TY - JOUR T1 - Discovering Pronoun Categories using Discourse Information JF - Proceedings of the 35th Annual Conference of the Cognitive Science Society Y1 - Submitted A1 - McKeown, R A1 - Feldman, N H A1 - Lidz, J A1 - Jordan Boyd-Graber AB - Abstract Interpretation of a pronoun is driven by properties of syntactic distribution. Consequently, acquiring the meaning and the distribution are intertwined. In order to learn that a pronoun is reflexive, learners need to know which entity the pronoun refers to in a ... UR - http://ling.umd.edu/~naho/orita_cogsci2013.pdf ER - TY - JOUR T1 - Evaluating Regularized Anchor Words JF - mimno.infosci.cornell.edu Y1 - Submitted A1 - Nguyen, T A1 - Hu, Y A1 - Jordan Boyd-Graber AB - Abstract We perform a comprehensive examination of the recently proposed anchor method for topic model inference using topic interpretability and held-out likelihood measures. After measuring the sensitivity to the anchor selection process, we incorporate L2 and Beta ... UR - http://mimno.infosci.cornell.edu/nips2013ws/nips2013tm_submission_27.pdf ER - TY - JOUR T1 - Topic Models for Translation Domain Adaptation JF - mimno.infosci.cornell.edu Y1 - Submitted A1 - Hu, Y A1 - Zhai, K A1 - Edelman, V A1 - Jordan Boyd-Graber AB - Abstract Topic models have been successfully applied in domain adaptation for translation models. However, previous works applied topic models only on source side and ignored the relations between source and target languages in machine translation. This paper ... UR - http://mimno.infosci.cornell.edu/nips2013ws/nips2013tm_submission_19.pdf ER - TY - JOUR T1 - Tree-based Label Dependency Topic Models JF - cs.umd.edu Y1 - Submitted A1 - Nguyen, V A A1 - Jordan Boyd-Graber A1 - Chang, J A1 - Resnik, P AB - Abstract Multi-labeled corpora, where each document is tagged with a set of labels, are ubiquitous. When the number of unique labels in the dataset is large, there are naturally some dependencies among the labels. In this paper, we propose TREELAD—a ... UR - http://www.cs.umd.edu/~vietan/2013_l2h.pdf ER - TY - JOUR T1 - Rapid, quantitative therapeutic screening for Alzheimer's enzymes enabled by optimal signal transduction with transistors JF - The Analyst Y1 - 2020 A1 - Le, Son T. A1 - Morris, Michelle A. A1 - Cardone, Antonio A1 - Guros, Nicholas B. A1 - Klauda, Jeffery B. A1 - Sperling, Brent A. A1 - Richter, Curt A. A1 - Pant, Harish C. A1 - Balijepalli, Arvind VL - 145 UR - http://xlink.rsc.org/?DOI=C9AN01804Bhttp://pubs.rsc.org/en/content/articlepdf/2020/AN/C9AN01804Bhttp://pubs.rsc.org/en/content/articlepdf/2020/AN/C9AN01804B CP - 8 J1 - Analyst M3 - 10.1039/C9AN01804B ER - TY - JOUR T1 - Metagenome sequencing-based strain-level and functional characterization of supragingival microbiome associated with dental caries in children JF - Journal of Oral Microbiology Y1 - 2019 A1 - Al-Hebshi, Nezar Noor A1 - Baraniya, Divyashri A1 - Chen, Tsute A1 - Hill, Jennifer A1 - Puri, Sumant A1 - Tellez, Marisol A1 - Hassan, Nur A. A1 - Rita R Colwell A1 - Ismail, Amid AB - Studies of the microbiome associated with dental caries have largely relied on 16S rRNA sequence analysis, which is associated with PCR biases, low taxonomic resolution, and inability to accurately study functions. Here, we employed whole metagenome shotgun sequencing, coupled with high-resolution analysis algorithm, to analyze supragingival microbiomes from 30 children with or without dental caries. A total of 726 bacterial strains belonging to 406 species, in addition to 34 bacteriophages were identified. A core bacteriome was identified at the species and strain levels. Species of Prevotella, Veillonella, as yet unnamed Actinomyces, and Atopobium showed strongest association with caries; Streptococcus sp. AS14 and Leptotrichia sp. Oral taxon 225, among others, were overabundant in caries-free. For several species, the association was strain-specific. Furthermore, for some species, e.g. Streptococcus mitis and Streptococcus sanguinis, sister strains showed differential associations. Noteworthy, associations were also identified for phages: Streptococcus phage M102 with caries and Haemophilus phage HP1 with caries-free. Functionally, potentially relevant features were identified including urate, vitamin K2, and polyamine biosynthesis in association with caries; and three deiminases and lactate dehydrogenase with health. The results demonstrate new associations between the microbiome and dental caries at the strain and functional levels that need further investigation. UR - https://www.tandfonline.com/doi/full/10.1080/20002297.2018.1557986 CP - 118 J1 - Journal of Oral Microbiology M3 - 10.1080/20002297.2018.1557986 ER - TY - JOUR T1 - Quantum Capacitance-Limited MoS2 Biosensors Enable Remote Label-Free Enzyme Measurements JF - Nanoscale Y1 - 2019 A1 - Le, Son T A1 - Guros, Nicholas B A1 - Bruce, Robert C A1 - Cardone, Antonio A1 - Amin, Niranjana D A1 - Zhang, Siyuan A1 - Klauda, Jeffery A1 - Pant, Harish C A1 - Richter, Curt A A1 - Balijepalli, Arvind UR - http://pubs.rsc.org/en/Content/ArticleLanding/2019/NR/C9NR03171Ehttp://pubs.rsc.org/en/content/articlepdf/2019/NR/C9NR03171E J1 - Nanoscale M3 - 10.1039/C9NR03171E ER - TY - JOUR T1 - Comparison of Infant Gut and Skin Microbiota, Resistome and Virulome Between Neonatal Intensive Care Unit (NICU) Environments JF - Frontiers in Microbiology Y1 - 2018 A1 - Hourigan, Suchitra K. A1 - Subramanian, Poorani A1 - Hasan, Nur A. A1 - Ta, Allison A1 - Klein, Elisabeth A1 - Chettout, Nassim A1 - Huddleston, Kathi A1 - Deopujari, Varsha A1 - Levy, Shira A1 - Baveja, R A1 - Clemency, Nicole C. A1 - Baker, Robin L. A1 - Niederhuber, John E. A1 - Rita R Colwell UR - https://www.frontiersin.org/article/10.3389/fmicb.2018.01361/full J1 - Front. Microbiol. M3 - 10.3389/fmicb.2018.01361 ER - TY - CONF T1 - Interpolation-Based Gray-Level Co-Occurrence Matrix Computation for Texture Directionality Estimation T2 - IEEE 22nd Signal Processing Algorithms, Architectures, Arrangements, and Applications Conference Y1 - 2018 A1 - Marcin Kociolek A1 - Mary Brady A1 - Peter Bajcsy A1 - Cardone, Antonio AB - A novel interpolation-based model for the computation of the Gray Level Co-occurrence Matrix (GLCM) is presented. The model enables GLCM computation for any real valued angles and offsets, as opposed to the traditional, lattice-based model. A texture directionality estimation algorithm is defined using the GLCM-derived correlation feature. The robustness of the algorithm with respect to image blur and additive Gaussian noise is evaluated. It is concluded that directionality estimation is robust to image blur and low noise levels. For high noise levels, the mean error increases but remains bounded. The performance of the directionality estimation algorithm is illustrated on fluorescence microscopy images of fibroblast cells. The algorithm was implemented in C++ and the source code is available in an openly accessible repository. JA - IEEE 22nd Signal Processing Algorithms, Architectures, Arrangements, and Applications Conference PB - IEEE CY - Poznan, Poland SN - 978-8-3620-6533-2 UR - https://ieeexplore.ieee.org/document/8563413 M3 - 10.23919/SPA.2018.8563413 ER - TY - JOUR T1 - Occurrence of Vibrio cholerae in water reservoirs of Burkina Faso JF - Research in Microbiology Y1 - 2018 A1 - Kaboré, Saidou A1 - Cecchi, Philippe A1 - Mosser, Thomas A1 - Toubiana, Mylène A1 - Traoré, Oumar A1 - Ouattara, Aboubakar S. A1 - Traoré, Alfred S. A1 - Barro, Nicolas A1 - Rita R Colwell A1 - Monfort, Patrick AB - Africa is currently an important region in which cholera epidemics occur. Little is known about the presence of Vibrio cholerae in freshwater bodies in Africa. There are ca. 1700 lakes and reservoirs in Burkina Faso, most of which have been built within recent decades to secure water resources. The purpose of this study was to investigate the presence of V. cholerae in the water of reservoirs, using the most-probable-number polymerase chain reaction. Results showed that V. cholerae could be detected in water samples collected from 14 of 39 sampled reservoirs. The concentrations varied from 0 MPN/l to more than 1100 MPN/l. Fifty strains of V. cholerae isolated on CHROMagar™ vibrio were identified as V. cholerae non-O1/non-O139, none of which carried the ctxA gene. A significant positive correlation was found between the presence of V. cholerae in the reservoirs and both alkaline pH and phytoplankton biomass. V. cholerae was present in significantly higher numbers in reservoirs of urban areas than in rural areas. Since V. cholerae non-O1/non-O139 has been shown to be a causative agent of endemic diarrheal outbreaks, their presence in Burkina Faso reservoirs suggests they may play a role in gastroenteritis in that country. VL - 169 UR - https://www.sciencedirect.com/science/article/pii/S092325081730147X?via%3Dihub CP - 1 J1 - Research in Microbiology M3 - 10.1016/j.resmic.2017.08.004 ER - TY - JOUR T1 - Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis) JF - Biological Reviews Y1 - 2018 A1 - Carlson, Colin J. A1 - Getz, Wayne M. A1 - Kausrud, Kyrre L. A1 - Cizauskas, Carrie A. A1 - Blackburn, Jason K. A1 - Bustos Carrillo, Fausto A. A1 - Rita R Colwell A1 - Easterday, W. Ryan A1 - Ganz, Holly H. A1 - Kamath, Pauline L. A1 - Økstad, Ole A. A1 - Turner, Wendy C. A1 - Kolsto, Anne-Brit A1 - Stenseth, Nils C. AB - Environmentally transmitted diseases are comparatively poorly understood and managed, and their ecology is particularly understudied. Here we identify challenges of studying environmental transmission and persistence with a six‐sided interdisciplinary review of the biology of anthrax (Bacillus anthracis). Anthrax is a zoonotic disease capable of maintaining infectious spore banks in soil for decades (or even potentially centuries), and the mechanisms of its environmental persistence have been the topic of significant research and controversy. Where anthrax is endemic, it plays an important ecological role, shaping the dynamics of entire herbivore communities. The complex eco‐epidemiology of anthrax, and the mysterious biology of Bacillus anthracis during its environmental stage, have necessitated an interdisciplinary approach to pathogen research. Here, we illustrate different disciplinary perspectives through key advances made by researchers working in Etosha National Park, a long‐term ecological research site in Namibia that has exemplified the complexities of the enzootic process of anthrax over decades of surveillance. In Etosha, the role of scavengers and alternative routes (waterborne transmission and flies) has proved unimportant relative to the long‐term persistence of anthrax spores in soil and their infection of herbivore hosts. Carcass deposition facilitates green‐ups of vegetation to attract herbivores, potentially facilitated by the role of anthrax spores in the rhizosphere. The underlying seasonal pattern of vegetation, and herbivores' immune and behavioural responses to anthrax risk, interact to produce regular ‘anthrax seasons’ that appear to be a stable feature of the Etosha ecosystem. Through the lens of microbiologists, geneticists, immunologists, ecologists, epidemiologists, and clinicians, we discuss how anthrax dynamics are shaped at the smallest scale by population genetics and interactions within the bacterial communities up to the broadest scales of ecosystem structure. We illustrate the benefits and challenges of this interdisciplinary approach to disease ecology, and suggest ways anthrax might offer insights into the biology of other important pathogens. Bacillus anthracis, and the more recently emerged Bacillus cereus biovar anthracis, share key features with other environmentally transmitted pathogens, including several zoonoses and panzootics of special interest for global health and conservation efforts. Understanding the dynamics of anthrax, and developing interdisciplinary research programs that explore environmental persistence, is a critical step forward for understanding these emerging threats. UR - https://onlinelibrary.wiley.com/doi/full/10.1111/brv.12420 CP - 4 J1 - Biol Rev M3 - 10.1111/brv.12420 ER - TY - JOUR T1 - Application of a paper based device containing a new culture medium to detect Vibrio cholerae in water samples collected in Haiti JF - Journal of Microbiological Methods Y1 - 2017 A1 - Briquaire, Romain A1 - Rita R Colwell A1 - Boncy, Jacques A1 - Rossignol, Emmanuel A1 - Dardy, Aline A1 - Pandini, Isabelle A1 - Villeval, François A1 - Machuron, Jean-Louis A1 - Huq, Anwar A1 - Rashed, Shah A1 - Vandevelde, Thierry A1 - Rozand, Christine VL - 133 UR - https://www.sciencedirect.com/science/article/pii/S0167701216303578?via%3Dihub J1 - Journal of Microbiological Methods M3 - 10.1016/j.mimet.2016.12.014 ER - TY - JOUR T1 - A Bioinformatics 3D Cellular Morphotyping Strategy for Assessing Biomaterial Scaffold Niches JF - ACS Biomaterials Science & Engineering Y1 - 2017 A1 - Florczyk, Stephen J. A1 - Simon, Mylene A1 - Juba, Derek A1 - Pine, P. Scott A1 - Sarkar, Sumona A1 - Chen, Desu A1 - Baker, Paula J. A1 - Bodhak, Subhadip A1 - Cardone, Antonio A1 - Brady, Mary C. A1 - Bajcsy, Peter A1 - Simon, Carl G. VL - 3 UR - http://pubs.acs.org/doi/10.1021/acsbiomaterials.7b00473http://pubs.acs.org/doi/pdf/10.1021/acsbiomaterials.7b00473 CP - 10 J1 - ACS Biomater. Sci. Eng. M3 - 10.1021/acsbiomaterials.7b00473 ER - TY - JOUR T1 - Characterization of Pathogenic Vibrio parahaemolyticus from the Chesapeake Bay, Maryland JF - Frontiers in Microbiology Y1 - 2017 A1 - Chen, Arlene J. A1 - Hasan, Nur A. A1 - Haley, Bradd J. A1 - Taviani, Elisa A1 - Tarnowski, Mitch A1 - Brohawn, Kathy A1 - Johnson, Crystal N. A1 - Rita R Colwell A1 - Huq, Anwar UR - http://journal.frontiersin.org/article/10.3389/fmicb.2017.02460 J1 - Front. Microbiol. M3 - 10.3389/fmicb.2017.02460 ER - TY - JOUR T1 - CRISPR-Cas and Contact-Dependent Secretion Systems Present on Excisable Pathogenicity Islands with Conserved Recombination Modules JF - Journal of Bacteriology Y1 - 2017 A1 - Carpenter, Megan R. A1 - Kalburge, Sai S. A1 - Borowski, Joseph D. A1 - Peters, Molly C. A1 - Rita R Colwell A1 - Boyd, E. Fidelma ED - DiRita, Victor J. AB - Pathogenicity islands (PAIs) are mobile integrated genetic elements that contain a diverse range of virulence factors. PAIs integrate into the host chromosome at a tRNA locus that contains their specific bacterial attachment site, attB, via integrase-mediated site-specific recombination generating attL and attR sites. We identified conserved recombination modules (integrases and att sites) previously described in choleragenic Vibrio cholerae PAIs but with novel cargo genes. Clustered regularly interspaced short palindromic repeat (CRISPR)-associated proteins (Cas proteins) and a type VI secretion system (T6SS) gene cluster were identified at the Vibrio pathogenicity island 1 (VPI-1) insertion site in 19 V. cholerae strains and contained the same recombination module. Two divergent type I-F CRISPR-Cas systems were identified, which differed in Cas protein homology and content. The CRISPR repeat sequence was identical among all V. cholerae strains, but the CRISPR spacer sequences and the number of spacers varied. In silico analysis suggests that the CRISPR-Cas systems were active against phages and plasmids. A type III secretion system (T3SS) was present in 12 V. cholerae strains on a 68-kb island inserted at the same tRNA-serine insertion site as VPI-2 and contained the same recombination module. Bioinformatics analysis showed that two divergent T3SSs exist among the strains examined. Both the CRISPR and T3SS islands excised site specifically from the bacterial chromosome as complete units, and the cognate integrases were essential for this excision. These data demonstrated that identical recombination modules that catalyze integration and excision from the chromosome can acquire diverse cargo genes, signifying a novel method of acquisition for both CRISPR-Cas systems and T3SSs. UR - http://jb.asm.org/lookup/doi/10.1128/JB.00842-16 CP - 10 J1 - J. Bacteriol. M3 - 10.1128/JB.00842-16 ER - TY - JOUR T1 - Genomic Methods and Microbiological Technologies for Profiling Novel and Extreme Environments for the Extreme Microbiome Project (XMP) JF - Journal of Biomolecular Techniques : JBT Y1 - 2017 A1 - Tighe, Scott A1 - Afshinnekoo, Ebrahim A1 - Rock, Tara M. A1 - McGrath, Ken A1 - Alexander, Noah A1 - McIntyre, Alexa A1 - Ahsanuddin, Sofia A1 - Bezdan, Daniela A1 - Green, Stefan J. A1 - Joye, Samantha A1 - Stewart Johnson, Sarah A1 - Baldwin, Don A. A1 - Bivens, Nathan A1 - Ajami, Nadim A1 - Carmical, Joseph R. A1 - Herriott, Ian Charold A1 - Rita R Colwell A1 - Donia, Mohamed A1 - Foox, Jonathan A1 - Greenfield, Nick A1 - Hunter, Tim A1 - Hoffman, Jessica A1 - Hyman, Joshua A1 - Jorgensen, Ellen A1 - Krawczyk, Diana A1 - Lee, Jodie A1 - Levy, Shawn A1 - Garcia-Reyero, àlia A1 - Settles, Matthew A1 - Thomas, Kelley A1 - ómez, Felipe A1 - Schriml, Lynn A1 - Kyrpides, Nikos A1 - Zaikova, Elena A1 - Penterman, Jon A1 - Mason, Christopher E. AB - The Extreme Microbiome Project (XMP) is a project launched by the Association of Biomolecular Resource Facilities Metagenomics Research Group (ABRF MGRG) that focuses on whole genome shotgun sequencing of extreme and unique environments using a wide variety of biomolecular techniques. The goals are multifaceted, including development and refinement of new techniques for the following: 1) the detection and characterization of novel microbes, 2) the evaluation of nucleic acid techniques for extremophilic samples, and 3) the identification and implementation of the appropriate bioinformatics pipelines. Here, we highlight the different ongoing projects that we have been working on, as well as details on the various methods we use to characterize the microbiome and metagenome of these complex samples. In particular, we present data of a novel multienzyme extraction protocol that we developed, called Polyzyme or MetaPolyZyme. Presently, the XMP is characterizing sample sites around the world with the intent of discovering new species, genes, and gene clusters. Once a project site is complete, the resulting data will be publically available. Sites include Lake Hillier in Western Australia, the “Door to Hell” crater in Turkmenistan, deep ocean brine lakes of the Gulf of Mexico, deep ocean sediments from Greenland, permafrost tunnels in Alaska, ancient microbial biofilms from Antarctica, Blue Lagoon Iceland, Ethiopian toxic hot springs, and the acidic hypersaline ponds in Western Australia. VL - 28 UR - https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5345951/ CP - 1 J1 - J Biomol Tech M3 - 10.7171/jbt.17-2801-004 ER - TY - JOUR T1 - The microbiomes of blowflies and houseflies as bacterial transmission reservoirs JF - Scientific Reports Y1 - 2017 A1 - Junqueira, AC A1 - Ratan, Aakrosh A1 - Acerbi, Enzo A1 - Drautz-Moses, Daniela I. A1 - Premkrishnan, BNV A1 - Costea, PI A1 - Linz, Bodo A1 - Purbojati, Rikky W. A1 - Paulo, Daniel F. A1 - Gaultier, Nicolas E. A1 - Subramanian, Poorani A1 - Hasan, Nur A. A1 - Rita R Colwell A1 - Bork, Peer A1 - Azeredo-Espin, Ana Maria L. A1 - Bryant, Donald A. A1 - Schuster, Stephan C. AB - Blowflies and houseflies are mechanical vectors inhabiting synanthropic environments around the world. They feed and breed in fecal and decaying organic matter, but the microbiome they harbour and transport is largely uncharacterized. We sampled 116 individual houseflies and blowflies from varying habitats on three continents and subjected them to high-coverage, whole-genome shotgun sequencing. This allowed for genomic and metagenomic analyses of the host-associated microbiome at the species level. Both fly host species segregate based on principal coordinate analysis of their microbial communities, but they also show an overlapping core microbiome. Legs and wings displayed the largest microbial diversity and were shown to be an important route for microbial dispersion. The environmental sequencing approach presented here detected a stochastic distribution of human pathogens, such as Helicobacter pylori, thereby demonstrating the potential of flies as proxies for environmental and public health surveillance. UR - http://www.nature.com/articles/s41598-017-16353-x CP - 1 J1 - Sci Rep M3 - 10.1038/s41598-017-16353-x ER - TY - JOUR T1 - SYN-004 (ribaxamase), an oral beta-lactamase, mitigates antibiotic-mediated dysbiosis in a porcine gut microbiome model JF - Journal of Applied Microbiology Y1 - 2017 A1 - Connelly, S. A1 - Bristol, J.A. A1 - Hubert, S. A1 - Subramanian, P. A1 - Hasan, N.A. A1 - Rita R Colwell A1 - Kaleko, M. AB - Aim To evaluate an antibiotic inactivation strategy to protect the gut microbiome from antibiotic‐mediated damage. Methods and Results SYN‐004 (ribaxamase) is an orally delivered beta‐lactamase intended to degrade penicillins and cephalosporins within the gastrointestinal tract to protect the microbiome. Pigs (20 kg, n = 10) were treated with ceftriaxone (CRO) (IV, 50 mg kg−1, SID) for 7 days and a cohort (n = 5) received ribaxamase (PO, 75 mg, QID) for 9 days beginning the day before antibiotic administration. Ceftriaxone serum levels were not statistically different in the antibiotic‐alone and antibiotic + ribaxamase groups, indicating ribaxamase did not alter systemic antibiotic levels. Whole‐genome metagenomic analyses of pig faecal DNA revealed that CRO caused significant changes to the gut microbiome and an increased frequency of antibiotic resistance genes. With ribaxamase, the gut microbiomes were not significantly different from pretreatment and antibiotic resistance gene frequency was not increased. Conclusion Ribaxamase mitigated CRO‐mediated gut microbiome dysbiosis and attenuated propagation of the antibiotic resistance genes in pigs. Significance and Impact of the Study Damage of the microbiome can lead to overgrowth of pathogenic organisms and antibiotic exposure can promote selection for antibiotic‐resistant micro‐organisms. Ribaxamase has the potential to become the first therapy designed to protect the gut microbiome from antibiotic‐mediated dysbiosis and reduce emergence of antibiotic resistance. UR - https://onlinelibrary.wiley.com/doi/10.1111/jam.13432 CP - 1Suppl 11 J1 - J Appl Microbiol M3 - 10.1111/jam.13432 ER - TY - CONF T1 - 3D Cellular Morphotyping of Scaffold Niches T2 - 2016 32nd Southern Biomedical Engineering Conference (SBEC) Y1 - 2016 A1 - Florczyk, Stephen J A1 - Simon, Mylene A1 - Juba, Derek A1 - Pine, P Scott A1 - Sarkar, Sumona A1 - Chen, Desu A1 - Baker, Paula J A1 - Bodhak, Subhadip A1 - Cardone, Antonio A1 - Brady, Mary A1 - others JA - 2016 32nd Southern Biomedical Engineering Conference (SBEC) PB - IEEE ER - TY - JOUR T1 - Chitin promotes Mycobacterium ulcerans growth JF - FEMS Microbiology Ecology Y1 - 2016 A1 - Sanhueza, Daniel A1 - Chevillon, Christine A1 - Rita R Colwell A1 - Babonneau, Jérémie A1 - Marion, Estelle A1 - Marsollier, Laurent A1 - égan, çois ED - Sobecky, Patricia AB - Mycobacterium ulcerans (MU) is the causative agent of Buruli ulcer, an emerging human infectious disease. However, both the ecology and life cycle of MU are poorly understood. The occurrence of MU has been linked to the aquatic environment, notably water bodies affected by human activities. It has been hypothesized that one or a combination of environmental factor(s) connected to human activities could favour growth of MU in aquatic systems. Here, we tested in vitro the growth effect of two ubiquitous polysaccharides and five chemical components on MU at concentration ranges shown to occur in endemic regions. Real-time PCR showed that chitin increased MU growth significantly providing a nutrient source or environmental support for the bacillus, thereby, providing a focus on the association between MU and aquatic arthropods. Aquatic environments with elevated population of arthropods provide increased chitin availability and, thereby, enhanced multiplication of MU. If calcium very slightly enhanced MU growth, iron, zinc, sulphate and phosphate did not stimulate MU growth, and at the concentration ranges of this study would limit MU population in natural ecosystems. VL - 928565871 UR - https://academic.oup.com/femsec/article-lookup/doi/10.1093/femsec/fiw067 CP - 6 J1 - FEMS Microbiology Ecology M3 - 10.1093/femsec/fiw067 ER - TY - JOUR T1 - Climate influence on Vibrio and associated human diseases during the past half-century in the coastal North Atlantic JF - Proceedings of the National Academy of Sciences Y1 - 2016 A1 - Vezzulli, Luigi A1 - Grande, Chiara A1 - Reid, Philip C. A1 - élaouët, Pierre A1 - Edwards, Martin A1 - öfle, Manfred G. A1 - Brettar, Ingrid A1 - Rita R Colwell A1 - Pruzzo, Carla AB - Climate change is having a dramatic impact on marine animal and plant communities but little is known of its influence on marine prokaryotes, which represent the largest living biomass in the world oceans and play a fundamental role in maintaining life on our planet. In this study, for the first time to our knowledge, experimental evidence is provided on the link between multidecadal climatic variability in the temperate North Atlantic and the presence and spread of an important group of marine prokaryotes, the vibrios, which are responsible for several infections in both humans and animals. Using archived formalin-preserved plankton samples collected by the Continuous Plankton Recorder survey over the past half-century (1958–2011), we assessed retrospectively the relative abundance of vibrios, including human pathogens, in nine areas of the North Atlantic and North Sea and showed correlation with climate and plankton changes. Generalized additive models revealed that long-term increase in Vibrio abundance is promoted by increasing sea surface temperatures (up to ∼1.5 °C over the past 54 y) and is positively correlated with the Northern Hemisphere Temperature (NHT) and Atlantic Multidecadal Oscillation (AMO) climatic indices (P < 0.001). Such increases are associated with an unprecedented occurrence of environmentally acquired Vibrio infections in the human population of Northern Europe and the Atlantic coast of the United States in recent years. UR - http://www.pnas.org/lookup/doi/10.1073/pnas.1609157113 J1 - Proc Natl Acad Sci USA M3 - 10.1073/pnas.1609157113 ER - TY - JOUR T1 - Computational study of the inhibitory mechanism of the kinase CDK5 hyperactivity by peptide p5 and derivation of a pharmacophore JF - Journal of Computer-Aided Molecular Design Y1 - 2016 A1 - Cardone, Antonio A1 - Brady, M. A1 - Sriram, R. A1 - Pant, H. C. A1 - Hassan, S. A. VL - 30 UR - http://link.springer.com/10.1007/s10822-016-9922-3http://link.springer.com/content/pdf/10.1007/s10822-016-9922-3http://link.springer.com/content/pdf/10.1007/s10822-016-9922-3.pdfhttp://link.springer.com/article/10.1007/s10822-016-9922-3/fulltext.html CP - 6 J1 - J Comput Aided Mol Des M3 - 10.1007/s10822-016-9922-3 ER - TY - JOUR T1 - Enrichment dynamics of Listeria monocytogenes and the associated microbiome from naturally contaminated ice cream linked to a listeriosis outbreak JF - BMC Microbiology Y1 - 2016 A1 - Ottesen, Andrea A1 - Ramachandran, Padmini A1 - Reed, Elizabeth A1 - White, James R. A1 - Hasan, Nur A1 - Subramanian, Poorani A1 - Ryan, Gina A1 - Jarvis, Karen A1 - Grim, Christopher A1 - Daquiqan, Ninalynn A1 - Hanes, Darcy A1 - Allard, Marc A1 - Rita R Colwell A1 - Brown, Eric A1 - Chen, Yi UR - http://bmcmicrobiol.biomedcentral.com/articles/10.1186/s12866-016-0894-1 J1 - BMC Microbiol M3 - 10.1186/s12866-016-0894-1 ER - TY - JOUR T1 - IncA/C Conjugative Plasmids Mobilize a New Family of Multidrug Resistance Islands in Clinical Vibrio cholerae Non-O1/Non-O139 Isolates from Haiti JF - mBio Y1 - 2016 A1 - Carraro, Nicolas A1 - Rivard, Nicolas A1 - Ceccarelli, Daniela A1 - Rita R Colwell A1 - Burrus, Vincent AB - Mobile genetic elements play a pivotal role in the adaptation of bacterial populations, allowing them to rapidly cope with hostile conditions, including the presence of antimicrobial compounds. IncA/C conjugative plasmids (ACPs) are efficient vehicles for dissemination of multidrug resistance genes in a broad range of pathogenic species of Enterobacteriaceae. ACPs have sporadically been reported in Vibrio cholerae, the infectious agent of the diarrheal disease cholera. The regulatory network that controls ACP mobility ultimately depends on the transcriptional activation of multiple ACP-borne operons by the master activator AcaCD. Beyond ACP conjugation, AcaCD has also recently been shown to activate the expression of genes located in the Salmonella genomic island 1 (SGI1). Here, we describe MGIVchHai6, a novel and unrelated mobilizable genomic island (MGI) integrated into the 3′ end of trmE in chromosome I of V. cholerae HC-36A1, a non-O1/non-O139 multidrug-resistant clinical isolate recovered from Haiti in 2010. MGIVchHai6 contains a mercury resistance transposon and an integron In104-like multidrug resistance element similar to the one of SGI1. We show that MGIVchHai6 excises from the chromosome in an AcaCD-dependent manner and is mobilized by ACPs. Acquisition of MGIVchHai6 confers resistance to β-lactams, sulfamethoxazole, tetracycline, chloramphenicol, trimethoprim, and streptomycin/spectinomycin. In silico analyses revealed that MGIVchHai6-like elements are carried by several environmental and clinical V. cholerae strains recovered from the Indian subcontinent, as well as from North and South America, including all non-O1/non-O139 clinical isolates from Haiti. UR - http://mbio.asm.org/lookup/doi/10.1128/mBio.00509-16 CP - 4 J1 - mBio M3 - 10.1128/mBio.00509-16 ER - TY - JOUR T1 - Modeling Sustainability: Population, Inequality, Consumption, and Bidirectional Coupling of the Earth and Human Systems JF - National Science Review Y1 - 2016 A1 - Motesharrei, Safa A1 - Rivas, Jorge A1 - Kalnay, Eugenia A1 - Asrar, Ghassem R. A1 - Busalacchi, Antonio J. A1 - Cahalan, Robert F. A1 - Cane, Mark A. A1 - Rita R Colwell A1 - Feng, Kuishuang A1 - Franklin, Rachel S. A1 - Hubacek, Klaus A1 - Miralles-Wilhelm, Fernando A1 - Miyoshi, Takemasa A1 - Ruth, Matthias A1 - Sagdeev, Roald A1 - Shirmohammadi, Adel A1 - Shukla, Jagadish A1 - Srebric, Jelena A1 - Yakovenko, Victor M. A1 - Zeng, Ning AB - Over the last two centuries, the impact of the Human System has grown dramatically, becoming strongly dominant within the Earth System in many different ways. Consumption, inequality, and population have increased extremely fast, especially since about 1950, threatening to overwhelm the many critical functions and ecosystems of the Earth System. Changes in the Earth System, in turn, have important feedback effects on the Human System, with costly and potentially serious consequences. However, current models do not incorporate these critical feedbacks. We argue that in order to understand the dynamics of either system, Earth System Models must be coupled with Human System Models through bidirectional couplings representing the positive, negative, and delayed feedbacks that exist in the real systems. In particular, key Human System variables, such as demographics, inequality, economic growth, and migration, are not coupled with the Earth System but are instead driven by exogenous estimates, such as United Nations population projections. This makes current models likely to miss important feedbacks in the real Earth–Human system, especially those that may result in unexpected or counterintuitive outcomes, and thus requiring different policy interventions from current models. The importance and imminence of sustainability challenges, the dominant role of the Human System in the Earth System, and the essential roles the Earth System plays for the Human System, all call for collaboration of natural scientists, social scientists, and engineers in multidisciplinary research and modeling to develop coupled Earth–Human system models for devising effective science-based policies and measures to benefit current and future generations. UR - https://academic.oup.com/nsr/article-lookup/doi/10.1093/nsr/nww081 J1 - Nat. Sci. Rev. M3 - 10.1093/nsr/nww081 ER - TY - JOUR T1 - Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union JF - Frontiers in Public Health Y1 - 2015 A1 - Bartholomew, James C. A1 - Pearson, Andrew D. A1 - Stenseth, Nils C. A1 - LeDuc, James W. A1 - Hirschberg, David L. A1 - Rita R Colwell VL - 35361632 UR - http://journal.frontiersin.org/Article/10.3389/fpubh.2015.00271/abstract J1 - Front. Public Health M3 - 10.3389/fpubh.2015.00271 ER - TY - JOUR T1 - Deep-sea hydrothermal vent bacteria related to human pathogenic Vibrio species JF - Proceedings of the National Academy of Sciences Y1 - 2015 A1 - Hasan, Nur A. A1 - Grim, Christopher J. A1 - Lipp, Erin K. A1 - Rivera, Irma N. G. A1 - Chun, Jongsik A1 - Haley, Bradd J. A1 - Taviani, Elisa A1 - Choi, Seon Young A1 - Hoq, Mozammel A1 - Munk, A. Christine A1 - Brettin, Thomas S. A1 - Bruce, David A1 - Challacombe, Jean F. A1 - Detter, J. Chris A1 - Han, Cliff S. A1 - Eisen, Jonathan A. A1 - Huq, Anwar A1 - Rita R Colwell AB - Vibrio species are both ubiquitous and abundant in marine coastal waters, estuaries, ocean sediment, and aquaculture settings worldwide. We report here the isolation, characterization, and genome sequence of a novel Vibrio species, Vibrio antiquarius, isolated from a mesophilic bacterial community associated with hydrothermal vents located along the East Pacific Rise, near the southwest coast of Mexico. Genomic and phenotypic analysis revealed V. antiquarius is closely related to pathogenic Vibrio species, namely Vibrio alginolyticus, Vibrio parahaemolyticus, Vibrio harveyi, and Vibrio vulnificus, but sufficiently divergent to warrant a separate species status. The V. antiquarius genome encodes genes and operons with ecological functions relevant to the environment conditions of the deep sea and also harbors factors known to be involved in human disease caused by freshwater, coastal, and brackish water vibrios. The presence of virulence factors in this deep-sea Vibrio species suggests a far more fundamental role of these factors for their bacterial host. Comparative genomics revealed a variety of genomic events that may have provided an important driving force in V. antiquarius evolution, facilitating response to environmental conditions of the deep sea. UR - http://www.pnas.org/lookup/doi/10.1073/pnas.1503928112 CP - 2144666966517 J1 - Proc Natl Acad Sci USA M3 - 10.1073/pnas.1503928112 ER - TY - JOUR T1 - Detection and characterization of nonspecific, sparsely populated binding modes in the early stages of complexation. JF - J Comput Chem Y1 - 2015 A1 - Cardone, Antonio A1 - Bornstein, Aaron A1 - Pant, Harish C A1 - Brady, Mary A1 - Sriram, Ram A1 - Hassan, Sergio A AB -

A method is proposed to study protein-ligand binding in a system governed by specific and nonspecific interactions. Strong associations lead to narrow distributions in the proteins configuration space; weak and ultraweak associations lead instead to broader distributions, a manifestation of nonspecific, sparsely populated binding modes with multiple interfaces. The method is based on the notion that a discrete set of preferential first-encounter modes are metastable states from which stable (prerelaxation) complexes at equilibrium evolve. The method can be used to explore alternative pathways of complexation with statistical significance and can be integrated into a general algorithm to study protein interaction networks. The method is applied to a peptide-protein complex. The peptide adopts several low-population conformers and binds in a variety of modes with a broad range of affinities. The system is thus well suited to analyze general features of binding, including conformational selection, multiplicity of binding modes, and nonspecific interactions, and to illustrate how the method can be applied to study these problems systematically. The equilibrium distributions can be used to generate biasing functions for simulations of multiprotein systems from which bulk thermodynamic quantities can be calculated. © 2015 Wiley Periodicals, Inc.

M3 - 10.1002/jcc.23883 ER - TY - JOUR T1 - Environmental Surveillance for Toxigenic Vibrio cholerae in Surface Waters of Haiti JF - The American Journal of Tropical Medicine and Hygiene Y1 - 2015 A1 - Hill, Vincent R. A1 - Humphrys, Michael S. A1 - Kahler, Amy M. A1 - Boncy, Jacques A1 - Tarr, Cheryl L. A1 - Huq, Anwar A1 - Chen, Arlene A1 - Katz, Lee S. A1 - Mull, Bonnie J. A1 - Derado, Gordana A1 - Haley, Bradd J. A1 - Freeman, Nicole A1 - Rita R Colwell A1 - Turnsek, Maryann AB - Epidemic cholera was reported in Haiti in 2010, with no information available on the occurrence or geographic distribution of toxigenic Vibrio cholerae in Haitian waters. In a series of field visits conducted in Haiti between 2011 and 2013, water and plankton samples were collected at 19 sites. Vibrio cholerae was detected using culture, polymerase chain reaction, and direct viable count methods (DFA-DVC). Cholera toxin genes were detected by polymerase chain reaction in broth enrichments of samples collected in all visits except March 2012. Toxigenic V. cholerae was isolated from river water in 2011 and 2013. Whole genome sequencing revealed that these isolates were a match to the outbreak strain. The DFA-DVC tests were positive for V. cholerae O1 in plankton samples collected from multiple sites. Results of this survey show that toxigenic V. cholerae could be recovered from surface waters in Haiti more than 2 years after the onset of the epidemic. VL - 92 UR - http://www.ajtmh.org/content/journals/10.4269/ajtmh.13-0601 CP - 1 M3 - 10.4269/ajtmh.13-0601 ER - TY - CONF T1 - Estimating Actin Fiber Orientation using Interpolation-Based Grey-Level Co-Occurrence Matrix Computation T2 - BioImage Informatics Conference Y1 - 2015 A1 - Cardone, Antonio A1 - Brady, Mary A1 - Kociolek, Marcin A1 - Bajcsy, Peter JA - BioImage Informatics Conference ER - TY - JOUR T1 - Nontoxigenic Vibrio cholerae Non-O1/O139 Isolate from a Case of Human Gastroenteritis in the U.S. Gulf Coast JF - Journal of Clinical Microbiology Y1 - 2015 A1 - Hasan, Nur A. A1 - Rezayat, Talayeh A1 - Blatz, Peter J. A1 - Choi, Seon Young A1 - Griffitt, Kimberly J. A1 - Rashed, Shah M. A1 - Huq, Anwar A1 - Conger, Nicholas G. A1 - Rita R Colwell A1 - Grimes, D. Jay ED - Munson, E. AB - An occurrence of Vibrio cholerae non-O1/O139 gastroenteritis in the U.S. Gulf Coast is reported here. Genomic analysis revealed that the isolate lacked known virulence factors associated with the clinical outcome of a V. cholerae infection but did contain putative genomic islands and other accessory virulence factors. Many of these factors are widespread among environmental strains of V. cholerae, suggesting that there might be additional virulence factors in non-O1/O139 V. cholerae yet to be determined. Phylogenetic analysis revealed that the isolate belonged to a phyletic lineage of environmental V. cholerae isolates associated with sporadic cases of gastroenteritis in the Western Hemisphere, suggesting a need to monitor non-O1/O139 V. cholerae in the interest of public health. UR - http://jcm.asm.org/lookup/doi/10.1128/JCM.02187-14 CP - 1 J1 - J. Clin. Microbiol. M3 - 10.1128/JCM.02187-14 ER - TY - JOUR T1 - Satellite Based Assessment of Hydroclimatic Conditions Related to Cholera in Zimbabwe JF - PLOS ONE Y1 - 2015 A1 - Jutla, Antarpreet A1 - Aldaach, Haidar A1 - Billian, Hannah A1 - Akanda, Ali A1 - Huq, Anwar A1 - Rita R Colwell ED - Schumann, Guy J-P. AB - Introduction Cholera, an infectious diarrheal disease, has been shown to be associated with large scale hydroclimatic processes. The sudden and sporadic occurrence of epidemic cholera is linked with high mortality rates, in part, due to uncertainty in timing and location of outbreaks. Improved understanding of the relationship between pathogenic abundance and climatic processes allows prediction of disease outbreak to be an achievable goal. In this study, we show association of large scale hydroclimatic processes with the cholera epidemic in Zimbabwe reported to have begun in Chitungwiza, a city in Mashonaland East province, in August, 2008. Principal Findings Climatic factors in the region were found to be associated with triggering cholera outbreak and are shown to be related to anomalies of temperature and precipitation, validating the hypothesis that poor conditions of sanitation, coupled with elevated temperatures, and followed by heavy rainfall can initiate outbreaks of cholera. Spatial estimation by satellite of precipitation and global gridded air temperature captured sensitivities in hydroclimatic conditions that permitted identification of the location in the region where the disease outbreak began. Discussion Satellite derived hydroclimatic processes can be used to capture environmental conditions related to epidemic cholera, as occurred in Zimbabwe, thereby providing an early warning system. Since cholera cannot be eradicated because the causative agent, Vibrio cholerae, is autochthonous to the aquatic environment, prediction of conditions favorable for its growth and estimation of risks of triggering the disease in a given population can be used to alert responders, potentially decreasing infection and saving lives. UR - https://dx.plos.org/10.1371/journal.pone.0137828 CP - 9Suppl 1 J1 - PLoS ONE M3 - 10.1371/journal.pone.0137828 ER - TY - CONF T1 - Segmentation and sub-cellular feature-based analysis of microscopy images T2 - BioImage Informatics Conference Y1 - 2015 A1 - Cardone, Antonio A1 - Chalfoun, Joe A1 - Peskin, Adele A1 - Bajcsy, Peter A1 - Kociolek, Marcin A1 - Bhadriraju, Kiran A1 - Brady, Mary JA - BioImage Informatics Conference ER - TY - JOUR T1 - Survey statistics of automated segmentations applied to optical imaging of mammalian cells JF - BMC bioinformatics Y1 - 2015 A1 - Bajcsy, Peter A1 - Cardone, Antonio A1 - Chalfoun, Joe A1 - Halter, Michael A1 - Juba, Derek A1 - Kociolek, Marcin A1 - Majurski, Michael A1 - Peskin, Adele A1 - Simon, Carl A1 - Simon, Mylene A1 - others VL - 16 ER - TY - JOUR T1 - A unified initiative to harness Earth's microbiomes JF - Science Y1 - 2015 A1 - Alivisatos, A. P. A1 - Blaser, M. J. A1 - Brodie, E. L. A1 - Chun, M. A1 - Dangl, J. L. A1 - Donohue, T. J. A1 - Dorrestein, P. C. A1 - Gilbert, J. A. A1 - Green, J. L. A1 - Jansson, J. K. A1 - Knight, R. A1 - Maxon, M. E. A1 - McFall-Ngai, M. J. A1 - Miller, J. F. A1 - Pollard, K. S. A1 - Ruby, E. G. A1 - Taha, S. A. A1 - Rita R Colwell UR - http://www.sciencemag.org/cgi/doi/10.1126/science.aac8480 CP - 62607551614341176 J1 - Science M3 - 10.1126/science.aac8480 ER - TY - JOUR T1 - Use of Environmental Parameters to Model Pathogenic Vibrios in Chesapeake Bay JF - Journal of Environmental Informatics Y1 - 2015 A1 - Zaitchik, B. F. A1 - Guikema, S. D. A1 - Haley, B. J. A1 - Taviani, E. A1 - Chen, A. A1 - Brown, M.E. A1 - Huq, A. A1 - Rita R Colwell AB - Although the transportation sector is a major contributor to urban air pollution and global climate change due to its substantial energy consumptions, previous studies for evacuation practices in this sector seldom took environmental consequences into account. As an attempt in event-related evacuation planning under uncertainty, this study proposed an emission-mitigation-oriented fuzzy evacuation management (emoFEM) model. Comprehensive considerations over system efficiency, environmental protection, economic cost and resource availability were incorporated within a general modeling formulation to facilitate evacuation management in a systematic and compromise manner. Vague and ambiguous information embedded within evacuation problems could be quantified and directly communicated into the optimization process, greatly improving conventional tools for evacuation management under uncertainty. The proposed emoFEM model was then applied to a hypothetic but representative case. Useful solutions were generated, which could help identify timely, safe and cost-effective evacuation schemes without significant disturbances over normal municipal traffic and environmental quality. The advantages of emoFEM were further revealed through comparing its solutions with those from its deterministic counterpart. UR - http://www.iseis.org/jei/abstract.asp?no=201500307 J1 - J ENV INFORM M3 - 10.3808/jei.201500307 ER - TY - JOUR T1 - Vibrio metoecus sp. nov., a close relative of Vibrio cholerae isolated from coastal brackish ponds and clinical specimens JF - INTERNATIONAL JOURNAL OF SYSTEMATIC AND EVOLUTIONARY MICROBIOLOGY Y1 - 2014 A1 - Kirchberger, P. C. A1 - Turnsek, M. A1 - Hunt, D. E. A1 - Haley, B. J. A1 - Rita R Colwell A1 - Polz, M. F. A1 - Tarr, C. L. A1 - Boucher, Y. UR - http://ijs.microbiologyresearch.org/content/journal/ijsem/10.1099/ijs.0.060145-0 CP - Pt 95616795215116120545121 J1 - INTERNATIONAL JOURNAL OF SYSTEMATIC AND EVOLUTIONARY MICROBIOLOGY M3 - 10.1099/ijs.0.060145-0 ER - TY - JOUR T1 - Microbial Community Profiling of Human Saliva Using Shotgun Metagenomic Sequencing JF - PLoS ONE Y1 - 2014 A1 - Hasan, Nur A. A1 - Young, Brian A. A1 - Minard-Smith, Angela T. A1 - Saeed, Kelly A1 - Li, Huai A1 - Heizer, Esley M. A1 - McMillan, Nancy J. A1 - Isom, Richard A1 - Abdullah, Abdul Shakur A1 - Bornman, Daniel M. A1 - Faith, Seth A. A1 - Choi, Seon Young A1 - Dickens, Michael L. A1 - Cebula, Thomas A. A1 - Rita R Colwell ED - Ahmed, Niyaz AB - Human saliva is clinically informative of both oral and general health. Since next generation shotgun sequencing (NGS) is now widely used to identify and quantify bacteria, we investigated the bacterial flora of saliva microbiomes of two healthy volunteers and five datasets from the Human Microbiome Project, along with a control dataset containing short NGS reads from bacterial species representative of the bacterial flora of human saliva. GENIUS, a system designed to identify and quantify bacterial species using unassembled short NGS reads was used to identify the bacterial species comprising the microbiomes of the saliva samples and datasets. Results, achieved within minutes and at greater than 90% accuracy, showed more than 175 bacterial species comprised the bacterial flora of human saliva, including bacteria known to be commensal human flora but also Haemophilus influenzae, Neisseria meningitidis, Streptococcus pneumoniae, and Gamma proteobacteria. Basic Local Alignment Search Tool (BLASTn) analysis in parallel, reported ca. five times more species than those actually comprising the in silico sample. Both GENIUS and BLAST analyses of saliva samples identified major genera comprising the bacterial flora of saliva, but GENIUS provided a more precise description of species composition, identifying to strain in most cases and delivered results at least 10,000 times faster. Therefore, GENIUS offers a facile and accurate system for identification and quantification of bacterial species and/or strains in metagenomic samples. UR - https://dx.plos.org/10.1371/journal.pone.0097699 CP - 5 J1 - PLoS ONE M3 - 10.1371/journal.pone.0097699 ER - TY - JOUR T1 - Occurrence in Mexico, 1998–2008, of Vibrio cholerae CTX + El Tor carrying an additional truncated CTX prophage JF - Proceedings of the National Academy of Sciences Y1 - 2014 A1 - Alam, Munirul A1 - Rashed, Shah M A1 - Mannan, Shahnewaj Bin A1 - Islam, Tarequl A1 - Lizarraga-Partida, Marcial L. A1 - Delgado, Gabriela A1 - Morales-Espinosa, Rosario A1 - Mendez, Jose Luis A1 - Navarro, Armando A1 - Watanabe, Haruo A1 - Ohnishi, Makoto A1 - Hasan, Nur A. A1 - Huq, Anwar A1 - Sack, R. Bradley A1 - Rita R Colwell A1 - Cravioto, Alejandro VL - 111 UR - http://www.pnas.org/lookup/doi/10.1073/pnas.1323408111 CP - 27 J1 - Proc Natl Acad Sci USA M3 - 10.1073/pnas.1323408111 ER - TY - JOUR T1 - Validation of high throughput sequencing and microbial forensics applications JF - Investigative Genetics Y1 - 2014 A1 - Budowle, Bruce A1 - Connell, Nancy D A1 - Bielecka-Oder, Anna A1 - Rita R Colwell A1 - Corbett, Cindi R A1 - Fletcher, Jacqueline A1 - Forsman, Mats A1 - Kadavy, Dana R A1 - Markotic, Alemka A1 - Morse, Stephen A A1 - Murch, Randall S A1 - Sajantila, Antti A1 - Schmedes, Sarah E A1 - Ternus, Krista L A1 - Turner, Stephen D A1 - Minot, Samuel AB - High throughput sequencing (HTS) generates large amounts of high quality sequence data for microbial genomics. The value of HTS for microbial forensics is the speed at which evidence can be collected and the power to characterize microbial-related evidence to solve biocrimes and bioterrorist events. As HTS technologies continue to improve, they provide increasingly powerful sets of tools to support the entire field of microbial forensics. Accurate, credible results allow analysis and interpretation, significantly influencing the course and/or focus of an investigation, and can impact the response of the government to an attack having individual, political, economic or military consequences. Interpretation of the results of microbial forensic analyses relies on understanding the performance and limitations of HTS methods, including analytical processes, assays and data interpretation. The utility of HTS must be defined carefully within established operating conditions and tolerances. Validation is essential in the development and implementation of microbial forensics methods used for formulating investigative leads attribution. HTS strategies vary, requiring guiding principles for HTS system validation. Three initial aspects of HTS, irrespective of chemistry, instrumentation or software are: 1) sample preparation, 2) sequencing, and 3) data analysis. Criteria that should be considered for HTS validation for microbial forensics are presented here. Validation should be defined in terms of specific application and the criteria described here comprise a foundation for investigators to establish, validate and implement HTS as a tool in microbial forensics, enhancing public safety and national security. VL - 5 UR - http://investigativegenetics.biomedcentral.com/articles/10.1186/2041-2223-5-9 CP - 1 J1 - Invest GenetInvestigative Genetics M3 - 10.1186/2041-2223-5-9 ER - TY - JOUR T1 - Viewing Marine Bacteria, Their Activity and Response to Environmental Drivers from Orbit JF - Microbial Ecology Y1 - 2014 A1 - Grimes, D. Jay A1 - Ford, Tim E. A1 - Rita R Colwell A1 - Baker-Austin, Craig A1 - Martinez-Urtaza, Jaime A1 - Subramaniam, Ajit A1 - Capone, Douglas G. AB - Satellite-based remote sensing of marine microorganisms has become a useful tool in predicting human health risks associated with these microscopic targets. Early applications were focused on harmful algal blooms, but more recently methods have been developed to interrogate the ocean for bacteria. As satellite-based sensors have become more sophisticated and our ability to interpret information derived from these sensors has advanced, we have progressed from merely making fascinating pictures from space to developing process models with predictive capability. Our understanding of the role of marine microorganisms in primary production and global elemental cycles has been vastly improved as has our ability to use the combination of remote sensing data and models to provide early warning systems for disease outbreaks. This manuscript will discuss current approaches to monitoring cyanobacteria and vibrios, their activity and response to environmental drivers, and will also suggest future directions. UR - http://link.springer.com/10.1007/s00248-013-0363-4 CP - 38 J1 - Microb Ecol M3 - 10.1007/s00248-013-0363-4 ER - TY - JOUR T1 - Argviz: Interactive Visualization of Topic Dynamics in Multi-party Conversations JF - Human Language Technologies: The 2013 Annual Conference of the North American Chapter of the Association for Computational Linguistics Y1 - 2013 A1 - Nguyen, V A A1 - Hu, Y A1 - Jordan Boyd-Graber AB - Abstract We introduce an efficient, interactive framework—Argviz—for experts to analyze the dynamic topical structure of multi-party conversations. Users inject their needs, expertise, and insights into models via iterative topic refinement. The refined topics feed into a ... UR - https://www.aclweb.org/anthology-new/N/N13/N13-3.pdf#page=42 ER - TY - JOUR T1 - Binary to Bushy: Bayesian Hierarchical Clustering with the Beta Coalescent Y1 - 2013 A1 - Hu, Yuening A1 - Jordan Boyd-Graber A1 - Daume III, Hal A1 - Ying, Z Irene AB - Abstract Discovering hierarchical regularities in data is a key problem in interacting with large datasets, modeling cognition, and encoding knowledge. A previous Bayesian solution-- -Kingman's coalescent---provides a convenient probabilistic model for data represented ... UR - http://papers.nips.cc/paper/5161-binary-to-bushy-bayesian-hierarchical-clustering-with-the-beta-coalescent ER - TY - JOUR T1 - Dirichlet Mixtures, the Dirichlet Process, and the Structure of Protein Space JF - Journal of Computational Biology Y1 - 2013 A1 - Nguyen,Viet-An A1 - Jordan Boyd-Graber A1 - Altschul, Stephen F. KW - ALIGNMENT KW - computational molecular biology KW - dynamic programming KW - multiple alignment KW - sequence analysis AB - The Dirichlet process is used to model probability distributions that are mixtures of an unknown number of components. Amino acid frequencies at homologous positions within related proteins have been fruitfully modeled by Dirichlet mixtures, and we use the Dirichlet process to derive such mixtures with an unbounded number of components. This application of the method requires several technical innovations to sample an unbounded number of Dirichlet-mixture components. The resulting Dirichlet mixtures model multiple-alignment data substantially better than do previously derived ones. They consist of over 500 components, in contrast to fewer than 40 previously, and provide a novel perspective on the structure of proteins. Individual protein positions should be seen not as falling into one of several categories, but rather as arrayed near probability ridges winding through amino acid multinomial space. VL - 20 M3 - 10.1089/cmb.2012.0244 ER - TY - JOUR T1 - Engaging Actively with Issues in the Responsible Conduct of Science: Lessons from International Efforts Are Relevant for Undergraduate Education in the United States JF - CBE—Life Sciences Education Y1 - 2013 A1 - Clements, John D. A1 - Connell, Nancy D. A1 - Dirks, Clarissa A1 - El-Faham, Mohamed A1 - Hay, Alastair A1 - Heitman, Elizabeth A1 - Stith, James H. A1 - Bond, Enriqueta C. A1 - Rita R Colwell A1 - Anestidou, Lida A1 - Husbands, Jo L. A1 - Labov, Jay B. AB - Numerous studies are demonstrating that engaging undergraduate students in original research can improve their achievement in the science, technology, engineering, and mathematics (STEM) fields and increase the likelihood that some of them will decide to pursue careers in these disciplines. Associated with this increased prominence of research in the undergraduate curriculum are greater expectations from funders, colleges, and universities that faculty mentors will help those students, along with their graduate students and postdoctoral fellows, develop an understanding and sense of personal and collective obligation for responsible conduct of science (RCS). This Feature describes an ongoing National Research Council (NRC) project and a recent report about educating faculty members in culturally diverse settings (Middle East/North Africa and Asia) to employ active-learning strategies to engage their students and colleagues deeply in issues related to RCS. The NRC report describes the first phase of this project, which took place in Aqaba and Amman, Jordan, in September 2012 and April 2013, respectively. Here we highlight the findings from that report and our subsequent experience with a similar interactive institute in Kuala Lumpur, Malaysia. Our work provides insights and perspectives for faculty members in the United States as they engage undergraduate and graduate students, as well as postdoctoral fellows, to help them better understand the intricacies of and connections among various components of RCS. Further, our experiences can provide insights for those who may wish to establish “train-the-trainer” programs at their home institutions. UR - https://www.lifescied.org/doi/10.1187/cbe.13-09-0184 CP - 4 J1 - LSE M3 - 10.1187/cbe.13-09-0184 ER - TY - JOUR T1 - Identification of bacteria in enrichment cultures of sulfate reducers in the Cariaco Basin water column employing Denaturing Gradient Gel Electrophoresis of 16S ribosomal RNA gene fragments JF - Aquatic Biosystems Y1 - 2013 A1 - Bozo-Hurtado, Lorelei A1 - García-Amado, M A1 - Chistoserdov, Andrei A1 - Varela, Ramon A1 - Narvaez, J A1 - Rita R Colwell A1 - Suárez, Paula AB - Background The Cariaco Basin is characterized by pronounced and predictable vertical layering of microbial communities dominated by reduced sulfur species at and below the redox transition zone. Marine water samples were collected in May, 2005 and 2006, at the sampling stations A (10°30′ N, 64°40′ W), B (10°40′ N, 64°45′ W) and D (10°43’N, 64°32’W) from different depths, including surface, redox interface, and anoxic zones. In order to enrich for sulfate reducing bacteria (SRB), water samples were inoculated into anaerobic media amended with lactate or acetate as carbon source. To analyze the composition of enrichment cultures, we performed DNA extraction, PCR-DGGE, and sequencing of selected bands. Results DGGE results indicate that many bacterial genera were present that are associated with the sulfur cycle, including Desulfovibrio spp., as well as heterotrophs belonging to Vibrio, Enterobacter, Shewanella, Fusobacterium, Marinifilum, Mariniliabilia, and Spirochaeta. These bacterial populations are related to sulfur coupling and carbon cycles in an environment of variable redox conditions and oxygen availability. Conclusions In our studies, we found an association of SRB-like Desulfovibrio with Vibrio species and other genera that have a previously defined relevant role in sulfur transformation and coupling of carbon and sulfur cycles in an environment where there are variable redox conditions and oxygen availability. This study provides new information about microbial species that were culturable on media for SRB at anaerobic conditions at several locations and water depths in the Cariaco Basin. VL - 9 UR - http://aquaticbiosystems.biomedcentral.com/articles/10.1186/2046-9063-9-17 CP - 1 J1 - Aquat BiosystAquatic Biosystems M3 - 10.1186/2046-9063-9-17 ER - TY - JOUR T1 - Improving public transit accessibility for blind riders by crowdsourcing bus stop landmark locations with Google street view JF - The 15th International ACM SIGACCESS Conference Y1 - 2013 A1 - Hara, Kotaro A1 - Azenkot, Shiri A1 - Campbell, Megan A1 - Bennett, Cynthia L A1 - Le, Vicki A1 - Pannella, Sean A1 - Moore, Robert A1 - Minckler, Kelly A1 - Ng, Rochelle H A1 - Jon Froehlich AB - Abstract Low-vision and blind bus riders often rely on known physical landmarks to help locate and verify bus stop locations (eg., by searching for a shelter, bench, newspaper bin). However, there are currently few, if any, methods to determine this information a priori via ... PB - SIGACCESS, ACM Special Interest Group on Accessible ComputingACM CY - New York, New York, USA SN - 9781450324052 UR - http://dl.acm.org/citation.cfm?doid=2513383.2513448 J1 - ASSETS '13 M3 - 10.1145/2513383.2513448 ER - TY - JOUR T1 - Lexical and Hierarchical Topic Regression Y1 - 2013 A1 - Nguyen, Viet-An A1 - Jordan Boyd-Graber A1 - Resnik, Philip AB - Abstract Inspired by a two-level theory that unifies agenda setting and ideological framing, we propose supervised hierarchical latent Dirichlet allocation (SHLDA) which jointly captures documents' multi-level topic structure and their polar response variables. Our ... UR - http://papers.nips.cc/paper/5163-lexical-and-hierarchical-topic-regression ER - TY - CONF T1 - Mind the Theoretical Gap: Interpreting, Using, and Developing Behavioral Theory in HCI Research T2 - CHI 2013 To Appear Y1 - 2013 A1 - Hekler, E. B. A1 - Klasnja,P. A1 - Jon Froehlich A1 - Buman, M. P. JA - CHI 2013 To Appear ER - TY - JOUR T1 - Modeling topic control to detect influence in conversations using nonparametric topic models JF - Machine Learning Y1 - 2013 A1 - Nguyen, Viet-An A1 - Jordan Boyd-Graber A1 - Resnik, Philip A1 - Cai, Deborah A A1 - Midberry, Jennifer E A1 - Wang, Yuanxin AB - Abstract Identifying influential speakers in multi-party conversations has been the focus of research in communication, sociology, and psychology for decades. It has been long acknowledged qualitatively that controlling the topic of a conversation is a sign of ... PB - Springer US UR - http://link.springer.com/article/10.1007/s10994-013-5417-9/fulltext.html J1 - Mach Learn M3 - 10.1007/s10994-013-5417-9/fulltext.html ER - TY - CONF T1 - Online Latent Dirichlet Allocation with Infinite Vocabulary T2 - International Conference on Machine Learning Y1 - 2013 A1 - Zhai,Ke A1 - Jordan Boyd-Graber AB - Topic models based on latent Dirichlet allocation (LDA) assume a predefined vocabulary. This is reasonable in batch settings but not reasonable for streaming and online settings. To address this lacuna, we extend LDA by drawing topics from a Dirichlet process whose base distribution is a distribution over all strings rather than from a finite Dirichlet. We develop inference using online variational inference and—to only consider a finite number of words for each topic—propose heuristics to dynamically order, expand, and contract the set of words we consider in our vocabulary. We show our model can successfully incorporate new words and that it performs better than topic models with finite vocabularies in evaluations of topic quality and classification performance. JA - International Conference on Machine Learning ER - TY - JOUR T1 - Parallel geometric classification of stem cells by their three-dimensional morphology JF - Computational Science & Discovery Y1 - 2013 A1 - Juba,Derek A1 - Cardone, Antonio A1 - Ip, Cheuk Yiu A1 - Simon Jr, Carl G A1 - K Tison, Christopher A1 - Kumar, Girish A1 - Brady,Mary A1 - Varshney, Amitabh VL - 6 CP - 1 J1 - Comput. Sci. Disc. M3 - 10.1088/1749-4699/6/1/015007 ER - TY - JOUR T1 - Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells. JF - Journal of microscopy Y1 - 2013 A1 - Chalfoun, J A1 - Kociolek, M A1 - Dima, A A1 - Halter, M A1 - Cardone, Antonio A1 - Peskin, A A1 - Bajcsy, P A1 - Brady, M. KW - Animals KW - Cell Adhesion KW - Cell Count KW - Cell Division KW - Cell Shape KW - Computational Biology KW - Fibroblasts KW - Image Processing, Computer-Assisted KW - Mice KW - Microscopy, Phase-Contrast KW - NIH 3T3 Cells KW - Reproducibility of results KW - Sensitivity and Specificity KW - Time-Lapse Imaging AB - We present a new method for segmenting phase contrast images of NIH 3T3 fibroblast cells that is accurate even when cells are physically in contact with each other. The problem of segmentation, when cells are in contact, poses a challenge to the accurate automation of cell counting, tracking and lineage modelling in cell biology. The segmentation method presented in this paper consists of (1) background reconstruction to obtain noise-free foreground pixels and (2) incorporation of biological insight about dividing and nondividing cells into the segmentation process to achieve reliable separation of foreground pixels defined as pixels associated with individual cells. The segmentation results for a time-lapse image stack were compared against 238 manually segmented images (8219 cells) provided by experts, which we consider as reference data. We chose two metrics to measure the accuracy of segmentation: the 'Adjusted Rand Index' which compares similarities at a pixel level between masks resulting from manual and automated segmentation, and the 'Number of Cells per Field' (NCF) which compares the number of cells identified in the field by manual versus automated analysis. Our results show that the automated segmentation compared to manual segmentation has an average adjusted rand index of 0.96 (1 being a perfect match), with a standard deviation of 0.03, and an average difference of the two numbers of cells per field equal to 5.39% with a standard deviation of 4.6%. VL - 249 CP - 1 U1 - http://www.ncbi.nlm.nih.gov/pubmed/23126432?dopt=Abstract M3 - 10.1111/j.1365-2818.2012.03678.x ER - TY - JOUR T1 - Spoiler Alert: Machine Learning Approaches to Detect Social Media Posts with Revelatory Information Y1 - 2013 A1 - Jordan Boyd-Graber A1 - Glasgow, K A1 - Zajac, J S AB - ABSTRACT Spoilers—critical plot information about works of fiction that “spoil” a viewer's enjoyment—have prompted elaborate conventions on social media to allow readers to insulate themselves from spoilers. However, these solutions depend on the ... UR - http://www.umiacs.umd.edu/~jbg/docs/2013_spoiler.pdf ER - TY - JOUR T1 - TIGRFAMs and Genome Properties in 2013. JF - Nucleic Acids Res Y1 - 2013 A1 - Haft, Daniel H A1 - Jeremy D Selengut A1 - Richter, Roland A A1 - Harkins, Derek A1 - Basu, Malay K A1 - Beck, Erin KW - Databases, Protein KW - Genome, Archaeal KW - Genome, Bacterial KW - Genomics KW - Internet KW - Markov chains KW - Molecular Sequence Annotation KW - Proteins KW - sequence alignment AB -

TIGRFAMs, available online at http://www.jcvi.org/tigrfams is a database of protein family definitions. Each entry features a seed alignment of trusted representative sequences, a hidden Markov model (HMM) built from that alignment, cutoff scores that let automated annotation pipelines decide which proteins are members, and annotations for transfer onto member proteins. Most TIGRFAMs models are designated equivalog, meaning they assign a specific name to proteins conserved in function from a common ancestral sequence. Models describing more functionally heterogeneous families are designated subfamily or domain, and assign less specific but more widely applicable annotations. The Genome Properties database, available at http://www.jcvi.org/genome-properties, specifies how computed evidence, including TIGRFAMs HMM results, should be used to judge whether an enzymatic pathway, a protein complex or another type of molecular subsystem is encoded in a genome. TIGRFAMs and Genome Properties content are developed in concert because subsystems reconstruction for large numbers of genomes guides selection of seed alignment sequences and cutoff values during protein family construction. Both databases specialize heavily in bacterial and archaeal subsystems. At present, 4284 models appear in TIGRFAMs, while 628 systems are described by Genome Properties. Content derives both from subsystem discovery work and from biocuration of the scientific literature.

VL - 41 CP - Database issue M3 - 10.1093/nar/gks1234 ER - TY - JOUR T1 - Understanding the impact of image quality on segmentation accuracy JF - SPIE Newsroom Y1 - 2013 A1 - Li-Baboud, Ya-Shian A1 - Cardone, Antonio A1 - Chalfoun, Joe A1 - Bajcsy, Peter A1 - Elliott, John ER - TY - CHAP T1 - Why “Fiat-Shamir for Proofs” Lacks a Proof T2 - Theory of Cryptography Y1 - 2013 A1 - Bitansky, Nir A1 - Dana Dachman-Soled A1 - Garg, Sanjam A1 - Jain, Abhishek A1 - Kalai, Yael Tauman A1 - López-Alt, Adriana A1 - Wichs, Daniel ED - Sahai, Amit KW - Algorithm Analysis and Problem Complexity KW - Computation by Abstract Devices KW - Data Encryption KW - Systems and Data Security AB - The Fiat-Shamir heuristic [CRYPTO ’86] is used to convert any 3-message public-coin proof or argument system into a non-interactive argument, by hashing the prover’s first message to select the verifier’s challenge. It is known that this heuristic is sound when the hash function is modeled as a random oracle. On the other hand, the surprising result of Goldwasser and Kalai [FOCS ’03] shows that there exists a computationally sound argument on which the Fiat-Shamir heuristic is never sound, when instantiated with any actual efficient hash function. This leaves us with the following interesting possibility: perhaps we can securely instantiates the Fiat-Shamir heuristic for all 3-message public-coin statistically sound proofs, even if we must fail for some computationally sound arguments. Indeed, this has been conjectured to be the case by Barak, Lindell and Vadhan [FOCS ’03], but we do not have any provably secure instantiation under any “standard assumption”. In this work, we give a broad black-box separation result showing that the security of the Fiat-Shamir heuristic for statistically sound proofs cannot be proved under virtually any standard assumption via a black-box reduction. More precisely: –If we want to have a “universal” instantiation of the Fiat-Shamir heuristic that works for all 3-message public-coin proofs, then we cannot prove its security via a black-box reduction from any assumption that has the format of a “cryptographic game”. –For many concrete proof systems, if we want to have a “specific” instantiation of the Fiat-Shamir heuristic for that proof system, then we cannot prove its security via a black box reduction from any “falsifiable assumption” that has the format of a cryptographic game with an efficient challenger. JA - Theory of Cryptography T3 - Lecture Notes in Computer Science PB - Springer Berlin Heidelberg SN - 978-3-642-36593-5, 978-3-642-36594-2 UR - http://link.springer.com/chapter/10.1007/978-3-642-36594-2_11 ER - TY - JOUR T1 - BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics JF - Systematic BiologySyst Biol Y1 - 2012 A1 - Ayres,Daniel L A1 - Darling,Aaron A1 - Zwickl,Derrick J A1 - Beerli,Peter A1 - Holder,Mark T A1 - Lewis,Paul O A1 - Huelsenbeck,John P A1 - Ronquist,Fredrik A1 - Swofford,David L A1 - Cummings, Michael P. A1 - Rambaut,Andrew A1 - Suchard,Marc A KW - Bayesian phylogenetics KW - gpu KW - maximum likelihood KW - parallel computing AB - Phylogenetic inference is fundamental to our understanding of most aspects of the origin and evolution of life, and in recent years, there has been a concentration of interest in statistical approaches such as Bayesian inference and maximum likelihood estimation. Yet, for large data sets and realistic or interesting models of evolution, these approaches remain computationally demanding. High-throughput sequencing can yield data for thousands of taxa, but scaling to such problems using serial computing often necessitates the use of nonstatistical or approximate approaches. The recent emergence of graphics processing units (GPUs) provides an opportunity to leverage their excellent floating-point computational performance to accelerate statistical phylogenetic inference. A specialized library for phylogenetic calculation would allow existing software packages to make more effective use of available computer hardware, including GPUs. Adoption of a common library would also make it easier for other emerging computing architectures, such as field programmable gate arrays, to be used in the future. We present BEAGLE, an application programming interface (API) and library for high-performance statistical phylogenetic inference. The API provides a uniform interface for performing phylogenetic likelihood calculations on a variety of compute hardware platforms. The library includes a set of efficient implementations and can currently exploit hardware including GPUs using NVIDIA CUDA, central processing units (CPUs) with Streaming SIMD Extensions and related processor supplementary instruction sets, and multicore CPUs via OpenMP. To demonstrate the advantages of a common API, we have incorporated the library into several popular phylogenetic software packages. The BEAGLE library is free open source software licensed under the Lesser GPL and available from http://beagle-lib.googlecode.com. An example client program is available as public domain software. VL - 61 SN - 1063-5157, 1076-836X UR - http://sysbio.oxfordjournals.org/content/61/1/170 CP - 1 M3 - 10.1093/sysbio/syr100 ER - TY - CONF T1 - Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World T2 - CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security Y1 - 2012 A1 - Bilge, Leyla A1 - Tudor Dumitras KW - full disclosure KW - vulnerabilities KW - zero-day attacks AB - Little is known about the duration and prevalence of zero-day attacks, which exploit vulnerabilities that have not been disclosed publicly. Knowledge of new vulnerabilities gives cyber criminals a free pass to attack any target of their choosing, while remaining undetected. Unfortunately, these serious threats are difficult to analyze, because, in general, data is not available until after an attack is discovered. Moreover, zero-day attacks are rare events that are unlikely to be observed in honeypots or in lab experiments. In this paper, we describe a method for automatically identifying zero-day attacks from field-gathered data that records when benign and malicious binaries are downloaded on 11 million real hosts around the world. Searching this data set for malicious files that exploit known vulnerabilities indicates which files appeared on the Internet before the corresponding vulnerabilities were disclosed. We identify 18 vulnerabilities exploited before disclosure, of which 11 were not previously known to have been employed in zero-day attacks. We also find that a typical zero-day attack lasts 312 days on average and that, after vulnerabilities are disclosed publicly, the volume of attacks exploiting them increases by up to 5 orders of magnitude. JA - CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security T3 - CCS '12 PB - ACM SN - 978-1-4503-1651-4 UR - http://doi.acm.org/10.1145/2382196.2382284 ER - TY - JOUR T1 - Besting the Quiz Master: Crowdsourcing Incremental Classification Games JF - Empirical Methods in Natural Language Processing Y1 - 2012 A1 - Satinoff,Brianna A1 - Jordan Boyd-Graber AB - Cost-sensitive classification, where the features used in machine learning tasks have a cost, has been explored as a means of balancing knowl- edge against the expense of obtaining new fea- tures. We introduce a setting where humans engage in classification with incrementally re- vealed features: the collegiate trivia circuit. By providing the community with a web-based system to practice, we collected tens of thou- sands of implicit word-by-word ratings of how useful features are for eliciting correct answers. Observing humans’ classification process, we improve the performance of a state-of-the art classifier. We also use the dataset to evaluate a system to compete in the incremental classifica- tion task through a reduction of reinforcement learning to classification. Our system learns when to answer a question, performing better than baselines and most human players. ER - TY - JOUR T1 - Biases from model assumptions in texture sub-cellular image segmentation JF - SPIE Newsroom Y1 - 2012 A1 - Cardone, Antonio A1 - Amelot, Julien A1 - Li-Baboud, Ya-Shian A1 - Brady, Mary A1 - Bajcsy, Peter VL - 13 ER - TY - CHAP T1 - Collecting Semantic Similarity Ratings to Connect Concepts in Assistive Communication Tools T2 - Modeling, Learning, and Processing of Text Technological Data StructuresModeling, Learning, and Processing of Text Technological Data Structures Y1 - 2012 A1 - Nikolova,Sonya A1 - Jordan Boyd-Graber A1 - Fellbaum,Christiane ED - Mehler,Alexander ED - Kühnberger,Kai-Uwe ED - Lobin,Henning ED - Lüngen,Harald ED - Storrer,Angelika ED - Witt,Andreas AB - To compensate for the common inability of people with lexical production impairments to access and express intended concepts, we make use of models of human semantic memory that build on the notion of semantic similarity and relatedness. Such models, constructed on evidence gained from psycholinguistic experiments, form the basis of a large lexical database, WordNet . We augment WordNet with many additional links among words and concepts that are semantically related. Making this densely connected semantic network available to people with anomic aphasia through assistive technologies should enable them to navigate among related words and concepts and retrieve the words that they intend to express. JA - Modeling, Learning, and Processing of Text Technological Data StructuresModeling, Learning, and Processing of Text Technological Data Structures T3 - Studies in Computational Intelligence PB - Springer Berlin / Heidelberg VL - 370 SN - 978-3-642-22612-0 UR - http://dx.doi.org/10.1007/978-3-642-22613-7_5 ER - TY - CONF T1 - The design and evaluation of prototype eco-feedback displays for fixture-level water usage data Y1 - 2012 A1 - Jon Froehlich A1 - Findlater,L. A1 - Ostergren, M. A1 - Ramanathan, S. A1 - Peterson,J. A1 - Wragg, I. A1 - Larson,E. A1 - Fu, F. A1 - Bai, M. A1 - Patel,S. PB - ACM SN - 145031015X ER - TY - JOUR T1 - Design and Synthesis for Multimedia Systems Using the Targeted Dataflow Interchange Format JF - IEEE Transactions on Multimedia Y1 - 2012 A1 - Chung-Ching Shen A1 - Wu, Shenpei A1 - Sane, N. A1 - Wu, Hsiang-Huang A1 - Plishker,W. A1 - Bhattacharyya, Shuvra S. KW - associated dataflow graph-code generation KW - Computational modeling KW - contextual information encapsulation KW - cross-platform application design KW - data flow graphs KW - Data models KW - Data structures KW - Dataflow graphs KW - design components KW - design tools KW - Digital signal processing KW - electronic data interchange KW - embedded signal processing KW - Embedded software KW - high-level abstract modeling KW - high-performance embedded-processing architectures KW - Image coding KW - image registration application KW - image representation KW - low-level customizations KW - low-level optimization KW - low-level synthesis KW - Multimedia communication KW - multimedia systems KW - multimedia systems development KW - object-oriented data structures KW - object-oriented methods KW - parameterized schedule representation KW - programming interfaces KW - repetitive graph structures KW - retargetable design KW - Schedules KW - scheduling KW - software synthesis KW - Streaming media KW - targeted dataflow interchange format KW - task-level dataflow analysis AB - Development of multimedia systems that can be targeted to different platforms is challenging due to the need for rigorous integration between high-level abstract modeling, and low-level synthesis and optimization. In this paper, a new dataflow-based design tool called the targeted dataflow interchange format is introduced for retargetable design, analysis, and implementation of embedded software for multimedia systems. Our approach provides novel capabilities, based on principles of task-level dataflow analysis, for exploring and optimizing interactions across design components; object-oriented data structures for encapsulating contextual information for components; a novel model for representing parameterized schedules that are derived from repetitive graph structures; and automated code generation for programming interfaces and low-level customizations that are geared toward high-performance embedded-processing architectures. We demonstrate our design tool for cross-platform application design, parameterized schedule representation, and associated dataflow graph-code generation using a case study centered around an image registration application. VL - 14 SN - 1520-9210 CP - 3 ER - TY - CHAP T1 - Determining Protein Dynamics from 15N Relaxation Data by Using DYNAMICS T2 - Protein NMR Techniques Y1 - 2012 A1 - Fushman, David ED - Shekhtman,Alexander ED - Burz,David S. ED - Walker,John M. KW - Biomedical and Life Sciences AB - Motions are essential for protein function, and knowledge of protein dynamics is a key to our understanding the mechanisms underlying protein folding and stability, ligand recognition, allostery, and catalysis. In the last two decades, NMR relaxation measurements have become a powerful tool for characterizing backbone and side chain dynamics in complex biological macromolecules such as proteins and nucleic acids. Accurate analysis of the experimental data in terms of motional parameters is an essential prerequisite for developing physical models of motions to paint an adequate picture of protein dynamics. Here, I describe in detail how to use the software package DYNAMICS that was developed for accurate characterization of the overall tumbling and local dynamics in a protein from nuclear spin-relaxation rates measured by NMR. Step-by-step instructions are provided and illustrated through an analysis of 15 N relaxation data for protein G. JA - Protein NMR Techniques T3 - Methods in Molecular Biology PB - Humana Press VL - 831 SN - 978-1-61779-480-3 UR - http://www.springerlink.com/content/q667p0k138058103/abstract/ ER - TY - JOUR T1 - Dictionary-based Face Recognition Under Variable Lighting and Pose JF - IEEE Transactions on Information Forensics and Security Y1 - 2012 A1 - Patel, Vishal M. A1 - Wu,T. A1 - Biswas,S. A1 - Phillips,P. A1 - Chellapa, Rama KW - Biometrics KW - dictionary learning KW - face recognition KW - illumination variation, KW - outlier rejection AB - We present a face recognition algorithm based on simultaneous sparse approximations under varying illumination and pose. A dictionary is learned for each class based on given training examples which minimizes the representation error with a sparseness constraint. A novel test image is projected onto the span of the atoms in each learned dictionary. The resulting residual vectors are then used for classification. To handle variations in lighting conditions and pose, an image relighting technique based on pose-robust albedo estimation is used to generate multiple frontal images of the same person with variable lighting. As a result, the proposed algorithm has the ability to recognize human faces with high accuracy even when only a single or a very few images per person are provided for training. The efficiency of the proposed method is demonstrated using publicly available databases and it is shown that this method is efficient and can perform significantly better than many competitive face recognition algorithms. VL - PP SN - 1556-6013 CP - 99 M3 - 10.1109/TIFS.2012.2189205 ER - TY - JOUR T1 - Drosophila Src regulates anisotropic apical surface growth to control epithelial tube size JF - Nature Cell Biology Y1 - 2012 A1 - Nelson, Kevin S. A1 - Zia Khan A1 - Molnár, Imre A1 - Mihály, József A1 - Kaschube, Matthias A1 - Beitel, Greg J. AB - Networks of epithelial and endothelial tubes are essential for the function of organs such as the lung, kidney and vascular system. The sizes and shapes of these tubes are highly regulated to match their individual functions. Defects in tube size can cause debilitating diseases such as polycystic kidney disease and ischaemia. It is therefore critical to understand how tube dimensions are regulated. Here we identify the tyrosine kinase Src as an instructive regulator of epithelial-tube length in the Drosophila tracheal system. Loss-of-function Src42 mutations shorten tracheal tubes, whereas Src42 overexpression elongates them. Surprisingly, Src42 acts distinctly from known tube-size pathways and regulates both the amount of apical surface growth and, with the conserved formin dDaam, the direction of growth. Quantitative three-dimensional image analysis reveals that Src42- and dDaam-mutant tracheal cells expand more in the circumferential than the axial dimension, resulting in tubes that are shorter in length—but larger in diameter—than wild-type tubes. Thus, Src42 and dDaam control tube dimensions by regulating the direction of anisotropic growth, a mechanism that has not previously been described. VL - 14 SN - 1465-7392 UR - http://www.nature.com/ncb/journal/v14/n5/abs/ncb2467.html CP - 5 J1 - Nat Cell Biol ER - TY - JOUR T1 - Ecology of Vibrio parahaemolyticus and Vibrio vulnificus in the Coastal and Estuarine Waters of Louisiana, Maryland, Mississippi, and Washington (United States) JF - Applied and Environmental Microbiology Y1 - 2012 A1 - Johnson, Crystal N. A1 - Bowers, John C. A1 - Griffitt, Kimberly J. A1 - Molina, Vanessa A1 - Clostio, Rachel W. A1 - Pei, Shaofeng A1 - Laws, Edward A1 - Paranjpye, Rohinee N. A1 - Strom, Mark S. A1 - Chen, Arlene A1 - Hasan, Nur A. A1 - Huq, Anwar A1 - Noriea, Nicholas F. A1 - Grimes, D. Jay A1 - Rita R Colwell AB - Vibrio parahaemolyticus and Vibrio vulnificus, which are native to estuaries globally, are agents of seafood-borne or wound infections, both potentially fatal. Like all vibrios autochthonous to coastal regions, their abundance varies with changes in environmental parameters. Sea surface temperature (SST), sea surface height (SSH), and chlorophyll have been shown to be predictors of zooplankton and thus factors linked to vibrio populations. The contribution of salinity, conductivity, turbidity, and dissolved organic carbon to the incidence and distribution of Vibrio spp. has also been reported. Here, a multicoastal, 21-month study was conducted to determine relationships between environmental parameters and V. parahaemolyticus and V. vulnificus populations in water, oysters, and sediment in three coastal areas of the United States. Because ecologically unique sites were included in the study, it was possible to analyze individual parameters over wide ranges. Molecular methods were used to detect genes for thermolabile hemolysin (tlh), thermostable direct hemolysin (tdh), and tdh-related hemolysin (trh) as indicators of V. parahaemolyticus and the hemolysin gene vvhA for V. vulnificus. SST and suspended particulate matter were found to be strong predictors of total and potentially pathogenic V. parahaemolyticus and V. vulnificus. Other predictors included chlorophyll a, salinity, and dissolved organic carbon. For the ecologically unique sites included in the study, SST was confirmed as an effective predictor of annual variation in vibrio abundance, with other parameters explaining a portion of the variation not attributable to SST. UR - http://aem.asm.org/lookup/doi/10.1128/AEM.01296-12 CP - 20 J1 - Appl. Environ. Microbiol. M3 - 10.1128/AEM.01296-12 ER - TY - CHAP T1 - Efficient Password Authenticated Key Exchange via Oblivious Transfer T2 - Public Key Cryptography – PKC 2012 Y1 - 2012 A1 - Canetti, Ran A1 - Dana Dachman-Soled A1 - Vaikuntanathan, Vinod A1 - Wee, Hoeteck ED - Fischlin, Marc ED - Buchmann, Johannes ED - Manulis, Mark KW - adaptive security KW - Algorithm Analysis and Problem Complexity KW - Computer Communication Networks KW - Data Encryption KW - Discrete Mathematics in Computer Science KW - Management of Computing and Information Systems KW - oblivious transfer KW - Password Authenticated Key Exchange KW - search assumptions KW - Systems and Data Security KW - UC security AB - We present a new framework for constructing efficient password authenticated key exchange (PAKE) protocols based on oblivious transfer (OT). Using this framework, we obtain: an efficient and simple UC-secure PAKE protocol that is secure against adaptive corruptions without erasures. efficient and simple PAKE protocols under the Computational Diffie-Hellman (CDH) assumption and the hardness of factoring. (Previous efficient constructions rely on hash proof systems, which appears to be inherently limited to decisional assumptions.) All of our constructions assume a common reference string (CRS) but do not rely on random oracles. JA - Public Key Cryptography – PKC 2012 T3 - Lecture Notes in Computer Science PB - Springer Berlin Heidelberg SN - 978-3-642-30056-1, 978-3-642-30057-8 UR - http://link.springer.com/chapter/10.1007/978-3-642-30057-8_27 ER - TY - JOUR T1 - Efficient Tree-Based Topic Modeling JF - Association for Computational Linguistics Y1 - 2012 A1 - Hu,Yuening A1 - Jordan Boyd-Graber AB - Topic modeling with a tree-based prior has been used for a variety of applications be- cause it can encode correlations between words that traditional topic modeling cannot. How- ever, its expressive power comes at the cost of more complicated inference. We extend the SPARSELDA (Yao et al., 2009) inference scheme for latent Dirichlet allocation (LDA) to tree-based topic models. This sampling scheme computes the exact conditional distri- bution for Gibbs sampling much more quickly than enumerating all possible latent variable assignments. We further improve performance by iteratively refining the sampling distribution only when needed. Experiments show that the proposed techniques dramatically improve the computation time. ER - TY - JOUR T1 - The first international workshop on entity-oriented search (EOS) JF - SIGIR Forum Y1 - 2012 A1 - Balog,Krisztian A1 - de Vries,Arjen P. A1 - Serdyukov,Pavel A1 - Wen,Ji-Rong AB - The First International Workshop on Entity-Oriented Search (EOS) workshop was held on July 28, 2011 in Beijing, China, in conjunction with the 34th Annual International ACM SIGIR Conference (SIGIR 2011). The objective for the workshop was to bring together academic researchers and industry practitioners working on entity-oriented search to discuss tasks and challenges, and to uncover the next frontiers for academic research on the topic. The workshop program accommodated two invited talks, eleven refereed papers divided into three technical paper sessions, and a group discussion. VL - 45 SN - 0163-5840 UR - http://doi.acm.org/10.1145/2093346.2093353 CP - 2 M3 - 10.1145/2093346.2093353 ER - TY - JOUR T1 - A framework for human microbiome research JF - Nature Y1 - 2012 A1 - Methé, B.A. A1 - Nelson,K. E A1 - Pop, Mihai A1 - Creasy, H.H. A1 - Giglio, M.G. A1 - Huttenhower, C. A1 - Gevers, D. A1 - Petrosino, J.F. A1 - Abubucker, S. A1 - Badger, J.H. AB - A variety of microbial communities and their genes (the microbiome) exist throughout the human body, with fundamental roles in human health and disease. The National Institutes of Health (NIH)-funded Human Microbiome Project Consortium has established a population-scale framework to develop metagenomic protocols, resulting in a broad range of quality-controlled resources and data including standardized methods for creating, processing and interpreting distinct types of high-throughput metagenomic data available to the scientific community. Here we present resources from a population of 242 healthy adults sampled at 15 or 18 body sites up to three times, which have generated 5,177 microbial taxonomic profiles from 16S ribosomal RNA genes and over 3.5 terabases of metagenomic sequence so far. In parallel, approximately 800 reference strains isolated from the human body have been sequenced. Collectively, these data represent the largest resource describing the abundance and variety of the human microbiome, while providing a framework for current and future studies. VL - 486 ER - TY - JOUR T1 - Global secretome analysis identifies novel mediators of bone metastasis JF - Cell Research Y1 - 2012 A1 - Blanco, Mario Andres A1 - LeRoy, Gary A1 - Zia Khan A1 - Alečković, Maša A1 - Zee, Barry M. A1 - Garcia, Benjamin A. A1 - Kang, Yibin KW - bone KW - cancer KW - metastasis KW - proteomics KW - secretome AB - Bone is the one of the most common sites of distant metastasis of solid tumors. Secreted proteins are known to influence pathological interactions between metastatic cancer cells and the bone stroma. To comprehensively profile secreted proteins associated with bone metastasis, we used quantitative and non-quantitative mass spectrometry to globally analyze the secretomes of nine cell lines of varying bone metastatic ability from multiple species and cancer types. By comparing the secretomes of parental cells and their bone metastatic derivatives, we identified the secreted proteins that were uniquely associated with bone metastasis in these cell lines. We then incorporated bioinformatic analyses of large clinical metastasis datasets to obtain a list of candidate novel bone metastasis proteins of several functional classes that were strongly associated with both clinical and experimental bone metastasis. Functional validation of selected proteins indicated that in vivo bone metastasis can be promoted by high expression of (1) the salivary cystatins CST1, CST2, and CST4; (2) the plasminogen activators PLAT and PLAU; or (3) the collagen functionality proteins PLOD2 and COL6A1. Overall, our study has uncovered several new secreted mediators of bone metastasis and therefore demonstrated that secretome analysis is a powerful method for identification of novel biomarkers and candidate therapeutic targets. VL - 22 SN - 1001-0602 UR - http://www.nature.com/cr/journal/v22/n9/abs/cr201289a.html CP - 9 J1 - Cell Res ER - TY - JOUR T1 - Grammatical structures for word-level sentiment detection JF - North American Association of Computational Linguistics Y1 - 2012 A1 - Jordan Boyd-Graber A1 - Sayeed,Asad B. A1 - Rusk,Bryan A1 - Weinberg, Amy AB - Existing work in fine-grained sentiment anal- ysis focuses on sentences and phrases but ig- nores the contribution of individual words and their grammatical connections. This is because of a lack of both (1) annotated data at the word level and (2) algorithms that can leverage syn- tactic information in a principled way. We ad- dress the first need by annotating articles from the information technology business press via crowdsourcing to provide training and testing data. To address the second need, we propose a suffix-tree data structure to represent syntac- tic relationships between opinion targets and words in a sentence that are opinion-bearing. We show that a factor graph derived from this data structure acquires these relationships with a small number of word-level features. We demonstrate that our supervised model per- forms better than baselines that ignore syntac- tic features and constraints. ER - TY - JOUR T1 - Grey-box GUI Testing: Efficient Generation of Event Sequences JF - arXiv:1205.4928 Y1 - 2012 A1 - Arlt,Stephan A1 - Banerjee,Ishan A1 - Bertolini,Cristiano A1 - Memon, Atif M. A1 - Schäf,Martin KW - 68N30 KW - Computer Science - Software Engineering AB - Graphical user interfaces (GUIs), due to their event driven nature, present a potentially unbounded space of all possible ways to interact with software. During testing it becomes necessary to effectively sample this space. In this paper we develop algorithms that sample the GUI's input space by only generating sequences that (1) are allowed by the GUI's structure, and (2) chain together only those events that have data dependencies between their event handlers. We create a new abstraction, called an event-dependency graph (EDG) of the GUI, that captures data dependencies between event handler code. We develop a mapping between EDGs and an existing black-box user-level model of the GUI's workflow, called an event-flow graph (EFG). We have implemented automated EDG construction in a tool that analyzes the bytecode of each event handler. We evaluate our "grey-box" approach using four open-source applications and compare it with the current state-of-the-art EFG approach. Our results show that using the EDG reduces the number of test cases while still achieving at least the same coverage. Furthermore, we were able to detect 2 new bugs in the subject applications. UR - http://arxiv.org/abs/1205.4928 ER - TY - RPRT T1 - A Hybrid System for Error Detection in Electronic Dictionaries Y1 - 2012 A1 - Zajic, David A1 - David Doermann A1 - Bloodgood,Michael A1 - Rodrigues,Paul A1 - Ye,Peng A1 - Zotkina,Elena AB - A progress report on CASL’s research on error detection in electronic dictionaries, including a hybrid system, application and evaluation on a second dictionary and a graphical user interface. JA - Technical Reports of the Center for the Advanced Study of Language ER - TY - JOUR T1 - Identification of Coli Surface Antigen 23, a Novel Adhesin of Enterotoxigenic Escherichia coli JF - Infection and immunity Y1 - 2012 A1 - Del Canto, F. A1 - Botkin, D.J. A1 - Valenzuela, P. A1 - Popov, V. A1 - Ruiz-Perez, F. A1 - Nataro, J.P. A1 - Levine, M.M. A1 - Stine, O.C. A1 - Pop, Mihai A1 - Torres, A.G. A1 - others AB - Enterotoxigenic Escherichia coli (ETEC) is an important cause of diarrhea, mainly in developing countries. Although there are 25 different ETEC adhesins described in strains affecting humans, between 15% and 50% of the clinical isolates from different geographical regions are negative for these adhesins, suggesting that additional unidentified adhesion determinants might be present. Here, we report the discovery of Coli Surface Antigen 23 (CS23), a novel adhesin expressed by an ETEC serogroup O4 strain (ETEC 1766a), which was negative for the previously known ETEC adhesins, albeit it has the ability to adhere to Caco-2 cells. CS23 is encoded by an 8.8-kb locus which contains 9 open reading frames (ORFs), 7 of them sharing significant identity with genes required for assembly of K88-related fimbriae. This gene locus, named aal (adhesion-associated locus), is required for the adhesion ability of ETEC 1766a and was able to confer this adhesive phenotype to a nonadherent E. coli HB101 strain. The CS23 major structural subunit, AalE, shares limited identity with known pilin proteins, and it is more closely related to the CS13 pilin protein CshE, carried by human ETEC strains. Our data indicate that CS23 is a new member of the diverse adhesin repertoire used by ETEC strains. VL - 80 CP - 8 ER - TY - JOUR T1 - InterPro in 2011: new developments in the family and domain prediction database. JF - Nucleic Acids Res Y1 - 2012 A1 - Hunter, Sarah A1 - Jones, Philip A1 - Mitchell, Alex A1 - Apweiler, Rolf A1 - Attwood, Teresa K A1 - Bateman, Alex A1 - Bernard, Thomas A1 - Binns, David A1 - Bork, Peer A1 - Burge, Sarah A1 - de Castro, Edouard A1 - Coggill, Penny A1 - Corbett, Matthew A1 - Das, Ujjwal A1 - Daugherty, Louise A1 - Duquenne, Lauranne A1 - Finn, Robert D A1 - Fraser, Matthew A1 - Gough, Julian A1 - Haft, Daniel A1 - Hulo, Nicolas A1 - Kahn, Daniel A1 - Kelly, Elizabeth A1 - Letunic, Ivica A1 - Lonsdale, David A1 - Lopez, Rodrigo A1 - Madera, Martin A1 - Maslen, John A1 - McAnulla, Craig A1 - McDowall, Jennifer A1 - McMenamin, Conor A1 - Mi, Huaiyu A1 - Mutowo-Muellenet, Prudence A1 - Mulder, Nicola A1 - Natale, Darren A1 - Orengo, Christine A1 - Pesseat, Sebastien A1 - Punta, Marco A1 - Quinn, Antony F A1 - Rivoire, Catherine A1 - Sangrador-Vegas, Amaia A1 - Jeremy D Selengut A1 - Sigrist, Christian J A A1 - Scheremetjew, Maxim A1 - Tate, John A1 - Thimmajanarthanan, Manjulapramila A1 - Thomas, Paul D A1 - Wu, Cathy H A1 - Yeats, Corin A1 - Yong, Siew-Yit KW - Databases, Protein KW - Protein Structure, Tertiary KW - Proteins KW - Sequence Analysis, Protein KW - software KW - Terminology as Topic KW - User-Computer Interface AB -

InterPro (http://www.ebi.ac.uk/interpro/) is a database that integrates diverse information about protein families, domains and functional sites, and makes it freely available to the public via Web-based interfaces and services. Central to the database are diagnostic models, known as signatures, against which protein sequences can be searched to determine their potential function. InterPro has utility in the large-scale analysis of whole genomes and meta-genomes, as well as in characterizing individual protein sequences. Herein we give an overview of new developments in the database and its associated software since 2009, including updates to database content, curation processes and Web and programmatic interfaces.

VL - 40 CP - Database issue M3 - 10.1093/nar/gkr948 ER - TY - JOUR T1 - Vibrio Cholerae Classical Biotype Strains Reveal Distinct Signatures in Mexico JF - Journal of Clinical Microbiology Y1 - 2012 A1 - Alam,Munirul A1 - Islam,M. Tarequl A1 - Rashed,Shah Manzur A1 - Johura,Fatema-Tuz A1 - Bhuiyan,Nurul A. A1 - Delgado,Gabriela A1 - Morales,Rosario A1 - Mendez,Jose Luis A1 - Navarro,Armando A1 - Watanabe,Haruo A1 - Hasan,Nur-A. A1 - Rita R Colwell A1 - Cravioto,Alejandro AB - Vibrio cholerae O1 Classical (CL) biotype caused the 5th and 6th, and probably the earlier cholera pandemics, before the El Tor (ET) biotype initiated the 7th pandemic in Asia in the 1970's by completely displacing the CL biotype. Although the CL biotype was thought to be extinct in Asia, and it had never been reported from Latin America, V. cholerae CL and ET biotypes, including hybrid ET were found associated with endemic cholera in Mexico between 1991 and 1997. In this study, CL biotype strains isolated from endemic cholera in Mexico, between 1983 and 1997 were characterized in terms of major phenotypic and genetic traits, and compared with CL biotype strains isolated in Bangladesh between 1962 and 1989. According to sero- and bio-typing data, all V. cholerae strains tested had the major phenotypic and genotypic characteristics specific for the CL biotype. Antibiograms revealed the majority of the Bangladeshi strains to be resistant to trimethoprim/sulfamethoxazole, furazolidone, ampicillin, and gentamycin, while the Mexican strains were sensitive to all of these drugs, as well as to ciprofloxacin, erythromycin, and tetracycline. Pulsed-field gel electrophoresis (PFGE) of NotI-digested genomic DNA revealed characteristic banding patterns for all the CL biotype strains, although the Mexican strains differed with the Bangladeshi strains in 1-2 DNA bands. The difference may be subtle, but consistent, as confirmed by the sub-clustering patterns in the PFGE-based dendrogram, and can serve as regional signature, suggesting pre-1991 existence and evolution of the CL biotype strains in the Americas, independent from that of Asia. SN - 0095-1137, 1098-660X UR - http://jcm.asm.org/content/early/2012/04/12/JCM.00189-12 M3 - 10.1128/JCM.00189-12 ER - TY - JOUR T1 - Vibrio cholerae in a historically cholera-free country JF - Environmental Microbiology Reports Y1 - 2012 A1 - Haley, Bradd J. A1 - Chen, Arlene A1 - Grim, Christopher J. A1 - Clark, Philip A1 - Diaz, Celia M A1 - Taviani, Elisa A1 - Hasan, Nur A. A1 - Sancomb, Elizabeth A1 - Elnemr, Wessam M A1 - Islam, Muhammad A. A1 - Huq, Anwar A1 - Rita R Colwell A1 - Benediktsdóttir, Eva AB - We report the autochthonous existence of Vibrio cholerae in coastal waters of Iceland, a geothermally active country where cholera is absent and has never been reported. Seawater, mussel and macroalgae samples were collected close to, and distant from, sites where geothermal activity causes a significant increase in water temperature during low tides. Vibrio cholerae was detected only at geothermal‐influenced sites during low‐tides. None of the V. cholerae isolates encoded cholera toxin (ctxAB) and all were non‐O1/non‐O139 serogroups. However, all isolates encoded other virulence factors that are associated with cholera as well as extra‐intestinal V. cholerae infections. The virulence factors were functional at temperatures of coastal waters of Iceland, suggesting an ecological role. It is noteworthy that V. cholerae was isolated from samples collected at sites distant from anthropogenic influence, supporting the conclusion that V. cholerae is autochthonous to the aquatic environment of Iceland. UR - http://doi.wiley.com/10.1111/j.1758-2229.2012.00332.x CP - 4 M3 - 10.1111/j.1758-2229.2012.00332.x ER - TY - RPRT T1 - Lithium: Event-Driven Network Control Y1 - 2012 A1 - Kim,H. A1 - Voellmy,A. A1 - Burnett,S. A1 - Feamster, Nick A1 - Clark,R. AB - This paper introduces event-driven network control, a network control framework that makes networks easier to manage by automating many tasks that must currently be performed by manually modifying low-level, distributed, and complex device configuration. We identify four policy domains that inherently capture many events: time, user, history, and traffic flow. We then present Lithium, an event-driven network control framework that can implement policies expressed using these domains. Lithium can support policies that automatically react to a wide range of events, from fluctuations in traffic volumes to changes in the time of day. Lithium allows network operators to specify networkwide policies in terms of a high-level, event-driven policy model, as opposed to configuring individual network devices with low-level commands. To show that Lithium is practical, general, and applicable in different types of network scenarios, we have deployed Lithium in both a campus network and a home network and used it to implement more flexible and dynamic network policies. We also perform evaluations to show that Lithium introduces negligible overhead beyond a conventional OpenFlow-based control framework. PB - Georgia Institute of Technology VL - GT-CS-12-03 UR - http://hdl.handle.net/1853/43377 ER - TY - JOUR T1 - Long-term effects of ocean warming on the prokaryotic community: evidence from the vibrios JF - The ISME Journal Y1 - 2012 A1 - Vezzulli, Luigi A1 - Brettar, Ingrid A1 - Pezzati, Elisabetta A1 - Reid, Philip C A1 - Rita R Colwell A1 - Höfle, Manfred G A1 - Pruzzo, Carla AB - The long-term effects of ocean warming on prokaryotic communities are unknown because of lack of historical data. We overcame this gap by applying a retrospective molecular analysis to the bacterial community on formalin-fixed samples from the historical Continuous Plankton Recorder archive, which is one of the longest and most geographically extensive collections of marine biological samples in the world. We showed that during the last half century, ubiquitous marine bacteria of the Vibrio genus, including Vibrio cholerae, increased in dominance within the plankton-associated bacterial community of the North Sea, where an unprecedented increase in bathing infections related to these bacteria was recently reported. Among environmental variables, increased sea surface temperature explained 45% of the variance in Vibrio data, supporting the view that ocean warming is favouring the spread of vibrios and may be the cause of the globally increasing trend in their associated diseases. VL - 6111114882511 UR - http://www.nature.com/articles/ismej201189 CP - 1 J1 - ISME J M3 - 10.1038/ismej.2011.89 ER - TY - JOUR T1 - Mapping Parameterized Cyclo-static Dataflow Graphs onto Configurable Hardware JF - Journal of Signal Processing Systems Y1 - 2012 A1 - Kee, Hojin A1 - Chung-Ching Shen A1 - Bhattacharyya, Shuvra S. A1 - Wong, Ian A1 - Yong Rao A1 - Kornerup, Jacob KW - 4G communication systems KW - Circuits and Systems KW - Computer Imaging, Vision, Pattern Recognition and Graphics KW - Dataflow modeling KW - Electrical Engineering KW - FPGA implementation KW - Image Processing and Computer Vision KW - Parameterized dataflow KW - pattern recognition KW - scheduling KW - Signal, Image and Speech Processing AB - In recent years, parameterized dataflow has evolved as a useful framework for modeling synchronous and cyclo-static graphs in which arbitrary parameters can be changed dynamically. Parameterized dataflow has proven to have significant expressive power for managing dynamics of DSP applications in important ways. However, efficient hardware synthesis techniques for parameterized dataflow representations are lacking. This paper addresses this void; specifically, the paper investigates efficient field programmable gate array (FPGA)-based implementation of parameterized cyclo-static dataflow (PCSDF) graphs. We develop a scheduling technique for throughput-constrained minimization of dataflow buffering requirements when mapping PCSDF representations of DSP applications onto FPGAs. The proposed scheduling technique is integrated with an existing formal schedule model, called the generalized schedule tree, to reduce schedule cost. To demonstrate our new, hardware-oriented PCSDF scheduling technique, we have designed a real-time base station emulator prototype based on a subset of long-term evolution (LTE), which is a key cellular standard. VL - 66 SN - 1939-8018, 1939-8115 UR - http://link.springer.com/article/10.1007/s11265-011-0599-5 CP - 3 J1 - J Sign Process Syst ER - TY - JOUR T1 - Modality and Negation in SIMT Use of Modality and Negation in Semantically-Informed Syntactic MT JF - Computational Linguistics Y1 - 2012 A1 - Baker,Kathryn A1 - Bloodgood,Michael A1 - Dorr, Bonnie J A1 - Callison-Burch,Chris A1 - Filardo,Nathaniel W. A1 - Piatko,Christine A1 - Levin,Lori A1 - Miller,Scott AB - This paper describes the resource- and system-building efforts of an eight-week Johns Hopkins University Human Language Technology Center of Excellence Summer Camp for Applied Language Exploration (SCALE-2009) on Semantically-Informed Machine Translation (SIMT). We describe a new modality/negation (MN) annotation scheme, the creation of a (publicly available) MN lexicon, and two automated MN taggers that we built using the annotation scheme and lexicon. Our annotation scheme isolates three components of modality and negation: a trigger (a word that conveys modality or negation), a target (an action associated with modality or negation) and a holder (an experiencer of modality). We describe how our MN lexicon was semi-automatically produced and we demonstrate that a structure-based MN tagger results in precision around 86% (depending on genre) for tagging of a standard LDC data set. SN - 0891-2017 UR - http://dx.doi.org/10.1162/COLI_a_00099 M3 - 10.1162/COLI_a_00099 ER - TY - CONF T1 - Modeling Images using Transformed Indian Buffet Processes T2 - International Conference of Machine Learning Y1 - 2012 A1 - Zhai,Ke A1 - Hu,Yuening A1 - Williamson,Sinead A1 - Jordan Boyd-Graber AB - Latent feature models are attractive for image modeling, since images generally contain mul- tiple objects. However, many latent feature models ignore that objects can appear at dif- ferent locations or require pre-segmentation of images. While the transformed Indian buffet process (tIBP) provides a method for modeling transformation-invariant features in unsegmented binary images, its current form is inappropriate for real images because of its computational cost and modeling assumptions. We combine the tIBP with likelihoods appropriate for real images and develop an efficient inference, using the cross- correlation between images and features, that is theoretically and empirically faster than existing inference techniques. Our method discovers rea- sonable components and achieve effective image reconstruction in natural images. JA - International Conference of Machine Learning ER - TY - CONF T1 - Mr. LDA: A Flexible Large Scale Topic Modeling Package using Variational Inference in MapReduce T2 - Proceedings of ACM International Conference on World Wide Web, 2012 Y1 - 2012 A1 - Zhai,Ke A1 - Jordan Boyd-Graber A1 - Asadi,Nima A1 - Alkhouja,Mohamad AB - Latent Dirichlet Allocation (LDA) is a popular topic modeling tech- nique for exploring document collections. Because of the increasing prevalence of large datasets, there is a need to improve the scal- ability of inference for LDA. In this paper, we introduce a novel and flexible large scale topic modeling package in MapReduce (Mr. LDA). As opposed to other techniques which use Gibbs sampling, our proposed framework uses variational inference, which easily fits into a distributed environment. More importantly, this variational implementation, unlike highly tuned and specialized implementa- tions based on Gibbs sampling, is easily extensible. We demonstrate two extensions of the models possible with this scalable framework: informed priors to guide topic discovery and extracting topics from a multilingual corpus. We compare the scalability of Mr. LDA against Mahout, an existing large scale topic modeling package. Mr. LDA out-performs Mahout both in execution speed and held-out likelihood. JA - Proceedings of ACM International Conference on World Wide Web, 2012 ER - TY - JOUR T1 - Occurrence of protozoans & their limnological relationships in some ponds of Mathbaria, Bangladesh JF - University Journal of Zoology, Rajshahi University Y1 - 2012 A1 - Mozumder,P. K. A1 - Banu,M. A. A1 - Naser,M. N. A1 - Ali,M. S. A1 - Alam,M. A1 - Sack,R. B. A1 - Rita R Colwell A1 - Huq,A. VL - 29 SN - 1023-6104 UR - http://journals.sfu.ca/bd/index.php/UJZRU CP - 1 ER - TY - CONF T1 - Optimizing epidemic protection for socially essential workers T2 - Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium Y1 - 2012 A1 - Barrett,Chris A1 - Beckman,Richard A1 - Bisset,Keith A1 - Chen,Jiangzhuo A1 - DuBois,Thomas A1 - Eubank,Stephen A1 - Kumar,V. S. Anil A1 - Lewis,Bryan A1 - Marathe,Madhav V. A1 - Srinivasan, Aravind A1 - Stretz,Paula E. KW - epidemiology KW - OPTIMIZATION KW - public health informatics AB - Public-health policy makers have many tools to mitigate an epidemic's effects. Most related research focuses on the direct effects on those infected (in terms of health, life, or productivity). Interventions including treatment, prophylaxis, quarantine, and social distancing are well studied in this context. These interventions do not address indirect effects due to the loss of critical services and infrastructures when too many of those responsible for their day-to-day operations fall ill. We examine, both analytically and through simulation, the protection of such essential subpopulations by sequestering them, effectively isolating them into groups during an epidemic. We develop a framework for studying the benefits of sequestering and heuristics for when to sequester. We also prove a key property of sequestering placement which helps partition the subpopulations optimally. Thus we provide a first step toward determining how to allocate resources between the direct protection of a population, and protection of those responsible for critical services. JA - Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium T3 - IHI '12 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0781-9 UR - http://doi.acm.org/10.1145/2110363.2110371 M3 - 10.1145/2110363.2110371 ER - TY - JOUR T1 - Preparation and probing of coherent vibrational wave packets in the ground electronic state of HD^{+} JF - Physical Review A Y1 - 2012 A1 - Bhattacharya, Rangana A1 - Chatterjee, Souvik A1 - Bhattacharyya, Shuvra S. AB - We have investigated the formation of coherent vibrational wave packets in the ground electronic state of HD+ on exposure to intense ultrashort laser pulses of wavelength 1060 nm. The effects of the duration and field strength of the pulse on the final composition of the residual bound nuclear wave packet generated by such impulsive excitations have been studied. The resulting wave packet is allowed to evolve freely on the potential surface for some time, after which a weak pulse of sufficiently large duration is used for probing its composition. This pulse can cause only single-photon dissociation. The simulations have been performed with different probe wavelengths for accessing information about different portions of the wave packet in the vibrational quantum number space. Our aim was to investigate the extent to which information obtained from the kinetic-energy spectra of the photofragments induced by the probe pulse can be correlated to the structure of the wave packet. Simple time-dependent perturbation calculations have also been performed for obtaining the relative strengths of photofragment signals arising from different vibrational levels due to wave-packet dissociation. A comparison with our numerical results indicates that though the general features of the photofragment kinetic-energy spectra from a wave packet are consistent with the perturbation theory results in the intensity regime studied, dynamical evolution during a long pulse can modify the relative heights of the kinetic-energy peaks through nonperturbative interactions in some cases. VL - 85 UR - http://link.aps.org/doi/10.1103/PhysRevA.85.033424 CP - 3 J1 - Phys. Rev. A ER - TY - JOUR T1 - Prototyping scalable digital signal processing systems for radio astronomy using dataflow models JF - Radio Science Y1 - 2012 A1 - Sane, N. A1 - Ford, J. A1 - Harris, A. I. A1 - Bhattacharyya, Shuvra S. KW - dataflow models KW - digital downconverter KW - Digital signal processing KW - model-based design KW - radio astronomy KW - rapid prototyping AB - There is a growing trend toward using high-level tools for design and implementation of radio astronomy digital signal processing (DSP) systems. Such tools, for example, those from the Collaboration for Astronomy Signal Processing and Electronics Research (CASPER), are usually platform-specific, and lack high-level, platform-independent, portable, scalable application specifications. This limits the designer's ability to experiment with designs at a high-level of abstraction and early in the development cycle. We address some of these issues using a model-based design approach employing dataflow models. We demonstrate this approach by applying it to the design of a tunable digital downconverter (TDD) used for narrow-bandwidth spectroscopy. Our design is targeted toward an FPGA platform, called theInterconnect Break-out Board (IBOB), that is available from the CASPER. We use the term TDD to refer to a digital downconverter for which the decimation factor and center frequency can be reconfigured without the need for regenerating the hardware code. Such a design is currently not available in the CASPER DSP library. The work presented in this paper focuses on two aspects. First, we introduce and demonstrate a dataflow-based design approach using thedataflow interchange format (DIF) tool for high-level application specification, and we integrate this approach with the CASPER tool flow. Secondly, we explore the trade-off between the flexibility of TDD designs and the low hardware cost of fixed-configuration digital downconverter (FDD) designs that use the available CASPER DSP library. We further explore this trade-off in the context of a two-stage downconversion scheme employing a combination of TDD or FDD designs. VL - 47 SN - 1944-799X UR - http://onlinelibrary.wiley.com/doi/10.1029/2011RS004924/abstract CP - 3 ER - TY - JOUR T1 - Quantitative measurement of allele‐specific protein expression in a diploid yeast hybrid by LC‐MS JF - Molecular Systems Biology Y1 - 2012 A1 - Zia Khan A1 - Bloom, Joshua S. A1 - Amini, Sasan A1 - Singh, Mona A1 - Perlman, David H. A1 - Caudy, Amy A. A1 - Kruglyak, Leonid KW - allele specific KW - divergence KW - mass spectrometry KW - protein expression KW - proteomics AB - Understanding the genetic basis of gene regulatory variation is a key goal of evolutionary and medical genetics. Regulatory variation can act in an allele‐specific manner (cis‐acting) or it can affect both alleles of a gene (trans‐acting). Differential allele‐specific expression (ASE), in which the expression of one allele differs from another in a diploid, implies the presence of cis‐acting regulatory variation. While microarrays and high‐throughput sequencing have enabled genome‐wide measurements of transcriptional ASE, methods for measurement of protein ASE (pASE) have lagged far behind. We describe a flexible, accurate, and scalable strategy for measurement of pASE by liquid chromatography‐coupled mass spectrometry (LC‐MS). We apply this approach to a hybrid between the yeast species Saccharomyces cerevisiae and Saccharomyces bayanus. Our results provide the first analysis of the relative contribution of cis‐acting and trans‐acting regulatory differences to protein expression divergence between yeast species.Synopsis A novel strategy for the quantitative measurement of allele‐specific protein expression is used to infer the contributions of cis‐ and trans‐acting factors influencing the divergence of protein levels between yeast species. Rigorous experimental controls and analyses confirm the accuracy of the new strategy for the quantitative measurement of allele‐specific protein expression by high‐throughput mass spectrometry.Analysis of allele‐specific protein expression in an interspecies yeast hybrid and protein expression differences between species reveals that both cis‐effects and trans‐effects contribute to protein expression divergence between two yeast species, Saccharomyces cerevisiae and Saccharomyces bayanus. VL - 8 UR - http://msb.embopress.org/content/8/1/602 CP - 1 ER - TY - CONF T1 - A Random Forest System Combination Approach for Error Detection in Digital Dictionaries T2 - Innovative hybrid approaches to the processing of textual data, EACL 2012 Workshop Y1 - 2012 A1 - Bloodgood,Michael A1 - Ye,Peng A1 - Rodrigues,Paul A1 - Zajic, David A1 - David Doermann AB - When digitizing a print bilingual dictionary, whether via optical character recognition or manual entry, it is inevitable that errors are introduced into the electronic version that is created. We investigate automating the process of detecting errors in an XML representation of a digitized print dictionary using a hybrid approach that combines rule-based, feature-based, and language model-based methods. We investigate combining methods and show that using random forests is a promising approach. We find that in isolation, unsupervised methods rival the performance of supervised methods. Random forests typically require training data so we investigate how we can apply random forests to combine individual base methods that are themselves unsupervised without requiring large amounts of training data. Experiments reveal empirically that a relatively small amount of data is sufficient and can potentially be further reduced through specific selection criteria. JA - Innovative hybrid approaches to the processing of textual data, EACL 2012 Workshop ER - TY - JOUR T1 - Rpn1 and Rpn2 coordinate ubiquitin processing factors at the proteasome JF - Journal of Biological ChemistryJ. Biol. Chem. Y1 - 2012 A1 - Rosenzweig,Rina A1 - Bronner,Vered A1 - Zhang,Daoning A1 - Fushman, David A1 - Glickman,Michael H. KW - deubiquitination KW - Proteasome KW - solenoid KW - Surface plasmon resonance (SPR) KW - ubiquitin KW - Ubiquitin-dependent protease AB - Substrates tagged with (poly)ubiquitin for degradation can be targeted directly to the 26S proteasome where they are proteolysed. Independently, ubiquitin-conjugates may also be delivered by bivalent shuttles. The majority of shuttles attach to the proteasome through a ubiquitin-like domain (UBL) while anchoring cargo at a C-terminal polyubiquitin-binding domain(s). We found that two shuttles of this class, Rad23 and Dsk2, dock at two different receptors embedded within a single subunit of the 19S proteasome regulatory particle (RP), Rpn1. Their association/dissociation constants and affinities for Rpn1 are similar. In contrast, another UBL-containing protein, the deubiquitinase Ubp6, is also anchored by Rpn1, yet dissociates slower, thus behaving as a sometimes proteasome subunit distinct from transiently-associated shuttles. Two neighboring subunits, Rpn10 and Rpn13, show a marked preference for polyubiquitin over UBLs. Rpn10 attaches to the central solenoid portion of Rpn1 although this association is stabilized by the presence of a third subunit, Rpn2. Rpn13 binds directly to the C-terminal portion of Rpn2. These intrinsic polyubiquitin receptors may compete with substrate shuttles for their polyubiquitin-conjugates, thereby aiding release of the emptied shuttles. By binding multiple ubiquitin-processing factors simultaneously, Rpn1 is uniquely suited to coordinate substrate recruitment, deubiquitination, and movement towards the catalytic core. The broad range of affinities for ubiquitin, ubiquitin-like, and non-ubiquitin signals by adjacent yet non-overlapping sites all within the Base illustrates a hub of activity that coordinates the intricate relay of substrates within the proteasome, and consequently influences substrate residency time and commitment to degradation. SN - 0021-9258, 1083-351X UR - http://www.jbc.org/content/early/2012/02/08/jbc.M111.316323 M3 - 10.1074/jbc.M111.316323 ER - TY - JOUR T1 - SITS: A Hierarchical Nonparametric Model using Speaker Identity for Topic Segmentation in Multiparty Conversations JF - Association for Computational Linguistics Y1 - 2012 A1 - Nguyen,Viet-An A1 - Jordan Boyd-Graber A1 - Resnik, Philip AB - One of the key tasks for analyzing conversa- tional data is segmenting it into coherent topic segments. However, most models of topic segmentation ignore the social aspect of con- versations, focusing only on the words used. We introduce a hierarchical Bayesian nonpara- metric model, Speaker Identity for Topic Seg- mentation (SITS), that discovers (1) the top- ics used in a conversation, (2) how these top- ics are shared across conversations, (3) when these topics shift, and (4) a person-specific tendency to introduce new topics. We eval- uate against current unsupervised segmenta- tion models to show that including person- specific information improves segmentation performance on meeting corpora and on po- litical debates. Moreover, we provide evidence that SITS captures an individual’s tendency to introduce new topics in political contexts, via analysis of the 2008 US presidential debates and the television program Crossfire. ER - TY - JOUR T1 - Speeding Up Particle Trajectory Simulations under Moving Force Fields using GPUs JF - Journal of Computing and Information Science in Engineering Y1 - 2012 A1 - Patro,R. A1 - Dickerson,J. P. A1 - Bista,S. A1 - Gupta,S.K. A1 - Varshney, Amitabh AB - In this paper, we introduce a GPU-based framework forsimulating particle trajectories under both static and dynamic force fields. By exploiting the highly parallel nature of the problem and making efficient use of the available hardware, our simulator exhibits a significant speedup over its CPU- based analog. We apply our framework to a specific experi- mental simulation: the computation of trapping probabilities associated with micron-sized silica beads in optical trapping workbenches. When evaluating large numbers of trajectories (4096), we see approximately a 356 times speedup of the GPU-based simulator over its CPU-based counterpart. ER - TY - JOUR T1 - Structure, function and diversity of the healthy human microbiome JF - Nature Y1 - 2012 A1 - Huttenhower, C. A1 - Gevers, D. A1 - Knight,R. A1 - Abubucker, S. A1 - Badger, J.H. A1 - Chinwalla, A.T. A1 - Creasy, H.H. A1 - Earl, A.M. A1 - Fitzgerald, M.G. A1 - Fulton, R.S. A1 - others AB - Studies of the human microbiome have revealed that even healthy individuals differ remarkably in the microbes that occupy habitats such as the gut, skin and vagina. Much of this diversity remains unexplained, although diet, environment, host genetics and early microbial exposure have all been implicated. Accordingly, to characterize the ecology of human-associated microbial communities, the Human Microbiome Project has analysed the largest cohort and set of distinct, clinically relevant body habitats so far. We found the diversity and abundance of each habitat’s signature microbes to vary widely even among healthy subjects, with strong niche specialization both within and among individuals. The project encountered an estimated 81–99% of the genera, enzyme families and community configurations occupied by the healthy Western microbiome. Metagenomic carriage of metabolic pathways was stable among individuals despite variation in community structure, and ethnic/racial background proved to be one of the strongest associations of both pathways and microbes with clinical metadata. These results thus delineate the range of structural and functional configurations normal in the microbial communities of a healthy population, enabling future characterization of the epidemiology, ecology and translational applications of the human microbiome. VL - 486 ER - TY - CONF T1 - Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions T2 - the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12 Y1 - 2012 A1 - Martineau, Justin A1 - Mokashi,Ronil A1 - Chapman, David A1 - Grasso, Michael A1 - Brady,Mary A1 - Yesha,Yelena A1 - Yesha,Yaacov A1 - Cardone, Antonio A1 - Dima, Alden JA - the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12 PB - ACM Press CY - Miami, Florida, USANew York, New York, USA SN - 9781450307819 J1 - IHI '12 M3 - 10.1145/211036310.1145/2110363.2110409 ER - TY - JOUR T1 - Temporal and Spatial Variability in the Distribution of Vibrio vulnificus in the Chesapeake Bay: A Hindcast Study JF - EcoHealth Y1 - 2012 A1 - Banakar,V. A1 - Constantin de Magny,G. A1 - Jacobs,J. A1 - Murtugudde,R. A1 - Huq,A. A1 - J. Wood,R. A1 - Rita R Colwell AB - Vibrio vulnificus, an estuarine bacterium, is the causative agent of seafood-related gastroenteritis, primary septicemia, and wound infections worldwide. It occurs as part of the normal microflora of coastal marine environments and can be isolated from water, sediment, and oysters. Hindcast prediction was undertaken to determine spatial and temporal variability in the likelihood of occurrence of V. vulnificus in surface waters of the Chesapeake Bay. Hindcast predictions were achieved by forcing a multivariate habitat suitability model with simulated sea surface temperature and salinity in the Bay for the period between 1991 and 2005 and the potential hotspots of occurrence of V. vulnificus in the Chesapeake Bay were identified. The likelihood of occurrence of V. vulnificus during high and low rainfall years was analyzed. From results of the study, it is concluded that hindcast prediction yields an improved understanding of environmental conditions associated with occurrence of V. vulnificus in the Chesapeake Bay. M3 - 10.1007/s10393-011-0736-4 ER - TY - JOUR T1 - Topic Models for Dynamic Translation Model Adaptation JF - Association for Computational Linguistics Y1 - 2012 A1 - Vladimir Eidelman A1 - Jordan Boyd-Graber A1 - Resnik, Philip AB - We propose an approach that biases machine translation systems toward relevant transla- tions based on topic-specific contexts, where topics are induced in an unsupervised way using topic models; this can be thought of as inducing subcorpora for adaptation with- out any human annotation. We use these topic distributions to compute topic-dependent lex- ical weighting probabilities and directly in- corporate them into our translation model as features. Conditioning lexical probabilities on the topic biases translations toward topic- relevant output, resulting in significant im- provements of up to 1 BLEU and 3 TER on Chinese to English translation over a strong baseline. ER - TY - CONF T1 - You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home T2 - SIGCHI '12 Y1 - 2012 A1 - Marshini Chetty A1 - Banks, Richard A1 - Brush, A.J. A1 - Donner, Jonathan A1 - Grinter, Rebecca KW - Bandwidth KW - bandwidth cap KW - data cap KW - Internet KW - metered use KW - pricing KW - usage-based billing KW - usage-based pricing AB - Bandwidth caps, a limit on the amount of data users can upload and download in a month, are common globally for both home and mobile Internet access. With caps, each bit of data consumed comes at a cost against a monthly quota or a running tab. Yet, relatively little work has considered the implications of this usage-based pricing model on the user experience. In this paper, we present results from a qualitative study of households living with bandwidth caps. Our findings suggest home users grapple with three uncertainties regarding their bandwidth usage: invisible balances, mysterious processes, and multiple users. We discuss how these uncertainties impact their usage and describe the potential for better tools to help monitor and manage data caps. We conclude that as a community we need to cater for users under Internet cost constraints. JA - SIGCHI '12 T3 - CHI '12 PB - ACM SN - 978-1-4503-1015-4 UR - http://doi.acm.org/10.1145/2207676.2208714 ER - TY - JOUR T1 - Accurate proteome-wide protein quantification from high-resolution 15N mass spectra JF - Genome Biology Y1 - 2011 A1 - Zia Khan A1 - Amini, Sasan A1 - Bloom, Joshua S. A1 - Ruse, Cristian A1 - Caudy, Amy A. A1 - Kruglyak, Leonid A1 - Singh, Mona A1 - Perlman, David H. A1 - Tavazoie, Saeed AB - In quantitative mass spectrometry-based proteomics, the metabolic incorporation of a single source of 15N-labeled nitrogen has many advantages over using stable isotope-labeled amino acids. However, the lack of a robust computational framework for analyzing the resulting spectra has impeded wide use of this approach. We have addressed this challenge by introducing a new computational methodology for analyzing 15N spectra in which quantification is integrated with identification. Application of this method to an Escherichia coli growth transition reveals significant improvement in quantification accuracy over previous methods.PMID: 22182234 VL - 12 SN - 1465-6906 UR - http://genomebiology.com/2011/12/12/R122/abstract CP - 12 ER - TY - CONF T1 - Active inference for retrieval in camera networks T2 - Person-Oriented Vision (POV), 2011 IEEE Workshop on Y1 - 2011 A1 - Daozheng Chen A1 - Bilgic,M. A1 - Getoor, Lise A1 - Jacobs, David W. A1 - Mihalkova,L. A1 - Tom Yeh KW - active KW - annotation;probabilistic KW - frame;cameras;inference KW - inference;camera KW - mechanisms;probability;search KW - model;human KW - model;retrieval KW - network;graphical KW - problem;video KW - problems;video KW - processing; KW - retrieval;video KW - signal KW - system;searching AB - We address the problem of searching camera network videos to retrieve frames containing specified individuals. We show the benefit of utilizing a learned probabilistic model that captures dependencies among the cameras. In addition, we develop an active inference framework that can request human input at inference time, directing human attention to the portions of the videos whose correct annotation would provide the biggest performance improvements. Our primary contribution is to show that by mapping video frames in a camera network onto a graphical model, we can apply collective classification and active inference algorithms to significantly increase the performance of the retrieval system, while minimizing the number of human annotations required. JA - Person-Oriented Vision (POV), 2011 IEEE Workshop on M3 - 10.1109/POV.2011.5712363 ER - TY - CONF T1 - Active inference for retrieval in camera networks T2 - Person-Oriented Vision (POV), 2011 IEEE Workshop on Y1 - 2011 A1 - Daozheng Chen A1 - Bilgic,Mustafa A1 - Getoor, Lise A1 - Jacobs, David W. A1 - Mihalkova,Lilyana A1 - Tom Yeh AB - We address the problem of searching camera network videos to retrieve frames containing specified individuals. We show the benefit of utilizing a learned probabilistic model that captures dependencies among the cameras. In addition, we develop an active inference framework that can request human input at inference time, directing human attention to the portions of the videos whose correct annotation would provide the biggest performance improvements. Our primary contribution is to show that by mapping video frames in a camera network onto a graphical model, we can apply collective classification and active inference algorithms to significantly increase the performance of the retrieval system, while minimizing the number of human annotations required. JA - Person-Oriented Vision (POV), 2011 IEEE Workshop on PB - IEEE SN - 978-1-61284-036-9 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5712363&tag=1 M3 - 10.1109/POV.2011.5712363 ER - TY - JOUR T1 - Analysis of SystemC actor networks for efficient synthesis JF - ACM Trans. Embed. Comput. Syst. Y1 - 2011 A1 - Falk, Joachim A1 - Zebelein, Christian A1 - Keinert, Joachim A1 - Haubelt, Christian A1 - Teich, Juergen A1 - Bhattacharyya, Shuvra S. KW - actor-oriented design KW - clustering KW - Dataflow analysis KW - scheduling AB - Applications in the signal processing domain are often modeled by dataflow graphs. Due to heterogeneous complexity requirements, these graphs contain both dynamic and static dataflow actors. In previous work, we presented a generalized clustering approach for these heterogeneous dataflow graphs in the presence of unbounded buffers. This clustering approach allows the application of static scheduling methodologies for static parts of an application during embedded software generation for multiprocessor systems. It systematically exploits the predictability and efficiency of the static dataflow model to obtain latency and throughput improvements. In this article, we present a generalization of this clustering technique to dataflow graphs with bounded buffers, therefore enabling synthesis for embedded systems without dynamic memory allocation. Furthermore, a case study is given to demonstrate the performance benefits of the approach. VL - 10 SN - 1539-9087 UR - http://doi.acm.org/10.1145/1880050.1880054 CP - 2 ER - TY - CONF T1 - Applying graphics processor acceleration in a software defined radio prototyping environment T2 - 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP) Y1 - 2011 A1 - Plishker,W. A1 - Zaki, G.F. A1 - Bhattacharyya, Shuvra S. A1 - Clancy, C. A1 - Kuykendall, J. KW - Acceleration KW - coprocessors KW - dataflow foundation KW - GNU radio KW - Graphics processing unit KW - graphics processor acceleration KW - Kernel KW - Libraries KW - multicore platforms KW - Multicore processing KW - PARALLEL PROCESSING KW - Pipelines KW - Protocols KW - software defined radio prototyping environment KW - software radio KW - stand-alone GPU accelerated library AB - With higher bandwidth requirements and more complex protocols, software defined radio (SDR) has ever growing computational demands. SDR applications have different levels of parallelism that can be exploited on multicore platforms, but design and programming difficulties have inhibited the adoption of specialized multicore platforms like graphics processors (GPUs). In this work we propose a new design flow that augments a popular existing SDR development environment (GNU Radio), with a dataflow foundation and a stand-alone GPU accelerated library. The approach gives an SDR developer the ability to prototype a GPU accelerated application and explore its design space fast and effectively. We demonstrate this design flow on a standard SDR benchmark and show that deciding how to utilize a GPU can be non-trivial for even relatively simple applications. JA - 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP) ER - TY - JOUR T1 - Architecting for innovation JF - SIGCOMM Comput. Commun. Rev. Y1 - 2011 A1 - Koponen,Teemu A1 - Shenker,Scott A1 - Balakrishnan,Hari A1 - Feamster, Nick A1 - Ganichev,Igor A1 - Ghodsi,Ali A1 - Godfrey,P. Brighten A1 - McKeown,Nick A1 - Parulkar,Guru A1 - Raghavan,Barath A1 - Rexford,Jennifer A1 - Arianfar,Somaya A1 - Kuptsov,Dmitriy KW - diversity KW - Evolution KW - innovation KW - internet architecture AB - We argue that the biggest problem with the current Internet architecture is not a particular functional deficiency, but its inability to accommodate innovation. To address this problem we propose a minimal architectural "framework" in which comprehensive architectures can reside. The proposed Framework for Internet Innovation (FII) --- which is derived from the simple observation that network interfaces should be extensible and abstract --- allows for a diversity of architectures to coexist, communicate, and evolve. We demonstrate FII's ability to accommodate diversity and evolution with a detailed examination of how information flows through the architecture and with a skeleton implementation of the relevant interfaces. VL - 41 SN - 0146-4833 UR - http://doi.acm.org/10.1145/2002250.2002256 CP - 3 M3 - 10.1145/2002250.2002256 ER - TY - JOUR T1 - An assessment of systems and software engineering scholars and institutions (2003–2007 and 2004–2008) JF - Journal of Systems and Software Y1 - 2011 A1 - Wong,W. Eric A1 - Tse,T.H. A1 - Glass,Robert L. A1 - Basili, Victor R. A1 - Chen,T.Y. KW - Research publications KW - Systems and software engineering KW - Top institutions KW - Top scholars AB - An ongoing, annual survey of publications in systems and software engineering identifies the top 15 scholars and institutions in the field over a 5-year period. Each ranking is based on the weighted scores of the number of papers published in TSE, TOSEM, JSS, SPE, EMSE, IST, and Software of the corresponding period. This report summarizes the results for 2003–2007 and 2004–2008. The top-ranked institution is Korea Advanced Institute of Science and Technology, Korea for 2003–2007, and Simula Research Laboratory, Norway for 2004–2008, while Magne Jørgensen is the top-ranked scholar for both periods. VL - 84 SN - 0164-1212 UR - http://www.sciencedirect.com/science/article/pii/S0164121210002682 CP - 1 M3 - 10.1016/j.jss.2010.09.036 ER - TY - CHAP T1 - Automated Planning Logic Synthesis for Autonomous Unmanned Vehicles in Competitive Environments with Deceptive Adversaries T2 - New Horizons in Evolutionary Robotics Y1 - 2011 A1 - Svec,Petr A1 - Gupta, Satyandra K. ED - Doncieux,Stéphane ED - Bredèche,Nicolas ED - Mouret,Jean-Baptiste KW - engineering AB - We developed a new approach for automated synthesis of a planning logic for autonomous unmanned vehicles. This new approach can be viewed as an automated iterative process during which an initial version of a logic is synthesized and then gradually improved by detecting and fixing its shortcomings. This is achieved by combining data mining for extraction of vehicle’s states of failure and Genetic Programming (GP) technique for synthesis of corresponding navigation code. We verified the feasibility of the approach using unmanned surface vehicles (USVs) simulation. Our focus was specifically on the generation of a planning logic used for blocking the advancement of an intruder boat towards a valuable target. Developing autonomy logic for this behavior is challenging as the intruder’s attacking logic is human-competitive with deceptive behavior so the USV is required to learn specific maneuvers for specific situations to do successful blocking. We compared the performance of the generated blocking logic to the performance of logic that was manually implemented. Our results show that the new approach was able to synthesize a blocking logic with performance closely approaching the performance of the logic coded by hand. JA - New Horizons in Evolutionary Robotics T3 - Studies in Computational Intelligence PB - Springer Berlin / Heidelberg VL - 341 SN - 978-3-642-18271-6 UR - http://www.springerlink.com/content/f454477212518671/abstract/ ER - TY - JOUR T1 - Bacillus Anthracis Comparative Genome Analysis in Support of the Amerithrax Investigation JF - Proceedings of the National Academy of SciencesPNAS Y1 - 2011 A1 - Rasko,David A A1 - Worsham,Patricia L A1 - Abshire,Terry G A1 - Stanley,Scott T A1 - Bannan,Jason D A1 - Wilson,Mark R A1 - Langham,Richard J A1 - Decker,R. Scott A1 - Jiang,Lingxia A1 - Read,Timothy D. A1 - Phillippy,Adam M A1 - Salzberg,Steven L. A1 - Pop, Mihai A1 - Van Ert,Matthew N A1 - Kenefic,Leo J A1 - Keim,Paul S A1 - Fraser-Liggett,Claire M A1 - Ravel,Jacques AB - Before the anthrax letter attacks of 2001, the developing field of microbial forensics relied on microbial genotyping schemes based on a small portion of a genome sequence. Amerithrax, the investigation into the anthrax letter attacks, applied high-resolution whole-genome sequencing and comparative genomics to identify key genetic features of the letters’ Bacillus anthracis Ames strain. During systematic microbiological analysis of the spore material from the letters, we identified a number of morphological variants based on phenotypic characteristics and the ability to sporulate. The genomes of these morphological variants were sequenced and compared with that of the B. anthracis Ames ancestor, the progenitor of all B. anthracis Ames strains. Through comparative genomics, we identified four distinct loci with verifiable genetic mutations. Three of the four mutations could be directly linked to sporulation pathways in B. anthracis and more specifically to the regulation of the phosphorylation state of Spo0F, a key regulatory protein in the initiation of the sporulation cascade, thus linking phenotype to genotype. None of these variant genotypes were identified in single-colony environmental B. anthracis Ames isolates associated with the investigation. These genotypes were identified only in B. anthracis morphotypes isolated from the letters, indicating that the variants were not prevalent in the environment, not even the environments associated with the investigation. This study demonstrates the forensic value of systematic microbiological analysis combined with whole-genome sequencing and comparative genomics. VL - 108 SN - 0027-8424, 1091-6490 UR - http://www.pnas.org/content/108/12/5027 CP - 12 M3 - 10.1073/pnas.1016657108 ER - TY - CONF T1 - Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text T2 - Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence Y1 - 2011 A1 - Anand,P. A1 - King,J. A1 - Jordan Boyd-Graber A1 - Wagner,E. A1 - Martell,C. A1 - Oard, Douglas A1 - Resnik, Philip JA - Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence ER - TY - JOUR T1 - Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? JF - Systematic BiologySyst Biol Y1 - 2011 A1 - Cho,Soowon A1 - Zwick,Andreas A1 - Regier,Jerome C A1 - Mitter,Charles A1 - Cummings, Michael P. A1 - Yao,Jianxiu A1 - Du,Zaile A1 - Zhao,Hong A1 - Kawahara,Akito Y A1 - Weller,Susan A1 - Davis,Donald R A1 - Baixeras,Joaquin A1 - Brown,John W A1 - Parr,Cynthia KW - Ditrysia KW - gene sampling KW - Hexapoda KW - Lepidoptera KW - missing data KW - molecular phylogenetics KW - nuclear genes KW - taxon sampling AB - This paper addresses the question of whether one can economically improve the robustness of a molecular phylogeny estimate by increasing gene sampling in only a subset of taxa, without having the analysis invalidated by artifacts arising from large blocks of missing data. Our case study stems from an ongoing effort to resolve poorly understood deeper relationships in the large clade Ditrysia ( > 150,000 species) of the insect order Lepidoptera (butterflies and moths). Seeking to remedy the overall weak support for deeper divergences in an initial study based on five nuclear genes (6.6 kb) in 123 exemplars, we nearly tripled the total gene sample (to 26 genes, 18.4 kb) but only in a third (41) of the taxa. The resulting partially augmented data matrix (45% intentionally missing data) consistently increased bootstrap support for groupings previously identified in the five-gene (nearly) complete matrix, while introducing no contradictory groupings of the kind that missing data have been predicted to produce. Our results add to growing evidence that data sets differing substantially in gene and taxon sampling can often be safely and profitably combined. The strongest overall support for nodes above the family level came from including all nucleotide changes, while partitioning sites into sets undergoing mostly nonsynonymous versus mostly synonymous change. In contrast, support for the deepest node for which any persuasive molecular evidence has yet emerged (78–85% bootstrap) was weak or nonexistent unless synonymous change was entirely excluded, a result plausibly attributed to compositional heterogeneity. This node (Gelechioidea + Apoditrysia), tentatively proposed by previous authors on the basis of four morphological synapomorphies, is the first major subset of ditrysian superfamilies to receive strong statistical support in any phylogenetic study. A “more-genes-only” data set (41 taxa×26 genes) also gave strong signal for a second deep grouping (Macrolepidoptera) that was obscured, but not strongly contradicted, in more taxon-rich analyses. VL - 60 SN - 1063-5157, 1076-836X UR - http://sysbio.oxfordjournals.org/content/60/6/782 CP - 6 M3 - 10.1093/sysbio/syr079 ER - TY - CONF T1 - A case study of measuring process risk for early insights into software safety T2 - Software Engineering (ICSE), 2011 33rd International Conference on Y1 - 2011 A1 - Layman,L. A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V A1 - Fisher,K.L. KW - analysis;software KW - and KW - computing;risk KW - constellation KW - control;software KW - Hardware KW - maintenance; KW - measurement;aerospace KW - measurement;software KW - NASA KW - process KW - program;TPRM;flight KW - risk KW - safety;technical KW - spaceflight KW - systems;process AB - In this case study, we examine software safety risk in three flight hardware systems in NASA's Constellation spaceflight program. We applied our Technical and Process Risk Measurement (TPRM) methodology to the Constellation hazard analysis process to quantify the technical and process risks involving software safety in the early design phase of these projects. We analyzed 154 hazard reports and collected metrics to measure the prevalence of software in hazards and the specificity of descriptions of software causes of hazardous conditions. We found that 49-70% of 154 hazardous conditions could be caused by software or software was involved in the prevention of the hazardous condition. We also found that 12-17% of the 2013 hazard causes involved software, and that 23-29% of all causes had a software control. The application of the TRPM methodology identified process risks in the application of the hazard analysis process itself that may lead to software safety risk. JA - Software Engineering (ICSE), 2011 33rd International Conference on M3 - 10.1145/1985793.1985881 ER - TY - CONF T1 - Characterizing Attackers and Attacks: An Empirical Study Y1 - 2011 A1 - Salles-Loustau,G. A1 - Berthier,R. A1 - Collange,E. A1 - Sobesto,B. A1 - Michel Cukier KW - attack sessions KW - attacker characterization KW - attacker skill measurement KW - honey net infrastructure KW - honey pot configurations KW - IP address KW - keystroke profile analysis KW - opportunity target KW - rogue software exploitation KW - security of data KW - SSH-based authentication proxy AB - This paper describes an empirical research study to characterize attackers and attacks against targets of opportunity. A honey net infrastructure was built and deployed over 167 days that leveraged three different honey pot configurations and a SSH-based authentication proxy to attract and follow attackers over several weeks. A total of 211 attack sessions were recorded and evidence was collected at each stage of the attack sequence: from discovery to intrusion and exploitation of rogue software. This study makes two important contributions: 1) we introduce a new approach to measure attacker skills, and 2) we leverage keystroke profile analysis to differentiate attackers beyond their IP address of origin. M3 - 10.1109/PRDC.2011.29 ER - TY - CONF T1 - CHI 2011 sustainability community invited panel: challenges ahead T2 - 2011 annual conference extended abstracts on Human factors in computing systems Y1 - 2011 A1 - Khan,Azam A1 - Bartram,Lyn A1 - Blevis,Eli A1 - DiSalvo,Carl A1 - Jon Froehlich A1 - Kurtenbach,Gordon KW - design KW - Environment KW - sustainability; community KW - user behavior AB - As part of a new CHI Sustainability Community, focused on environmental sustainability, this panel will discuss specific ways in which HCI research will be critical in finding solutions to this global challenge. While research to date has primarily focused on the end consumer, the panel will be challenged with enlarging the discussion to include the designer as a target user and to consider interfaces and interactions that support sustainable design and sustainable manufacturing, as well as sustainable consumption. Specifically, to make real progress, we seek to enumerate ways that HCI needs to grow, as well as to find ways that can help more HCI researchers to become involved. JA - 2011 annual conference extended abstracts on Human factors in computing systems T3 - CHI EA '11 PB - ACM CY - New York, NY, USA UR - http://doi.acm.org/10.1145/1979482.1979484 M3 - 10.1145/1979482.1979484 ER - TY - JOUR T1 - Clonal transmission, dual peak, and off-season cholera in Bangladesh JF - Infection Ecology & Epidemiology Y1 - 2011 A1 - Alam,M. A1 - Islam,A. A1 - Bhuiyan,N. A. A1 - Rahim,N. A1 - Hossain,A. A1 - Khan,G. Y. A1 - Ahmed,D. A1 - Watanabe,H. A1 - Izumiya,H. A1 - Faruque,A. S. G. A1 - Rita R Colwell AB - Vibrio cholerae is an estuarine bacterium associated with a single peak of cholera (March–May) in coastal villages of Bangladesh. For an unknown reason, however, cholera occurs in a unique dual peak (March–May and September–November) pattern in the city of Dhaka that is bordered by a heavily polluted freshwater river system and flood embankment. In August 2007, extreme flooding was accompanied by an unusually severe diarrhea outbreak in Dhaka that resulted in a record high illness. This study was aimed to understand the unusual outbreak and if it was related to the circulation of a new V. cholerae clone. Nineteen V. cholerae isolated during the peak of the 2007 outbreak were subjected to extensive phenotypic and molecular analyses, including multi-locus genetic screening by polymerase chain reaction (PCR), sequence-typing of the ctxB gene, and pulsed-field gel electrophoresis (PFGE). Factors associated with the unusual incidence of cholera were determined and analysis of the disease severity was done. Overall, microbiological and molecular data confirmed that the hypervirulent V. cholerae was O1 biotype El Tor (ET) that possessed cholera toxin (CT) of the classical biotype. The PFGE (NotI) and dendrogram clustering confirmed that the strains were clonal and related to the pre-2007 variant ET from Dhaka and Matlab and resembled one of two distinct clones of the variant ET confirmed to be present in the estuarine ecosystem of Bangladesh. Results of the analyses of both diarrheal case data for three consecutive years (2006–2008) and regional hydroclimatology over three decades (1980–2009) clearly indicate that the pattern of cholera occurring in Dhaka, and not seen at other endemic sites, was associated with flood waters transmitting the infectious clone circulating via the fecal-oral route during and between the dual seasonal cholera peaks in Dhaka. Circular river systems and flood embankment likely facilitate transmission of infectious V. cholerae throughout the year that leads to both sudden and off-season outbreaks in the densely populated urban ecosystem of Dhaka. Clonal recycling of hybrid El Tor with increasing virulence in a changing climate and in a region with a growing urban population represents a serious public health concern for Bangladesh. VL - 1 CP - 1 M3 - 10.3402/iee.v1i0.7273 ER - TY - CONF T1 - Comparing values and sentiment using Mechanical Turk T2 - Proceedings of the 2011 iConference Y1 - 2011 A1 - Templeton,Thomas Clay A1 - Fleischmann,Kenneth R. A1 - Jordan Boyd-Graber KW - human values KW - sentiment analysis KW - text classification AB - Human values can help to explain people's sentiment toward current events. In this experiment, we compare people's values with their agreement or disagreement with paragraphs that were classified as either supporting or opposing a specific topic. We found that five value types have statistically significant agreement (p<0.001) for both the supporting and opposing paragraphs, in opposite directions. We hope to use these paragraph ratings to train an automatic text classifier to agree or disagree with paragraphs based on a specific value profile. JA - Proceedings of the 2011 iConference T3 - iConference '11 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0121-3 UR - http://doi.acm.org/10.1145/1940761.1940903 M3 - 10.1145/1940761.1940903 ER - TY - CONF T1 - Computing the Tree of Life: Leveraging the Power of Desktop and Service Grids T2 - Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on Y1 - 2011 A1 - Bazinet,A. L A1 - Cummings, Michael P. KW - (artificial KW - (mathematics);user KW - analysis;science KW - BOINC KW - computation;grid KW - computational KW - computing KW - computing;information KW - computing;machine KW - data;grid KW - estimation;portals;trees KW - evolutionary KW - Grid KW - grids;service KW - handling;evolutionary KW - history;evolutionary KW - intelligence);maximum KW - interface;computational KW - interfaces; KW - jobs;HPC KW - learning;maximum KW - likelihood KW - load;Internet;data KW - method;molecular KW - model;genetic KW - model;substantial KW - portal;service KW - power;data KW - project;life KW - resource;lattice KW - resource;Web KW - sequence KW - services;learning KW - sets;evolutionary KW - software;GARLI KW - system;heterogeneous KW - systematics;phylogenetic KW - tree AB - The trend in life sciences research, particularly in molecular evolutionary systematics, is toward larger data sets and ever-more detailed evolutionary models, which can generate substantial computational loads. Over the past several years we have developed a grid computing system aimed at providing researchers the computational power needed to complete such analyses in a timely manner. Our grid system, known as The Lattice Project, was the first to combine two models of grid computing - the service model, which mainly federates large institutional HPC resources, and the desktop model, which harnesses the power of PCs volunteered by the general public. Recently we have developed a "science portal" style web interface that makes it easier than ever for phylogenetic analyses to be completed using GARLI, a popular program that uses a maximum likelihood method to infer the evolutionary history of organisms on the basis of genetic sequence data. This paper describes our approach to scheduling thousands of GARLI jobs with diverse requirements to heterogeneous grid resources, which include volunteer computers running BOINC software. A key component of this system provides a priori GARLI runtime estimates using machine learning with random forests. JA - Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on M3 - 10.1109/IPDPS.2011.344 ER - TY - CONF T1 - Correcting Errors in Digital Lexicographic Resources Using a Dictionary Manipulation Language T2 - Electronic lexicography in the 21st century: new applications for new users (eLEX2011) Y1 - 2011 A1 - Zajic, David A1 - Maxwell,Michael A1 - David Doermann A1 - Rodrigues,Paul A1 - Bloodgood,Michael AB - We describe a paradigm for combining manual and automatic error correction of noisy structured lexicographic data. Modifications to the structure and underlying text of the lexicographic data are expressed in a simple, interpreted programming language. Dictionary Manipulation Language (DML) commands identify nodes by unique identifiers, and manipulations are performed using simple commands such as create, move, set text, etc. Corrected lexicons are produced by applying sequences of DML commands to the source version of the lexicon. DML commands can be written manually to repair one-off errors or generated automatically to correct recurring problems. We discuss advantages of the paradigm for the task of editing digital bilingual dictionaries. JA - Electronic lexicography in the 21st century: new applications for new users (eLEX2011) ER - TY - CONF T1 - Creating contextual help for GUIs using screenshots T2 - Proceedings of the 24th annual ACM symposium on User interface software and technology Y1 - 2011 A1 - Tom Yeh A1 - Chang,Tsung-Hsiang A1 - Xie,Bo A1 - Walsh,Greg A1 - Watkins,Ivan A1 - Wongsuphasawat,Krist A1 - Huang,Man A1 - Davis, Larry S. A1 - Bederson, Benjamin B. KW - contextual help KW - help KW - pixel analysis AB - Contextual help is effective for learning how to use GUIs by showing instructions and highlights on the actual interface rather than in a separate viewer. However, end-users and third-party tech support typically cannot create contextual help to assist other users because it requires programming skill and source code access. We present a creation tool for contextual help that allows users to apply common computer skills-taking screenshots and writing simple scripts. We perform pixel analysis on screenshots to make this tool applicable to a wide range of applications and platforms without source code access. We evaluated the tool's usability with three groups of participants: developers, in-structors, and tech support. We further validated the applicability of our tool with 60 real tasks supported by the tech support of a university campus. JA - Proceedings of the 24th annual ACM symposium on User interface software and technology T3 - UIST '11 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0716-1 UR - http://doi.acm.org/10.1145/2047196.2047214 M3 - 10.1145/2047196.2047214 ER - TY - RPRT T1 - Dataflow-based Design and Implementation of Image Processing Applications Y1 - 2011 A1 - Chung-Ching Shen A1 - Plishker,William A1 - Bhattacharyya, Shuvra S. KW - Technical Report AB - Dataflow is a well known computational model and is widely used forexpressing the functionality of digital signal processing (DSP) applications, such as audio and video data stream processing, digital communications, and image processing. These applications usually require real-time processing capabilities and have critical performance constraints. Dataflow provides a formal mechanism for describing specifications of DSP applications, imposes minimal data-dependency constraints in specifications, and is effective in exposing and exploiting task or data level parallelism for achieving high performance implementations. To demonstrate dataflow-based design methods in a manner that is concrete and easily adapted to different platforms and back-end design tools, we present in this report a number of case studies based on the lightweight dataflow (LWDF) programming methodology. LWDF is designed as a "minimalistic" approach for integrating coarse grain dataflow programming structures into arbitrary simulation- or platform-oriented languages, such as C, C++, CUDA, MATLAB, SystemC, Verilog, and VHDL. In particular, LWDF requires minimal dependence on specialized tools or libraries. This feature --- together with the rigorous adherence to dataflow principles throughout the LWDF design framework --- allows designers to integrate and experiment with dataflow modeling approaches relatively quickly and flexibly into existing design methodologies and processes. JA - Technical Reports from UMIACS SN - UMIACS-TR-2011-11 UR - http://drum.lib.umd.edu//handle/1903/11403 M3 - Technical Report ER - TY - RPRT T1 - Dataflow-Based Implementation of Layered Sensing Applications Y1 - 2011 A1 - Bhattacharyya, Shuvra S. A1 - Chung-Ching Shen A1 - Plishker,William A1 - Sane, Nimish A1 - Wu, Hsiang-Huang A1 - Gu, Ruirui KW - *COMPUTER AIDED DESIGN KW - *DATA FUSION KW - *DATAFLOW KW - *LAYERS KW - *SOFTWARE TOOLS KW - COMPUTER PROGRAMMING AND SOFTWARE KW - DETECTION KW - High performance computing KW - LAYERED SENSING KW - OPTIMIZATION KW - Signal processing KW - synthesis KW - T2KA AB - This report describes a new dataflow-based technology and associated design tools for high-productivity design, analysis, and optimization of layered sensing software for signal processing systems. Our approach provides novel capabilities, based on the principles of task-level dataflow analysis, for exploring and optimizing interactions across application behavior; operational context; high performance embedded processing platforms, and implementation constraints. Particularly, we introduce and deliver novel software tools, called the targeted dataflow interchange format (TDIF) and Dataflow Interchange Format Markup Language (DIFML), for design and implementation of layered sensing and signal processing systems. The TDIF-CUDA (Compute Unified Device Architecture) environment is a graphics processing unit targeted software synthesis tool that provides a unique integration of dynamic dataflow modeling; retargetable actor construction; software synthesis; and instrumentation-based schedule evaluation and tuning. The DIFML package is a software package for the DIFML format, which is an Extensible Markup Language (XML)-based format for exchanging information between DIF and other tools. ER - TY - CONF T1 - Decentralized, accurate, and low-cost network bandwidth prediction T2 - 2011 Proceedings IEEE INFOCOM Y1 - 2011 A1 - Sukhyun Song A1 - Keleher,P. A1 - Bhattacharjee, Bobby A1 - Sussman, Alan KW - accuracy KW - approximate tree metric space KW - Bandwidth KW - bandwidth allocation KW - bandwidth measurement KW - decentralized low cost system KW - distributed tree KW - end-to-end prediction KW - Extraterrestrial measurements KW - Internet KW - low-cost network bandwidth prediction KW - Measurement uncertainty KW - pairwise bandwidth KW - Peer to peer computing KW - Prediction algorithms KW - trees (mathematics) AB - The distributed nature of modern computing makes end-to-end prediction of network bandwidth increasingly important. Our work is inspired by prior work that treats the Internet and bandwidth as an approximate tree metric space. This paper presents a decentralized, accurate, and low cost system that predicts pairwise bandwidth between hosts. We describe an algorithm to construct a distributed tree that embeds bandwidth measurements. The correctness of the algorithm is provable when driven by precise measurements. We then describe three novel heuristics that achieve high accuracy for predicting bandwidth even with imprecise input data. Simulation experiments with a real-world dataset confirm that our approach shows high accuracy with low cost. JA - 2011 Proceedings IEEE INFOCOM PB - IEEE SN - 978-1-4244-9919-9 M3 - 10.1109/INFCOM.2011.5935251 ER - TY - BOOK T1 - Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings Y1 - 2011 A1 - Baras,John S A1 - Katz, Jonathan A1 - Altman,Eitan KW - Business & Economics / Information Management KW - Computers / Hardware / Network Hardware KW - Computers / Information Technology KW - Computers / Programming / Algorithms KW - Computers / Security / General KW - Mathematics / Applied KW - Mathematics / Game Theory KW - Mathematics / General AB - This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments. PB - Springer SN - 9783642252792 ER - TY - JOUR T1 - Design and fabrication of miniature compliant hinges for multi-material compliant mechanisms JF - The International Journal of Advanced Manufacturing Technology Y1 - 2011 A1 - Bejgerowski,Wojciech A1 - Gerdes,John A1 - Gupta, Satyandra K. A1 - Bruck,Hugh KW - engineering AB - Multi-material molding (MMM) enables the creation of multi-material mechanisms that combine compliant hinges, serving as revolute joints, and rigid links in a single part. There are three important challenges in creating these structures: (1) bonding between the materials used, (2) the ability of the hinge to transfer the required loads in the mechanism while allowing for the prescribed degree(s) of freedom, and (3) incorporating the process-specific requirements in the design stage. This paper presents the approach for design and fabrication of miniature compliant hinges in multi-material compliant mechanisms. The methodology described in this paper allows for the concurrent design of the part and the manufacturing process. For the first challenge, mechanical interlocking strategies are presented. For the second challenge, the development of a simulation-based optimization model of the hinge is presented, involving functional and manufacturing constrains. For the third challenge, the development of hinge positioning features and gate positioning constraints is presented. The developed MMM process is described, along with the main constraints and performance measures. This includes the process sequence, the mold cavity design, gate selection, and runner system development. A case study is presented to demonstrate the feasibility of creating multi-material mechanisms with miniature hinges serving as joints through MMM process. The approach described in this paper was utilized to design a drive mechanism for a flapping wing micro air vehicle. The methods described in this paper are applicable to any lightweight, load-bearing compliant mechanism manufactured using multi-material injection molding. VL - 57 SN - 0268-3768 UR - http://www.springerlink.com/content/ul641k1v50360607/abstract/ CP - 5 M3 - 10.1007/s00170-011-3301-y ER - TY - CONF T1 - Design methods for Wireless Sensor Network Building Energy Monitoring Systems T2 - 2011 IEEE 36th Conference on Local Computer Networks (LCN) Y1 - 2011 A1 - Cho, Inkeun A1 - Chung-Ching Shen A1 - Potbhare, S. A1 - Bhattacharyya, Shuvra S. A1 - Goldsman,N. KW - Analytical models KW - application-level interfacing behavior KW - building energy monitoring system KW - Buildings KW - dataflow technique KW - embedded sensor node KW - energy analysis method KW - Energy consumption KW - energy management systems KW - Energy resolution KW - IEEE 802.15.4 MAC functionality KW - Monitoring KW - OPTIMIZATION KW - wireless sensor network KW - Wireless sensor networks KW - WSNBEMS KW - Zigbee AB - In this paper, we present a new energy analysis method for evaluating energy consumption of embedded sensor nodes at the application level and the network level. Then we apply the proposed energy analysis method to develop new energy management schemes in order to maximize lifetime for Wireless Sensor Network Building Energy Monitoring Systems (WSNBEMS). At the application level, we develop a new design approach that uses dataflow techniques to model the application-level interfacing behavior between the processor and sensors on an embedded sensor node. At the network level, we analyze the energy consumption of the IEEE 802.15.4 MAC functionality. Based on our techniques for modeling and energy analysis, we have implemented an optimized WSNBEMS for a real building, and validated our energy analysis techniques through measurements on this implementation. The performance of our implementation is also evaluated in terms of monitoring accuracy and energy consumption savings. We have demonstrated that by applying the proposed scheme, system lifetime can be improved significantly without affecting monitoring accuracy. JA - 2011 IEEE 36th Conference on Local Computer Networks (LCN) ER - TY - CONF T1 - A design tool for efficient mapping of multimedia applications onto heterogeneous platforms T2 - 2011 IEEE International Conference on Multimedia and Expo (ICME) Y1 - 2011 A1 - Chung-Ching Shen A1 - Wu, Hsiang-Huang A1 - Sane, N. A1 - Plishker,W. A1 - Bhattacharyya, Shuvra S. KW - Dataflow graphs KW - design tools KW - embedded signal processing KW - software synthesis AB - Development of multimedia systems on heterogeneous platforms is a challenging task with existing design tools due to a lack of rigorous integration between high level abstract modeling, and low level synthesis and analysis. In this paper, we present a new dataflow-based design tool, called the targeted dataflow interchange format (TDIF), for design, analysis, and implementation of embedded software for multimedia systems. Our approach provides novel capabilities, based on the principles of task-level dataflow analysis, for exploring and optimizing interactions across application behavior; operational context; heterogeneous platforms, including high performance embedded processing architectures; and implementation constraints. JA - 2011 IEEE International Conference on Multimedia and Expo (ICME) ER - TY - CONF T1 - Detecting Structural Irregularity in Electronic Dictionaries Using Language Modeling T2 - Electronic lexicography in the 21st century: new applications for new users (eLEX2011) Y1 - 2011 A1 - Rodrigues,Paul A1 - Zajic, David A1 - Bloodgood,Michael A1 - Ye,Peng A1 - David Doermann AB - Dictionaries are often developed using Extensible Markup Language (XML)-based standards. Very often, these standards allow many high-level repeating elements to represent lexical entries, and utilize descendants of these repeating elements to represent the structure within each lexical entry, in the form of an XML tree. In many cases, dictionaries are published that have errors and inconsistencies that would be too expensive to find manually. This paper discusses a method for dictionary writers to audit structural regularity across entries in a dictionary, quickly, by using statistical language modelling. The approach learns the patterns of XML nodes that could occur within an XML tree, and then calculates the probability of each XML tree in the dictionary against these patterns to look for entries that diverge from the norm. JA - Electronic lexicography in the 21st century: new applications for new users (eLEX2011) ER - TY - JOUR T1 - Developing a Single Model and Test Prioritization Strategies for Event-Driven Software JF - Software Engineering, IEEE Transactions on Y1 - 2011 A1 - Bryce,R.C. A1 - Sampath,S. A1 - Memon, Atif M. KW - EDS KW - event-driven software KW - graphical user interface KW - Graphical user interfaces KW - GUI testing KW - Internet KW - program testing KW - service-oriented architecture KW - test prioritization strategy KW - Web application testing AB - Event-Driven Software (EDS) can change state based on incoming events; common examples are GUI and Web applications. These EDSs pose a challenge to testing because there are a large number of possible event sequences that users can invoke through a user interface. While valuable contributions have been made for testing these two subclasses of EDS, such efforts have been disjoint. This work provides the first single model that is generic enough to study GUI and Web applications together. In this paper, we use the model to define generic prioritization criteria that are applicable to both GUI and Web applications. Our ultimate goal is to evolve the model and use it to develop a unified theory of how all EDS should be tested. An empirical study reveals that the GUI and Web-based applications, when recast using the new model, show similar behavior. For example, a criterion that gives priority to all pairs of event interactions did well for GUI and Web applications; another criterion that gives priority to the smallest number of parameter value settings did poorly for both. These results reinforce our belief that these two subclasses of applications should be modeled and studied together. VL - 37 SN - 0098-5589 CP - 1 M3 - 10.1109/TSE.2010.12 ER - TY - JOUR T1 - Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization JF - Nature Medicine Y1 - 2011 A1 - Korpal, Manav A1 - Ell, Brian J. A1 - Buffa, Francesca M. A1 - Ibrahim, Toni A1 - Blanco, Mario A. A1 - Celià-Terrassa, Toni A1 - Mercatali, Laura A1 - Zia Khan A1 - Goodarzi, Hani A1 - Hua, Yuling A1 - Wei, Yong A1 - Hu, Guohong A1 - Garcia, Benjamin A. A1 - Ragoussis, Jiannis A1 - Amadori, Dino A1 - Harris, Adrian L. A1 - Kang, Yibin AB - Although the role of miR-200s in regulating E-cadherin expression and epithelial-to-mesenchymal transition is well established, their influence on metastatic colonization remains controversial. Here we have used clinical and experimental models of breast cancer metastasis to discover a pro-metastatic role of miR-200s that goes beyond their regulation of E-cadherin and epithelial phenotype. Overexpression of miR-200s is associated with increased risk of metastasis in breast cancer and promotes metastatic colonization in mouse models, phenotypes that cannot be recapitulated by E-cadherin expression alone. Genomic and proteomic analyses revealed global shifts in gene expression upon miR-200 overexpression toward that of highly metastatic cells. miR-200s promote metastatic colonization partly through direct targeting of Sec23a, which mediates secretion of metastasis-suppressive proteins, including Igfbp4 and Tinagl1, as validated by functional and clinical correlation studies. Overall, these findings suggest a pleiotropic role of miR-200s in promoting metastatic colonization by influencing E-cadherin–dependent epithelial traits and Sec23a-mediated tumor cell secretome.View full text VL - 17 SN - 1078-8956 UR - http://www.nature.com/nm/journal/v17/n9/abs/nm.2401.html CP - 9 J1 - Nat Med ER - TY - CHAP T1 - Distributed Sensing and Processing for Multi-Camera Networks T2 - Distributed Video Sensor NetworksDistributed Video Sensor Networks Y1 - 2011 A1 - Sankaranarayanan,Aswin C. A1 - Chellapa, Rama A1 - Baraniuk,Richard G. ED - Bhanu,Bir ED - Ravishankar,Chinya V. ED - Roy-Chowdhury,Amit K. ED - Aghajan,Hamid ED - Terzopoulos,Demetri AB - Sensor networks with large numbers of cameras are becoming increasingly prevalent in a wide range of applications, including video conferencing, motion capture, surveillance, and clinical diagnostics. In this chapter, we identify some of the fundamental challenges in designing such systems: robust statistical inference, computationally efficiency, and opportunistic and parsimonious sensing. We show that the geometric constraints induced by the imaging process are extremely useful for identifying and designing optimal estimators for object detection and tracking tasks. We also derive pipelined and parallelized implementations of popular tools used for statistical inference in non-linear systems, of which multi-camera systems are examples. Finally, we highlight the use of the emerging theory of compressive sensing in reducing the amount of data sensed and communicated by a camera network. JA - Distributed Video Sensor NetworksDistributed Video Sensor Networks PB - Springer London SN - 978-0-85729-127-1 UR - http://dx.doi.org/10.1007/978-0-85729-127-1_6 ER - TY - RPRT T1 - The DSPCAD Integrative Command Line Environment: Introduction to DICE Version 1.1 Y1 - 2011 A1 - Bhattacharyya, Shuvra S. A1 - Plishker,William A1 - Chung-Ching Shen A1 - Sane, Nimish A1 - Zaki, George KW - *SOFTWARE ENGINEERING KW - COMPUTER PROGRAMMING KW - COMPUTER PROGRAMMING AND SOFTWARE KW - COMPUTER PROGRAMS KW - DICE(COMPUTER PROGRAM) KW - programming languages KW - Project management AB - DICE (the DSPCAD Integrative Command Line Environment) is a package of utilities that facilitates efficient management of software projects. Key areas of emphasis in DICE are cross-platform operation, support for projects that integrate heterogeneous programming languages, and support for applying and integrating different kinds of design and testing methodologies. The package is being developed at the University of Maryland to facilitate the research and teaching of methods for implementation, testing, evolution, and revision of engineering software. The package is also being developed as a foundation for developing experimental research software for techniques and tools in the area of computer-aided design (CAD) of digital signal processing (DSP) systems. The package is intended for cross-platform operation, and is currently being developed and used actively on the Linux, Mac OS, Solaris, and Windows (equipped with Cygwin) platforms. This report provides an introduction to DICE, and provides background on some of the key features in DICE Version 1.1. This report also gives a brief introduction to dicelang, which is a plug-in package for DICE that provides additional utilities, libraries, and tools for managing software projects in specific programming languages. ER - TY - RPRT T1 - The DSPCAD Lightweight Dataflow Environment: Introduction to LIDE Version 0.1 Y1 - 2011 A1 - Chung-Ching Shen A1 - Wang, Lai-Huei A1 - Cho, Inkeun A1 - Kim, Scott A1 - Won, Stephen A1 - Plishker,William A1 - Bhattacharyya, Shuvra S. KW - Technical Report AB - LIDE (the DSPCAD Lightweight Dataflow Environment) is a flexible,lightweight design environment that allows designers to experiment with dataflow-based approaches for design and implementation of digital signal processing (DSP) systems. LIDE contains libraries of dataflow graph elements (primitive actors, hierarchical actors, and edges) and utilities that assist designers in modeling, simulating, and implementing DSP systems using formal dataflow techniques. The libraries of dataflow graph elements (mainly actors) contained in LIDE provide useful building blocks that can be used to construct signal processing applications, and that can be used as examples that designers can adapt to create their own, customized LIDE actors. Furthermore, by using LIDE along with the DSPCAD Integrative Command Line Environment (DICE), designers can efficiently create and execute unit tests for user-designed actors. This report provides an introduction to LIDE. The report includes details on the process for setting up the LIDE environment, and covers methods for using pre-designed libraries of graph elements, as well as creating user-designed libraries and associated utilities using the C language. The report also gives an introduction to the C language plug-in for dicelang. This plug-in, called dicelang-C, provides features for efficient C-based project development and maintenance that are useful to apply when working with LIDE. JA - Technical Reports from UMIACS SN - UMIACS-TR-2011-17 UR - http://drum.lib.umd.edu//handle/1903/12147 M3 - Technical Report ER - TY - JOUR T1 - Dynamic Processing Allocation in Video JF - Pattern Analysis and Machine Intelligence, IEEE Transactions on Y1 - 2011 A1 - Daozheng Chen A1 - Bilgic,M. A1 - Getoor, Lise A1 - Jacobs, David W. KW - algorithms;digital KW - allocation;video KW - analysis;computer KW - background KW - detection;graphical KW - detection;resource KW - graphics;face KW - model;resource KW - processing; KW - processing;face KW - recognition;object KW - signal KW - subtraction;baseline KW - video AB - Large stores of digital video pose severe computational challenges to existing video analysis algorithms. In applying these algorithms, users must often trade off processing speed for accuracy, as many sophisticated and effective algorithms require large computational resources that make it impractical to apply them throughout long videos. One can save considerable effort by applying these expensive algorithms sparingly, directing their application using the results of more limited processing. We show how to do this for retrospective video analysis by modeling a video using a chain graphical model and performing inference both to analyze the video and to direct processing. We apply our method to problems in background subtraction and face detection, and show in experiments that this leads to significant improvements over baseline algorithms. VL - 33 SN - 0162-8828 CP - 11 M3 - 10.1109/TPAMI.2011.55 ER - TY - JOUR T1 - Eighth workshop on mining and learning with graphs JF - SIGKDD Explor. Newsl. Y1 - 2011 A1 - Brefeld,Ulf A1 - Getoor, Lise A1 - Macskassy,Sofus A. KW - data mining KW - dynamic network analysis KW - graph mining KW - kernel methods KW - link mining KW - machine learning KW - network analysis KW - pattern recognition KW - relational learning KW - scalable graph mining KW - statistical relational learning AB - The Eighth Workshop on Mining and Learning with Graphs (MLG)1was held at KDD 2010 in Washington DC. It brought together a variete of researchers interested in analyzing data that is best represented as a graph. Examples include the WWW, social networks, biological networks, communication networks, and many others. The importance of being able to effectively mine and learn from such data is growing, as more and more structured and semi-structured data is becoming available. This is a problem across widely different fields such as economics, statistics, social science, physics and computer science, and is studied within a variety of sub-disciplines of machine learning and data mining including graph mining, graphical models, kernel theory, statistical relational learning, etc. The objective of this workshop was to bring together practitioners from these various fields and areas to foster a rich discussion of which problems we work on, how we frame them in the context of graphs, which tools and algorithms we apply and our general findings and lessons learned. This year's workshop was very successful with well over 100 attendees, excellent keynote speakers and papers. This is a rapidly growing area and we believe that this community is only in its infancy. We hope that the readers will join us next year for MLG 2011. VL - 12 SN - 1931-0145 UR - http://doi.acm.org/10.1145/1964897.1964915 CP - 2 M3 - 10.1145/1964897.1964915 ER - TY - JOUR T1 - Empirical Studies in Information Visualization: Seven Scenarios JF - Visualization and Computer Graphics, IEEE Transactions on Y1 - 2011 A1 - Lam,H. A1 - Bertini,E. A1 - Isenberg,P. A1 - Plaisant, Catherine A1 - Carpendale,S. AB - We take a new, scenario based look at evaluation in information visualization. Our seven scenarios, evaluating visual data analysis and reasoning, evaluating user performance, evaluating user experience, evaluating environments and work practices, evaluating communication through visualization, evaluating visualization algorithms, and evaluating collaborative data analysis were derived through an extensive literature review of over 800 visualization publications. These scenarios distinguish different study goals and types of research questions and are illustrated through example studies. Through this broad survey and the distillation of these scenarios we make two contributions. One, we encapsulate the current practices in the information visualization research community and, two, we provide a different approach to reaching decisions about what might be the most effective evaluation of a given information visualization. Scenarios can be used to choose appropriate research questions and goals and the provided examples can be consulted for guidance on how to design one's own study. VL - PP SN - 1077-2626 CP - 99 M3 - 10.1109/TVCG.2011.279 ER - TY - JOUR T1 - The Evolution of Network Configuration: A Tale of Two Campuses JF - Networks Y1 - 2011 A1 - Kim,H. A1 - Benson,T. A1 - Akella,A. A1 - Feamster, Nick AB - Studying network configuration evolution can improve our under- standing of the evolving complexity of networks and can be helpful in making network configuration less error-prone. Unfortunately, the nature of changes that operators make to network configuration is poorly understood. Towards improving our understanding, we examine and analyze five years of router, switch, and firewall con- figurations from two large campus networks using the logs from version control systems used to store the configurations. We study how network configuration is distributed across different network operations tasks and how the configuration for each task evolves over time, for different types of devices and for different loca- tions in the network. To understand the trends of how configura- tion evolves over time, we study the extent to which configuration for various tasks are added, modified, or deleted. We also study whether certain devices experience configuration changes more fre- quently than others, as well as whether configuration changes tend to focus on specific portions of the configuration (or on specific tasks). We also investigate when network operators make configu- ration changes of various types. Our results concerning configura- tion changes can help the designers of configuration languages un- derstand which aspects of configuration might be more automated or tested more rigorously and may ultimately help improve config- uration languages. VL - 7 ER - TY - JOUR T1 - Exploiting Statically Schedulable Regions in Dataflow Programs JF - Journal of Signal Processing Systems Y1 - 2011 A1 - Gu, Ruirui A1 - Janneck, Jörn W. A1 - Raulet, Mickaël A1 - Bhattacharyya, Shuvra S. KW - Cal KW - Circuits and Systems KW - Computer Imaging, Vision, Pattern Recognition and Graphics KW - Dataflow KW - DIF KW - Electrical Engineering KW - Image Processing and Computer Vision KW - multicore processors KW - pattern recognition KW - Quasi-static scheduling KW - Signal, Image and Speech Processing AB - Dataflow descriptions have been used in a wide range of Digital Signal Processing (DSP) applications, such as multi-media processing, and wireless communications. Among various forms of dataflow modeling, Synchronous Dataflow (SDF) is geared towards static scheduling of computational modules, which improves system performance and predictability. However, many DSP applications do not fully conform to the restrictions of SDF modeling. More general dataflow models, such as CAL (Eker and Janneck 2003), have been developed to describe dynamically-structured DSP applications. Such generalized models can express dynamically changing functionality, but lose the powerful static scheduling capabilities provided by SDF. This paper focuses on the detection of SDF-like regions in dynamic dataflow descriptions—in particular, in the generalized specification framework of CAL. This is an important step for applying static scheduling techniques within a dynamic dataflow framework. Our techniques combine the advantages of different dataflow languages and tools, including CAL (Eker and Janneck 2003), DIF (Hsu et al. 2005) and CAL2C (Roquier et al. 2008). In addition to detecting SDF-like regions, we apply existing SDF scheduling techniques to exploit the static properties of these regions within enclosing dynamic dataflow models. Furthermore, we propose an optimized approach for mapping SDF-like regions onto parallel processing platforms such as multi-core processors. VL - 63 SN - 1939-8018, 1939-8115 UR - http://link.springer.com/article/10.1007/s11265-009-0445-1 CP - 1 J1 - J Sign Process Syst ER - TY - CHAP T1 - Face Tracking and Recognition in a Camera Network T2 - Multibiometrics for Human IdentificationMultibiometrics for Human Identification Y1 - 2011 A1 - Bhanu,Bir A1 - Govindaraju,Venu JA - Multibiometrics for Human IdentificationMultibiometrics for Human Identification PB - Cambridge University Press SN - 9780511921056 UR - http://dx.doi.org/10.1017/CBO9780511921056 ER - TY - JOUR T1 - Fast approximations of the rotational diffusion tensor and their application to structural assembly of molecular complexes JF - Proteins: Structure, Function, and Bioinformatics Y1 - 2011 A1 - Berlin,Konstantin A1 - O'Leary, Dianne P. A1 - Fushman, David KW - diffusion‐guided molecular assembly KW - ellipsoid model KW - ELM KW - PATI KW - protein complexes KW - residual dipolar couplings KW - rigid‐body docking AB - We present and evaluate a rigid-body, deterministic, molecular docking method, called ELMDOCK, that relies solely on the three-dimensional structure of the individual components and the overall rotational diffusion tensor of the complex, obtained from nuclear spin-relaxation measurements. We also introduce a docking method, called ELMPATIDOCK, derived from ELMDOCK and based on the new concept of combining the shape-related restraints from rotational diffusion with those from residual dipolar couplings, along with ambiguous contact/interface-related restraints obtained from chemical shift perturbations. ELMDOCK and ELMPATIDOCK use two novel approximations of the molecular rotational diffusion tensor that allow computationally efficient docking. We show that these approximations are accurate enough to properly dock the two components of a complex without the need to recompute the diffusion tensor at each iteration step. We analyze the accuracy, robustness, and efficiency of these methods using synthetic relaxation data for a large variety of protein-protein complexes. We also test our method on three protein systems for which the structure of the complex and experimental relaxation data are available, and analyze the effect of flexible unstructured tails on the outcome of docking. Additionally, we describe a method for integrating the new approximation methods into the existing docking approaches that use the rotational diffusion tensor as a restraint. The results show that the proposed docking method is robust against experimental errors in the relaxation data or structural rearrangements upon complex formation and is computationally more efficient than current methods. The developed approximations are accurate enough to be used in structure refinement protocols. Proteins 2011; © 2011 Wiley-Liss, Inc. VL - 79 SN - 1097-0134 UR - http://onlinelibrary.wiley.com/doi/10.1002/prot.23053/full CP - 7 M3 - 10.1002/prot.23053 ER - TY - BOOK T1 - GameSec'11: Proceedings of the Second international conference on Decision and Game Theory for Security Y1 - 2011 ED - Baras,John S ED - Katz, Jonathan ED - Altman,Eitan PB - Springer-Verlag CY - Berlin, Heidelberg SN - 978-3-642-25279-2 ER - TY - CONF T1 - HCI for peace: from idealism to concrete steps T2 - PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems Y1 - 2011 A1 - Hourcade,Juan Pablo A1 - Bullock-Rest,Natasha E. A1 - Friedman,Batya A1 - Nelson,Mark A1 - Shneiderman, Ben A1 - Zaphiris,Panayiotis KW - cyprus KW - peace KW - persuasive technology KW - post-conflict reconciliation KW - social media KW - value sensitive design KW - war AB - This panel will contribute diverse perspectives on the use of computer technology to promote peace and prevent armed conflict. These perspectives include: the use of social media to promote democracy and citizen participation, the role of computers in helping people communicate across division lines in zones of conflict, how persuasive technology can promote peace, and how interaction design can play a role in post-conflict reconciliation. JA - PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems T3 - CHI EA '11 PB - ACM CY - New York, NY, USA UR - http://doi.acm.org/10.1145/1979482.1979493 M3 - 10.1145/1979482.1979493 ER - TY - CHAP T1 - Heterogeneous Design in Functional DIF T2 - Transactions on High-Performance Embedded Architectures and Compilers IV Y1 - 2011 A1 - Plishker,William A1 - Sane, Nimish A1 - Kiemb, Mary A1 - Bhattacharyya, Shuvra S. ED - Stenström, Per KW - Arithmetic and Logic Structures KW - Computer Communication Networks KW - Dataflow KW - heterogeneous KW - Input/Output and Data Communications KW - Logic Design KW - Processor Architectures KW - Programming Languages, Compilers, Interpreters KW - Signal processing AB - Dataflow formalisms have provided designers of digital signal processing (DSP) systems with analysis and optimizations for many years. As system complexity increases, designers are relying on more types of dataflow models to describe applications while retaining these implementation benefits. The semantic range of DSP-oriented dataflow models has expanded to cover heterogeneous models and dynamic applications, but efficient design, simulation, and scheduling of such applications has not. To facilitate implementing heterogeneous applications, we utilize a new dataflow model of computation and show how actors designed in other dataflow models are directly supported by this framework, allowing system designers to immediately compose and simulate actors from different models. Using examples, we show how this approach can be applied to quickly describe and functionally simulate a heterogeneous dataflow-based application such that a designer may analyze and tune trade-offs among different models and schedules for simulation time, memory consumption, and schedule size. JA - Transactions on High-Performance Embedded Architectures and Compilers IV T3 - Lecture Notes in Computer Science PB - Springer Berlin Heidelberg SN - 978-3-642-24567-1, 978-3-642-24568-8 UR - http://link.springer.com/chapter/10.1007/978-3-642-24568-8_20 ER - TY - JOUR T1 - A Hierarchical Algorithm for Fast Debye Summation with Applications to Small Angle Scattering JF - Technical Reports from UMIACS Y1 - 2011 A1 - Gumerov, Nail A. A1 - Berlin,Konstantin A1 - Fushman, David A1 - Duraiswami, Ramani KW - Technical Report AB - Debye summation, which involves the summation of sinc functions of distances between all pair of atoms in three dimensional space, arises in computations performed in crystallography, small/wide angle X-ray scattering (SAXS/WAXS) and small angle neutron scattering (SANS). Direct evaluation of Debye summation has quadratic complexity, which results in computational bottleneck when determining crystal properties, or running structure refinement protocols that involve SAXS or SANS, even for moderately sized molecules. We present a fast approximation algorithm that efficiently computes the summation to any prescribed accuracy epsilon in linear time. The algorithm is similar to the fast multipole method (FMM), and is based on a hierarchical spatial decomposition of the molecule coupled with local harmonic expansions and translation of these expansions. An even more efficient implementation is possible when the scattering profile is all that is required, as in small angle scattering reconstruction (SAS) of macromolecules. We examine the relationship of the proposed algorithm to existing approximate methods for profile computations, and provide detailed description of the algorithm, including error bounds and algorithms for stable computation of the translation operators. Our theoretical and computational results show orders of magnitude improvement in computation complexity over existing methods, while maintaining prescribed accuracy. UR - http://drum.lib.umd.edu/handle/1903/11857 ER - TY - JOUR T1 - Illumination modeling for face recognition JF - Handbook of face recognition Y1 - 2011 A1 - Basri,R. A1 - Jacobs, David W. AB - In this chapter, we show that effective systems can account for the effects of lighting using fewer than 10 degrees of freedom. This can have considerable impact on the speed and accuracy of recognition systems. We will describe theoretical results that, with some simplifying assumptions, prove the validity of low-dimensional, linear approximations to the set of images produced by a face. M3 - 10.1007/978-0-85729-932-1_7 ER - TY - CONF T1 - Illumination robust dictionary-based face recognition T2 - 2011 18th IEEE International Conference on Image Processing (ICIP) Y1 - 2011 A1 - Patel, Vishal M. A1 - Tao Wu A1 - Biswas,S. A1 - Phillips,P.J. A1 - Chellapa, Rama KW - albedo KW - approximation theory KW - classification KW - competitive face recognition algorithms KW - Databases KW - Dictionaries KW - Face KW - face recognition KW - face recognition method KW - filtering theory KW - human face recognition KW - illumination robust dictionary-based face recognition KW - illumination variation KW - image representation KW - learned dictionary KW - learning (artificial intelligence) KW - lighting KW - lighting conditions KW - multiple images KW - nonstationary stochastic filter KW - publicly available databases KW - relighting KW - relighting approach KW - representation error KW - residual vectors KW - Robustness KW - simultaneous sparse approximations KW - simultaneous sparse signal representation KW - sparseness constraint KW - Training KW - varying illumination KW - vectors AB - In this paper, we present a face recognition method based on simultaneous sparse approximations under varying illumination. Our method consists of two main stages. In the first stage, a dictionary is learned for each face class based on given training examples which minimizes the representation error with a sparseness constraint. In the second stage, a test image is projected onto the span of the atoms in each learned dictionary. The resulting residual vectors are then used for classification. Furthermore, to handle changes in lighting conditions, we use a relighting approach based on a non-stationary stochastic filter to generate multiple images of the same person with different lighting. As a result, our algorithm has the ability to recognize human faces with good accuracy even when only a single or a very few images are provided for training. The effectiveness of the proposed method is demonstrated on publicly available databases and it is shown that this method is efficient and can perform significantly better than many competitive face recognition algorithms. JA - 2011 18th IEEE International Conference on Image Processing (ICIP) PB - IEEE SN - 978-1-4577-1304-0 M3 - 10.1109/ICIP.2011.6116670 ER - TY - CHAP T1 - Implicit Authentication through Learning User Behavior T2 - Information Security Y1 - 2011 A1 - Elaine Shi A1 - Niu, Yuan A1 - Jakobsson, Markus A1 - Chow, Richard ED - Burmester, Mike ED - Tsudik, Gene ED - Magliveras, Spyros ED - Ilic, Ivana KW - Computer science AB - Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication - authenticating users based on behavior patterns. We describe our model for performing implicit authentication and assess our techniques using more than two weeks of collected data from over 50 subjects. JA - Information Security T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6531 SN - 978-3-642-18177-1 UR - http://www.springerlink.com/content/m57u551u3133475m/abstract/ ER - TY - JOUR T1 - Interactive topic modeling Y1 - 2011 A1 - Hu, Yuening A1 - Jordan Boyd-Graber A1 - Satinoff, Brianna AB - Abstract Topic models have been used extensively as a tool for corpus exploration, and a cottage industry has developed to tweak topic models to better encode human intuitions or to better model data. However, creating such extensions requires expertise in machine ... PB - Association for Computational Linguistics UR - http://dl.acm.org/citation.cfm?id=2002472.2002505 ER - TY - CONF T1 - IP geolocation in metropolitan areas T2 - Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems Y1 - 2011 A1 - Singh,Satinder Pal A1 - Baden,Randolph A1 - Lee,Choon A1 - Bhattacharjee, Bobby A1 - La,Richard A1 - Shayman,Mark KW - geolocation KW - pattern recognition KW - perturbation AB - Current IP geoloation techniques can geolocate an IP address to a region approximately 700 square miles, roughly the size of a metropolitan area. We model geolocation as a pattern-recognition problem, and introduce techniques that geolocate addresses to within 5 miles inside a metropolitan area. We propose two complementary algorithms: The first algorithm, Pattern Based Geolocation (PBG), models the distribution of latencies to the target and compares it to those of the reference landmarks to resolve an address to within 5 miles in a metropolitan area. The second approach, Perturbation Augmented PBG (PAPBG), provides higher resolution by sending extra traffic in the network. While sending an aggregate of 600 Kbps extra traffic to 20 nodes for approximately 2 minutes, PAPBG geolocates addresses to within 3 miles. JA - Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems T3 - SIGMETRICS '11 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0814-4 UR - http://doi.acm.org/10.1145/1993744.1993803 M3 - 10.1145/1993744.1993803 ER - TY - JOUR T1 - An iterative algorithm for homology computation on simplicial shapes JF - Computer-Aided Design Y1 - 2011 A1 - Boltcheva,Dobrina A1 - Canino,David A1 - Merino Aceituno,Sara A1 - Léon,Jean-Claude A1 - De Floriani, Leila A1 - Hétroy,Franck KW - Computational topology KW - Generators KW - Mayer–Vietoris sequence KW - shape decomposition KW - simplicial complexes KW - Z -homology AB - We propose a new iterative algorithm for computing the homology of arbitrary shapes discretized through simplicial complexes. We demonstrate how the simplicial homology of a shape can be effectively expressed in terms of the homology of its sub-components. The proposed algorithm retrieves the complete homological information of an input shape including the Betti numbers, the torsion coefficients and the representative homology generators.To the best of our knowledge, this is the first algorithm based on the constructive Mayer–Vietoris sequence, which relates the homology of a topological space to the homologies of its sub-spaces, i.e. the sub-components of the input shape and their intersections. We demonstrate the validity of our approach through a specific shape decomposition, based only on topological properties, which minimizes the size of the intersections between the sub-components and increases the efficiency of the algorithm. VL - 43 SN - 0010-4485 UR - http://www.sciencedirect.com/science/article/pii/S0010448511002144 CP - 11 M3 - 10.1016/j.cad.2011.08.015 ER - TY - JOUR T1 - Limits on the power of zero-knowledge proofs in cryptographic constructions JF - Theory of Cryptography Y1 - 2011 A1 - Brakerski,Z. A1 - Katz, Jonathan A1 - Segev,G. A1 - Yerukhimovich,A. AB - For over 20 years, black-box impossibility results have been used to argue the infeasibility of constructing certain cryptographic primitives (e.g., key agreement) from others (e.g., one-way functions). A widely recognized limitation of such impossibility results, however, is that they say nothing about the usefulness of (known) nonblack-box techniques. This is unsatisfying, as we would at least like to rule out constructions using the set of techniques we have at our disposal.With this motivation in mind, we suggest a new framework for black-box constructions that encompasses constructions with a nonblack-box flavor: specifically, those that rely on zero-knowledge proofs relative to some oracle. We show that our framework is powerful enough to capture the Naor-Yung/Sahai paradigm for building a (shielding) CCA-secure public-key encryption scheme from a CPA-secure one, something ruled out by prior black-box separation results. On the other hand, we show that several black-box impossibility results still hold even in a setting that allows for zero-knowledge proofs. M3 - 10.1007/978-3-642-19571-6_34 ER - TY - CONF T1 - Localizing parts of faces using a consensus of exemplars T2 - Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on Y1 - 2011 A1 - Belhumeur,P. N. A1 - Jacobs, David W. A1 - Kriegman, D.J. A1 - Kumar,N. KW - Bayesian KW - faces;lighting;occlusion;pose;Bayes KW - function;exemplar KW - images;expression;face KW - localization;human KW - methods;face KW - objective KW - part KW - recognition; AB - We present a novel approach to localizing parts in images of human faces. The approach combines the output of local detectors with a non-parametric set of global models for the part locations based on over one thousand hand-labeled exemplar images. By assuming that the global models generate the part locations as hidden variables, we derive a Bayesian objective function. This function is optimized using a consensus of models for these hidden variables. The resulting localizer handles a much wider range of expression, pose, lighting and occlusion than prior ones. We show excellent performance on a new dataset gathered from the internet and show that our localizer achieves state-of-the-art performance on the less challenging BioID dataset. JA - Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on M3 - 10.1109/CVPR.2011.5995602 ER - TY - JOUR T1 - Long-term effects of ocean warming on the prokaryotic community: evidence from the vibrios JF - The ISME Journal Y1 - 2011 A1 - Vezzulli,Luigi A1 - Brettar,Ingrid A1 - Pezzati,Elisabetta A1 - Reid,Philip C. A1 - Rita R Colwell A1 - Höfle,Manfred G. A1 - Pruzzo,Carla KW - ecophysiology KW - ecosystems KW - environmental biotechnology KW - geomicrobiology KW - ISME J KW - microbe interactions KW - microbial communities KW - microbial ecology KW - microbial engineering KW - microbial epidemiology KW - microbial genomics KW - microorganisms AB - The long-term effects of ocean warming on prokaryotic communities are unknown because of lack of historical data. We overcame this gap by applying a retrospective molecular analysis to the bacterial community on formalin-fixed samples from the historical Continuous Plankton Recorder archive, which is one of the longest and most geographically extensive collections of marine biological samples in the world. We showed that during the last half century, ubiquitous marine bacteria of the Vibrio genus, including Vibrio cholerae, increased in dominance within the plankton-associated bacterial community of the North Sea, where an unprecedented increase in bathing infections related to these bacteria was recently reported. Among environmental variables, increased sea surface temperature explained 45% of the variance in Vibrio data, supporting the view that ocean warming is favouring the spread of vibrios and may be the cause of the globally increasing trend in their associated diseases. VL - 6 SN - 1751-7362 UR - http://www.nature.com/ismej/journal/v6/n1/full/ismej201189a.html?WT.ec_id=ISMEJ-201201 CP - 1 M3 - 10.1038/ismej.2011.89 ER - TY - CONF T1 - MDMap: A system for data-driven layout and exploration of molecular dynamics simulations T2 - Biological Data Visualization (BioVis), 2011 IEEE Symposium on Y1 - 2011 A1 - Patro,R. A1 - Ip, Cheuk Yiu A1 - Bista,S. A1 - Cho,S.S. A1 - Thirumalai,D. A1 - Varshney, Amitabh KW - computing;digital KW - driven KW - DYNAMICS KW - exploration;data KW - folding KW - graph;stochastic KW - landscapes;data KW - layout;molecular KW - MDMap;biomolecular KW - method;stochastic KW - processes; KW - simulation;graph KW - simulations;state KW - simulations;trajectory KW - space;biology KW - theory;molecular KW - time-varying KW - transition AB - Contemporary molecular dynamics simulations result in a glut of simulation data, making analysis and discovery a difficult and burdensome task. We present MDMap, a system designed to summarize long-running molecular dynamics (MD) simulations. We represent a molecular dynamics simulation as a state transition graph over a set of intermediate (stable and semi-stable) states. The transitions amongst the states together with their frequencies represent the flow of a biomolecule through the trajectory space. MDMap automatically determines potential intermediate conformations and the transitions amongst them by analyzing the conformational space explored by the MD simulation. MDMap is an automated system to visualize MD simulations as state-transition diagrams, and can replace the current tedious manual layouts of biomolecular folding landscapes with an automated tool. The layout of the representative states and the corresponding transitions among them is presented to the user as a visual synopsis of the long-running MD simulation. We compare and contrast multiple presentations of the state transition diagrams, such as conformational embedding, and spectral, hierarchical, and force-directed graph layouts. We believe this system could provide a road-map for the visualization of other stochastic time-varying simulations in a variety of different domains. JA - Biological Data Visualization (BioVis), 2011 IEEE Symposium on M3 - 10.1109/BioVis.2011.6094055 ER - TY - JOUR T1 - Medication Reconciliation: Work Domain Ontology, Prototype Development, and a Predictive Model JF - AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc Y1 - 2011 A1 - Markowitz,Eliz A1 - Bernstam,Elmer V. A1 - Herskovic,Jorge A1 - Zhang,Jiajie A1 - Shneiderman, Ben A1 - Plaisant, Catherine A1 - Johnson,Todd R. AB - Medication errors can result from administration inaccuracies at any point of care and are a major cause for concern. To develop a successful Medication Reconciliation (MR) tool, we believe it necessary to build a Work Domain Ontology (WDO) for the MR process. A WDO defines the explicit, abstract, implementation-independent description of the task by separating the task from work context, application technology, and cognitive architecture. We developed a prototype based upon the WDO and designed to adhere to standard principles of interface design. The prototype was compared to Legacy Health System’s and Pre-Admission Medication List Builder MR tools via a Keystroke-Level Model analysis for three MR tasks. The analysis found the prototype requires the fewest mental operations, completes tasks in the fewest steps, and completes tasks in the least amount of time. Accordingly, we believe that developing a MR tool, based upon the WDO and user interface guidelines, improves user efficiency and reduces cognitive load. VL - 2011 SN - 1942-597X ER - TY - CONF T1 - Methods for design and implementation of dynamic signal processing systems T2 - 2011 International Conference on Embedded Computer Systems (SAMOS) Y1 - 2011 A1 - Bhattacharyya, Shuvra S. KW - actor invocation predictability KW - complementary dataflow models KW - Computational modeling KW - computational structure KW - COMPUTERS KW - data flow graphs KW - dataflow schedule graph KW - DSG models KW - DSP-powered products KW - Dynamic scheduling KW - dynamic scheduling techniques KW - dynamic signal processing systems KW - Educational institutions KW - EIDF models KW - enable-invoke dataflow KW - formal dataflow semantics KW - functionality structure KW - Laboratories KW - Maryland DSPCAD Research Group KW - quasi-static schedules KW - Schedules KW - scheduling KW - Signal processing KW - static schedules AB - Summary form only given. Dynamic signal processing systems, where significant changes in functionality and computational structure must be achieved while applications are running, are becoming increasingly important as computational platforms become more powerful, and feature-sets of DSP-powered products become more sophisticated. This talk covers two new, complementary dataflow models of computation that are being developed in the Maryland DSPCAD Research Group to help address the challenges of structured design, simulation, and synthesis of dynamic signal processing systems. The first of these models, called enable-invoke dataflow (EIDF), is aimed improving the predictability of actor invocation and the efficiency with which dynamic scheduling techniques can be realized. The second model, called the dataflow schedule graph (DSG), provides a formal framework for representing and analyzing dataflow graph schedules that is rooted in formal dataflow semantics, and accommodates a wide range of schedule classes, including static, quasi-static, and dynamic schedules, as well as both sequential and parallel schedule formats. In this talk, I will present the EIDF and DSG models and discuss their potential to improve the processes by which dynamic signal processing systems are developed. JA - 2011 International Conference on Embedded Computer Systems (SAMOS) ER - TY - JOUR T1 - Model-based precision analysis and optimization for digital signal processors JF - Proceedings of the European Signal Processing Conference Y1 - 2011 A1 - Kedilaya, Soujanya A1 - Plishker,William A1 - Purkovic, Aleksandar A1 - Johnson, Brian A1 - Bhattacharyya, Shuvra S. AB - Embedded signal processing has witnessed explosive growth in re-cent years in both scientific and consumer applications, driving the need for complex, high-performance signal processing systems that are largely application driven. In order to efficiently implement these systems on programmable platforms such as digital signal processors (DSPs), it is important to analyze and optimize the ap- plication design from early stages of the design process. A key per- formance concern for designers is choosing the data format. In this work, we propose a systematic and efficient design flow involving model-based design to analyze application data sets and precision requirements. We demonstrate this design flow with an exploration study into the required precision for eigenvalue decomposition (EVD) using the Jacobi algorithm. We demonstrate that with a high degree of structured analysis and automation, we are able to analyze the data set to derive an efficient data format, and optimize important parts of the algorithm with respect to precision. ER - TY - CONF T1 - A Model-Based Schedule Representation for Heterogeneous Mapping of Dataflow Graphs T2 - 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW) Y1 - 2011 A1 - Wu, Hsiang-Huang A1 - Chung-Ching Shen A1 - Sane, N. A1 - Plishker,W. A1 - Bhattacharyya, Shuvra S. KW - Computational modeling KW - data flow graphs KW - dataflow schedule graph KW - dataflow semantics KW - dataflow-based application specifications KW - Dynamic scheduling KW - heterogeneous mapping KW - heterogeneous signal processing system design KW - model-based design methodologies KW - model-based schedule representation KW - Processor scheduling KW - Program processors KW - Schedules KW - semantics KW - Signal processing KW - synchronization AB - Dataflow-based application specifications are widely used in model-based design methodologies for signal processing systems. In this paper, we develop a new model called the dataflow schedule graph (DSG) for representing a broad class of dataflow graph schedules. The DSG provides a graphical representation of schedules based on dataflow semantics. In conventional approaches, applications are represented using dataflow graphs, whereas schedules for the graphs are represented using specialized notations, such as various kinds of sequences or looping constructs. In contrast, the DSG approach employs dataflow graphs for representing both application models and schedules that are derived from them. Our DSG approach provides a precise, formal framework for unambiguously representing, analyzing, manipulating, and interchanging schedules. We develop detailed formulations of the DSG representation, and present examples and experimental results that demonstrate the utility of DSGs in the context of heterogeneous signal processing system design. JA - 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW) ER - TY - CONF T1 - Modeling and optimization of dynamic signal processing in resource-aware sensor networks T2 - 2011 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS) Y1 - 2011 A1 - Bhattacharyya, Shuvra S. A1 - Plishker,W. A1 - Sane, N. A1 - Chung-Ching Shen A1 - Wu, Hsiang-Huang KW - Adaptation models KW - Aerodynamics KW - Computational modeling KW - data flow graphs KW - dataflow interchange format KW - Dynamic scheduling KW - dynamic signal processing KW - power consumption overhead KW - Program processors KW - resource-aware sensor networks KW - run-time adaptation KW - Schedules KW - sensor node processing KW - Signal processing KW - Wireless sensor networks AB - Sensor node processing in resource-aware sensor networks is often critically dependent on dynamic signal processing functionality - i.e., signal processing functionality in which computational structure must be dynamically assessed and adapted based on time-varying environmental conditions, operating constraints or application requirements. In dynamic signal processing systems, it is important to provide flexibility for run-time adaptation of application behavior and execution characteristics, but in the domain of resource-aware sensor networks, such flexibility cannot come with significant costs in terms of power consumption overhead or reduced predictability. In this paper, we review a variety of complementary models of computation that are being developed as part of the dataflow interchange format (DIF) project to facilitate efficient and reliable implementation of dynamic signal processing systems. We demonstrate these methods in the context of resource-aware sensor networks. JA - 2011 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS) ER - TY - CONF T1 - Modeling diverse standpoints in text classification: learning to be human by modeling human values T2 - Proceedings of the 2011 iConference Y1 - 2011 A1 - Fleischmann,Kenneth R. A1 - Templeton,Thomas Clay A1 - Jordan Boyd-Graber KW - diversity KW - framing theory KW - machine learning KW - standpoint epistemology KW - value sensitive computing AB - An annotator's classification of a text not only tells us something about the intent of the text's author, it also tells us something about the annotator's standpoint. To understand authorial intent, we can consider all of these diverse standpoints, as well as the extent to which the annotators' standpoints affect their perceptions of authorial intent. To model human behavior, it is important to model humans' unique standpoints. Human values play an especially important role in determining human behavior and how people perceive the world around them, so any effort to model human behavior and perception can benefit from an effort to understand and model human values. Instead of training humans to obscure their standpoints and act like computers, we should teach computers to have standpoints of their own. JA - Proceedings of the 2011 iConference T3 - iConference '11 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0121-3 UR - http://doi.acm.org/10.1145/1940761.1940863 M3 - 10.1145/1940761.1940863 ER - TY - CONF T1 - Multi-material compliant mechanisms for mobile millirobots Y1 - 2011 A1 - Vogtmann,Dana E. A1 - Gupta, Satyandra K. A1 - Bergbreiter,Sarah AB - This paper describes a new process for fabricating planar, multi-material, compliant mechanisms, intended for use in small scale robotics. The process involves laser cutting the mechanism geometry from a rigid material, and refilling the joint areas with a second, elastomeric material. This method allows for a large set of potential materials, with a wide range of material properties, to be used in combination to create mechanisms with highly tailored mechanical properties. These multi-material compliant mechanisms have minimum feature sizes of approximately 100 #x00B5;m and have demonstrated long lifetimes, easily surviving 100,000 bending cycles. We also present the first use of these compliant mechanisms in a 2.5cm #x00D7; 2.5cm #x00D7; 7.5cm, 6g hexapod. This hexapod has been demonstrated moving at speeds up to 6 cm/s, with a predicted maximum speed of up to 17 cm/s. M3 - 10.1109/ICRA.2011.5980543 ER - TY - JOUR T1 - Multithreaded Simulation for Synchronous Dataflow Graphs JF - ACM Trans. Des. Autom. Electron. Syst. Y1 - 2011 A1 - Chia-Jui Hsu A1 - Pino, José Luis A1 - Bhattacharyya, Shuvra S. KW - multithreaded simulation KW - scheduling KW - Synchronous dataflow AB - For system simulation, Synchronous DataFlow (SDF) has been widely used as a core model of computation in design tools for digital communication and signal processing systems. The traditional approach for simulating SDF graphs is to compute and execute static schedules in single-processor desktop environments. Nowadays, however, multicore processors are increasingly popular desktop platforms for their potential performance improvements through thread-level parallelism. Without novel scheduling and simulation techniques that explicitly explore thread-level parallelism for executing SDF graphs, current design tools gain only minimal performance improvements on multicore platforms. In this article, we present a new multithreaded simulation scheduler, called MSS, to provide simulation runtime speedup for executing SDF graphs on multicore processors. MSS strategically integrates graph clustering, intracluster scheduling, actor vectorization, and intercluster buffering techniques to construct InterThread Communication (ITC) graphs at compile-time. MSS then applies efficient synchronization and dynamic scheduling techniques at runtime for executing ITC graphs in multithreaded environments. We have implemented MSS in the Advanced Design System (ADS) from Agilent Technologies. On an Intel dual-core, hyper-threading (4 processing units) processor, our results from this implementation demonstrate up to 3.5 times speedup in simulating modern wireless communication systems (e.g., WCDMA3G, CDMA 2000, WiMax, EDGE, and Digital TV). VL - 16 SN - 1084-4309 UR - http://doi.acm.org/10.1145/1970353.1970358 CP - 3 ER - TY - CONF T1 - Odd Leaf Out: Improving Visual Recognition with Games T2 - Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom) Y1 - 2011 A1 - Hansen,D. L A1 - Jacobs, David W. A1 - Lewis,D. A1 - Biswas,A. A1 - Preece,J. A1 - Rotman,D. A1 - Stevens,E. KW - algorithm;educational KW - classification;object KW - computational KW - computing;botany;computer KW - datasets;misclassification KW - errors;scientific KW - feedback;labeled KW - game;human KW - games;computer KW - games;image KW - image KW - leaf KW - Odd KW - Out;complex KW - recognition; KW - recognition;biology KW - tags;visual KW - tasks;computer KW - tasks;textual KW - VISION AB - A growing number of projects are solving complex computational and scientific tasks by soliciting human feedback through games. Many games with a purpose focus on generating textual tags for images. In contrast, we introduce a new game, Odd Leaf Out, which provides players with an enjoyable and educational game that serves the purpose of identifying misclassification errors in a large database of labeled leaf images. The game uses a novel mechanism to solicit useful information from players' incorrect answers. A study of 165 players showed that game data can be used to identify mislabeled leaves much more quickly than would have been possible using a computer vision algorithm alone. Domain novices and experts were equally good at identifying mislabeled images, although domain experts enjoyed the game more. We discuss the successes and challenges of this new game, which can be applied to other domains with labeled image datasets. JA - Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom) M3 - 10.1109/PASSAT/SocialCom.2011.225 ER - TY - JOUR T1 - Overview of the MPEG Reconfigurable Video Coding Framework JF - Journal of Signal Processing Systems Y1 - 2011 A1 - Bhattacharyya, Shuvra S. A1 - Eker, Johan A1 - Janneck, Jörn W. A1 - Lucarz, Christophe A1 - Mattavelli, Marco A1 - Raulet, Mickaël KW - CAL actor language KW - Circuits and Systems KW - Code synthesis KW - Computer Imaging, Vision, Pattern Recognition and Graphics KW - Dataflow programming KW - Electrical Engineering KW - Image Processing and Computer Vision KW - pattern recognition KW - Reconfigurable Video Coding KW - Signal, Image and Speech Processing AB - Video coding technology in the last 20 years has evolved producing a variety of different and complex algorithms and coding standards. So far the specification of such standards, and of the algorithms that build them, has been done case by case providing monolithic textual and reference software specifications in different forms and programming languages. However, very little attention has been given to provide a specification formalism that explicitly presents common components between standards, and the incremental modifications of such monolithic standards. The MPEG Reconfigurable Video Coding (RVC) framework is a new ISO standard currently under its final stage of standardization, aiming at providing video codec specifications at the level of library components instead of monolithic algorithms. The new concept is to be able to specify a decoder of an existing standard or a completely new configuration that may better satisfy application-specific constraints by selecting standard components from a library of standard coding algorithms. The possibility of dynamic configuration and reconfiguration of codecs also requires new methodologies and new tools for describing the new bitstream syntaxes and the parsers of such new codecs. The RVC framework is based on the usage of a new actor/ dataflow oriented language called CAL for the specification of the standard library and instantiation of the RVC decoder model. This language has been specifically designed for modeling complex signal processing systems. CAL dataflow models expose the intrinsic concurrency of the algorithms by employing the notions of actor programming and dataflow. The paper gives an overview of the concepts and technologies building the standard RVC framework and the non standard tools supporting the RVC model from the instantiation and simulation of the CAL model to software and/or hardware code synthesis. VL - 63 SN - 1939-8018, 1939-8115 UR - http://link.springer.com/article/10.1007/s11265-009-0399-3 CP - 2 J1 - J Sign Process Syst ER - TY - JOUR T1 - ProPhylo: partial phylogenetic profiling to guide protein family construction and assignment of biological process. JF - BMC Bioinformatics Y1 - 2011 A1 - Basu, Malay K A1 - Jeremy D Selengut A1 - Haft, Daniel H KW - algorithms KW - Archaea KW - Archaeal Proteins KW - DNA KW - Methane KW - Phylogeny KW - software AB -

BACKGROUND: Phylogenetic profiling is a technique of scoring co-occurrence between a protein family and some other trait, usually another protein family, across a set of taxonomic groups. In spite of several refinements in recent years, the technique still invites significant improvement. To be its most effective, a phylogenetic profiling algorithm must be able to examine co-occurrences among protein families whose boundaries are uncertain within large homologous protein superfamilies.

RESULTS: Partial Phylogenetic Profiling (PPP) is an iterative algorithm that scores a given taxonomic profile against the taxonomic distribution of families for all proteins in a genome. The method works through optimizing the boundary of each protein family, rather than by relying on prebuilt protein families or fixed sequence similarity thresholds. Double Partial Phylogenetic Profiling (DPPP) is a related procedure that begins with a single sequence and searches for optimal granularities for its surrounding protein family in order to generate the best query profiles for PPP. We present ProPhylo, a high-performance software package for phylogenetic profiling studies through creating individually optimized protein family boundaries. ProPhylo provides precomputed databases for immediate use and tools for manipulating the taxonomic profiles used as queries.

CONCLUSION: ProPhylo results show universal markers of methanogenesis, a new DNA phosphorothioation-dependent restriction enzyme, and efficacy in guiding protein family construction. The software and the associated databases are freely available under the open source Perl Artistic License from ftp://ftp.jcvi.org/pub/data/ppp/.

VL - 12 M3 - 10.1186/1471-2105-12-434 ER - TY - JOUR T1 - Recent advances and future challenges in automated manufacturing planning JF - Journal of Computing and Information Science in Engineering Y1 - 2011 A1 - Bourne,D. A1 - Corney,J. A1 - Gupta,S.K. VL - 11 ER - TY - CONF T1 - Re-engineering health care with information technology: the role of computer-human interaction T2 - PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems Y1 - 2011 A1 - Butler,Keith A1 - Payne,Thomas A1 - Shneiderman, Ben A1 - Brennan,Patricia A1 - Zhang,Jiajie KW - clinical workflow KW - electronic medical records KW - health information technology visualization KW - healthcare informatics KW - participatory design KW - usability standards & evaluation AB - There is critical, nation-wide need to improve health care and its cost. Health information technology has great promise that is yet to be realized. In this panel four noted experts will discuss key issues that should drive health IT, and the challenges for the CHI community to play a leading role. JA - PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems T3 - CHI EA '11 PB - ACM CY - New York, NY, USA UR - http://doi.acm.org/10.1145/1979482.1979490 M3 - 10.1145/1979482.1979490 ER - TY - JOUR T1 - Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data JF - Information VisualizationInformation Visualization Y1 - 2011 A1 - Kandel,Sean A1 - Heer,Jeffrey A1 - Plaisant, Catherine A1 - Kennedy,Jessie A1 - Van Ham,Frank A1 - Riche,Nathalie Henry A1 - Weaver,Chris A1 - Lee,Bongshin A1 - Brodbeck,Dominique A1 - Buono,Paolo KW - data cleaning KW - data quality KW - data transformation KW - Uncertainty KW - Visualization AB - In spite of advances in technologies for working with data, analysts still spend an inordinate amount of time diagnosing data quality issues and manipulating data into a usable form. This process of ‘data wrangling’ often constitutes the most tedious and time-consuming aspect of analysis. Though data cleaning and integration arelongstanding issues in the database community, relatively little research has explored how interactive visualization can advance the state of the art. In this article, we review the challenges and opportunities associated with addressing data quality issues. We argue that analysts might more effectively wrangle data through new interactive systems that integrate data verification, transformation, and visualization. We identify a number of outstanding research questions, including how appropriate visual encodings can facilitate apprehension of missing data, discrepant values, and uncertainty; how interactive visualizations might facilitate data transform specification; and how recorded provenance and social interaction might enable wider reuse, verification, and modification of data transformations. VL - 10 SN - 1473-8716, 1473-8724 UR - http://ivi.sagepub.com/content/10/4/271 CP - 4 M3 - 10.1177/1473871611415994 ER - TY - RPRT T1 - Seven guiding scenarios for information visualization evaluation Y1 - 2011 A1 - Lam,H. A1 - Bertini,E. A1 - Isenberg,P. A1 - Plaisant, Catherine A1 - Carpendale,S. AB - We take a new, scenario based look at evaluation in information visualization. Our seven scenarios, evaluatingvisual data analysis and reasoning, evaluating user performance, evaluating user experience, evaluating environments and work practices, evaluating communication through visualization, automated evaluation of visualizations, and evaluating collaborative data analysis were derived through an extensive literature review of over 800 visualization publications. These scenarios are described through their goals, the types of questions they embody and illustrated through example studies. Through this broad survey and the distillation of these scenarios we make two contributions. One, we encapsulate the current practices in the information visualization research community and, two, we provide a different approach to reaching decisions about what might be the most effective evaluation of a given information visualization. For example, if the research goals or evaluative questions are known they can be used to map to specific scenarios, where practical existing examples can be considered for effective evaluation approaches. PB - Department of Computer Science, University of Calgary VL - 2011-992-04 ER - TY - CONF T1 - Simulating Audiences: Automating Analysis of Values, Attitudes, and Sentiment T2 - Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom) Y1 - 2011 A1 - Templeton,T.C. A1 - Fleischmann,K.R. A1 - Jordan Boyd-Graber KW - audience simulation KW - behavioural sciences computing KW - crowdsourcing KW - Educational institutions KW - human values KW - HUMANS KW - learning (artificial intelligence) KW - machine learning KW - moral argument KW - natural language processing KW - Park51 project KW - Presses KW - public controversy KW - public discussion KW - Security KW - social sciences computing KW - support vector machines KW - Weaving AB - Current events such as the Park51 Project in downtown Manhattan create "critical discourse moments," explosions of discourse around a topic that can be exploited for data gathering. Policymakers have a need to understand the dynamics of public discussion in real time. Human values, which are cognitively related to attitudes and serve as reference points in moral argument, are important indicators of what's at stake in a public controversy. This work shows that it is possible to link values data with reader behavior to infer values implicit in a topical corpus, and that it is possible to automate this process using machine learning. JA - Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom) PB - IEEE SN - 978-1-4577-1931-8 M3 - 10.1109/PASSAT/SocialCom.2011.238 ER - TY - JOUR T1 - Social Snapshot: A System for Temporally Coupled Social Photography JF - Computer Graphics and Applications, IEEE Y1 - 2011 A1 - Patro,R. A1 - Ip, Cheuk Yiu A1 - Bista,S. A1 - Varshney, Amitabh KW - 3D KW - acquisition;data KW - acquisition;photography;social KW - computing; KW - coupled KW - data KW - photography;data KW - photography;temporally KW - reconstruction;social KW - sciences KW - snapshot;spatiotemporal KW - social AB - Social Snapshot actively acquires and reconstructs temporally dynamic data. The system enables spatiotemporal 3D photography using commodity devices, assisted by their auxiliary sensors and network functionality. It engages users, making them active rather than passive participants in data acquisition. VL - 31 SN - 0272-1716 CP - 1 M3 - 10.1109/MCG.2010.107 ER - TY - PAT T1 - SYSTEM AND METHOD FOR DATA MANAGEMENT IN LARGE DATA NETWORKS Y1 - 2011 A1 - BROECHELER,M. A1 - V.S. Subrahmanian A1 - Pugliese, A. AB - A system and method for storing an input data network, in the form of graph is provided. The system includes a master node and a plurality of slave nodes. The master node is operable to receive the data network in the form of a graph, the graph including a plurality of vertices connected by edges; calculate a probability of co-retrieval for each of the plurality of vertices; and assign each of the plurality of vertices to one of the plurality of compute nodes based on the calculated probability of co-retrieval. Another method and system are provided for converting a dataset into a graph based index and storing the index on disk. Respective systems and methods of querying such data networks are also provided. VL - WO/2011/032077 CP - WO/2011/032077 ER - TY - CONF T1 - Teaching cross-platform design and testing methods for embedded systems using DICE Y1 - 2011 A1 - Bhattacharyya, Shuvra S. A1 - Plishker,William A1 - Gupta, Ayush A1 - Chung-Ching Shen AB - DICE (the DSPCAD Integrative Command Line Environment) is a package of utilities that facilitates efficient management of software projects. Key areas of emphasis in DICE are cross-platform operation, support for projects that integrate heterogeneous programming languages, and support for applying and integrating different kinds of design and testing methodologies. The package is being developed at the University of Maryland to facilitate the research and teaching of methods for implementation, testing, evolution, and revision of engineering software. The platform- and language-independent focus of DICE makes it an effective vehicle for teaching high-productivity, high-reliability methods for design and implementation of embedded systems for a variety of courses. In this paper, we provide an overview of features of DICE --- particularly as they relate to testing driven design practices --- that are useful in embedded systems education, and discuss examples and experiences of applying the tool in courses at the University of Maryland aimed at diverse groups of students --- undergraduate programming concepts for engineers, graduate VLSI architectures (aimed at research-oriented students), and graduate FPGA system design (aimed at professional Master's students). T3 - WESE '11 PB - ACM SN - 978-1-4503-1046-8 UR - http://doi.acm.org/10.1145/2077370.2077376 ER - TY - JOUR T1 - Temperature regulation of virulence factors in the pathogen Vibrio coralliilyticus JF - The ISME Journal Y1 - 2011 A1 - Kimes,Nikole E. A1 - Grim,Christopher J. A1 - Johnson,Wesley R. A1 - Hasan,Nur A. A1 - Tall,Ben D. A1 - Kothary,Mahendra H. A1 - Kiss,Hajnalka A1 - Munk,A. Christine A1 - Tapia,Roxanne A1 - Green,Lance A1 - Detter,Chris A1 - Bruce,David C. A1 - Brettin,Thomas S. A1 - Rita R Colwell A1 - Morris,Pamela J. KW - ecophysiology KW - ecosystems KW - environmental biotechnology KW - geomicrobiology KW - ISME J KW - microbe interactions KW - microbial communities KW - microbial ecology KW - microbial engineering KW - microbial epidemiology KW - microbial genomics KW - microorganisms AB - Sea surface temperatures (SST) are rising because of global climate change. As a result, pathogenic Vibrio species that infect humans and marine organisms during warmer summer months are of growing concern. Coral reefs, in particular, are already experiencing unprecedented degradation worldwide due in part to infectious disease outbreaks and bleaching episodes that are exacerbated by increasing SST. For example, Vibrio coralliilyticus, a globally distributed bacterium associated with multiple coral diseases, infects corals at temperatures above 27 °C. The mechanisms underlying this temperature-dependent pathogenicity, however, are unknown. In this study, we identify potential virulence mechanisms using whole genome sequencing of V. coralliilyticus ATCC (American Type Culture Collection) BAA-450. Furthermore, we demonstrate direct temperature regulation of numerous virulence factors using proteomic analysis and bioassays. Virulence factors involved in motility, host degradation, secretion, antimicrobial resistance and transcriptional regulation are upregulated at the higher virulent temperature of 27 °C, concurrent with phenotypic changes in motility, antibiotic resistance, hemolysis, cytotoxicity and bioluminescence. These results provide evidence that temperature regulates multiple virulence mechanisms in V. coralliilyticus, independent of abundance. The ecological and biological significance of this temperature-dependent virulence response is reinforced by climate change models that predict tropical SST to consistently exceed 27 °C during the spring, summer and fall seasons. We propose V. coralliilyticus as a model Gram-negative bacterium to study temperature-dependent pathogenicity in Vibrio-related diseases. VL - 6 SN - 1751-7362 UR - http://www.nature.com/ismej/journal/v6/n4/full/ismej2011154a.html CP - 4 M3 - 10.1038/ismej.2011.154 ER - TY - JOUR T1 - Threat-Aware Clustering in Wireless Sensor Networks JF - IFIP Advances in Information and Communication Technology (AICT) Y1 - 2011 A1 - Abd-Almageed, Wael A1 - Blace,R.E. A1 - Eltoweissy,M. VL - 264 CP - 264 ER - TY - CONF T1 - Toolchain for Programming, Simulating and Studying the XMT Many-Core Architecture T2 - Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on Y1 - 2011 A1 - Keceli,F. A1 - Tzannes,A. A1 - Caragea,G.C. A1 - Barua,R. A1 - Vishkin, Uzi KW - algorithm;XMT KW - architecture;XMT KW - architectures;shared KW - chain;cycle-accurate KW - compiler;programmer KW - compilers;parallel KW - component;shared KW - computing;optimizing KW - hardware;shared KW - many-core KW - many-core;concurrency KW - memory KW - multithreading;general-purpose KW - PRAM KW - simulator;ease-of-programming;explicit KW - systems; KW - theory;multi-threading;optimising KW - tool KW - workflow;programming KW - XMT AB - The Explicit Multi-Threading (XMT) is a general-purpose many-core computing platform, with the vision of a 1000-core chip that is easy to program but does not compromise on performance. This paper presents a publicly available tool chain for XMT, complete with a highly configurable cycle-accurate simulator and an optimizing compiler. The XMT tool chain has matured and has been validated to a point where its description merits publication. In particular, research and experimentation enabled by the tool chain played a central role in supporting the ease-of-programming and performance aspects of the XMT architecture. The compiler and the simulator are also important milestones for an efficient programmer's workflow from PRAM algorithms to programs that run on the shared memory XMT hardware. This workflow is a key component in accomplishing the dual goal of ease-of-programming and performance. The applicability of our tool chain extends beyond specific XMT choices. It can be used to explore the much greater design space of shared memory many-cores by system researchers or by programmers. As the tool chain can practically run on any computer, it provides a supportive environment for teaching parallel algorithmic thinking with a programming component. Unobstructed by techniques such as decomposition-first and programming for locality, this environment may be useful in deferring the teaching of these techniques, when desired, to more advanced or platform-specific courses. JA - Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on M3 - 10.1109/IPDPS.2011.270 ER - TY - JOUR T1 - Topological Patterns for Scalable Representation and Analysis of Dataflow Graphs JF - Journal of Signal Processing Systems Y1 - 2011 A1 - Sane, Nimish A1 - Kee, Hojin A1 - Seetharaman, Gunasekaran A1 - Bhattacharyya, Shuvra S. KW - Circuits and Systems KW - Computer Imaging, Vision, Pattern Recognition and Graphics KW - Dataflow graphs KW - Electrical Engineering KW - High-level languages KW - Image Processing and Computer Vision KW - model-based design KW - pattern recognition KW - Signal processing systems KW - Signal, Image and Speech Processing KW - Topological patterns AB - Tools for designing signal processing systems with their semantic foundation in dataflow modeling often use high-level graphical user interfaces (GUIs) or text based languages that allow specifying applications as directed graphs. Such graphical representations serve as an initial reference point for further analysis and optimizations that lead to platform-specific implementations. For large-scale applications, the underlying graphs often consist of smaller substructures that repeat multiple times. To enable more concise representation and direct analysis of such substructures in the context of high level DSP specification languages and design tools, we develop the modeling concept of topological patterns, and propose ways for supporting this concept in a high-level language. We augment the dataflow interchange format (DIF) language—a language for specifying DSP-oriented dataflow graphs—with constructs for supporting topological patterns, and we show how topological patterns can be effective in various aspects of embedded signal processing design flows using specific application examples. VL - 65 SN - 1939-8018, 1939-8115 UR - http://link.springer.com/article/10.1007/s11265-011-0610-1 CP - 2 J1 - J Sign Process Syst ER - TY - CHAP T1 - Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera T2 - Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum Y1 - 2011 A1 - Nguyen,Hien Van A1 - Banerjee,Amit A1 - Burlina,Philippe A1 - Broadwater,Joshua A1 - Chellapa, Rama ED - Hammoud,Riad ED - Fan,Guoliang ED - McMillan,Robert W. W. ED - Ikeuchi,Katsushi ED - Hammoud,Riad I. ED - Wolff,Lawrence B. AB - Recent advances in electronics and sensor design have enabled the development of a hyperspectral video camera that can capture hyperspectral datacubes at near video rates. The sensor offers the potential for novel and robust methods for surveillance by combining methods from computer vision and hyperspectral image analysis. Here, we focus on the problem of tracking objects through challenging conditions, such as rapid illumination and pose changes, occlusions, and in the presence of confusers. A new framework that incorporates radiative transfer theory to estimate object reflectance and particle filters to simultaneously track and identify an object based on its reflectance spectra is proposed. By exploiting high-resolution spectral features in the visible and near-infrared regimes, the framework is able to track objects that appear featureless to the human eye. For example, we demonstrate that near-IR spectra of human skin can also be used to distinguish different people in a video sequence. These capabilities are illustrated using experiments conducted on real hyperspectral video data. JA - Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum T3 - Augmented Vision and Reality PB - Springer Berlin Heidelberg VL - 1 SN - 978-3-642-11568-4 UR - http://dx.doi.org/10.1007/978-3-642-11568-4_9 ER - TY - CONF T1 - TreeVersity: Comparing tree structures by topology and node's attributes differences T2 - Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on Y1 - 2011 A1 - Gomez,J.A.G. A1 - Buck-Coleman,A. A1 - Plaisant, Catherine A1 - Shneiderman, Ben KW - (mathematics); KW - agencies;tree KW - attributes KW - changes;topology KW - classification;hierarchy;node KW - classification;trees KW - comparison;pattern KW - differences;structural KW - differences;traffic KW - LifeFlow;TreeVersity;data KW - STRUCTURES AB - It is common to classify data in hierarchies, they provide a comprehensible way of understanding big amounts of data. From budgets to organizational charts or even the stock market, trees are everywhere and people find them easy to use. However when analysts need to compare two versions of the same tree structure, or two related taxonomies, the task is not so easy. Much work has been done on this topic, but almost all of it has been restricted to either compare the trees by topology, or by the node attribute values. With this project we are proposing TreeVersity, a framework for comparing tree structures, both by structural changes and by differences in the node attributes. This paper is based on our previous work on comparing traffic agencies using LifeFlow [1, 2] and on a first prototype of TreeVersity. JA - Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on M3 - 10.1109/VAST.2011.6102471 ER - TY - CONF T1 - TreeVersity: Comparing tree structures by topology and node's attributes differences T2 - 2011 IEEE Conference on Visual Analytics Science and Technology (VAST) Y1 - 2011 A1 - Gomez,J.A.G. A1 - Buck-Coleman,A. A1 - Plaisant, Catherine A1 - Shneiderman, Ben KW - Computer science KW - data classification KW - Data visualization KW - Educational institutions KW - hierarchy KW - Image color analysis KW - LifeFlow KW - node attributes differences KW - Pattern classification KW - structural changes KW - Topology KW - topology attributes differences KW - traffic agencies KW - tree structures comparison KW - trees (mathematics) KW - TreeVersity KW - Vegetation KW - Visualization AB - It is common to classify data in hierarchies, they provide a comprehensible way of understanding big amounts of data. From budgets to organizational charts or even the stock market, trees are everywhere and people find them easy to use. However when analysts need to compare two versions of the same tree structure, or two related taxonomies, the task is not so easy. Much work has been done on this topic, but almost all of it has been restricted to either compare the trees by topology, or by the node attribute values. With this project we are proposing TreeVersity, a framework for comparing tree structures, both by structural changes and by differences in the node attributes. This paper is based on our previous work on comparing traffic agencies using LifeFlow [1, 2] and on a first prototype of TreeVersity. JA - 2011 IEEE Conference on Visual Analytics Science and Technology (VAST) PB - IEEE SN - 978-1-4673-0015-5 M3 - 10.1109/VAST.2011.6102471 ER - TY - RPRT T1 - Using the DSPCAD Integrative Command-Line Environment: User's Guide for DICE Version 1.1 Y1 - 2011 A1 - Bhattacharyya, Shuvra S. A1 - Chung-Ching Shen A1 - Plishker,William A1 - Sane, Nimish A1 - Zaki, George KW - Technical Report AB - This document provides instructions on setting up, starting up, andbuilding DICE and its key companion packages, dicemin and dicelang. This installation process is based on a general set of conventions, which we refer to as the DICE organizational conventions, for software packages. The DICE organizational conventions are specified in this report. These conventions are applied in DICE, dicemin, and dicelang, and also to other software packages that are developed in the Maryland DSPCAD Research Group. JA - Technical Reports from UMIACS SN - UMIACS-TR-2011-13 UR - http://drum.lib.umd.edu//handle/1903/11804 M3 - Technical Report ER - TY - JOUR T1 - Using Variational Inference and MapReduce to Scale Topic Modeling JF - arXiv:1107.3765 Y1 - 2011 A1 - Zhai,Ke A1 - Jordan Boyd-Graber A1 - Asadi,Nima KW - Computer Science - Artificial Intelligence KW - Computer Science - Distributed, Parallel, and Cluster Computing AB - Latent Dirichlet Allocation (LDA) is a popular topic modeling technique for exploring document collections. Because of the increasing prevalence of large datasets, there is a need to improve the scalability of inference of LDA. In this paper, we propose a technique called ~\emph{MapReduce LDA} (Mr. LDA) to accommodate very large corpus collections in the MapReduce framework. In contrast to other techniques to scale inference for LDA, which use Gibbs sampling, we use variational inference. Our solution efficiently distributes computation and is relatively simple to implement. More importantly, this variational implementation, unlike highly tuned and specialized implementations, is easily extensible. We demonstrate two extensions of the model possible with this scalable framework: informed priors to guide topic discovery and modeling topics from a multilingual corpus. UR - http://arxiv.org/abs/1107.3765 ER - TY - JOUR T1 - Value of information lattice: exploiting probabilistic independence for effective feature subset acquisition JF - Journal of Artificial Intelligence Research Y1 - 2011 A1 - Bilgic,Mustafa A1 - Getoor, Lise AB - We address the cost-sensitive feature acquisition problem, where misclassifying an instance is costly but the expected misclassification cost can be reduced by acquiring the values of the missing features. Because acquiring the features is costly as well, the objective is to acquire the right set of features so that the sum of the feature acquisition cost and misclassification cost is minimized. We describe the Value of Information Lattice (VOILA), an optimal and eficient feature subset acquisition framework. Unlike the common practice, which is to acquire features greedily, VOILA can reason with subsets of features. VOILA eficiently searches the space of possible feature subsets by discovering and exploiting conditional independence properties between the features and it reuses probabilistic inference computations to further speed up the process. Through empirical evaluation on five medical datasets, we show that the greedy strategy is often reluctant to acquire features, as it cannot forecast the benefit of acquiring multiple features in combination. VL - 41 SN - 1076-9757 UR - http://dl.acm.org/citation.cfm?id=2051237.2051240 CP - 2 ER - TY - CONF T1 - Vectorization and mapping of software defined radio applications on heterogeneous multi-processor platforms T2 - 2011 IEEE Workshop on Signal Processing Systems (SiPS) Y1 - 2011 A1 - Zaki, G.F. A1 - Plishker,W. A1 - Bhattacharyya, Shuvra S. A1 - Clancy, C. A1 - Kuykendall, J. KW - Benchmark testing KW - block processing KW - Design methodology KW - formal description KW - GNU radio environment KW - Graphic Processor Unit KW - Graphics processing unit KW - heterogeneous multiprocessor platform KW - mapping problem KW - Multicore processing KW - Multiprocessing systems KW - multiprocessor architecture KW - multiprocessor scheduling KW - operating systems (computers) KW - PARALLEL PROCESSING KW - Processor scheduling KW - Schedules KW - SIMD core KW - Software Defined Radio KW - software defined radio system design KW - software radio KW - telecommunication computing KW - Throughput KW - vectorization KW - workflow AB - A variety of multiprocessor architectures have proliferated even for off-the-shelf computing platforms. To improve performance and productivity for common heterogeneous systems, we have developed a workflow to generate efficient solutions. By starting with a formal description of an application and the mapping problem we are able to generate a range of designs that efficiently trade-of latency and throughput. In this approach, efficient utilization of SIMD cores is achieved by applying extensive block processing in conjunction with efficient mapping and scheduling. We demonstrate our approach through an integration into the GNU Radio environment for software defined radio system design. JA - 2011 IEEE Workshop on Signal Processing Systems (SiPS) ER - TY - CONF T1 - Why is My Internet Slow?: Making Network Speeds Visible T2 - SIGCHI '11 Y1 - 2011 A1 - Marshini Chetty A1 - Haslem, David A1 - Baird, Andrew A1 - Ofoha, Ugochi A1 - Sumner, Bethany A1 - Grinter, Rebecca KW - broadband speed KW - broadband tools KW - home networks AB - With widespread broadband adoption, more households report experiencing sub-optimal speeds. Not only are slow speeds frustrating, they may indicate consumers are not receiving the services they are paying for from their internet service providers. Yet, determining the speed and source of slow-downs is difficult because few tools exist for broadband management. We report on results of a field trial with 10 households using a visual network probe designed to address these problems. We describe the results of the study and provide design implications for future tools. More importantly, we argue that tools like this can educate and empower consumers by making broadband speeds and sources of slow-downs more visible. JA - SIGCHI '11 T3 - CHI '11 PB - ACM SN - 978-1-4503-0228-9 UR - http://doi.acm.org/10.1145/1978942.1979217 ER - TY - JOUR T1 - Active inference for collective classification JF - AAAI’10 Y1 - 2010 A1 - Bilgic,M. A1 - Getoor, Lise AB - Labeling nodes in a network is an important problem that has seen a growing interest. A number of methods that exploit both local and relational information have been developed for this task. Acquiring the labels for a few nodes at inference time can greatly improve the ac- curacy, however the question of figuring out which node labels to acquire is challenging. Previous approaches have been based on simple structural properties. Here, we present a novel technique, which we refer to as re- flect and correct, that can learn and predict when the un- derlying classification system is likely to make mistakes and it suggests acquisitions to correct those mistakes. ER - TY - JOUR T1 - Active learning for networked data JF - ICML’10 Y1 - 2010 A1 - Bilgic,M. A1 - Mihalkova,L. A1 - Getoor, Lise AB - We introduce a novel active learning algo-rithm for classification of network data. In this setting, training instances are connected by a set of links to form a network, the labels of linked nodes are correlated, and the goal is to exploit these dependencies and accu- rately label the nodes. This problem arises in many domains, including social and biologi- cal network analysis and document classifica- tion, and there has been much recent interest in methods that collectively classify the nodes in the network. While in many cases labeled examples are expensive, often network infor- mation is available. We show how an active learning algorithm can take advantage of net- work structure. Our algorithm effectively ex- ploits the links between instances and the in- teraction between the local and collective as- pects of a classifier to improve the accuracy of learning from fewer labeled examples. We ex- periment with two real-world benchmark col- lective classification domains, and show that we are able to achieve extremely accurate re- sults even when only a small fraction of the data is labeled. ER - TY - JOUR T1 - Adaptive Threshold Estimation via Extreme Value Theory JF - Signal Processing, IEEE Transactions on Y1 - 2010 A1 - Broadwater, J.B. A1 - Chellapa, Rama KW - detection; KW - detection;Pareto KW - distribution;adaptive KW - distribution;signal KW - estimation;extreme KW - estimation;signal KW - Kolmogorov-Smirnov KW - Pareto KW - statistical KW - test;adaptive KW - theory;generalized KW - threshold KW - value AB - Determining a detection threshold to automatically maintain a low false alarm rate is a challenging problem. In a number of different applications, the underlying parametric assumptions of most automatic target detection algorithms are invalid. Therefore, thresholds derived using these incorrect distribution assumptions do not produce desirable results when applied to real sensor data. Monte Carlo methods for threshold determination work well but tend to perform poorly when targets are present. In order to mitigate these effects, we propose an algorithm using extreme value theory through the use of the generalized Pareto distribution (GPD) and a Kolmogorov-Smirnov statistical test. Unlike previous work based on GPD estimates, this algorithm incorporates a way to adaptively maintain low false alarm rates in the presence of targets. Both synthetic and real-world detection results demonstrate the usefulness of this algorithm. VL - 58 SN - 1053-587X CP - 2 M3 - 10.1109/TSP.2009.2031285 ER - TY - CONF T1 - Are developers complying with the process: an XP study T2 - Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement Y1 - 2010 A1 - Zazworka, Nico A1 - Stapel,Kai A1 - Knauss,Eric A1 - Shull, Forrest A1 - Basili, Victor R. A1 - Schneider,Kurt KW - process conformance KW - process improvement KW - XP programming AB - Adapting new software processes and practices in organizational and academic environments requires training the developers and validating the applicability of the newly introduced activities. Investigating process conformance during training and understanding if programmers are able and willing to follow the specific steps are crucial to evaluating whether the process improves various software product quality factors. In this paper we present a process model independent approach to detect process non-conformance. Our approach is based on non-intrusively collected data captured by a version control system and provides the project manager with timely updates. Further, we provide evidence of the applicability of our approach by investigating process conformance in a five day training class on eXtreme Programming (XP) practices at the Leibniz Universität Hannover. Our results show that the approach enabled researchers to formulate minimal intrusive methods to check for conformance and that for the majority of the investigated XP practices violations could be detected. JA - Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement T3 - ESEM '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0039-1 UR - http://doi.acm.org/10.1145/1852786.1852805 M3 - 10.1145/1852786.1852805 ER - TY - CONF T1 - Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation T2 - 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP) Y1 - 2010 A1 - Gu, Ruirui A1 - Piat, J. A1 - Raulet, M. A1 - Janneck, J.W. A1 - Bhattacharyya, Shuvra S. KW - automated generation KW - automatic design flow KW - CAL language KW - CAL networks KW - CAL-to-C translation KW - CAL2C translation KW - coarse-grain dataflow representations KW - Computational modeling KW - data flow computing KW - dataflow information KW - Dataflow programming KW - decoding KW - Digital signal processing KW - Libraries KW - MPEG-4 reconfigurable video coding decoder implementation KW - parallel languages KW - SDF detection KW - synchronous dataflow detection KW - TDP KW - TDP-based static scheduling KW - The Dataflow interchange format Package KW - Transform coding KW - user-friendly design KW - video coding KW - video processing systems KW - XML KW - XML format AB - This paper proposes an automatic design flow from user-friendly design to efficient implementation of video processing systems. This design flow starts with the use of coarse-grain dataflow representations based on the CAL language, which is a complete language for dataflow programming of embedded systems. Our approach integrates previously developed techniques for detecting synchronous dataflow (SDF) regions within larger CAL networks, and exploiting the static structure of such regions using analysis tools in The Dataflow interchange format Package (TDP). Using a new XML format that we have developed to exchange dataflow information between different dataflow tools, we explore systematic implementation of signal processing systems using CAL, SDF-like region detection, TDP-based static scheduling, and CAL-to-C (CAL2C) translation. Our approach, which is a novel integration of three complementary dataflow tools - the CAL parser, TDP, and CAL2C - is demonstrated on an MPEG Reconfigurable Video Coding (RVC) decoder. JA - 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP) ER - TY - JOUR T1 - Brief announcement: decentralized network bandwidth prediction JF - Distributed Computing Y1 - 2010 A1 - Song,S. A1 - Keleher,P. A1 - Bhattacharjee, Bobby A1 - Sussman, Alan AB - Distributed applications can often benefit from knowledge of the bandwidth between hosts, without performing measurements between all host pairs. For example, if a peer-to-peer (P2P) computational grid system predicts pairwise bandwidth between all nodes in the system, that information could increase overall system performance by finding high-bandwidth nodes to store large scientific input or output datasets. Another possible beneficiary is a P2P online game, which can provide users a seamless gaming experience by selecting a coordinator node that has high-bandwidth connections to the players in a game region. ER - TY - CONF T1 - Buffer management for multi-application image processing on multi-core platforms: Analysis and case study T2 - 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) Y1 - 2010 A1 - Ko,Dong-Ik A1 - Won, N. A1 - Bhattacharyya, Shuvra S. KW - block-based image data KW - buffer memory management KW - buffer storage KW - concurrently-executing image processing application KW - data flow computing KW - data flow representation KW - data subset KW - Dataflow KW - Digital signal processing KW - Energy consumption KW - Energy management KW - Engineering management KW - FIFO buffer sizes KW - Hardware KW - Image analysis KW - IMAGE PROCESSING KW - image processing application KW - image representation KW - interprocessor communication KW - memory architecture KW - Memory management KW - multiapplication image processing KW - multicore image processing KW - multiprocessing KW - on-chip memory KW - power consumption KW - power consumption overhead KW - Runtime KW - scheduling KW - set theory KW - shared memory KW - storage management chips KW - synchronization overhead AB - Due to the limited amounts of on-chip memory, large volumes of data, and performance and power consumption overhead associated with interprocessor communication, efficient management of buffer memory is critical to multi-core image processing. To address this problem, this paper develops new modeling and analysis techniques based on dataflow representations, and demonstrates these techniques on a multi-core implementation case study involving multiple, concurrently-executing image processing applications. Our techniques are based on careful representation and exploitation of frame- or block-based operations, which involve repeated invocations of the same computations across regularly- arranged subsets of data. Using these new approaches to manage block-based image data, this paper demonstrates methods to analyze synchronization overhead and FIFO buffer sizes when mapping image processing applications onto heterogeneous, multi core architectures. JA - 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) ER - TY - CONF T1 - cdec: A decoder, alignment, and learning framework for finite-state and context-free translation models T2 - Proceedings of the ACL 2010 System Demonstrations Y1 - 2010 A1 - Dyer,C. A1 - Weese,J. A1 - Setiawan,H. A1 - Lopez,A. A1 - Ture,F. A1 - Eidelman,V. A1 - Ganitkevitch,J. A1 - Blunsom,P. A1 - Resnik, Philip JA - Proceedings of the ACL 2010 System Demonstrations ER - TY - JOUR T1 - Chipping away at censorship firewalls with user-generated content JF - Proc. 19th USENIX Security Symposium, Washington, DC Y1 - 2010 A1 - Burnett,S. A1 - Feamster, Nick A1 - Vempala,S. AB - Oppressive regimes and even democratic governmentsrestrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are relatively easy for a censor to discover and block. This paper offers a possible next step in the cen- sorship arms race: rather than relying on a single system or set of proxies to circumvent censorship firewalls, we explore whether the vast deployment of sites that host user-generated content can breach these firewalls. To ex- plore this possibility, we have developed Collage, which allows users to exchange messages through hidden chan- nels in sites that host user-generated content. Collage has two components: a message vector layer for embedding content in cover traffic; and a rendezvous mechanism to allow parties to publish and retrieve messages in the cover traffic. Collage uses user-generated content (e.g., photo-sharing sites) as “drop sites” for hidden messages. To send a message, a user embeds it into cover traffic and posts the content on some site, where receivers retrieve this content using a sequence of tasks. Collage makes it difficult for a censor to monitor or block these messages by exploiting the sheer number of sites where users can exchange messages and the variety of ways that a mes- sage can be hidden. Our evaluation of Collage shows that the performance overhead is acceptable for sending small messages (e.g., Web articles, email). We show how Collage can be used to build two applications: a direct messaging application, and a Web content delivery system. ER - TY - CONF T1 - Circumventing censorship with collage T2 - Proceedings of the ACM SIGCOMM 2010 conference Y1 - 2010 A1 - Burnett,Sam A1 - Feamster, Nick A1 - Vempala,Santosh KW - Availability KW - censorship AB - Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are relatively easy for a censor to discover and block. We explore a possible next step in the censorship arms race: rather than relying on a single system or set of proxies to circumvent censorship firewalls, we use the vast deployment of sites that host user-generated content to breach these firewalls. We have developed Collage, which allows users to exchange messages through hidden channels in sites that host user-generated content. To send a message, a user embeds it into cover traffic and posts the content on some site, where receivers retrieve this content. Collage makes it difficult for a censor to monitor or block these messages by exploiting the sheer number of sites where users can exchange messages and the variety of ways that a message can be hidden. We have built a censorship-resistant news reader using Collage that can retrieve from behind a censorship firewall and show Collage's effectiveness with a live demonstration of its complete infrastructure. JA - Proceedings of the ACM SIGCOMM 2010 conference T3 - SIGCOMM '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0201-2 UR - http://doi.acm.org/10.1145/1851182.1851269 M3 - 10.1145/1851182.1851269 ER - TY - CONF T1 - Clear Panels: a technique to design mobile application interactivity T2 - Proceedings of the 8th ACM Conference on Designing Interactive Systems Y1 - 2010 A1 - Brown,Q. A1 - Bonsignore,E. A1 - Hatley,L. A1 - Druin, Allison A1 - Walsh,G. A1 - Foss,E. A1 - Brewer,R. A1 - Hammer,J. A1 - Golub,E. JA - Proceedings of the 8th ACM Conference on Designing Interactive Systems ER - TY - JOUR T1 - Coherent turbulent motions in a Mach 3 boundary layer JF - Bulletin of the American Physical Society Y1 - 2010 A1 - Beekman,I. A1 - Kan,Y. C A1 - Priebe,S. A1 - Martin, M.P VL - 55 ER - TY - JOUR T1 - Common Mode Analysis of Ethernet Transformers JF - Magnetics Letters, IEEE Y1 - 2010 A1 - Bowen,D. A1 - Mayergoyz, Issak D A1 - Krafft,C. A1 - Kroop,D. AB - In this letter, a distributed model for Ethernet transformers subject to common mode signals is developed.Explicit formulas for transfer functions are derived and illustrated by numerical examples. VL - 1 ER - TY - JOUR T1 - Comparative genomic analysis reveals evidence of two novel Vibrio species closely related to V. cholerae JF - BMC Microbiology Y1 - 2010 A1 - Bradd,H. A1 - Christopher,G. A1 - Nur,H. A1 - Seon-Young,C. A1 - Jongsik,C. A1 - Thomas,B. A1 - David,B. A1 - Jean,C. A1 - Chris,D. J. A1 - Cliff,H. A1 - Rita R Colwell AB - In recent years genome sequencing has been used to characterize new bacterial species, a method of analysis available as a result of improved methodology and reduced cost. Included in a constantly expanding list of Vibrio species are several that have been reclassified as novel members of the Vibrionaceae. The description of two putative new Vibrio species, Vibrio sp. RC341 and Vibrio sp. RC586 for which we propose the names V. metecus and V. parilis, respectively, previously characterized as non-toxigenic environmental variants of V. cholerae is presented in this study. Results Based on results of whole-genome average nucleotide identity (ANI), average amino acid identity (AAI), rpoB similarity, MLSA, and phylogenetic analysis, the new species are concluded to be phylogenetically closely related to V. cholerae and V. mimicus. Vibrio sp. RC341 and Vibrio sp. RC586 demonstrate features characteristic of V. cholerae and V. mimicus, respectively, on differential and selective media, but their genomes show a 12 to 15% divergence (88 to 85% ANI and 92 to 91% AAI) compared to the sequences of V. cholerae and V. mimicus genomes (ANI <95% and AAI <96% indicative of separate species). Vibrio sp. RC341 and Vibrio sp. RC586 share 2104 ORFs (59%) and 2058 ORFs (56%) with the published core genome of V. cholerae and 2956 (82%) and 3048 ORFs (84%) with V. mimicus MB-451, respectively. The novel species share 2926 ORFs with each other (81% Vibrio sp. RC341 and 81% Vibrio sp. RC586). Virulence-associated factors and genomic islands of V. cholerae and V. mimicus, including VSP-I and II, were found in these environmental Vibrio spp. Conclusions Results of this analysis demonstrate these two environmental vibrios, previously characterized as variant V. cholerae strains, are new species which have evolved from ancestral lineages of the V. cholerae and V. mimicus clade. The presence of conserved integration loci for genomic islands as well as evidence of horizontal gene transfer between these two new species, V. cholerae, and V. mimicus suggests genomic islands and virulence factors are transferred between these species. VL - 10 ER - TY - CHAP T1 - Compressive Acquisition of Dynamic Scenes T2 - Computer Vision – ECCV 2010Computer Vision – ECCV 2010 Y1 - 2010 A1 - Sankaranarayanan,Aswin A1 - Turaga,Pavan A1 - Baraniuk,Richard A1 - Chellapa, Rama ED - Daniilidis,Kostas ED - Maragos,Petros ED - Paragios,Nikos AB - Compressive sensing (CS) is a new approach for the acquisition and recovery of sparse signals and images that enables sampling rates significantly below the classical Nyquist rate. Despite significant progress in the theory and methods of CS, little headway has been made in compressive video acquisition and recovery. Video CS is complicated by the ephemeral nature of dynamic events, which makes direct extensions of standard CS imaging architectures and signal models infeasible. In this paper, we develop a new framework for video CS for dynamic textured scenes that models the evolution of the scene as a linear dynamical system (LDS). This reduces the video recovery problem to first estimating the model parameters of the LDS from compressive measurements, from which the image frames are then reconstructed. We exploit the low-dimensional dynamic parameters (the state sequence) and high-dimensional static parameters (the observation matrix) of the LDS to devise a novel compressive measurement strategy that measures only the dynamic part of the scene at each instant and accumulates measurements over time to estimate the static parameters. This enables us to considerably lower the compressive measurement rate considerably. We validate our approach with a range of experiments including classification experiments that highlight the effectiveness of the proposed approach. JA - Computer Vision – ECCV 2010Computer Vision – ECCV 2010 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6311 SN - 978-3-642-15548-2 UR - http://dx.doi.org/10.1007/978-3-642-15549-9_10 ER - TY - RPRT T1 - Compressive Video Acquisition, Fusion and Processing Y1 - 2010 A1 - Baraniuk,Richard G. A1 - Chellapa, Rama A1 - Wakin,Michael KW - *DATA FUSION KW - *DETECTORS KW - *SIGNAL PROCESSING KW - *VIDEO SIGNALS KW - ACQUISITION KW - COLLECTION KW - COMMUNICATION AND RADIO SYSTEMS KW - COMPRESSIVE PROPERTIES KW - COMPRESSIVE SAMPLING KW - compressive sensing KW - COMPRESSIVE VIDEO KW - decision making KW - DEPLOYMENT KW - DETECTION KW - DYNAMICS KW - IMAGE PROCESSING KW - Linear systems KW - Linearity KW - MANIFOLDS(ENGINES) KW - measurement KW - MISCELLANEOUS DETECTION AND DETECTORS KW - MODELS KW - sampling KW - THEORY KW - TRAJECTORIES AB - Modern developments in sensor technology, signal processing, and wireless communications have enabled the conception and deployment of large-scale networked sensing systems spanning numerous collection platforms and varied modalities. These systems have the potential to make intelligent decisions by integrating information from massive amounts of sensor data. Before such benefits can be achieved, significant advances must be made in methods for communicating, fusing, and processing this evergrowing volume of diverse data. In this one-year research project, we aimed to expose the fundamental issues and pave the way for further careful study of compressive approaches to video acquisition, fusion, and processing. In doing so, we developed a theoretical definition of video temporal bandwidth and applied the theory to compressive sampling and reconstruction. We created a new framework for compressive video sensing based on linear dynamical systems, lowering the compressive measurement rate. Finally, we applied our own joint manifold model to a variety of relevant image processing problems, demonstrating the model's effectiveness and ability to overcome noise and occlusion obstacles. We also showed how joint manifold models can discover an object's trajectory, an important step towards video fusion. UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA533703 ER - TY - JOUR T1 - Computing marginal distributions over continuous markov networks for statistical relational learning JF - Advances in Neural Information Processing Systems (NIPS) Y1 - 2010 A1 - Bröcheler,M. A1 - Getoor, Lise AB - Continuous Markov random fields are a general formalism to model joint proba-bility distributions over events with continuous outcomes. We prove that marginal computation for constrained continuous MRFs is #P-hard in general and present a polynomial-time approximation scheme under mild assumptions on the struc- ture of the random field. Moreover, we introduce a sampling algorithm to com- pute marginal distributions and develop novel techniques to increase its effi- ciency. Continuous MRFs are a general purpose probabilistic modeling tool and we demonstrate how they can be applied to statistical relational learning. On the problem of collective classification, we evaluate our algorithm and show that the standard deviation of marginals serves as a useful measure of confidence. ER - TY - CONF T1 - COSI: Cloud Oriented Subgraph Identification in Massive Social Networks T2 - Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Conference on Y1 - 2010 A1 - Bröcheler,M. A1 - Pugliese, A. A1 - V.S. Subrahmanian KW - (online); KW - answering;social KW - complexity;data KW - computing;edge KW - data;graph KW - estimation;query KW - handling;graph KW - matching;Internet;computational KW - matching;probability;query KW - network;subgraph KW - networking KW - NP-complete;cloud KW - pattern;probability KW - processing;social KW - theory;pattern KW - weight;graph AB - Subgraph matching is a key operation on graph data. Social network (SN) providers may want to find all subgraphs within their social network that match certain query graph patterns. Unfortunately, subgraph matching is NP-complete, making its application to massive SNs a major challenge. Past work has shown how to implement subgraph matching on a single processor when the graph has 10-25M edges. In this paper, we show how to use cloud computing in conjunction with such existing single processor methods to efficiently match complex subgraphs on graphs as large as 778M edges. A cloud consists of one master compute node and k slave compute nodes. We first develop a probabilistic method to estimate probabilities that a vertex will be retrieved by a random query and that a pair of vertices will be successively retrieved by a random query. We use these probability estimates to define edge weights in an SN and to compute minimal edge cuts to partition the graph amongst k slave nodes. We develop algorithms for both master and slave nodes that try to minimize communication overhead. The resulting COSI system can answer complex queries over real-world SN data containing over 778M edges very efficiently. JA - Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Conference on M3 - 10.1109/ASONAM.2010.80 ER - TY - CONF T1 - Crowdsourcing the evaluation of a domain-adapted named entity recognition system Y1 - 2010 A1 - Sayeed,Asad B. A1 - Meyer,Timothy J. A1 - Nguyen,Hieu C. A1 - Buzek,Olivia A1 - Weinberg, Amy AB - Named entity recognition systems sometimes have difficulty when applied to data from domains that do not closely match the training data. We first use a simple rule-based technique for domain adaptation. Data for robust validation of the technique is then generated, and we use crowdsourcing techniques to show that this strategy produces reliable results even on data not seen by the rule designers. We show that it is possible to extract large improvements on the target data rapidly at low cost using these techniques. T3 - HLT '10 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA SN - 1-932432-65-5 UR - http://dl.acm.org/citation.cfm?id=1857999.1858050 ER - TY - JOUR T1 - Deploying sensor networks with guaranteed fault tolerance JF - IEEE/ACM Transactions on Networking (TON) Y1 - 2010 A1 - Bredin,J. L A1 - Demaine,E. D A1 - Hajiaghayi, Mohammad T. A1 - Rus,D. VL - 18 CP - 1 ER - TY - CONF T1 - Design and Fabrication of a Multi-Material Compliant Flapping Wing Drive Mechanism for Miniature Air Vehicles Y1 - 2010 A1 - Bejgerowski,Wojciech A1 - Gerdes,John W. A1 - Gupta, Satyandra K. A1 - Bruck,Hugh A. A1 - Wilkerson,Stephen AB - Successful realization of a flapping wing micro air vehicle (MAV) requires development of a light weight drive mechanism converting the rotary motion of the motor into flapping motion of the wings. Low weight of the drive mechanism is required to maximize the payload and battery capacity. In order to make flapping wing MAVs attractive in search, rescue, and recovery missions, they should be disposable from the cost point of view. Injection molded compliant drive mechanisms are an attractive design option to satisfy the weight, efficiency and cost requirements. In the past, we have successfully used multi-piece molding to create mechanisms utilizing distributed compliance for smaller MAVs. However, as the size of the MAV increases, mechanisms with distributed compliance exhibit excessive deformation. Therefore localizing rather than distributing the compliance in the mechanism becomes a more attractive option. Local compliance can be realized through multimaterial designs. A multi-material injection molded mechanism additionally offers reduction in the number of parts. This paper describes an approach for determining the drive mechanism shape and size that meets both the functional design and multi-material molding requirements. The design generated by the approach described in this paper was utilized to realize a flapping wing MAV with significant enhancements in the payload capabilities. PB - ASME SN - 978-0-7918-4410-6 UR - http://link.aip.org/link/ASMECP/v2010/i44106/p69/s1&Agg=doi M3 - 10.1115/DETC2010-28519 ER - TY - JOUR T1 - Design and implementation of embedded computer vision systems based on particle filters JF - Computer Vision and Image Understanding Y1 - 2010 A1 - Sankalita Saha A1 - Bambha, Neal K. A1 - Bhattacharyya, Shuvra S. KW - design space exploration KW - Particle filters KW - Reconfigurable platforms AB - Particle filtering methods are gradually attaining significant importance in a variety of embedded computer vision applications. For example, in smart camera systems, object tracking is a very important application and particle filter based tracking algorithms have shown promising results with robust tracking performance. However, most particle filters involve vast amount of computational complexity, thereby intensifying the challenges faced in their real-time, embedded implementation. Many of these applications share common characteristics, and the same system design can be reused by identifying and varying key system parameters and varying them appropriately. In this paper, we present a System-on-Chip (SoC) architecture involving both hardware and software components for a class of particle filters. The framework uses parameterization to enable fast and efficient reuse of the architecture with minimal re-design effort for a wide range of particle filtering applications as well as implementation platforms. Using this framework, we explore different design options for implementing three different particle filtering applications on field-programmable gate arrays (FPGAs). The first two applications involve particle filters with one-dimensional state transition models, and are used to demonstrate the key features of the framework. The main focus of this paper is on design methodology for hardware/software implementation of multi-dimensional particle filter application and we explore this in the third application which is a 3D facial pose tracking system for videos. In this multi-dimensional particle filtering application, we extend our proposed architecture with models for hardware/software co-design so that limited hardware resources can be utilized most effectively. Our experiments demonstrate that the framework is easy and intuitive to use, while providing for efficient design and implementation. We present different memory management schemes along with results on trade-offs between area (FPGA resource requirement) and execution speed. VL - 114 SN - 1077-3142 UR - http://www.sciencedirect.com/science/article/pii/S1077314210000950 CP - 11 J1 - Computer Vision and Image Understanding ER - TY - CONF T1 - Design and implementation of real-time signal processing applications on heterogeneous multiprocessor arrays T2 - 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) Y1 - 2010 A1 - Wu, Hsiang-Huang A1 - Chung-Ching Shen A1 - Bhattacharyya, Shuvra S. A1 - Compton, K. A1 - Schulte, M. A1 - Wolf, M. A1 - Zhang, Tong KW - application specific integrated circuits KW - application-specific integrated circuits KW - computational elements KW - Computer architecture KW - decoding KW - Field programmable gate arrays KW - field programmable X arrays KW - FPGA KW - FPXA KW - Integrated circuit modeling KW - Logic Design KW - microprocessor chips KW - multicore processors KW - multiprocessor arrays KW - real-time signal processing KW - reconfigurable architectures KW - reconfigurable processors KW - Routing KW - Signal processing KW - Signal processing systems KW - systolic arrays KW - Viterbi algorithm AB - Processing structures based on arrays of computational elements form an important class of architectures, which includes field programmable gate arrays (FPGAs), systolic arrays, and various forms of multicore processors. A wide variety of design methods and tools have been targeted to regular processing arrays involving homogeneous processing elements. In this paper, we introduce the concept of field programmable X arrays (FPXAs) as an abstract model for design and implementation of heterogeneous multiprocessor arrays for signal processing systems. FPXAs are abstract structures that can be targeted for implementation on application-specific integrated circuits, FPGAs, or other kinds of reconfigurable processors. FPXAs can also be mapped onto multicore processors for flexible emulation. We discuss the use of dataflow models as an integrated application representation and intermediate representation for efficient specification and mapping of signal processing systems on FPXAs. We demonstrate our proposed models and techniques with a case study involving the embedding of an application-specific FPXA system on an off-the-shelf FPGA device. JA - 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) ER - TY - JOUR T1 - Developing a Stochastic Dynamic Programming Framework for Optical Tweezer-Based Automated Particle Transport Operations JF - Automation Science and Engineering, IEEE Transactions on Y1 - 2010 A1 - Banerjee,A. G. A1 - Pomerance,A. A1 - Losert,W. A1 - Gupta,S.K. KW - holographic tweezer set-up KW - holography KW - infinite-horizon partially observable Markov decision process algorithm KW - Markov processes KW - motion planning framework KW - optical tweezer-based automated particle transport operations KW - optical tweezers KW - radiation pressure KW - silica beads KW - stochastic dynamic programming framework KW - stochastic programming AB - Automated particle transport using optical tweezers requires the use of motion planning to move the particle while avoiding collisions with randomly moving obstacles. This paper describes a stochastic dynamic programming based motion planning framework developed by modifying the discrete version of an infinite-horizon partially observable Markov decision process algorithm. Sample trajectories generated by this algorithm are presented to highlight effectiveness in crowded scenes and flexibility. The algorithm is tested using silica beads in a holographic tweezer set-up and data obtained from the physical experiments are reported to validate various aspects of the planning simulation framework. This framework is then used to evaluate the performance of the algorithm under a variety of operating conditions. VL - 7 SN - 1545-5955 CP - 2 M3 - 10.1109/TASE.2009.2026056 ER - TY - JOUR T1 - Diversity and distribution of cholix toxin, a novel ADP‐ribosylating factor from Vibrio cholerae JF - Environmental Microbiology Reports Y1 - 2010 A1 - Purdy,Alexandra E. A1 - Balch,Deborah A1 - Lizárraga‐Partida,Marcial Leonardo A1 - Islam,Mohammad Sirajul A1 - Martinez‐Urtaza,Jaime A1 - Huq,Anwar A1 - Rita R Colwell A1 - Bartlett,Douglas H. AB - Non-toxigenic non-O1, non-O139 Vibrio cholerae strains isolated from both environmental and clinical settings carry a suite of virulence factors aside from cholera toxin. Among V. cholerae strains isolated from coastal waters of southern California, this includes cholix toxin, an ADP-ribosylating factor that is capable of halting protein synthesis in eukaryotic cells. The prevalence of the gene encoding cholix toxin, chxA, was assessed among a collection of 155 diverse V. cholerae strains originating from both clinical and environmental settings in Bangladesh and Mexico and other countries around the globe. The chxA gene was present in 47% of 83 non-O1, non-O139 strains and 16% of 72 O1/O139 strains screened as part of this study. A total of 86 chxA gene sequences were obtained, and phylogenetic analysis revealed that they fall into two distinct clades. These two clades were also observed in the phylogenies of several housekeeping genes, suggesting that the divergence observed in chxA extends to other regions of the V. cholerae genome, and most likely has arisen from vertical descent rather than horizontal transfer. Our results clearly indicate that ChxA is a major toxin of V. cholerae with a worldwide distribution that is preferentially associated with non-pandemic strains. VL - 2 SN - 1758-2229 UR - http://onlinelibrary.wiley.com/doi/10.1111/j.1758-2229.2010.00139.x/abstract?userIsAuthenticated=false&deniedAccessCustomisedMessage= CP - 1 M3 - 10.1111/j.1758-2229.2010.00139.x ER - TY - RPRT T1 - Don't Configure the Network, Program It! Domain-Specific Programming Languages for Network Systems Y1 - 2010 A1 - Feamster, Nick A1 - Voellmy,A. A1 - Agarwal,A. A1 - Hudak,P. A1 - Burnett,S. A1 - Launchbury,J. AB - Network operators must configure networks to accomplish critical, complex, and often conflicting requirements: they must ensure good performance while maintaining security, and satisfy contractual obligations while ensuring profitable use of interdomain connections. Unfortunately, today they have no choice but to implement these high-level goals by configuring hundreds of individual network devices. These interact in complex and unexpected ways, often resulting in misconfigurations or downtime. We propose a new approach: rather than configure individual network devices, operators should program the network holistically, according to high-level policies. Towards this goal, we present Nettle, a system for clearly and concisely expressing network requirements together with mechanisms to control the network accordingly. At the lowest level, we rely on OpenFlow switches for programmable network hardware. On top of this layer, we build an extensible family of embedded domain-specific languages (EDSLs), each aimed at different operational concerns and provide convenient ways to sensibly combine expressions in these languages. We present a case study demonstrating a DSL for networks that provides fine-grained, dynamic access control policies. PB - Yale University VL - YALEU/DCS/RR-1432 ER - TY - CONF T1 - Don't love thy nearest neighbor T2 - Proceedings of the 9th international conference on Peer-to-peer systems Y1 - 2010 A1 - Lumezanu,Cristian A1 - Levin,Dave A1 - Han,Bo A1 - Spring, Neil A1 - Bhattacharjee, Bobby JA - Proceedings of the 9th international conference on Peer-to-peer systems T3 - IPTPS'10 PB - USENIX Association CY - Berkeley, CA, USA UR - http://dl.acm.org/citation.cfm?id=1863145.1863150 ER - TY - CHAP T1 - Dynamic and Multidimensional Dataflow Graphs T2 - Handbook of Signal Processing Systems Y1 - 2010 A1 - Bhattacharyya, Shuvra S. A1 - Deprettere, Ed F. A1 - Keinert, Joachim ED - Bhattacharyya, Shuvra S. ED - Deprettere, Ed F. ED - Leupers, Rainer ED - Takala, Jarmo KW - Communications Engineering, Networks KW - Computer Systems Organization and Communication Networks KW - Processor Architectures KW - Signal, Image and Speech Processing AB - Much of the work to date on dataflow models for signal processing system design has focused decidable dataflow models that are best suited for onedimensional signal processing. In this chapter, we review more general dataflow modeling techniques that are targeted to applications that include multidimensional signal processing and dynamic dataflow behavior. As dataflow techniques are applied to signal processing systems that are more complex, and demand increasing degrees of agility and flexibility, these classes of more general dataflow models are of correspondingly increasing interest. We begin with a discussion of two dataflow modeling techniques - multi-dimensional synchronous dataflow and windowed dataflow - that are targeted towards multidimensional signal processing applications. We then provide a motivation for dynamic dataflow models of computation, and review a number of specific methods that have emerged in this class of models. Our coverage of dynamic dataflowmodels in this chapter includes Boolean dataflow, the stream-based function model, CAL, parameterized dataflow, and enable-invoke dataflow. JA - Handbook of Signal Processing Systems PB - Springer US SN - 978-1-4419-6344-4, 978-1-4419-6345-1 UR - http://link.springer.com/chapter/10.1007/978-1-4419-6345-1_32 ER - TY - CONF T1 - The effect of packet loss on redundancy elimination in cellular wireless networks T2 - Proceedings of the 10th annual conference on Internet measurement Y1 - 2010 A1 - Lumezanu,Cristian A1 - Guo,Katherine A1 - Spring, Neil A1 - Bhattacharjee, Bobby KW - cellular networks KW - loss KW - redundancy elimination AB - Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous work shows that RE can suppress the transmission of 20-50% bytes when deployed at ISP access links or between routers. In this paper, we focus on the challenges of deploying RE in cellular networks. The potential benefifit is substantial, since cellular networks have a growing subscriber base and network links, including wired backhaul, are often oversubscribed. Using three large traces captured at two North American and one European wireless network providers, we show that RE can reduce the bandwidth consumption of the majority of mobile users by at least 10%. However, cellular links have much higher packet loss rates than their wired counterparts, which makes applying RE much more difficult. Our experiments also show that the loss of only a few packets can disrupt RE and eliminate the bandwidth savings. We propose informed marking, a lightweight scheme that detects lost packets and prevents RE algorithms from using them for future encodings. We implement RE with informed marking and deploy it in a real-world cellular network. Our results show that with informed marking, more than 60% of the bandwidth savings of RE are preserved, even when packet loss rates are high. JA - Proceedings of the 10th annual conference on Internet measurement T3 - IMC '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0483-2 UR - http://doi.acm.org/10.1145/1879141.1879179 M3 - 10.1145/1879141.1879179 ER - TY - JOUR T1 - An Efficient and Robust Algorithm for Shape Indexing and Retrieval JF - Multimedia, IEEE Transactions on Y1 - 2010 A1 - Biswas,S. A1 - Aggarwal,G. A1 - Chellapa, Rama KW - activity KW - algorithm;shape KW - classification;human KW - databases;robust KW - estimation;large KW - indexing;shape KW - MATCHING KW - matching;image KW - methods;shape KW - pose KW - recognition; KW - retrieval;image KW - retrieval;indexing;shape AB - Many shape matching methods are either fast but too simplistic to give the desired performance or promising as far as performance is concerned but computationally demanding. In this paper, we present a very simple and efficient approach that not only performs almost as good as many state-of-the-art techniques but also scales up to large databases. In the proposed approach, each shape is indexed based on a variety of simple and easily computable features which are invariant to articulations, rigid transformations, etc. The features characterize pairwise geometric relationships between interest points on the shape. The fact that each shape is represented using a number of distributed features instead of a single global feature that captures the shape in its entirety provides robustness to the approach. Shapes in the database are ordered according to their similarity with the query shape and similar shapes are retrieved using an efficient scheme which does not involve costly operations like shape-wise alignment or establishing correspondences. Depending on the application, the approach can be used directly for matching or as a first step for obtaining a short list of candidate shapes for more rigorous matching. We show that the features proposed to perform shape indexing can be used to perform the rigorous matching as well, to further improve the retrieval performance. VL - 12 SN - 1520-9210 CP - 5 M3 - 10.1109/TMM.2010.2050735 ER - TY - CONF T1 - Efficient static buffering to guarantee throughput-optimal FPGA implementation of synchronous dataflow graphs T2 - 2010 International Conference on Embedded Computer Systems (SAMOS) Y1 - 2010 A1 - Kee, Hojin A1 - Bhattacharyya, Shuvra S. A1 - Kornerup, J. KW - buffer memory KW - circuit complexity KW - Complexity theory KW - Computational modeling KW - data flow graphs KW - Digital signal processing KW - digital signal processing chips KW - DSP system design KW - efficient static buffering KW - Field programmable gate arrays KW - FPGA KW - graph buffer distributions KW - integrated circuit design KW - low polynomial time complexity KW - Random access memory KW - Schedules KW - SDF graph edges KW - Signal processing systems KW - Synchronous dataflow KW - synchronous dataflow graph mapping KW - Throughput KW - throughput-optimal execution KW - throughput-optimal FPGA implementation KW - two-actor SDF graph model KW - upper bounds AB - When designing DSP applications for implementation on field programmable gate arrays (FPGAs), it is often important to minimize consumption of limited FPGA resources while satisfying real-time performance constraints. In this paper, we develop efficient techniques to determine dataflow graph buffer sizes that guarantee throughput-optimal execution when mapping synchronous dataflow (SDF) representations of DSP applications onto FPGAs. Our techniques are based on a novel two-actor SDF graph Model (TASM), which efficiently captures the behavior and costs associated with SDF graph edges (flow-graph connections). With our proposed techniques, designers can automatically generate upper bounds on SDF graph buffer distributions that realize maximum achievable throughput performance for the corresponding applications. Furthermore, our proposed technique is characterized by low polynomial time complexity, which is useful for rapid prototyping in DSP system design. JA - 2010 International Conference on Embedded Computer Systems (SAMOS) ER - TY - JOUR T1 - Electromagnetic Modeling of Ethernet Transformers JF - Magnetics, IEEE Transactions on Y1 - 2010 A1 - Bowen,D. A1 - Mayergoyz, Issak D A1 - Krafft,C. KW - analysis;electromagnetic KW - area KW - capacitances;lumped KW - circuits;ethernet KW - circuits;local KW - cross-winding;distributed KW - modeling;equivalent KW - models;electromagnetic KW - networks;lumped KW - networks;transformer KW - parameter KW - parameters;novel KW - techniques;capacitance;equivalent KW - Testing KW - transformers;intrawinding KW - windings;transformers; AB - The unique features of Ethernet transformers are reviewed, and novel testing techniques for identification of lumped parameters of equivalent circuits are presented. To account for the distributed nature of the cross-winding and intrawinding capacitances, novel distributed models for electromagnetic analysis of Ethernet transformers are presented. VL - 46 SN - 0018-9464 CP - 2 M3 - 10.1109/TMAG.2009.2033203 ER - TY - JOUR T1 - Energy-driven distribution of signal processing applications across wireless sensor networks JF - ACM Trans. Sen. Netw. Y1 - 2010 A1 - Chung-Ching Shen A1 - Plishker, William L. A1 - Ko,Dong-Ik A1 - Bhattacharyya, Shuvra S. A1 - Goldsman,Neil KW - DSP KW - Energy efficiency KW - network lifetime KW - Speech recognition KW - Wireless sensor networks AB - Wireless sensor network (WSN) applications have been studied extensively in recent years. Such applications involve resource-limited embedded sensor nodes that have small size and low power requirements. Based on the need for extended network lifetimes in WSNs in terms of energy use, the energy efficiency of computation and communication operations in the sensor nodes becomes critical. Digital Signal Processing (DSP) applications typically require intensive data processing operations and as a result are difficult to implement directly in resource-limited WSNs. In this article, we present a novel design methodology for modeling and implementing computationally intensive DSP applications applied to wireless sensor networks. This methodology explores efficient modeling techniques for DSP applications, including data sensing and processing; derives formulations of Energy-Driven Partitioning (EDP) for distributing such applications across wireless sensor networks; and develops efficient heuristic algorithms for finding partitioning results that maximize the network lifetime. To address such an energy-driven partitioning problem, this article provides a new way of aggregating data and reducing communication traffic among nodes based on application analysis. By considering low data token delivery points and the distribution of computation in the application, our approach finds energy-efficient trade-offs between data communication and computation. VL - 6 SN - 1550-4859 UR - http://doi.acm.org/10.1145/1754414.1754420 CP - 3 ER - TY - CONF T1 - Error driven paraphrase annotation using Mechanical Turk T2 - Proceedings of the NAACL HLT 2010 Workshop on Creating Speech and Language Data with Amazon's Mechanical Turk Y1 - 2010 A1 - Buzek,O. A1 - Resnik, Philip A1 - Bederson, Benjamin B. JA - Proceedings of the NAACL HLT 2010 Workshop on Creating Speech and Language Data with Amazon's Mechanical Turk ER - TY - JOUR T1 - Evaluation of information retrieval for E-discovery JF - Artificial Intelligence and Law Y1 - 2010 A1 - Oard, Douglas A1 - Baron,Jason R. A1 - Hedin,Bruce A1 - Lewis,David D. A1 - Tomlinson,Stephen VL - 18 SN - 0924-8463, 1572-8382 UR - http://www.springerlink.com/content/m700w2k26n264u01/ M3 - 10.1007/s10506-010-9093-9 ER - TY - CHAP T1 - Evolutionary framework for Lepidoptera model systems T2 - Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera Y1 - 2010 A1 - Roe,A. A1 - Weller,S. A1 - Baixeras,J. A1 - Brown,J. W A1 - Cummings, Michael P. A1 - Davis,DR A1 - Horak,M A1 - Kawahara,A. Y A1 - Mitter,C A1 - Parr,C.S. A1 - Regier,J. C A1 - Rubinoff,D A1 - Simonsen,TJ A1 - Wahlberg,N A1 - Zwick,A. ED - Goldsmith,M ED - Marec,F AB - “Model systems” are specific organisms upon which detailed studies have been conducted examining a fundamental biological question. If the studies are robust, their results can be extrapolated among an array of organisms that possess features in common with the subject organism. The true power of model systems lies in the ability to extrapolate these details across larger groups of organisms. In order to generalize these results, comparative studies are essential and require that model systems be placed into their evolutionary or phylogenetic context. This chapter examines model systems in the insect order Lepidoptera from the perspective of several different superfamilies. Historically, many species of Lepidoptera have been essential in the development of invaluable model systems in the fields of development biology, genetics, molecular biology, physiology, co-evolution, population dynamics, and ecology. JA - Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera PB - Taylor & Francis CY - Boca Raton ER - TY - CHAP T1 - An Experimental Study of Color-Based Segmentation Algorithms Based on the Mean-Shift Concept T2 - Computer Vision – ECCV 2010Computer Vision – ECCV 2010 Y1 - 2010 A1 - Bitsakos,K. A1 - Fermüller, Cornelia A1 - Aloimonos, J. ED - Daniilidis,Kostas ED - Maragos,Petros ED - Paragios,Nikos AB - We point out a difference between the original mean-shift formulation of Fukunaga and Hostetler and the common variant in the computer vision community, namely whether the pairwise comparison is performed with the original or with the filtered image of the previous iteration. This leads to a new hybrid algorithm, called Color Mean Shift, that roughly speaking, treats color as Fukunaga’s algorithm and spatial coordinates as Comaniciu’s algorithm. We perform experiments to evaluate how different kernel functions and color spaces affect the final filtering and segmentation results, and the computational speed, using the Berkeley and Weizmann segmentation databases. We conclude that the new method gives better results than existing mean shift ones on four standard comparison measures ( improvement on RAND and BDE measures respectively for color images), with slightly higher running times ( ). Overall, the new method produces segmentations comparable in quality to the ones obtained with current state of the art segmentation algorithms. JA - Computer Vision – ECCV 2010Computer Vision – ECCV 2010 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6312 SN - 978-3-642-15551-2 UR - http://dx.doi.org/10.1007/978-3-642-15552-9_37 ER - TY - CHAP T1 - Fault-Tolerant Facility Location: A Randomized Dependent LP-Rounding Algorithm T2 - Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization Y1 - 2010 A1 - Byrka,Jaroslaw A1 - Srinivasan, Aravind A1 - Swamy,Chaitanya ED - Eisenbrand,Friedrich ED - Shepherd,F. JA - Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6080 SN - 978-3-642-13035-9 UR - http://dx.doi.org/10.1007/978-3-642-13036-6_19 ER - TY - JOUR T1 - Finishing genomes with limited resources: lessons from an ensemble of microbial genomes JF - BMC Genomics Y1 - 2010 A1 - Nagarajan,Niranjan A1 - Cook,Christopher A1 - Di Bonaventura,Maria Pia A1 - Ge,Hong A1 - Richards,Allen A1 - Bishop-Lilly,Kimberly A A1 - DeSalle,Robert A1 - Read,Timothy D. A1 - Pop, Mihai AB - While new sequencing technologies have ushered in an era where microbial genomes can be easily sequenced, the goal of routinely producing high-quality draft and finished genomes in a cost-effective fashion has still remained elusive. Due to shorter read lengths and limitations in library construction protocols, shotgun sequencing and assembly based on these technologies often results in fragmented assemblies. Correspondingly, while draft assemblies can be obtained in days, finishing can take many months and hence the time and effort can only be justified for high-priority genomes and in large sequencing centers. In this work, we revisit this issue in light of our own experience in producing finished and nearly-finished genomes for a range of microbial species in a small-lab setting. These genomes were finished with surprisingly little investments in terms of time, computational effort and lab work, suggesting that the increased access to sequencing might also eventually lead to a greater proportion of finished genomes from small labs and genomics cores. VL - 11 SN - 1471-2164 UR - http://www.biomedcentral.com/1471-2164/11/242 CP - 1 M3 - 10.1186/1471-2164-11-242 ER - TY - CONF T1 - FPGA-based design and implementation of the 3GPP-LTE physical layer using parameterized synchronous dataflow techniques T2 - 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) Y1 - 2010 A1 - Kee, Hojin A1 - Bhattacharyya, Shuvra S. A1 - Wong, I. A1 - Yong Rao KW - 3G mobile communication KW - 3GPP-long term evolution KW - 3GPP-LTE physical layer KW - 4G communication systems KW - Computational modeling KW - data flow analysis KW - data flow graphs KW - Dataflow modeling KW - Digital signal processing KW - DSP applications KW - Field programmable gate arrays KW - FPGA architecture framework KW - FPGA implementation KW - FPGA-based design KW - Hardware KW - hardware synthesis KW - Instruments KW - LabVIEW FPGA KW - Logic Design KW - LTE KW - next generation cellular standard KW - parameterized synchronous data flow technique KW - Pervasive computing KW - Physical layer KW - Physics computing KW - Production KW - PSDF graph KW - reconfigurable hardware implementation KW - Runtime KW - software synthesis KW - Ubiquitous Computing KW - ubiquitous data flow model AB - Synchronous dataflow (SDF) is an ubiquitous dataflow model of computation that has been studied extensively for efficient simulation and software synthesis of DSP applications. In recent years, parameterized SDF (PSDF) has evolved as a useful framework for modeling SDF graphs in which arbitrary parameters can be changed dynamically. However, the potential to enable efficient hardware synthesis has been treated relatively sparsely in the literature for SDF and even more so for the newer, more general PSDF model. This paper investigates efficient FPGA-based design and implementation of the physical layer for 3GPP-Long Term Evolution (LTE), a next generation cellular standard. To capture the SDF behavior of the functional core of LTE along with higher level dynamics in the standard, we use a novel PSDF-based FPGA architecture framework. We implement our PSDF-based, LTE design framework using National Instrument's LabVIEW FPGA, a recently-introduced commercial platform for reconfigurable hardware implementation. We show that our framework can effectively model the dynamics of the LTE protocol, while also providing a synthesis framework for efficient FPGA implementation. JA - 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) ER - TY - JOUR T1 - A general framework for efficient geographic routing in wireless networks JF - Computer Networks Y1 - 2010 A1 - Lee,Seungjoon A1 - Bhattacharjee, Bobby A1 - Banerjee,Suman A1 - Han,Bo KW - Geographic routing KW - Link cost estimation KW - Routing metric KW - Wireless multihop networks AB - We propose a new link metric called normalized advance (NADV) for geographic routing in multihop wireless networks. NADV selects neighbors with the optimal trade-off between proximity and link cost. Coupled with the local next hop decision in geographic routing, NADV enables an adaptive and efficient cost-aware routing strategy. Depending on the objective or message priority, applications can use the NADV framework to minimize various types of link cost.We present efficient methods for link cost estimation and perform detailed experiments in simulated environments. Our results show that NADV outperforms current schemes in many aspects: for example, in high noise environments with frequent packet losses, the use of NADV leads to 81% higher delivery ratio. When compared to centralized routing under certain settings, geographic routing using NADV finds paths whose cost is close to the optimum. We also conducted experiments in Emulab testbed and the results demonstrate that our proposed approach performs well in practice. VL - 54 SN - 1389-1286 UR - http://www.sciencedirect.com/science/article/pii/S1389128609002904 CP - 5 M3 - 10.1016/j.comnet.2009.09.013 ER - TY - JOUR T1 - Genome Sequence of Hybrid Vibrio Cholerae O1 MJ-1236, B-33, and CIRS101 and Comparative Genomics with V. Cholerae JF - Journal of BacteriologyJ. Bacteriol. Y1 - 2010 A1 - Grim,Christopher J. A1 - Hasan,Nur A. A1 - Taviani,Elisa A1 - Haley,Bradd A1 - Jongsik Chun A1 - Brettin,Thomas S. A1 - Bruce,David C. A1 - Detter,J. Chris A1 - Han,Cliff S. A1 - Chertkov,Olga A1 - Challacombe,Jean A1 - Huq,Anwar A1 - Nair,G. Balakrish A1 - Rita R Colwell AB - The genomes of Vibrio cholerae O1 Matlab variant MJ-1236, Mozambique O1 El Tor variant B33, and altered O1 El Tor CIRS101 were sequenced. All three strains were found to belong to the phylocore group 1 clade of V. cholerae, which includes the 7th-pandemic O1 El Tor and serogroup O139 isolates, despite displaying certain characteristics of the classical biotype. All three strains were found to harbor a hybrid variant of CTXΦ and an integrative conjugative element (ICE), leading to their establishment as successful clinical clones and the displacement of prototypical O1 El Tor. The absence of strain- and group-specific genomic islands, some of which appear to be prophages and phage-like elements, seems to be the most likely factor in the recent establishment of dominance of V. cholerae CIRS101 over the other two hybrid strains. VL - 192 SN - 0021-9193, 1098-5530 UR - http://jb.asm.org/content/192/13/3524 CP - 13 M3 - 10.1128/JB.00040-10 ER - TY - RPRT T1 - Global Contours Y1 - 2010 A1 - Bista, Sujal A1 - Varshney, Amitabh KW - Technical Report AB - We present a multi-scale approach that uses Laplacian eigenvectorsto extract globally significant contours from an image. The input images are mapped into the Laplacian space by using Laplacian eigenvectors. This mapping causes globally significant pixels along the contours to expand in the Laplacian space. The measure of the expansion is used to compute the Global Contours. We apply our scheme to real color images and compare it with several other methods that compute image and color saliency. The contours calculated by our method reflect global properties of the image and are complementary to classic center-surround image saliency methods. We believe that hybrid image saliency algorithms that combine our method of Global Contours with center-surround image saliency algorithms will be able to better characterize the most important regions of images than those from just using contours calculated using bottom-up approaches. PB - Department of Computer Science, University of Maryland, College Park VL - CS-TR-4957 UR - http://drum.lib.umd.edu/handle/1903/10072 ER - TY - BOOK T1 - Handbook of Signal Processing Systems Y1 - 2010 A1 - Bhattacharyya, Shuvra S. A1 - Deprettere, Ed F. KW - Computers / Information Theory KW - Technology & Engineering / Electrical KW - Technology & Engineering / Signals & Signal Processing AB - The Handbook is organized in four parts. The first part motivates representative applications that drive and apply state-of-the art methods for design and implementation of signal processing systems; the second part discusses architectures for implementing these applications; the third part focuses on compilers and simulation tools; and the fourth part describes models of computation and their associated design tools and methodologies. PB - Springer SN - 9781441963451 ER - TY - CONF T1 - Holistic sentiment analysis across languages: multilingual supervised latent Dirichlet allocation T2 - Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing Y1 - 2010 A1 - Jordan Boyd-Graber A1 - Resnik, Philip AB - In this paper, we develop multilingual supervised latent Dirichlet allocation (MlSLDA), a probabilistic generative model that allows insights gleaned from one language's data to inform how the model captures properties of other languages. MlSLDA accomplishes this by jointly modeling two aspects of text: how multilingual concepts are clustered into thematically coherent topics and how topics associated with text connect to an observed regression variable (such as ratings on a sentiment scale). Concepts are represented in a general hierarchical framework that is flexible enough to express semantic ontologies, dictionaries, clustering constraints, and, as a special, degenerate case, conventional topic models. Both the topics and the regression are discovered via posterior inference from corpora. We show MlSLDA can build topics that are consistent across languages, discover sensible bilingual lexical correspondences, and leverage multilingual corpora to better predict sentiment. JA - Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing T3 - EMNLP '10 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dl.acm.org/citation.cfm?id=1870658.1870663 ER - TY - JOUR T1 - Identification of Pathogenic Vibrio Species by Multilocus PCR-Electrospray Ionization Mass Spectrometry and Its Application to Aquatic Environments of the Former Soviet Republic of Georgia JF - Applied and Environmental MicrobiologyAppl. Environ. Microbiol. Y1 - 2010 A1 - Whitehouse,Chris A. A1 - Baldwin,Carson A1 - Sampath,Rangarajan A1 - Blyn,Lawrence B. A1 - Melton,Rachael A1 - Li,Feng A1 - Hall,Thomas A. A1 - Harpin,Vanessa A1 - Matthews,Heather A1 - Tediashvili,Marina A1 - Jaiani,Ekaterina A1 - Kokashvili,Tamar A1 - Janelidze,Nino A1 - Grim,Christopher A1 - Rita R Colwell A1 - Huq,Anwar AB - The Ibis T5000 is a novel diagnostic platform that couples PCR and mass spectrometry. In this study, we developed an assay that can identify all known pathogenic Vibrio species and field-tested it using natural water samples from both freshwater lakes and the Georgian coastal zone of the Black Sea. Of the 278 total water samples screened, 9 different Vibrio species were detected, 114 (41%) samples were positive for V. cholerae, and 5 (0.8%) samples were positive for the cholera toxin A gene (ctxA). All ctxA-positive samples were from two freshwater lakes, and no ctxA-positive samples from any of the Black Sea sites were detected. VL - 76 SN - 0099-2240, 1098-5336 UR - http://aem.asm.org/content/76/6/1996 CP - 6 M3 - 10.1128/AEM.01919-09 ER - TY - CHAP T1 - Identifying Differentially Abundant Metabolic Pathways in Metagenomic Datasets T2 - Bioinformatics Research and Applications Y1 - 2010 A1 - Liu,Bo A1 - Pop, Mihai ED - Borodovsky,Mark ED - Gogarten,Johann ED - Przytycka,Teresa ED - Rajasekaran,Sanguthevar AB - Enabled by rapid advances in sequencing technology, metagenomic studies aim to characterize entire communities of microbes bypassing the need for culturing individual bacterial members. One major goal of such studies is to identify specific functional adaptations of microbial communities to their habitats. Here we describe a powerful analytical method (MetaPath) that can identify differentially abundant pathways in metagenomic data-sets, relying on a combination of metagenomic sequence data and prior metabolic pathway knowledge. We show that MetaPath outperforms other common approaches when evaluated on simulated datasets. We also demonstrate the power of our methods in analyzing two, publicly available, metagenomic datasets: a comparison of the gut microbiome of obese and lean twins; and a comparison of the gut microbiome of infant and adult subjects. We demonstrate that the subpathways identified by our method provide valuable insights into the biological activities of the microbiome. JA - Bioinformatics Research and Applications T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6053 SN - 978-3-642-13077-9 UR - http://dx.doi.org/10.1007/978-3-642-13078-6_12 ER - TY - CONF T1 - Image classification of vascular smooth muscle cells T2 - Proceedings of the 1st ACM International Health Informatics Symposium Y1 - 2010 A1 - Grasso,Michael A. A1 - Mokashi,Ronil A1 - Dalvi,Darshana A1 - Cardone, Antonio A1 - Dima,Alden A. A1 - Bhadriraju,Kiran A1 - Plant,Anne L. A1 - Brady,Mary A1 - Yesha,Yaacov A1 - Yesha,Yelena KW - cell biology KW - digital image processing KW - machine learning JA - Proceedings of the 1st ACM International Health Informatics Symposium T3 - IHI '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0030-8 UR - http://doi.acm.org/10.1145/1882992.1883068 M3 - 10.1145/1882992.1883068 ER - TY - CONF T1 - Improving translation via targeted paraphrasing T2 - Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing Y1 - 2010 A1 - Resnik, Philip A1 - Buzek,O. A1 - Hu,C. A1 - Kronrod,Y. A1 - Quinn,A. A1 - Bederson, Benjamin B. JA - Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing ER - TY - CHAP T1 - On k-Column Sparse Packing Programs T2 - Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization Y1 - 2010 A1 - Bansal,Nikhil A1 - Korula,Nitish A1 - Nagarajan,Viswanath A1 - Srinivasan, Aravind ED - Eisenbrand,Friedrich ED - Shepherd,F. AB - We consider the class of packing integer programs (PIPs) that are column sparse, where there is a specified upper bound k on the number of constraints that each variable appears in. We give an improved (ek + o(k))-approximation algorithm for k-column sparse PIPs. Our algorithm is based on a linear programming relaxation, and involves randomized rounding combined with alteration. We also show that the integrality gap of our LP relaxation is at least 2k − 1; it is known that even special cases of k-column sparse PIPs are (klogk)-hard to approximate.We generalize our result to the case of maximizing monotone submodular functions over k-column sparse packing constraints, and obtain an e2ke−1+o(k) -approximation algorithm. In obtaining this result, we prove a new property of submodular functions that generalizes the fractionally subadditive property, which might be of independent interest. JA - Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6080 SN - 978-3-642-13035-9 UR - http://dx.doi.org/10.1007/978-3-642-13036-6_28 ER - TY - CONF T1 - Lazy binary-splitting: a run-time adaptive work-stealing scheduler T2 - Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming Y1 - 2010 A1 - Tzannes,Alexandros A1 - Caragea,George C. A1 - Barua,Rajeev A1 - Vishkin, Uzi KW - Dynamic scheduling KW - load balancing KW - nested parallelism KW - thread scheduling KW - work stealing AB - We present Lazy Binary Splitting (LBS), a user-level scheduler of nested parallelism for shared-memory multiprocessors that builds on existing Eager Binary Splitting work-stealing (EBS) implemented in Intel's Threading Building Blocks (TBB), but improves performance and ease-of-programming. In its simplest form (SP), EBS requires manual tuning by repeatedly running the application under carefully controlled conditions to determine a stop-splitting-threshold (sst)for every do-all loop in the code. This threshold limits the parallelism and prevents excessive overheads for fine-grain parallelism. Besides being tedious, this tuning also over-fits the code to some particular dataset, platform and calling context of the do-all loop, resulting in poor performance portability for the code. LBS overcomes both the performance portability and ease-of-programming pitfalls of a manually fixed threshold by adapting dynamically to run-time conditions without requiring tuning. We compare LBS to Auto-Partitioner (AP), the latest default scheduler of TBB, which does not require manual tuning either but lacks context portability, and outperform it by 38.9% using TBB's default AP configuration, and by 16.2% after we tuned AP to our experimental platform. We also compare LBS to SP by manually finding SP's sst using a training dataset and then running both on a different execution dataset. LBS outperforms SP by 19.5% on average. while allowing for improved performance portability without requiring tedious manual tuning. LBS also outperforms SP with sst=1, its default value when undefined, by 56.7%, and serializing work-stealing (SWS), another work-stealer by 54.7%. Finally, compared to serializing inner parallelism (SI) which has been used by OpenMP, LBS is 54.2% faster. JA - Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming T3 - PPoPP '10 PB - ACM CY - New York, NY, USA SN - 978-1-60558-877-3 UR - http://doi.acm.org/10.1145/1693453.1693479 M3 - 10.1145/1693453.1693479 ER - TY - CHAP T1 - Learning Through Application: The Maturing ofthe QIP in the SEL T2 - Making Software: What Really Works, and Why We Believe ItMaking Software: What Really Works, and Why We Believe It Y1 - 2010 A1 - Basili, Victor R. JA - Making Software: What Really Works, and Why We Believe ItMaking Software: What Really Works, and Why We Believe It PB - O'Reilly Media, Inc. SN - 9780596808327 ER - TY - CONF T1 - A Lightweight Dataflow Approach for Design and Implementation of SDR Systems T2 - Wireless Innovation Conference and Product Exposition, Washington DC, USA Y1 - 2010 A1 - Chung-Ching Shen A1 - Plishker,William A1 - Wu, Hsiang-Huang A1 - Bhattacharyya, Shuvra S. AB - Model-based design methods based on dataflow modelsof computation are attractive for design and implementation of wireless communication systems because of their intuitive correspondence to communication system block diagrams, and the formal structure that is exposed through formal dataflow representations (e.g., see [2]). In this paper, we introduce a novel lightweight dataflow (LWDF) programming model for model-based design and implementation of wireless communication and software-defined radio systems. The approach is suitable for improving the productivity of the design process; the agility with which designs can be retargeted across different platforms; and the quality of derived implementations. By “lightweight”, we meant that the programming model is designed to be minimally intrusive on existing design processes, and require minimal dependence on specialized tools or libraries. This allows designers to integrate and experiment with dataflow modeling approaches relatively quickly and flexibly into existing design methodologies and processes. JA - Wireless Innovation Conference and Product Exposition, Washington DC, USA UR - http://www.researchgate.net/publication/228788399_A_lightweight_dataflow_approach_for_design_and_implementation_of_SDR_systems/file/d912f511472fa25833.pdf ER - TY - THES T1 - Linguistic Extensions of Topic Models Y1 - 2010 A1 - Jordan Boyd-Graber AB - Topic models like latent Dirichlet allocation (LDA) provide a framework for analyzinglarge datasets where observations are collected into groups. Although topic modeling has been fruitfully applied to problems social science, biology, and computer vision, it has been most widely used to model datasets where documents are modeled as exchangeable groups of words. In this context, topic models discover topics, distribu- tions over words that express a coherent theme like “business” or “politics.” While one of the strengths of topic models is that they make few assumptions about the underlying data, such a general approach sometimes limits the type of problems topic models can solve. When we restrict our focus to natural language datasets, we can use insights from linguistics to create models that understand and discover richer language patterns. In this thesis, we extend LDA in three different ways: adding knowledge of word mean- ing, modeling multiple languages, and incorporating local syntactic context. These extensions apply topic models to new problems, such as discovering the meaning of ambiguous words, extend topic models for new datasets, such as unaligned multi- lingual corpora, and combine topic models with other sources of information about documents’ context. PB - Princeton University ER - TY - JOUR T1 - Linking Software Development and Business Strategy Through Measurement JF - Computer Y1 - 2010 A1 - Basili, Victor R. A1 - Lindvall,M. A1 - Regardie,M. A1 - Seaman,C. A1 - Heidrich,J. A1 - Munch,J. A1 - Rombach,D. A1 - Trendowicz,A. KW - approach;business KW - aspects;software KW - development;organisational KW - engineering; KW - GQM+Strategies KW - program;software KW - strategy;enterprise KW - support;measurement KW - wide AB - The GQM+Strategies approach extends the goal/question/metric paradigm for measuring the success or failure of goals and strategies, adding enterprise-wide support for determining action on the basis of measurement results. An organization can thus integrate its measurement program across all levels. VL - 43 SN - 0018-9162 CP - 4 M3 - 10.1109/MC.2010.108 ER - TY - CONF T1 - Loop transformations for interface-based hierarchies IN SDF graphs T2 - 2010 21st IEEE International Conference on Application-specific Systems Architectures and Processors (ASAP) Y1 - 2010 A1 - Piat, J. A1 - Bhattacharyya, Shuvra S. A1 - Raulet, M. KW - Application software KW - code generation KW - Computer architecture KW - Computer interfaces KW - Data-Flow programming KW - Digital signal processing KW - Loop parallelization KW - PARALLEL PROCESSING KW - Power engineering computing KW - Power system modeling KW - Processor scheduling KW - Programming profession KW - scheduling KW - SDF graph KW - system recovery AB - Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data-flow (SDF), offers strong compile-time predictability properties, but has limited expressive power. A new type of hierarchy (Interface-based SDF) has been proposed allowing more expressivity while maintaining its predictability. One of the main problems with this hierarchical SDF model is the lack of trade-off between parallelism and network clustering. This paper presents a systematic method for applying an important class of loop transformation techniques in the context of interface-based SDF semantics. The resulting approach provides novel capabilities for integrating parallelism extraction properties of the targeted loop transformations with the useful modeling, analysis, and code reuse properties provided by SDF. JA - 2010 21st IEEE International Conference on Application-specific Systems Architectures and Processors (ASAP) ER - TY - JOUR T1 - A Low-overhead Scheduling Methodology for Fine-grained Acceleration of Signal Processing Systems JF - Journal of Signal Processing Systems Y1 - 2010 A1 - Boutellier, Jani A1 - Bhattacharyya, Shuvra S. A1 - Silvén, Olli AB - Fine-grained accelerators have the potential to deliver significant benefits in various platforms for embedded signal processing. Due to the moderate complexity of their targeted operations, these accelerators must be managed with minimal run-time overhead. In this paper, we present a methodology for applying flow-shop scheduling techniques to make effective, low-overhead use of fine-grained DSP accelerators. We formulate the underlying scheduling approach in terms of general flow-shop scheduling concepts, and demonstrate our methodology concretely by applying it to MPEG-4 video decoding. We present quantitative experiments on a soft processor that runs on a field-programmable gate array, and provide insight on trends and trade-offs among different flow-shop scheduling approaches when applied to run-time management of fine-grained acceleration. VL - 60 UR - http://link.springer.com/article/10.1007/s11265-009-0366-z CP - 3 ER - TY - JOUR T1 - LP-rounding algorithms for facility-location problems JF - arXiv:1007.3611 Y1 - 2010 A1 - Byrka,Jaroslaw A1 - Ghodsi,Mohammadreza A1 - Srinivasan, Aravind KW - Computer Science - Data Structures and Algorithms AB - We study LP-rounding approximation algorithms for metric uncapacitated facility-location problems. We first give a new analysis for the algorithm of Chudak and Shmoys, which differs from the analysis of Byrka and Aardal in that now we do not need any bound based on the solution to the dual LP program. Besides obtaining the optimal bifactor approximation as do Byrka and Aardal, we can now also show that the algorithm with scaling parameter equaling 1.58 is, in fact, an 1.58-approximation algorithm. More importantly, we suggest an approach based on additional randomization and analyses such as ours, which could achieve or approach the conjectured optimal 1.46...--approximation for this basic problem. Next, using essentially the same techniques, we obtain improved approximation algorithms in the 2-stage stochastic variant of the problem, where we must open a subset of facilities having only stochastic information about the future demand from the clients. For this problem we obtain a 2.2975-approximation algorithm in the standard setting, and a 2.4957-approximation in the more restricted, per-scenario setting. We then study robust fault-tolerant facility location, introduced by Chechik and Peleg: solutions here are designed to provide low connection cost in case of failure of up to $k$ facilities. Chechik and Peleg gave a 6.5-approximation algorithm for $k=1$ and a ($7.5k + 1.5$)-approximation algorithm for general $k$. We improve this to an LP-rounding $(k+5+4/k)$-approximation algorithm. We also observe that in case of oblivious failures the expected approximation ratio can be reduced to $k + 1.5$, and that the integrality gap of the natural LP-relaxation of the problem is at least $k + 1$. UR - http://arxiv.org/abs/1007.3611 ER - TY - CONF T1 - Maranello: practical partial packet recovery for 802.11 T2 - Proceedings of the 7th USENIX conference on Networked systems design and implementation Y1 - 2010 A1 - Han,Bo A1 - Schulman,Aaron A1 - Gringoli,Francesco A1 - Spring, Neil A1 - Bhattacharjee, Bobby A1 - Nava,Lorenzo A1 - Ji,Lusheng A1 - Lee,Seungjoon A1 - Miller,Robert AB - Partial packet recovery protocols attempt to repair corrupted packets instead of retransmitting them in their entirety. Recent approaches have used physical layer confidence estimates or additional error detection codes embedded in each transmission to identify corrupt bits, or have applied forward error correction to repair without such explicit knowledge. In contrast to these approaches, our goal is a practical design that simultaneously: (a) requires no extra bits in correct packets, (b) reduces recovery latency, except in rare instances, (c) remains compatible with existing 802.11 devices by obeying timing and backoff standards, and (d) can be incrementally deployed on widely available access points and wireless cards. In this paper, we design, implement, and evaluate Maranello, a novel partial packet recovery mechanism for 802.11. In Maranello, the receiver computes checksums over blocks in corrupt packets and bundles these checksums into a negative acknowledgment sent when the sender expects to receive an acknowledgment. The sender then retransmits only those blocks for which the checksum is incorrect, and repeats this partial retransmission until it receives an acknowledgment. Successful transmissions are not burdened by additional bits and the receiver needs not infer which bits were corrupted. We implemented Maranello using OpenFWWF (open source firmware for Broadcom wireless cards) and deployed it in a small testbed. We compare Maranello to alternative recovery protocols using a trace-driven simulation and to 802.11 using a live implementation under various channel conditions. To our knowledge, Maranello is the first partial packet recovery design to be implemented in commonly available firmware. JA - Proceedings of the 7th USENIX conference on Networked systems design and implementation T3 - NSDI'10 PB - USENIX Association CY - Berkeley, CA, USA UR - http://dl.acm.org/citation.cfm?id=1855711.1855725 ER - TY - CONF T1 - Measuring transitivity using untrained annotators T2 - Proceedings of the NAACL HLT 2010 Workshop on Creating Speech and Language Data with Amazon's Mechanical Turk Y1 - 2010 A1 - Madnani,Nitin A1 - Jordan Boyd-Graber A1 - Resnik, Philip AB - Hopper and Thompson (1980) defined a multi-axis theory of transitivity that goes beyond simple syntactic transitivity and captures how much "action" takes place in a sentence. Detecting these features requires a deep understanding of lexical semantics and real-world pragmatics. We propose two general approaches for creating a corpus of sentences labeled with respect to the Hopper-Thompson transitivity schema using Amazon Mechanical Turk. Both approaches assume no existing resources and incorporate all necessary annotation into a single system; this is done to allow for future generalization to other languages. The first task attempts to use language-neutral videos to elicit human-composed sentences with specified transitivity attributes. The second task uses an iterative process to first label the actors and objects in sentences and then annotate the sentences' transitivity. We examine the success of these techniques and perform a preliminary classification of the transitivity of held-out data. JA - Proceedings of the NAACL HLT 2010 Workshop on Creating Speech and Language Data with Amazon's Mechanical Turk T3 - CSLDAMT '10 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dl.acm.org/citation.cfm?id=1866696.1866726 ER - TY - CONF T1 - Methods for efficient implementation of Model Predictive Control on multiprocessor systems T2 - 2010 IEEE International Conference on Control Applications (CCA) Y1 - 2010 A1 - Gu, Ruirui A1 - Bhattacharyya, Shuvra S. A1 - Levine,W. S KW - Computational modeling KW - COMPUTERS KW - Equations KW - Hardware KW - Linear systems KW - Mathematical model KW - model predictive control KW - MPC algorithms KW - Multiprocessing systems KW - Multiprocessor systems KW - parallel computers KW - predictive control KW - Program processors AB - Model Predictive Control (MPC) has been used in a wide range of application areas including chemical engineering, food processing, automotive engineering, aerospace, and metallurgy. An important limitation on the application of MPC is the difficulty in completing the necessary computations within the sampling interval. Recent trends in computing hardware towards greatly increased parallelism offer a solution to this problem. This paper describes modeling and analysis tools to facilitate implementing the MPC algorithms on parallel computers, thereby greatly reducing the time needed to complete the calculations. The use of these tools is illustrated by an application to a class of MPC problems. JA - 2010 IEEE International Conference on Control Applications (CCA) ER - TY - JOUR T1 - A modality lexicon and its use in automatic tagging JF - Proceedings of the Seventh conference on International Language Resources and Evaluation (LREC’10) Y1 - 2010 A1 - Baker,K. A1 - Bloodgood,M. A1 - Dorr, Bonnie J A1 - Filardo,N.W. A1 - Levin,L. A1 - Piatko,C. AB - This paper describes our resource-building results for an eight-week JHU Human Language Technology Center of Excellence SummerCamp for Applied Language Exploration (SCALE-2009) on Semantically-Informed Machine Translation. Specifically, we describe the construction of a modality annotation scheme, a modality lexicon, and two automated modality taggers that were built using the lexicon and annotation scheme. Our annotation scheme is based on identifying three components of modality: a trigger, a target and a holder. We describe how our modality lexicon was produced semi-automatically, expanding from an initial hand-selected list of modality trigger words and phrases. The resulting expanded modality lexicon is being made publicly available. We demonstrate that one tagger—a structure-based tagger—results in precision around 86% (depending on genre) for tagging of a standard LDC data set. In a machine translation application, using the structure-based tagger to annotate English modalities on an English-Urdu training corpus improved the translation quality score for Urdu by 0.3 Bleu points in the face of sparse training data. ER - TY - CONF T1 - Modeling perspective using adaptor grammars T2 - Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing Y1 - 2010 A1 - Hardisty,Eric A. A1 - Jordan Boyd-Graber A1 - Resnik, Philip AB - Strong indications of perspective can often come from collocations of arbitrary length; for example, someone writing get the government out of my X is typically expressing a conservative rather than progressive viewpoint. However, going beyond unigram or bigram features in perspective classification gives rise to problems of data sparsity. We address this problem using nonparametric Bayesian modeling, specifically adaptor grammars (Johnson et al., 2006). We demonstrate that an adaptive naïve Bayes model captures multiword lexical usages associated with perspective, and establishes a new state-of-the-art for perspective classification results using the Bitter Lemons corpus, a collection of essays about mid-east issues from Israeli and Palestinian points of view. JA - Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing T3 - EMNLP '10 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dl.acm.org/citation.cfm?id=1870658.1870686 ER - TY - CHAP T1 - Multidimensional data structures for spatial applications T2 - Algorithms and theory of computation handbookAlgorithms and theory of computation handbook Y1 - 2010 A1 - Samet, Hanan ED - Atallah,Mikhail J. ED - Blanton,Marina AB - An overview is presented of a number of representations of multidimensional data that arise in spatial applications. Multidimensional spatial data consists of points as well as objects that have extent such as line segments, rectangles, regions, and volumes. The points may have locational as well as nonlocational attributes. The focus is on spatial data which is a subset of multidimensional data consisting of points with locational attributes and objects with extent. The emphasis is on hierarchical representations based on the "divide-and-conquer" problem-solving paradigm. They are of interest because they enable focusing computational resources on the interesting subsets of data. Thus, there is no need to expend work where the payoff is small. These representations are of use in operations such as range searching and finding nearest neighbors. JA - Algorithms and theory of computation handbookAlgorithms and theory of computation handbook PB - Chapman & Hall/CRC SN - 978-1-58488-822-2 UR - http://dl.acm.org/citation.cfm?id=1882757.1882763 ER - TY - CONF T1 - Nfsight: netflow-based network awareness tool Y1 - 2010 A1 - Berthier,R. A1 - Michel Cukier A1 - Hiltunen,M. A1 - Kormann,D. A1 - Vesonder,G. A1 - Sheleheda,D. AB - Network awareness is highly critical for network and se-curity administrators. It enables informed planning and management of network resources, as well as detection and a comprehensive understanding of malicious activ- ity. It requires a set of tools to efficiently collect, process, and represent network data. While many such tools al- ready exist, there is no flexible and practical solution for visualizing network activity at various granularities, and quickly gaining insights about the status of network as- sets. To address this issue, we developed Nfsight, a Net- Flow processing and visualization application designed to offer a comprehensive network awareness solution. Nfsight constructs bidirectional flows out of the unidi- rectional NetFlow flows and leverages these bidirectional flows to provide client/server identification and intrusion detection capabilities. We present in this paper the in- ternal architecture of Nfsight, the evaluation of the ser- vice, and intrusion detection algorithms. We illustrate the contributions of Nfsight through several case studies conducted by security administrators on a large univer- sity network. UR - http://www.usenix.org/event/lisa10/tech/full_papers/Berthier.pdf ER - TY - JOUR T1 - Non-visual exploration of geographic maps: Does sonification help? JF - Disability & Rehabilitation: Assistive Technology Y1 - 2010 A1 - Delogu,Franco A1 - Palmiero,Massimiliano A1 - Federici,Stefano A1 - Plaisant, Catherine A1 - Zhao,Haixia A1 - Belardinelli,Olivetti AB - Purpose. This study aims at evaluating the effectiveness of sonification as a mean to provide access to geo-referenced information to users with visual impairments.Method. Thiry-five participants (10 congenitally blind, 10 with acquired blindness and 15 blindfolded sighted) completed four tasks of progressive difficulty. During each task, participants first explored a sonified map by using either a tablet or a keyboard to move across regions and listened to sounds giving information about the current location. Then the participants were asked to identify, among four tactile maps, the one that crossmodally corresponds to the sonifed map they just explored. Finally, participants answered a self-report questionnaire of understanding and satisfaction. Results. Participants achieved high accuracy in all of the four tactile map discrimination tasks. No significant performance difference was found neither between subjects that used keyboard or tablet, nor between the three groups of blind and sighted participants. Differences between groups and interfaces were found in the usage strategies. High levels of satisfaction and understanding of the tools and tasks emerged from users' reports. VL - 5 SN - 1748-3107, 1748-3115 UR - http://informahealthcare.com/doi/abs/10.3109/17483100903100277 CP - 3 M3 - 10.3109/17483100903100277 ER - TY - CONF T1 - Obtaining valid safety data for software safety measurement and process improvement T2 - Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement Y1 - 2010 A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V A1 - Layman,Lucas A1 - Dangle,Kathleen A1 - Diep,Madeline KW - case study KW - NASA KW - risk analysis KW - safety metrics AB - We report on a preliminary case study to examine software safety risk in the early design phase of the NASA Constellation spaceflight program. Our goal is to provide NASA quality assurance managers with information regarding the ongoing state of software safety across the program. We examined 154 hazard reports created during the preliminary design phase of three major flight hardware systems within the Constellation program. Our purpose was two-fold: 1) to quantify the relative importance of software with respect to system safety; and 2) to identify potential risks due to incorrect application of the safety process, deficiencies in the safety process, or the lack of a defined process. One early outcome of this work was to show that there are structural deficiencies in collecting valid safety data that make software safety different from hardware safety. In our conclusions we present some of these deficiencies. JA - Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement T3 - ESEM '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0039-1 UR - http://doi.acm.org/10.1145/1852786.1852846 M3 - 10.1145/1852786.1852846 ER - TY - CONF T1 - Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage T2 - Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on Y1 - 2010 A1 - Brakerski,Z. A1 - Kalai,Y.T. A1 - Katz, Jonathan A1 - Vaikuntanathan,V. KW - continual KW - cryptography; KW - cryptography;public-key KW - encryption KW - key KW - key;digital KW - leakage;cryptographic KW - memory KW - schemes;digital KW - schemes;public-key KW - schemes;secret KW - signatures;identity-based KW - signatures;public AB - In recent years, there has been a major effort to design cryptographic schemes that remain secure even when arbitrary information about the secret key is leaked (e.g., via side-channel attacks). We explore the possibility of achieving security under emphcontinual leakage from the emphentire secret key by designing schemes in which the secret key is updated over time. In this model, we construct public-key encryption schemes, digital signatures, and identity-based encryption schemes that remain secure even if an attacker can leak a constant fraction of the secret memory (including the secret key) in each time period between key updates. We also consider attackers who may probe the secret memory during the updates themselves. We stress that we allow unrestricted leakage, without the assumption that “only computation leaks information”. Prior to this work, constructions of public-key encryption schemes secure under continual leakage were not known even under this assumption. JA - Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on M3 - 10.1109/FOCS.2010.55 ER - TY - JOUR T1 - Overlay Networking and Resiliency JF - Guide to Reliable Internet Services and Applications Y1 - 2010 A1 - Bhattacharjee, Bobby A1 - Rabinovich,M. ER - TY - CONF T1 - Pose-robust albedo estimation from a single image T2 - Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on Y1 - 2010 A1 - Biswas,S. A1 - Chellapa, Rama KW - 3D KW - albedo KW - estimation; KW - estimation;shape KW - Face KW - filtering;face KW - image;single KW - image;stochastic KW - information;pose-robust KW - matching;pose KW - nonfrontal KW - pose;class-specific KW - recognition;filtering KW - recovery;single KW - statistics;computer KW - theory;pose KW - vision;illumination-insensitive AB - We present a stochastic filtering approach to perform albedo estimation from a single non-frontal face image. Albedo estimation has far reaching applications in various computer vision tasks like illumination-insensitive matching, shape recovery, etc. We extend the formulation proposed in that assumes face in known pose and present an algorithm that can perform albedo estimation from a single image even when pose information is inaccurate. 3D pose of the input face image is obtained as a byproduct of the algorithm. The proposed approach utilizes class-specific statistics of faces to iteratively improve albedo and pose estimates. Illustrations and experimental results are provided to show the effectiveness of the approach. We highlight the usefulness of the method for the task of matching faces across variations in pose and illumination. The facial pose estimates obtained are also compared against ground truth. JA - Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on M3 - 10.1109/CVPR.2010.5539987 ER - TY - JOUR T1 - The pre‐seventh pandemic Vibrio cholerae BX 330286 El Tor genome: evidence for the environment as a genome reservoir JF - Environmental Microbiology Reports Y1 - 2010 A1 - Haley,Bradd J. A1 - Grim,Christopher J. A1 - Hasan,Nur A. A1 - Taviani,Elisa A1 - Jongsik Chun A1 - Brettin,Thomas S. A1 - Bruce,David C. A1 - Challacombe,Jean F. A1 - Detter,J. Chris A1 - Han,Cliff S. A1 - Huq,Anwar A1 - Nair,G. Balakrish A1 - Rita R Colwell AB - Vibrio cholerae O1 El Tor BX 330286 was isolated from a water sample in Australia in 1986, 9 years after an indigenous outbreak of cholera occurred in that region. This environmental strain encodes virulence factors highly similar to those of clinical strains, suggesting an ability to cause disease in humans. We demonstrate its high similarity in gene content and genome-wide nucleotide sequence to clinical V. cholerae strains, notably to pre-seventh pandemic O1 El Tor strains isolated in 1910 (V. cholerae NCTC 8457) and 1937 (V. cholerae MAK 757), as well as seventh pandemic strains isolated after 1960 globally. Here we demonstrate that this strain represents a transitory clone with shared characteristics between pre-seventh and seventh pandemic strains of V. cholerae. Interestingly, this strain was isolated 25 years after the beginning of the seventh pandemic, suggesting the environment as a genome reservoir in areas where cholera does not occur in sporadic, endemic or epidemic form. VL - 2 SN - 1758-2229 UR - http://onlinelibrary.wiley.com/doi/10.1111/j.1758-2229.2010.00141.x/abstract?userIsAuthenticated=false&deniedAccessCustomisedMessage= CP - 1 M3 - 10.1111/j.1758-2229.2010.00141.x ER - TY - JOUR T1 - Probabilistic similarity logic JF - Proceedings of the Conference on Uncertainty in Artificial Intelligence Y1 - 2010 A1 - Bröcheler,M. A1 - Mihalkova,L. A1 - Getoor, Lise AB - Many machine learning applications require theability to learn from and reason about noisy multi-relational data. To address this, several ef- fective representations have been developed that provide both a language for expressing the struc- tural regularities of a domain, and principled sup- port for probabilistic inference. In addition to these two aspects, however, many applications also involve a third aspect–the need to reason about similarities–which has not been directly supported in existing frameworks. This paper introduces probabilistic similarity logic (PSL), a general-purpose framework for joint reason- ing about similarity in relational domains that incorporates probabilistic reasoning about sim- ilarities and relational structure in a principled way. PSL can integrate any existing domain- specific similarity measures and also supports reasoning about similarities between sets of en- tities. We provide efficient inference and learn- ing techniques for PSL and demonstrate its ef- fectiveness both in common relational tasks and in settings that require reasoning about similarity. ER - TY - JOUR T1 - The problem with zoning: nonlinear effects of interactions between location preferences and externalities on land use and utility JF - Environment and Planning B: Planning and Design Y1 - 2010 A1 - Zellner,M.L. A1 - Riolo,R.L. A1 - Rand, William A1 - Brown,D.G. A1 - Page,S.E. A1 - Fernandez,L.E. VL - 37 CP - 3 ER - TY - CONF T1 - Rapid prototyping for digital signal processing systems using Parameterized Synchronous Dataflow graphs T2 - 2010 21st IEEE International Symposium on Rapid System Prototyping (RSP) Y1 - 2010 A1 - Wu, Hsiang-Huang A1 - Kee, Hojin A1 - Sane, N. A1 - Plishker,W. A1 - Bhattacharyya, Shuvra S. KW - abstract scheduling KW - Computational modeling KW - Computer architecture KW - data flow graphs KW - dataflow based design KW - dataflow interchange format KW - design flow KW - design language KW - Digital signal processing KW - digital signal processing systems KW - dynamic parameter reconfiguration KW - Dynamic scheduling KW - efficient hardware mapping KW - efficient quasistatic scheduling KW - Embedded software KW - embedded systems KW - Field programmable gate arrays KW - flexible dynamic reconfiguration KW - FPGA based systems KW - FPGA implementations KW - functional simulation KW - Hardware KW - parameterized synchronous dataflow graphs KW - rapid prototyping KW - Schedules KW - scheduling KW - semantics KW - simulation tool KW - software package KW - systematic design methodology AB - Parameterized Synchronous Dataflow (PSDF) has been used previously for abstract scheduling and as a model for architecting embedded software and FPGA implementations. PSDF has been shown to be attractive for these purposes due to its support for flexible dynamic reconfiguration, and efficient quasi-static scheduling. To apply PSDF techniques more deeply into the design flow, support for comprehensive functional simulation and efficient hardware mapping is important. By building on the DIF (Dataflow Interchange Format), which is a design language and associated software package for developing and experimenting with dataflow-based design techniques for signal processing systems, we have developed a tool for functional simulation of PSDF specifications. This simulation tool allows designers to model applications in PSDF and simulate their functionality, including use of the dynamic parameter reconfiguration capabilities offered by PSDF. Based on this simulation tool, we also present a systematic design methodology for applying PSDF to the design and implementation of digital signal processing systems, with emphasis on FPGA-based systems for signal processing. We demonstrate capabilities for rapid and accurate prototyping offered by our proposed design methodology, along with its novel support for PSDF-based FPGA system implementation. JA - 2010 21st IEEE International Symposium on Rapid System Prototyping (RSP) ER - TY - CONF T1 - Resource-Aware Compiler Prefetching for Many-Cores T2 - Parallel and Distributed Computing (ISPDC), 2010 Ninth International Symposium on Y1 - 2010 A1 - Caragea,G.C. A1 - Tzannes,A. A1 - Keceli,F. A1 - Barua,R. A1 - Vishkin, Uzi KW - algorithm;memory KW - architecture;hardware-software KW - architectures;parallel KW - architectures;resource KW - aware KW - caches;super-scalar KW - compiler KW - compiler;Multicore KW - compilers;parallel KW - GCC-derived KW - level KW - management; KW - many-core KW - memories;storage KW - out-of-order KW - Parallel KW - parallelism;parallel KW - prefetch;loop KW - prefetching KW - prefetching;shared KW - processor;fine-grained KW - processors;multiprocessing KW - systems;optimising AB - Super-scalar, out-of-order processors that can have tens of read and write requests in the execution window place significant demands on Memory Level Parallelism (MLP). Multi-and many-cores with shared parallel caches further increase MLP demand. Current cache hierarchies however have been unable to keep up with this trend, with modern designs allowing only 4-16 concurrent cache misses. This disconnect is exacerbated by recent highly parallel architectures (e.g. GPUs) where power and area per-core budget favor lighter cores with less resources. Support for hardware and software prefetch increase MLP pressure since these techniques overlap multiple memory requests with existing computation. In this paper, we propose and evaluate a novel Resource-Aware Prefetching (RAP) compiler algorithm that is aware of the number of simultaneous prefetches supported, and optimized for the same. We show that in situations where not enough resources are available to issue prefetch instructions for all references in a loop, it is more beneficial to decrease the prefetch distance and prefetch for as many references as possible, rather than use a fixed prefetched distance and skip prefetching for some references, as in current approaches. We implemented our algorithm in a GCC-derived compiler and evaluated its performance using an emerging fine-grained many-core architecture. Our results show that the RAP algorithm outperforms a well-known loop prefetching algorithm by up to 40.15% and the state-of-the art GCC implementation by up to 34.79%. Moreover, we compare the RAP algorithm with a simple hardware prefetching mechanism, and show improvements of up to 24.61%. JA - Parallel and Distributed Computing (ISPDC), 2010 Ninth International Symposium on M3 - 10.1109/ISPDC.2010.16 ER - TY - CONF T1 - The role of geometry in age estimation T2 - 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) Y1 - 2010 A1 - Turaga,P. A1 - Biswas,S. A1 - Chellapa, Rama KW - age estimation KW - Aging KW - Biometrics KW - computational geometry KW - Face KW - Face Geometry KW - Facial animation KW - Feature extraction KW - function estimation problem KW - geometric face attributes KW - Geometry KW - Grassmann manifold KW - human face modeling KW - human face understanding KW - HUMANS KW - Mouth KW - regression KW - Regression analysis KW - SHAPE KW - Solid modeling KW - solid modelling KW - velocity vector AB - Understanding and modeling of aging in human faces is an important problem in many real-world applications such as biometrics, authentication, and synthesis. In this paper, we consider the role of geometric attributes of faces, as described by a set of landmark points on the face, in age perception. Towards this end, we show that the space of landmarks can be interpreted as a Grassmann manifold. Then the problem of age estimation is posed as a problem of function estimation on the manifold. The warping of an average face to a given face is quantified as a velocity vector that transforms the average to a given face along a smooth geodesic in unit-time. This deformation is then shown to contain important information about the age of the face. We show in experiments that exploiting geometric cues in a principled manner provides comparable performance to several systems that utilize both geometric and textural cues. We show results on age estimation using the standard FG-Net dataset and a passport dataset which illustrate the effectiveness of the approach. JA - 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) PB - IEEE SN - 978-1-4244-4295-9 M3 - 10.1109/ICASSP.2010.5495292 ER - TY - CONF T1 - Scalable representation of dataflow graph structures using topological patterns T2 - 2010 IEEE Workshop on Signal Processing Systems (SIPS) Y1 - 2010 A1 - Sane, N. A1 - Kee, Hojin A1 - Seetharaman, G. A1 - Bhattacharyya, Shuvra S. KW - arrays KW - data flow graphs KW - Dataflow graphs KW - DIF language KW - Digital signal processing KW - directed graphs KW - DSP specification languages KW - embedded signal processing design flows KW - embedded systems KW - Field programmable gate arrays KW - graphical user interface KW - Graphical user interfaces KW - High-level languages KW - modelbased design KW - optimisation KW - optimizations KW - scalable dataflow graph structures representation KW - semantics KW - Signal processing KW - Signal processing systems KW - Specification languages KW - text based languages KW - Topological patterns KW - Topology KW - Transform coding AB - Tools for designing signal processing systems with their semantic foundation in dataflow modeling often use high-level graphical user interface (GUI) or text based languages that allow specifying applications as directed graphs. Such graphical representations serve as an initial reference point for further analysis and optimizations that lead to platform-specific implementations. For large-scale applications, the underlying graphs often consist of smaller substructures that repeat multiple times. To enable more concise representation and direct analysis of such substructures in the context of high level DSP specification languages and design tools, we develop the modeling concept of topological patterns, and propose ways for supporting this concept in a high-level language. We augment the DIF language - a language for specifying DSP-oriented dataflow graphs - with constructs for supporting topological patterns, and we show how topological patterns can be effective in various aspects of embedded signal processing design flows using specific application examples. JA - 2010 IEEE Workshop on Signal Processing Systems (SIPS) ER - TY - JOUR T1 - Selective excitation of LI2 by chirped laser pulses with all possible interstate radiative couplings JF - The Journal of Chemical Physics Y1 - 2010 A1 - Chatterjee, Souvik A1 - Bhattacharyya, Shuvra S. AB - We have numerically explored the feasibility and the mechanism of population transfer to the excited E 1Σg electronic state of Li2 from the v = 0 level of the ground electronic state X 1Σg using the A 1Σu state as an intermediate. In this system, the use of transform limited pulses with a frequency difference greater than the maximum Rabi frequency does not produce population transfer when all possible radiative couplings are taken into account. We have employed two synchronous pulses far detuned from the allowed transition frequencies, mainly with the lower frequency pulse positively chirped, and both pulses coupling the successive pair of states, X-A and A-E. The adiabaticity of the process has been investigated by a generalized Floquet calculation in the basis of 12 field dressed molecular states, and the results have been compared with those obtained from the full solution of time dependent Schrödinger equation. The conventional representation of the process in terms of three (or four) adiabatic potentials is not valid. It has been found that for cases of almost complete population transfer in full calculations with the conservation of the vibrational quantum number, adiabatic passage is attained with the 12 state Floquet model but not with the six state model. The agreement between the full calculations and the 12 state Floquet calculations is generally good when the transfer is adiabatic. Another characteristic feature of this work is the gaining of control over the vibrational state preparation in the final electronic state by careful tuning of the laser parameters as well as the chirp rate sign. This causes time dependent changes in the adiabatic potentials and nonadiabatic transfers can be made to occur between them. VL - 133 SN - 00219606 UR - http://jcp.aip.org/resource/1/jcpsa6/v133/i16/p164313_s1 CP - 16 ER - TY - JOUR T1 - Signal Processing on Platforms with Multiple Cores: Part 2-Applications and Design [From the Guest Editors] JF - IEEE Signal Processing Magazine Y1 - 2010 A1 - Chen,Y. A1 - Chakrabarti,C. A1 - Bhattacharyya, Shuvra S. A1 - Bougard, B. KW - Concurrent computing KW - Embedded system KW - Energy management KW - Graphics KW - Multicore processing KW - Portable computers KW - Resource management KW - Signal design KW - Signal processing KW - Signal processing algorithms AB - Platforms with multiple cores are now prevalent everywhere from desktops and graphics processors to laptops and embedded systems. By adding more parallel computational resources while managing power consumption, multicore platforms offer better programmability, performance, and power efficiency. Signal processing systems of tomorrow will be and must be implemented on platforms with multiple cores. Writing efficient parallel applications that utilize the computing capability of many processing cores require some effort. Signal processing algorithm designers must understand the nuances of a multicore computing engine; only then can the tremendous computing power that such platforms provide be harnessed efficiently. To give a thorough perspective of the area, we have organized two special issues on this topic. VL - 27 SN - 1053-5888 CP - 2 ER - TY - CHAP T1 - Signatures of Reputation T2 - Financial Cryptography and Data Security Y1 - 2010 A1 - Bethencourt, John A1 - Elaine Shi A1 - Song, Dawn ED - Sion, Radu KW - Computer science JA - Financial Cryptography and Data Security T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6052 SN - 978-3-642-14576-6 UR - http://www.springerlink.com/content/8484428n77226512/abstract/ ER - TY - CONF T1 - Simulating dynamic communication systems using the core functional dataflow model T2 - 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) Y1 - 2010 A1 - Sane, N. A1 - Chia-Jui Hsu A1 - Pino,J. L A1 - Bhattacharyya, Shuvra S. KW - adaptive modulation KW - Analytical models KW - Application software KW - Computational modeling KW - core functional dataflow model KW - Dataflow KW - dataflow modeling semantics KW - design tools KW - Digital signal processing KW - dynamic communication systems KW - functional specification KW - Hardware KW - modeling and simulation KW - Power system modeling KW - Predictive models KW - Processor scheduling KW - Production KW - Signal processing KW - software tools KW - wireless communication AB - The latest communication technologies invariably consist of modules with dynamic behavior. There exists a number of design tools for communication system design with their foundation in dataflow modeling semantics. These tools must not only support the functional specification of dynamic communication modules and subsystems but also provide accurate estimation of resource requirements for efficient simulation and implementation. We explore this trade-off - between flexible specification of dynamic behavior and accurate estimation of resource requirements - using a representative application employing an adaptive modulation scheme. We propose an approach for precise modeling of such applications based on a recently-introduced form of dynamic dataflow called core functional dataflow. From our proposed modeling approach, we show how parameterized looped schedules can be generated and analyzed to simulate applications with low run-time overhead as well as guaranteed bounded memory execution. We demonstrate our approach using the Advanced Design System from Agilent Technologies, Inc., which is a commercial tool for design and simulation of communication systems. JA - 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) ER - TY - JOUR T1 - On Stability of Magnetization Dynamics in Nanoparticles JF - Magnetics, IEEE Transactions on Y1 - 2010 A1 - Mayergoyz, Issak D A1 - Serpico,C. A1 - Bertotti,G. KW - (electron);magnetic KW - DYNAMICS KW - ellipsoidal KW - field;magnetization KW - inequality;exchange KW - INTERACTIONS KW - magnetization KW - nanoparticles;spatially KW - nonuniform KW - oscillations;spin-wave KW - particles;magnetisation;nanoparticles;spin KW - perturbations;exchange KW - perturbations;spatially KW - Poincare KW - stability;small KW - uniform KW - waves; AB - It is rigorously demonstrated that spatially uniform magnetization oscillations in sufficiently small ellipsoidal nanoparticles can be unconditionally stable with respect to spatially nonuniform perturbations. The proof reveals the dominant stabilizing effect of exchange field which is mathematically manifested through the Poincare inequality. VL - 46 SN - 0018-9464 CP - 6 M3 - 10.1109/TMAG.2009.2039119 ER - TY - JOUR T1 - Stochastic simulations with graphics hardware: Characterization of accuracy and performance JF - Journal of Computing and Information Science in Engineering Y1 - 2010 A1 - Balijepalli,A. A1 - LeBrun,T. W. A1 - Gupta,S.K. VL - 10 ER - TY - JOUR T1 - Structural Assembly of Molecular Complexes Based on Residual Dipolar Couplings JF - J. Am. Chem. Soc. Y1 - 2010 A1 - Berlin,Konstantin A1 - O’Leary,Dianne P. A1 - Fushman, David AB - We present and evaluate a rigid-body molecular docking method, called PATIDOCK, that relies solely on the three-dimensional structure of the individual components and the experimentally derived residual dipolar couplings (RDCs) for the complex. We show that, given an accurate ab initio predictor of the alignment tensor from a protein structure, it is possible to accurately assemble a protein?protein complex by utilizing the RDCs? sensitivity to molecular shape to guide the docking. The proposed docking method is robust against experimental errors in the RDCs and computationally efficient. We analyze the accuracy and efficiency of this method using experimental or synthetic RDC data for several proteins, as well as synthetic data for a large variety of protein?protein complexes. We also test our method on two protein systems for which the structure of the complex and steric-alignment data are available (Lys48-linked diubiquitin and a complex of ubiquitin and a ubiquitin-associated domain) and analyze the effect of flexible unstructured tails on the outcome of docking. The results demonstrate that it is fundamentally possible to assemble a protein?protein complex solely on the basis of experimental RDC data and the prediction of the alignment tensor from 3D structures. Thus, despite the purely angular nature of RDCs, they can be converted into intermolecular distance/translational constraints. Additionally, we show a method for combining RDCs with other experimental data, such as ambiguous constraints from interface mapping, to further improve structure characterization of protein complexes.We present and evaluate a rigid-body molecular docking method, called PATIDOCK, that relies solely on the three-dimensional structure of the individual components and the experimentally derived residual dipolar couplings (RDCs) for the complex. We show that, given an accurate ab initio predictor of the alignment tensor from a protein structure, it is possible to accurately assemble a protein?protein complex by utilizing the RDCs? sensitivity to molecular shape to guide the docking. The proposed docking method is robust against experimental errors in the RDCs and computationally efficient. We analyze the accuracy and efficiency of this method using experimental or synthetic RDC data for several proteins, as well as synthetic data for a large variety of protein?protein complexes. We also test our method on two protein systems for which the structure of the complex and steric-alignment data are available (Lys48-linked diubiquitin and a complex of ubiquitin and a ubiquitin-associated domain) and analyze the effect of flexible unstructured tails on the outcome of docking. The results demonstrate that it is fundamentally possible to assemble a protein?protein complex solely on the basis of experimental RDC data and the prediction of the alignment tensor from 3D structures. Thus, despite the purely angular nature of RDCs, they can be converted into intermolecular distance/translational constraints. Additionally, we show a method for combining RDCs with other experimental data, such as ambiguous constraints from interface mapping, to further improve structure characterization of protein complexes. VL - 132 SN - 0002-7863 UR - http://dx.doi.org/10.1021/ja100447p CP - 26 M3 - 10.1021/ja100447p ER - TY - JOUR T1 - SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware JF - SIGCOMM Comput. Commun. Rev. Y1 - 2010 A1 - Anwer,Muhammad Bilal A1 - Motiwala,Murtaza A1 - Bin Tariq,Mukarram A1 - Feamster, Nick KW - netfpga KW - network virtualization AB - We present SwitchBlade, a platform for rapidly deploying custom protocols on programmable hardware. SwitchBlade uses a pipeline-based design that allows individual hardware modules to be enabled or disabled on the fly, integrates software exception handling, and provides support for forwarding based on custom header fields. SwitchBlade's ease of programmability and wire-speed performance enables rapid prototyping of custom data-plane functions that can be directly deployed in a production network. SwitchBlade integrates common packet-processing functions as hardware modules, enabling different protocols to use these functions without having to resynthesize hardware. SwitchBlade's customizable forwarding engine supports both longest-prefix matching in the packet header and exact matching on a hash value. SwitchBlade's software exceptions can be invoked based on either packet or flow-based rules and updated quickly at runtime, thus making it easy to integrate more flexible forwarding function into the pipeline. SwitchBlade also allows multiple custom data planes to operate in parallel on the same physical hardware, while providing complete isolation for protocols running in parallel. We implemented SwitchBlade using NetFPGA board, but SwitchBlade can be implemented with any FPGA. To demonstrate SwitchBlade's flexibility, we use SwitchBlade to implement and evaluate a variety of custom network protocols: we present instances of IPv4, IPv6, Path Splicing, and an OpenFlow switch, all running in parallel while forwarding packets at line rate. VL - 40 SN - 0146-4833 UR - http://doi.acm.org/10.1145/1851275.1851206 CP - 4 M3 - 10.1145/1851275.1851206 ER - TY - JOUR T1 - Syntactic Topic Models JF - arXiv:1002.4665v1 Y1 - 2010 A1 - Jordan Boyd-Graber A1 - Blei,David M. KW - Computer Science - Artificial Intelligence KW - Computer Science - Computation and Language KW - Mathematics - Statistics Theory AB - The syntactic topic model (STM) is a Bayesian nonparametric model of language that discovers latent distributions of words (topics) that are both semantically and syntactically coherent. The STM models dependency parsed corpora where sentences are grouped into documents. It assumes that each word is drawn from a latent topic chosen by combining document-level features and the local syntactic context. Each document has a distribution over latent topics, as in topic models, which provides the semantic consistency. Each element in the dependency parse tree also has a distribution over the topics of its children, as in latent-state syntax models, which provides the syntactic consistency. These distributions are convolved so that the topic of each word is likely under both its document and syntactic context. We derive a fast posterior inference algorithm based on variational methods. We report qualitative and quantitative studies on both synthetic data and hand-parsed documents. We show that the STM is a more predictive model of language than current models based only on syntax or only on topics. UR - http://arxiv.org/abs/1002.4665 ER - TY - CONF T1 - Toque: designing a cooking-based programming language for and with children T2 - Proceedings of the 28th international conference on Human factors in computing systems Y1 - 2010 A1 - Tarkan,S. A1 - Sazawal,V. A1 - Druin, Allison A1 - Golub,E. A1 - Bonsignore,E. M A1 - Walsh,G. A1 - Atrash,Z. JA - Proceedings of the 28th international conference on Human factors in computing systems ER - TY - CONF T1 - Tracking via object reflectance using a hyperspectral video camera T2 - 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) Y1 - 2010 A1 - Nguyen,Hien Van A1 - Banerjee, A. A1 - Chellapa, Rama KW - Computer vision KW - electronic design KW - hyperspectral datacubes KW - hyperspectral image analysis KW - Hyperspectral imaging KW - Hyperspectral sensors KW - hyperspectral video camera KW - Image motion analysis KW - Image sensors KW - lighting KW - Motion estimation KW - motion prediction KW - Object detection KW - object reflectance tracking KW - random projection KW - Reflectivity KW - robust methods KW - Robustness KW - sensor design KW - spectral detection KW - Surveillance KW - tracking KW - Video surveillance AB - Recent advances in electronics and sensor design have enabled the development of a hyperspectral video camera that can capture hyperspectral datacubes at near video rates. The sensor offers the potential for novel and robust methods for surveillance by combining methods from computer vision and hyperspectral image analysis. Here, we focus on the problem of tracking objects through challenging conditions, such as rapid illumination and pose changes, occlusions, and in the presence of confusers. A new framework that incorporates radiative transfer theory to estimate object reflectance and the mean shift algorithm to simultaneously track the object based on its reflectance spectra is proposed. The combination of spectral detection and motion prediction enables the tracker to be robust against abrupt motions, and facilitate fast convergence of the mean shift tracker. In addition, the system achieves good computational efficiency by using random projection to reduce spectral dimension. The tracker has been evaluated on real hyperspectral video data. JA - 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) PB - IEEE SN - 978-1-4244-7029-7 M3 - 10.1109/CVPRW.2010.5543780 ER - TY - JOUR T1 - Utilizing Hierarchical Multiprocessing for Medical Image Registration JF - IEEE Signal Processing Magazine Y1 - 2010 A1 - Plishker,W. A1 - Dandekar,O. A1 - Bhattacharyya, Shuvra S. A1 - Shekhar,R. KW - Acceleration KW - application parallelism KW - Biomedical imaging KW - domain-specific taxonomy KW - GPU acceleration KW - gradient descent approach KW - Graphics processing unit KW - hierarchical multiprocessing KW - image registration KW - Magnetic resonance imaging KW - Medical diagnostic imaging KW - medical image processing KW - medical image registration KW - multicore platform set KW - Multicore processing KW - PARALLEL PROCESSING KW - parallel programming KW - Robustness KW - Signal processing algorithms KW - Ultrasonic imaging AB - This work discusses an approach to utilize hierarchical multiprocessing in the context of medical image registration. By first organizing application parallelism into a domain-specific taxonomy, an algorithm is structured to target a set of multicore platforms.The approach on a cluster of graphics processing units (GPUs) requiring the use of two parallel programming environments to achieve fast execution times is demonstrated.There is negligible loss in accuracy for rigid registration when employing GPU acceleration, but it does adversely effect our nonrigid registration implementation due to our usage of a gradient descent approach. VL - 27 SN - 1053-5888 CP - 2 ER - TY - CONF T1 - VizWiz: nearly real-time answers to visual questions T2 - Proceedings of the 23nd annual ACM symposium on User interface software and technology Y1 - 2010 A1 - Bigham,Jeffrey P. A1 - Jayant,Chandrika A1 - Ji,Hanjie A1 - Little,Greg A1 - Miller,Andrew A1 - Miller,Robert C. A1 - Miller,Robin A1 - Tatarowicz,Aubrey A1 - White,Brandyn A1 - White,Samual A1 - Tom Yeh KW - blind users KW - non-visual interfaces KW - real-time human computation AB - The lack of access to visual information like text labels, icons, and colors can cause frustration and decrease independence for blind people. Current access technology uses automatic approaches to address some problems in this space, but the technology is error-prone, limited in scope, and quite expensive. In this paper, we introduce VizWiz, a talking application for mobile phones that offers a new alternative to answering visual questions in nearly real-time - asking multiple people on the web. To support answering questions quickly, we introduce a general approach for intelligently recruiting human workers in advance called quikTurkit so that workers are available when new questions arrive. A field deployment with 11 blind participants illustrates that blind people can effectively use VizWiz to cheaply answer questions in their everyday lives, highlighting issues that automatic approaches will need to address to be useful. Finally, we illustrate the potential of using VizWiz as part of the participatory design of advanced tools by using it to build and evaluate VizWiz::LocateIt, an interactive mobile tool that helps blind people solve general visual search problems. JA - Proceedings of the 23nd annual ACM symposium on User interface software and technology T3 - UIST '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0271-5 UR - http://doi.acm.org/10.1145/1866029.1866080 M3 - 10.1145/1866029.1866080 ER - TY - CONF T1 - VizWiz::LocateIt - enabling blind people to locate objects in their environment T2 - Computer Vision and Pattern Recognition Workshops (CVPRW), 2010 IEEE Computer Society Conference on Y1 - 2010 A1 - Bigham,Jeffrey P. A1 - Jayant,Chandrika A1 - Miller,Andrew A1 - White,Brandyn A1 - Tom Yeh AB - Blind people face a number of challenges when interacting with their environments because so much information is encoded visually. Text is pervasively used to label objects, colors carry special significance, and items can easily become lost in surroundings that cannot be quickly scanned. Many tools seek to help blind people solve these problems by enabling them to query for additional information, such as color or text shown on the object. In this paper we argue that many useful problems may be better solved by directly modeling them as search problems, and present a solution called VizWiz::LocateIt that directly supports this type of interaction. VizWiz::LocateIt enables blind people to take a picture and ask for assistance in finding a specific object. The request is first forwarded to remote workers who outline the object, enabling efficient and accurate automatic computer vision to guide users interactively from their existing cellphones. A two-stage algorithm is presented that uses this information to guide users to the appropriate object interactively from their phone. JA - Computer Vision and Pattern Recognition Workshops (CVPRW), 2010 IEEE Computer Society Conference on PB - IEEE SN - 978-1-4244-7029-7 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5543821 M3 - 10.1109/CVPRW.2010.5543821 ER - TY - JOUR T1 - When is it better not to look ahead? JF - Artificial Intelligence Y1 - 2010 A1 - Nau, Dana S. A1 - Luštrek,Mitja A1 - Parker,Austin A1 - Bratko,Ivan A1 - Gams,Matjaž KW - Game-tree search KW - Lookahead pathology KW - minimax AB - In situations where one needs to make a sequence of decisions, it is often believed that looking ahead will help produce better decisions. However, it was shown 30 years ago that there are “pathological” situations in which looking ahead is counterproductive. Two long-standing open questions are (a) what combinations of factors have the biggest influence on whether lookahead pathology occurs, and (b) whether it occurs in real-world decision-making.This paper includes simulation results for several synthetic game-tree models, and experimental results for three well-known board games: two chess endgames, kalah (with some modifications to facilitate experimentation), and the 8-puzzle. The simulations show the interplay between lookahead pathology and several factors that affect it; and the experiments confirm the trends predicted by the simulation models. The experiments also show that lookahead pathology is more common than has been thought: all three games contain situations where it occurs. VL - 174 SN - 0004-3702 UR - http://www.sciencedirect.com/science/article/pii/S0004370210001402 CP - 16–17 M3 - 10.1016/j.artint.2010.08.002 ER - TY - CONF T1 - Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home T2 - SIGCHI '10 Y1 - 2010 A1 - Marshini Chetty A1 - Banks, Richard A1 - Harper, Richard A1 - Regan, Tim A1 - Sellen, Abigail A1 - Gkantsidis, Christos A1 - Karagiannis, Thomas A1 - Key, Peter KW - bandwidth monitoring KW - home broadband KW - home networks AB - As more technologies enter the home, householders are burdened with the task of digital housekeeping-managing and sharing digital resources like bandwidth. In response to this, we created and evaluated a domestic tool for bandwidth management called Home Watcher. Our field trial showed that when resource contention amongst different household members is made visible, people's understanding of bandwidth changes and household politics are revealed. In this paper, we describe the consequences of showing real time resource usage in a home, and how this varies depending on the social make up of the household. JA - SIGCHI '10 T3 - CHI '10 PB - ACM SN - 978-1-60558-929-9 UR - http://doi.acm.org/10.1145/1753326.1753423 ER - TY - CONF T1 - Workshop on experimental evaluation of software and systems in computer science (Evaluate 2010) T2 - Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion Y1 - 2010 A1 - Blackburn,Steven M. A1 - Diwan,Amer A1 - Hauswirth,Matthias A1 - Memon, Atif M. A1 - Sweeney,Peter F. KW - Evaluation KW - METHODOLOGY AB - We call ourselves 'computer scientists', but are we scientists? If we are scientists, then we must practice the scientific method. This includes a solid experimental evaluation. In our experience, our experimental methodology is ad hoc at best, and nonexistent at worst. This workshop brings together experts from different areas of computer science to discuss, explore, and attempt to identify the principles of sound experimental evaluation JA - Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion T3 - SPLASH '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0240-1 UR - http://doi.acm.org/10.1145/1869542.1869618 M3 - 10.1145/1869542.1869618 ER - TY - JOUR T1 - Young Proteins Experience More Variable Selection Pressures Than Old Proteins JF - Genome ResearchGenome Res. Y1 - 2010 A1 - Vishnoi,Anchal A1 - Kryazhimskiy,Sergey A1 - Bazykin,Georgii A A1 - Hannenhalli, Sridhar A1 - Plotkin,Joshua B. AB - It is well known that young proteins tend to experience weaker purifying selection and evolve more quickly than old proteins. Here, we show that, in addition, young proteins tend to experience more variable selection pressures over time than old proteins. We demonstrate this pattern in three independent taxonomic groups: yeast, Drosophila, and mammals. The increased variability of selection pressures on young proteins is highly significant even after controlling for the fact that young proteins are typically shorter and experience weaker purifying selection than old proteins. The majority of our results are consistent with the hypothesis that the function of a young gene tends to change over time more readily than that of an old gene. At the same time, our results may be caused in part by young genes that serve constant functions over time, but nevertheless appear to evolve under changing selection pressures due to depletion of adaptive mutations. In either case, our results imply that the evolution of a protein-coding sequence is partly determined by its age and origin, and not only by the phenotypic properties of the encoded protein. We discuss, via specific examples, the consequences of these findings for understanding of the sources of evolutionary novelty. VL - 20 SN - 1088-9051, 1549-5469 UR - http://genome.cshlp.org/content/20/11/1574 CP - 11 M3 - 10.1101/gr.109595.110 ER - TY - JOUR T1 - Age progression in human faces: A survey JF - Journal of Visual Languages and Computing Y1 - 2009 A1 - Ramanathan,N. A1 - Chellapa, Rama A1 - Biswas,S. AB - Facial aging, a new dimension that has recently beenadded to the problem of face recognition, poses interesting theo- retical and practical challenges to the research community. The problem which originally generated interest in the psychophysics and human perception community, has recently found enhanced interest in the computer vision community. How do humans perceive age ? What constitutes an age-invariant signature that can be derived from faces ? How compactly can the facial growth event be described ? How does facial aging impact recognition performance ? In this paper, we give a thorough analysis on the problem of facial aging and further provide a complete account of the many interesting studies that have been performed on this topic from different fields. We offer a comparative analysis of various approaches that have been proposed for problems such as age estimation, appearance prediction, face verification etc. and offer insights into future research on this topic. VL - 15 ER - TY - JOUR T1 - Algorithms for extraction of nanowire lengths and positions from optical section microscopy image sequence JF - Journal of Computing and Information Science in Engineering Y1 - 2009 A1 - Peng,T. A1 - Balijepalli,A. A1 - Gupta,S.K. A1 - LeBrun,T. W. VL - 9 ER - TY - CONF T1 - All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit Errors T2 - INFOCOM 2009, IEEE Y1 - 2009 A1 - Han,Bo A1 - Ji,Lusheng A1 - Lee,Seungjoon A1 - Bhattacharjee, Bobby A1 - Miller,R.R. KW - 802.11 KW - bit KW - coding;error KW - coding;forward KW - coding;subframe KW - combining KW - Communication KW - correction;frame KW - correction;wireless KW - error KW - errors;channel KW - errors;wireless KW - IEEE KW - LAN; KW - LAN;channel KW - mechanisms;network KW - patterns;transmission KW - statistics;forward AB - In IEEE 802.11 Wireless LAN (WLAN) systems, techniques such as acknowledgement, retransmission, and transmission rate adaptation, are frame-level mechanisms designed for combating transmission errors. Recently sub-frame level mechanisms such as frame combining have been proposed by the research community. In this paper, we present results obtained from our bit error study for identifying sub-frame error patterns because we believe that identifiable bit error patterns can potentially introduce new opportunities in channel coding, network coding, forward error correction (FEC), and frame combining mechanisms. We have constructed a number of IEEE 802.11 wireless LAN testbeds and conducted extensive experiments to study the characteristics of bit errors and their location distribution. Conventional wisdom dictates that bit error probability is the result of channel condition and ought to follow corresponding distribution. However our measurement results identify three repeatable bit error patterns that are not induced by channel conditions. We have verified that such error patterns are present in WLAN transmissions in different physical environments and across different wireless LAN hardware platforms. We also discuss our current hypotheses for the reasons behind these bit error probability patterns and how identifying these patterns may help improving WLAN transmission robustness. JA - INFOCOM 2009, IEEE M3 - 10.1109/INFCOM.2009.5062078 ER - TY - JOUR T1 - Analytical Description of Quasi-Random Magnetization Relaxation to Equilibrium JF - Magnetics, IEEE Transactions on Y1 - 2009 A1 - Serpico,C. A1 - d'Aquino,M. A1 - Bertotti,G. A1 - Mayergoyz, Issak D KW - approach;quasirandom KW - crossing;uniformly KW - dynamical KW - dynamics;averaging KW - Hamiltonian KW - magnetization KW - magnetized KW - particle;magnetic KW - particles;magnetic KW - perturbed KW - relaxation;magnetisation;probability; KW - relaxation;separatrix KW - system;Landau-Lifshitz KW - technique;damping;probabilistic AB - The Landau-Lifshitz (LL) dynamics of a uniformly magnetized particle is considered. The LL equation is written in the form of a Hamiltonian perturbed dynamical system. By using suitable averaging technique, the equation for the slow dynamics of the energy is derived. The averaging technique breaks up in the case of separatrix crossing. It is shown that, in the limit of small damping, the separatrix crossing can be described by using a probabilistic approach. VL - 45 SN - 0018-9464 CP - 11 M3 - 10.1109/TMAG.2009.2031067 ER - TY - CONF T1 - Analyzing (social media) networks with NodeXL T2 - Proceedings of the fourth international conference on Communities and technologies Y1 - 2009 A1 - Smith,Marc A. A1 - Shneiderman, Ben A1 - Milic-Frayling,Natasa A1 - Mendes Rodrigues,Eduarda A1 - Barash,Vladimir A1 - Dunne,Cody A1 - Capone,Tony A1 - Perer,Adam A1 - Gleave,Eric KW - excel KW - network analysis KW - social media KW - social network KW - spreadsheet KW - Visualization AB - We present NodeXL, an extendible toolkit for network overview, discovery and exploration implemented as an add-in to the Microsoft Excel 2007 spreadsheet software. We demonstrate NodeXL data analysis and visualization features with a social media data sample drawn from an enterprise intranet social network. A sequence of NodeXL operations from data import to computation of network statistics and refinement of network visualization through sorting, filtering, and clustering functions is described. These operations reveal sociologically relevant differences in the patterns of interconnection among employee participants in the social media space. The tool and method can be broadly applied. JA - Proceedings of the fourth international conference on Communities and technologies T3 - C&T '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-713-4 UR - http://doi.acm.org/10.1145/1556460.1556497 M3 - 10.1145/1556460.1556497 ER - TY - CONF T1 - Analyzing the process of installing rogue software Y1 - 2009 A1 - Berthier,R. A1 - Arjona,J. A1 - Michel Cukier KW - Linux KW - Linux target computers KW - malicious actions KW - rogue software installation KW - security of data AB - This practical experience report presents the results of an experiment aimed at understanding the sequence of malicious actions following a remote compromise. The type of rogue software installed during attacks was used to classify and understand sequences of malicious actions. For this experiment, we used four Linux target computers running SSH with simple passwords. During the eight-month data collection period, we recorded a total of 1,171 attack sessions. In these sessions, attackers typed a total of 20,335 commands that we categorized into 24 specific actions. These actions were analyzed based on the type of rogue software installed by attackers. M3 - 10.1109/DSN.2009.5270293 ER - TY - JOUR T1 - An architectural level design methodology for smart camera applications JF - International Journal of Embedded Systems Y1 - 2009 A1 - Saha,S. A1 - Kianzad,V. A1 - Schlessman,J. A1 - Aggarwal,G. A1 - Bhattacharyya, Shuvra S. A1 - Chellapa, Rama A1 - Wolf,W. AB - Today's embedded computing applications are characterised by increased functionality, and hence increased design complexity and processing requirements. The resulting design spaces are vast and designers are typically able to evaluate only small subsets of solutions due to lack of efficient design tools. In this paper, we propose an architectural level design methodology that provides a means for a comprehensive design space exploration for smart camera applications and enable designers to select higher quality solutions and provides substantial savings on the overall cost of the system. We present efficient, accurate and intuitive models for performance estimation and validate them with experiments. VL - 4 CP - 1 ER - TY - JOUR T1 - An assessment of systems and software engineering scholars and institutions (2002–2006) JF - Journal of Systems and Software Y1 - 2009 A1 - Wong,W. Eric A1 - Tse,T.H. A1 - Glass,Robert L. A1 - Basili, Victor R. A1 - Chen,T.Y. KW - Research publications KW - Systems and software engineering KW - Top institutions KW - Top scholars AB - This paper summarizes a survey of publications in the field of systems and software engineering from 2002 to 2006. The survey is an ongoing, annual event that identifies the top 15 scholars and institutions over a 5-year period. The rankings are calculated based on the number of papers published in TSE, TOSEM, JSS, SPE, EMSE, IST, and Software. The top-ranked institution is Korea Advanced Institute of Science and Technology, Korea, and the top-ranked scholar is Magne Jørgensen of Simula Research Laboratory, Norway. VL - 82 SN - 0164-1212 UR - http://www.sciencedirect.com/science/article/pii/S0164121209001265 CP - 8 M3 - 10.1016/j.jss.2009.06.018 ER - TY - CONF T1 - Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators T2 - Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility Y1 - 2009 A1 - Nikolova,Sonya A1 - Jordan Boyd-Graber A1 - Fellbaum,Christiane A1 - Cook,Perry KW - adaptive tools KW - aphasia KW - assistive communication KW - semantic networks KW - visual vocabularies AB - The difficulties of navigating vocabulary in an assistive communication device are exacerbated for individuals with lexical access disorders like those due to aphasia. We present the design and implementation of a vocabulary network based on WordNet, a resource that attempts to model human semantic memory, that enables users to find words easily. To correct for the sparsity of links among words, we augment WordNet with additional connections derived from human judgments of semantic similarity collected in an online experiment. We evaluate the resulting system, the visual vocabulary for aphasia (ViVA), and describe its potential to adapt to a user's profile and enable faster search and improved navigation. JA - Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility T3 - Assets '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-558-1 UR - http://doi.acm.org/10.1145/1639642.1639673 M3 - 10.1145/1639642.1639673 ER - TY - CONF T1 - Channel Access Throttling for Improving WLAN QoS T2 - Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON '09. 6th Annual IEEE Communications Society Conference on Y1 - 2009 A1 - Han,Bo A1 - Ji,Lusheng A1 - Lee,Seungjoon A1 - Miller,R.R. A1 - Bhattacharjee, Bobby KW - 802.11 KW - access KW - area KW - call KW - capacity;data KW - capacity;quality KW - capacity;WLAN KW - categories;transmission KW - channel KW - device KW - distributed KW - driver;quality KW - facto KW - frames;de KW - IEEE KW - LAN; KW - LAN;VoIP KW - local KW - mechanism;member KW - method;enhanced KW - multimedia KW - network;wireless KW - networks;channel KW - of KW - parameters;channel KW - priority;channel KW - QoS KW - QoS;channel KW - service;telecommunication KW - service;traffic KW - standards;telecommunication KW - stations;open-source KW - throttling;channel KW - traffic;wireless KW - treatments;wireless KW - wireless AB - The de facto QoS channel access method for the IEEE 802.11 Wireless LANs is the Enhanced Distributed Channel Access (EDCA) mechanism, which differentiates transmission treatments for data frames belonging to different traffic categories with four different levels of channel access priority. In this paper, we propose extending EDCA with Channel Access Throttling (CAT) for more flexible and efficient QoS support. By assigning different member stations different channel access parameters, CAT differentiates channel access priorities not between traffic categories but between member stations. Then by dynamically changing the channel access parameters of each member station based on a pre-computed schedule, CAT enables EDCA WLANs the benefits of scheduled access QoS. We also present evaluation results of CAT obtained from both simulations and experiments conducted using off-the-shelf WLAN hardware and open-source device driver. Our results show that CAT can proportionally partition channel capacity, significantly improve performance of multimedia applications, effectively achieve performance protection for admitted flows, and increase per cell VoIP call capacity by up to 41%. JA - Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON '09. 6th Annual IEEE Communications Society Conference on M3 - 10.1109/SAHCN.2009.5168915 ER - TY - CONF T1 - Channel Access Throttling for Overlapping BSS Management T2 - Communications, 2009. ICC '09. IEEE International Conference on Y1 - 2009 A1 - Han,Bo A1 - Ji,Lusheng A1 - Lee,Seungjoon A1 - Miller,R.R. A1 - Bhattacharjee, Bobby KW - access KW - access;cellular KW - allocation;channel KW - BSS KW - capacity;computer KW - capacity;proportional KW - cell;open-source KW - channel KW - channels; KW - co-channel KW - device KW - driver;overlapping KW - efficiency;high-priority KW - LAN;wireless KW - management;partition KW - management;wireless KW - medium KW - network KW - parameters;multiple KW - partitioning;radio KW - radio;channel KW - resources;wireless KW - throttling;channel KW - utilization KW - WLAN AB - Multiple co-channel WLAN BSSes (i.e., WLAN cells) overlapping in coverage are generally considered undesirable because members of the OBSSes compete for channel access, which typically increases the contention level of wireless medium access and reduces overall system performance. In this paper, we propose to use channel access throttling (CAT) for managing Wireless LAN radio resources for overlapping BSSes (OBSSes). CAT provides an access point (AP) of each BSS with a mechanism to control channel access parameters of its member stations on the fly. By coordinating the CAT operations of the OBSS APs, we can enable privileged channel access to an individual BSS at a particular time, for example, by assigning high priority access parameters to member stations associated with the BSS. By controlling how much each BSS may be given the privileged channel access, we can also achieve a proportional partitioning of channel capacity among OBSSes. We present evaluation results obtained from both simulations and experiments using testbed built with commercial off-the-shelf (COTS) WLAN hardware and open-source device driver. Our results show that with CAT, not only can we proportionally partition channel capacity among the OBSSes, but also improve channel utilization efficiency and increase overall capacity. JA - Communications, 2009. ICC '09. IEEE International Conference on M3 - 10.1109/ICC.2009.5198815 ER - TY - JOUR T1 - Characterization and control of pin diameter during in-mold assembly of mesoscale revolute joints JF - North American Manufacturing Research Institute Y1 - 2009 A1 - Ananthanarayanan,A. A1 - Gupta,S.K. A1 - Bruck,H. A. AB - Macro-scale revolute joints can be formed byfirst molding the hole and then molding the pin inside the hole. As the pin shrinks during the solidification process, it moves away from the hole and provides the clearance for the joint to function. The value of clearance in the macro- scale joint can be controlled by carefully selecting the process parameters and the material for the pin. However, in order for this strategy to work at the mesoscale, it requires the use of very thin cores to form sub-millimeter holes. Such thin cores are very difficult to make, are easily damaged during the molding process, and very difficult to retract from the hole. Our previous work has shown that making the pins first and then creating holes on the top of pins leads to successful mesoscale joints. This strategy is counter intuitive based on our experiences at the macro-scale. At the macroscale, as the hole shrinks on top of the pin, the joint is jammed. So a fundamental question is why this counter-intuitive strategy works at the mesoscale. In this paper we show that at the mesoscale, the joint jamming is prevented because of the deformation of the pin under the compressive loading during the second stage molding. We also describe features in the mold that can control the pin deformation and hence control the joint parameters. We present experimental data and computational models to show how mesoscale revolute joints can be formed. VL - 37 UR - http://web.mit.edu/arvinda/www/NAMRI_2009_draft.pdf ER - TY - CONF T1 - Characterizing VLAN-induced sharing in a campus network T2 - Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference Y1 - 2009 A1 - Bin Tariq,Mukarram A1 - Mansy,Ahmed A1 - Feamster, Nick A1 - Ammar,Mostafa KW - network diagnosis KW - network virtualization KW - VLAN KW - vlan-induced dependency AB - Many enterprise, campus, and data-center networks have complex layer-2 virtual LANs ("VLANs") below the IP layer. The interaction between layer-2 and IP topologies in these VLANs introduces hidden dependencies between IP level network and the physical infrastructure that has implications for network management tasks such as planning for capacity or reliability, and for fault diagnosis. This paper characterizes the extent and effect of these dependencies in a large campus network. We first present the design and implementation of EtherTrace, a tool that we make publicly available, which infers the layer-2 topology using data passively collected from Ethernet switches. Using this tool, we infer the layer-2 topology for a large campus network and compare it with the IP topology. We find that almost 70% of layer-2 edges are shared by 10 or more IP edges, and a single layer-2 edge may be shared by as many as 34 different IP edges. This sharing of layer-2 edges and switches among IP paths commonly results from trunking multiple VLANs to the same access router, or from colocation of academic departments that share layer-2 infrastructure, but have logically separate IP subnet and routers. We examine how this sharing affects the accuracy and specificity of fault diagnosis. For example, applying network tomography to the IP topology to diagnose failures caused by layer-2 devices results in only 54% accuracy, compared to 100% accuracy when our tomography algorithm takes input across layers. JA - Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference T3 - IMC '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-771-4 UR - http://doi.acm.org/10.1145/1644893.1644907 M3 - 10.1145/1644893.1644907 ER - TY - CHAP T1 - Collective classification for text classification T2 - Text Mining: Classification, Clustering, and ApplicationsText Mining: Classification, Clustering, and Applications Y1 - 2009 A1 - Namata,G. A1 - Sen,P. A1 - Bilgic,M. A1 - Getoor, Lise JA - Text Mining: Classification, Clustering, and ApplicationsText Mining: Classification, Clustering, and Applications ER - TY - CHAP T1 - Collective relational clustering T2 - Constrained Clustering: Advances in Algorithms, Theory, and ApplicationsConstrained Clustering: Advances in Algorithms, Theory, and Applications Y1 - 2009 A1 - Bhattacharya,I. A1 - Getoor, Lise JA - Constrained Clustering: Advances in Algorithms, Theory, and ApplicationsConstrained Clustering: Advances in Algorithms, Theory, and Applications ER - TY - JOUR T1 - Computational methods for modeling facial aging: A survey JF - Journal of Visual Languages & Computing Y1 - 2009 A1 - Ramanathan,Narayanan A1 - Chellapa, Rama A1 - Biswas,Soma KW - age estimation KW - Age progression KW - Craniofacial growth KW - face recognition AB - Facial aging, a new dimension that has recently been added to the problem of face recognition, poses interesting theoretical and practical challenges to the research community. The problem which originally generated interest in the psychophysics and human perception community has recently found enhanced interest in the computer vision community. How do humans perceive age? What constitutes an age-invariant signature that can be derived from faces? How compactly can the facial growth event be described? How does facial aging impact recognition performance? In this paper, we give a thorough analysis on the problem of facial aging and further provide a complete account of the many interesting studies that have been performed on this topic from different fields. We offer a comparative analysis of various approaches that have been proposed for problems such as age estimation, appearance prediction, face verification, etc. and offer insights into future research on this topic. VL - 20 SN - 1045-926X UR - http://www.sciencedirect.com/science/article/pii/S1045926X09000032 CP - 3 M3 - 10.1016/j.jvlc.2009.01.011 ER - TY - CONF T1 - Connections between the lines: augmenting social networks with text T2 - Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining Y1 - 2009 A1 - Chang,Jonathan A1 - Jordan Boyd-Graber A1 - Blei,David M. KW - Graphical models KW - social network learning KW - statistical topic models AB - Network data is ubiquitous, encoding collections of relationships between entities such as people, places, genes, or corporations. While many resources for networks of interesting entities are emerging, most of these can only annotate connections in a limited fashion. Although relationships between entities are rich, it is impractical to manually devise complete characterizations of these relationships for every pair of entities on large, real-world corpora. In this paper we present a novel probabilistic topic model to analyze text corpora and infer descriptions of its entities and of relationships between those entities. We develop variational methods for performing approximate inference on our model and demonstrate that our model can be practically deployed on large corpora such as Wikipedia. We show qualitatively and quantitatively that our model can construct and annotate graphs of relationships and make useful predictions. JA - Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining T3 - KDD '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-495-9 UR - http://doi.acm.org/10.1145/1557019.1557044 M3 - 10.1145/1557019.1557044 ER - TY - CONF T1 - CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast T2 - INFOCOM 2009, IEEE Y1 - 2009 A1 - Gopalakrishnan,V. A1 - Bhattacharjee, Bobby A1 - Ramakrishnan,K.K. A1 - Jana,R. A1 - Srivastava,D. KW - assists;multicast;peer-to-peer KW - communication;peer-to-peer KW - computing;video KW - CPM;cooperative KW - demand; KW - on KW - parameters;video-on-demand;multicast KW - peer KW - schemes;synthetic AB - We present CPM, a unified approach that exploits server multicast, assisted by peer downloads, to provide efficient video-on-demand (VoD) in a service provider environment. We describe our architecture and show how CPM is designed to dynamically adapt to a wide range of situations including highly different peer-upload bandwidths, content popularity, user request arrival patterns, video library size, and subscriber population. We demonstrate the effectiveness of CPM using simulations (based on an actual implementation codebase) across the range of situations described above and show that CPM does significantly better than traditional unicast, different forms of multicast, as well as peer-to-peer schemes. Along with synthetic parameters, we augment our experiments using data from a deployed VoD service to evaluate the performance of CPM. JA - INFOCOM 2009, IEEE M3 - 10.1109/INFCOM.2009.5061910 ER - TY - JOUR T1 - CTCF binding site classes exhibit distinct evolutionary, genomic, epigenomic and transcriptomic features JF - Genome Biology Y1 - 2009 A1 - Essien,Kobby A1 - Vigneau,Sebastien A1 - Apreleva,Sofia A1 - Singh,Larry N. A1 - Bartolomei,Marisa S. A1 - Hannenhalli, Sridhar AB - CTCF (CCCTC-binding factor) is an evolutionarily conserved zinc finger protein involved in diverse functions ranging from negative regulation of MYC, to chromatin insulation of the beta-globin gene cluster, to imprinting of the Igf2 locus. The 11 zinc fingers of CTCF are known to differentially contribute to the CTCF-DNA interaction at different binding sites. It is possible that the differences in CTCF-DNA conformation at different binding sites underlie CTCF's functional diversity. If so, the CTCF binding sites may belong to distinct classes, each compatible with a specific functional role. VL - 10 SN - 1465-6906 UR - http://genomebiology.com/2009/10/11/R131 CP - 11 M3 - 10.1186/gb-2009-10-11-r131 ER - TY - CONF T1 - A Decoupled and Prioritized Stochastic Dynamic Programming Approach for Automated Transport of Multiple Particles Using Optical Tweezers Y1 - 2009 A1 - Banerjee,Ashis Gopal A1 - Losert,Wolfgang A1 - Gupta, Satyandra K. AB - Automated transport of multiple particles using optical tweezers requires the use of motion planning to move them simultaneously while avoiding collisions amongst themselves and with randomly moving obstacles. This paper develops a decoupled and prioritized stochastic dynamic programming based motion planning framework by sequentially applying a partially observable Markov decision process algorithm on every particle that needs to be transported. An iterative version of a maximum bipartite graph matching algorithm is used to assign given goal locations to such particles. The algorithm for individual particle transport is validated using silica beads in a holographic tweezer set-up. Once the individual plans are computed, a three-step method consisting of clustering, classification, and branch and bound optimization is employed to determine the final collision-free paths. Simulation results in the form of sample trajectories and performance characterization plots are presented to illustrate the usefulness of the developed approach. PB - ASME CY - San Diego, California, USA VL - 6 SN - 978-0-7918-4903-3 UR - http://link.aip.org/link/ASMECP/v2009/i49033/p785/s1&Agg=doi M3 - 10.1115/DETC2009-87113 ER - TY - CONF T1 - The design of ViVA: a mixed-initiative visual vocabulary for aphasia T2 - Proceedings of the 27th international conference extended abstracts on Human factors in computing systems Y1 - 2009 A1 - Nikolova,Sonya A1 - Jordan Boyd-Graber A1 - Cook,Perry R. KW - adaptive and adaptable interfaces KW - assistive communication tools KW - multi-modal interfaces AB - In this paper, we present the design of ViVA, a visual vocabulary for aphasia. Aphasia is an acquired language disorder that causes variability of impairments affecting individual's ability to speak, comprehend, read and write. Existing communication aids lack flexibility and adequate customization functionality failing to address this variability and to satisfy individual user needs. We tackle these shortcomings by incorporating adaptive and adaptable capabilities in ViVA which is designed to assist communication for users suffering from aphasia. The visual vocabulary for aphasia implements a novel approach that organizes the words in the vocabulary according to user preferences, word usage and certain semantic measures, thus continuously tailoring the tool to the user's profile. JA - Proceedings of the 27th international conference extended abstracts on Human factors in computing systems T3 - CHI EA '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-247-4 UR - http://doi.acm.org/10.1145/1520340.1520610 M3 - 10.1145/1520340.1520610 ER - TY - CONF T1 - Designing the reading experience for scanned multi-lingual picture books on mobile phones T2 - Proceedings of the 9th ACM/IEEE-CS joint conference on Digital libraries Y1 - 2009 A1 - Bederson, Benjamin B. A1 - Quinn,A. A1 - Druin, Allison JA - Proceedings of the 9th ACM/IEEE-CS joint conference on Digital libraries ER - TY - CONF T1 - Detecting network neutrality violations with causal inference T2 - Proceedings of the 5th international conference on Emerging networking experiments and technologies Y1 - 2009 A1 - Bin Tariq,Mukarram A1 - Motiwala,Murtaza A1 - Feamster, Nick A1 - Ammar,Mostafa KW - causal inference KW - network neutrality AB - We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting discrimination are typically specific to an application or to a particular discrimination mechanism and rely on active measurement tests. Unfortunately, ISPs can change discrimination policies and mechanisms, and they can evade these tests by giving probe traffic higher priority. NANO detects ISP discrimination by passively collecting performance data from clients. To distinguish discrimination from other causes of degradation (e.g., overload, misconfiguration, failure), NANO establishes a causal relationship between an ISP and observed performance by adjusting for confounding factors. NANO agents deployed at participating clients across the Internet collect performance data for selected services and report this information to centralized servers, which analyze the measurements to establish causal relationship between an ISP and performance degradations. We have implemented NANO and deployed clients in a controlled environment on Emulab. We run a combination of controlled experiments on Emulab and wide-area experiments on PlanetLab that show that NANO can determine the extent and criteria for discrimination for a variety of discrimination policies and applications. JA - Proceedings of the 5th international conference on Emerging networking experiments and technologies T3 - CoNEXT '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-636-6 UR - http://doi.acm.org/10.1145/1658939.1658972 M3 - 10.1145/1658939.1658972 ER - TY - JOUR T1 - Distinguishing knowledge vs social capital in social media with roles and context JF - Proceedings of the ICWSM Y1 - 2009 A1 - Barash,V. A1 - Smith,M. A1 - Getoor, Lise A1 - Welser,H. T AB - Social media communities (e.g. Wikipedia, Flickr, Live Q&A) give rise to distinct types of content, foremost among which are relational content (discussion, chat) and factual content (answering questions, problem-solving). Both users and researchers are increasingly interested in developing strategies that can rapidly distinguish these types of content. While many text-based and structural strategies are possible, we extend two bodies of research that show how social context, and the social roles of answerers can predict content type. We test our framework on a dataset of manually labeled contributions to Microsoft's Live Q&A and find that it reliably extracts factual and relational messages from the data. VL - 9 ER - TY - JOUR T1 - Do you know the way to SNA?: A process model for analyzing and visualizing social media data JF - University of Maryland Tech Report: HCIL-2009-17 Y1 - 2009 A1 - Hansen,D. L A1 - Rotman,D. A1 - Bonsignore,E. A1 - Milic-Frayling,N. A1 - Rodrigues,E.M. A1 - Smith,M. A1 - Shneiderman, Ben AB - Traces of activity left by social media users can shed lighton individual behavior, social relationships, and community efficacy. Tools and processes to analyze social traces are essential for enabling practitioners to study and nurture meaningful and sustainable social interaction. Yet such tools and processes remain in their infancy. We conducted a study of 15 graduate students who were learning to apply Social Network Analysis (SNA) to data from online communities. Based on close observations of their emergent practices, we derived the Network Analysis and Visualization (NAV) process model and identified stages where intervention from peers, experts, and an SNA tool were most useful. We show how the NAV model informs the design of SNA tools and services, education practices, and support for social media practitioners. ER - TY - JOUR T1 - Electromagnetic Analysis of Plasmon-Resonance Based All-Optical Magnetic Recording JF - Magnetics, IEEE Transactions on Y1 - 2009 A1 - Mayergoyz, Issak D A1 - Zhang,Zhenyu A1 - McAvoy,P. A1 - Bowen,D. A1 - Krafft,C. KW - Ag;boundary KW - all-optical KW - analysis;magnetization KW - and KW - based KW - effects;nanoparticles;silver;surface KW - eigenfunctions;magnetic KW - equations;circular KW - equations;eigenvalues KW - integral KW - intensity;cylindrical KW - light KW - magnetic KW - modes;plasmon-resonance KW - nanoholes;circularly KW - nanoshells;eigenvalue KW - nanostructures;boundary KW - plasmon KW - polarized KW - problem;electromagnetic KW - recording;magnetisation KW - recording;silver;uniaxial KW - resonance; KW - reversal;magneto-optical KW - reversals;nanoparticle;plasmon AB - The electromagnetic analysis of plasmon-resonance-based all-optical magnetic recording is performed. This analysis is based on the treatment of plasmon resonances as an eigenvalue problem for specific boundary integral equations. The plasmon modes which can be excited in circular nanoholes and cylindrical nanoshells by circularly polarized light are theoretically and numerically studied. Dramatic enhancement of circularly polarized light intensity on the nanoscale through the excitation of specific plasmon modes in uniaxial nanostructures is demonstrated. VL - 45 SN - 0018-9464 CP - 3 M3 - 10.1109/TMAG.2009.2012762 ER - TY - JOUR T1 - The emergence of zoning policy games in exurban jurisdictions: Informing collective action theory JF - Land Use Policy Y1 - 2009 A1 - Zellner,Moira L. A1 - Page,Scott E. A1 - Rand, William A1 - Brown,Daniel G. A1 - Robinson,Derek T. A1 - Nassauer,Joan A1 - Low,Bobbi KW - Agent-based modeling KW - game theory KW - Land-use policy KW - Local government cooperation KW - Scale interaction AB - Theoretical urban policy literature predicts the likelihood of free riding in the management of common goods such as forested open space; such outcome is often characterized as a Prisoner's Dilemma game. Numerous cases exist in which neighboring jurisdictions cooperate to maintain public goods, challenging the expected results, yet theoretical explanations of these cases have not been fully developed. In this paper, we use an agent-based model to explore how underlying micro-behaviors affect the payoffs obtained by two neighboring municipalities in a hypothetical exurban area. Payoffs are measured in terms of regional forested space and of local tax revenue at the end of the agent-based simulations; the municipalities affect these payoffs through their choice of residential zoning policies and the spillover effect between the neighboring jurisdictions. Zoning restrictions influence the conversion of farmland into residential subdivisions of different types, and consequently the location of heterogeneous residential households in the region. Developers and residents respond to the changing landscape characteristics, thus establishing a feedback between early and future land-use patterns. The structure of the simulated payoffs is analyzed using standard game theory. Our analysis shows that a variety of games, in addition to Prisoner's Dilemma, can emerge between the neighboring jurisdictions. Other games encourage coordination or subsidization, offering some explanations for the unexpected observations. The game realized in any given context depends on the initial characteristics of the landscape, the value given to the objectives each township seeks to maximize, and the income distribution of the population. VL - 26 SN - 0264-8377 UR - http://www.sciencedirect.com/science/article/pii/S0264837708000604 CP - 2 M3 - 10.1016/j.landusepol.2008.04.004 ER - TY - CONF T1 - Enhanced force measurement techniques to extend optical trapping towards nanoscale manipulation Y1 - 2009 A1 - Balijepalli,A. A1 - LeBrun,T. W. A1 - Gorman,J. J. A1 - Gupta,S.K. KW - Brownian motion KW - extend optical trapping KW - Fokker-Planck equation KW - force measurement KW - inflection point KW - linear trap stiffness KW - nanoparticle KW - nanoparticles KW - nanoscale manipulation KW - nanotechnology KW - optical trapping force KW - power series expansion KW - radiation pressure KW - random thermal motion AB - We have developed a new force measurement technique based on the random thermal motion of a nanoparticle in an optical trap. We demonstrate this method, in one-dimension, through numerical simulations and laboratory experiments. We show that computer simulations successfully recover the profile of the optical trapping force, beyond the inflection point of the trapping potential for a range of particle sizes. We show, through laboratory experiments, that this technique is effective in recovering higher order terms, in a power series expansion of the trapping force, beyond the widely reported linear trap stiffness. We also show that the first order (stiffness) term in our series expansion is consistent with values reported in the literature. ER - TY - JOUR T1 - An evaluation of connection characteristics for separating network attacks JF - International Journal of Security and Networks Y1 - 2009 A1 - Berthier,Robin A1 - Michel Cukier AB - The goal of this paper is to evaluate the efficiency of connection characteristics to separate different attack families that target a single TCP port. Identifying the most relevant characteristics might allow statistically separating attack families without systematically using forensics. This study is based on a dataset collected over 117 days using a test-bed of two high interaction honeypots. The results indicated that to separate unsuccessful from successful attacks in malicious traffic: the number of bytes is a relevant characteristic; time-based characteristics are poor characteristics; using combinations of characteristics does not improve the efficiency of separating attacks. VL - 4 UR - http://dx.doi.org/10.1504/IJSN.2009.02343 CP - 1 M3 - 10.1504/IJSN.2009.02343 ER - TY - JOUR T1 - Extreme polymorphism in a vaccine antigen and risk of clinical malaria: implications for vaccine development JF - Sci Transl Med Y1 - 2009 A1 - Takala,S. L A1 - Coulibaly,D. A1 - Thera,M. A A1 - Batchelor,A. H A1 - Cummings, Michael P. A1 - Escalante,A. A A1 - Ouattara,A. A1 - Traoré,K. A1 - Niangaly,A. A1 - Djimdé,A. A A1 - Doumbo,OK A1 - Plowe,CV AB - Vaccines directed against the blood stages of Plasmodium falciparum malaria are intended to prevent the parasite from invading and replicating within host cells. No blood-stage malaria vaccine has shown clinical efficacy in humans. Most malaria vaccine antigens are parasite surface proteins that have evolved extensive genetic diversity, and this diversity could allow malaria parasites to escape vaccine-induced immunity. We examined the extent and within-host dynamics of genetic diversity in the blood-stage malaria vaccine antigen apical membrane antigen-1 in a longitudinal study in Mali. Two hundred and fourteen unique apical membrane antigen-1 haplotypes were identified among 506 human infections, and amino acid changes near a putative invasion machinery binding site were strongly associated with the development of clinical symptoms, suggesting that these residues may be important to consider in designing polyvalent apical membrane antigen-1 vaccines and in assessing vaccine efficacy in field trials. This extreme diversity may pose a serious obstacle to an effective polyvalent recombinant subunit apical membrane antigen-1 vaccine. VL - 1 CP - 2 M3 - 10.1126/scitranslmed.3000257 ER - TY - CHAP T1 - Face Recognition from Video T2 - The Essential Guide to Video Processing (Second Edition)The Essential Guide to Video Processing (Second Edition) Y1 - 2009 A1 - Zhou,Shaohua Kevin A1 - Chellapa, Rama A1 - Aggarwal,Gaurav ED - Al Bovik JA - The Essential Guide to Video Processing (Second Edition)The Essential Guide to Video Processing (Second Edition) PB - Academic Press CY - Boston SN - 978-0-12-374456-2 UR - http://www.sciencedirect.com/science/article/pii/B9780123744562000232 ER - TY - CONF T1 - Fighting Spam with the NeighborhoodWatch DHT T2 - IEEE INFOCOM 2009 Y1 - 2009 A1 - Bender,A. A1 - Sherwood,R. A1 - Monner,D. A1 - Goergen,N. A1 - Spring, Neil A1 - Bhattacharjee, Bobby KW - Communications Society KW - computer crime KW - cryptography KW - Databases KW - IP addresses KW - IP networks KW - on-line trusted authority KW - Peer to peer computing KW - peer-to-peer computing KW - peer-to-peer distributed hash table KW - Postal services KW - Relays KW - Resilience KW - Routing KW - Security KW - table size routing KW - Unsolicited electronic mail AB - In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based blacklists (DNSBLs) of IP addresses of mail relays that forward spam. Implementing a blacklist on a DHT improves resilience to DoS attacks and secures message delivery, when compared to DNSBLs. However, due to the sensitive nature of the blacklist, storing the data in a peer-to-peer DHT would invite attackers to infiltrate the system. Typical DHTs can withstand fail-stop failures, but malicious nodes may provide incorrect routing information, refuse to return published items, or simply ignore certain queries. The neighborhoodwatch DHT is resilient to malicious nodes and maintains the O(logiV) bounds on routing table size and expected lookup time. NeighborhoodWatch depends on two assumptions in order to make these guarantees: (1) the existence of an on-line trusted authority that periodically contacts and issues signed certificates to each node, and (2) for every sequence of k + 1 consecutive nodes in the ID space, at least one is alive and non-malicious. We show how NeighborhoodWatch maintains many of its security properties even when the second assumption is violated. Honest nodes in NeighborhoodWatch can detect malicious behavior and expel the responsible nodes from the DHT. JA - IEEE INFOCOM 2009 PB - IEEE SN - 978-1-4244-3512-8 M3 - 10.1109/INFCOM.2009.5062095 ER - TY - CHAP T1 - Finding Biologically Accurate Clusterings in Hierarchical Tree Decompositions Using the Variation of Information T2 - Research in Computational Molecular Biology Y1 - 2009 A1 - Navlakha,Saket A1 - White,James A1 - Nagarajan,Niranjan A1 - Pop, Mihai A1 - Kingsford, Carl ED - Batzoglou,Serafim AB - Hierarchical clustering is a popular method for grouping together similar elements based on a distance measure between them. In many cases, annotations for some elements are known beforehand, which can aid the clustering process. We present a novel approach for decomposing a hierarchical clustering into the clusters that optimally match a set of known annotations, as measured by the variation of information metric. Our approach is general and does not require the user to enter the number of clusters desired. We apply it to two biological domains: finding protein complexes within protein interaction networks and identifying species within metagenomic DNA samples. For these two applications, we test the quality of our clusters by using them to predict complex and species membership, respectively. We find that our approach generally outperforms the commonly used heuristic methods. JA - Research in Computational Molecular Biology T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 5541 SN - 978-3-642-02007-0 UR - http://dx.doi.org/10.1007/978-3-642-02008-7_29 ER - TY - CONF T1 - First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL T2 - International Conference on Computational Science and Engineering, 2009. CSE '09 Y1 - 2009 A1 - Bonsignore,E. M A1 - Dunne,C. A1 - Rotman,D. A1 - Smith,M. A1 - Capone,T. A1 - Hansen,D. L A1 - Shneiderman, Ben KW - Computer science KW - computer science education KW - data visualisation KW - Data visualization KW - Educational institutions KW - graph drawing KW - graph layout algorithm KW - Information services KW - Information Visualization KW - Internet KW - Libraries KW - Microsoft Excel open-source template KW - MILC KW - multi-dimensional in-depth long-term case studies KW - Netviz Nirvana KW - NodeXL KW - Open source software KW - Programming profession KW - SNA KW - social network analysis KW - Social network services KW - social networking (online) KW - spreadsheet programs KW - structural relationship KW - teaching KW - visual analytics KW - visualization tool KW - Web sites AB - Social Network Analysis (SNA) has evolved as a popular, standard method for modeling meaningful, often hidden structural relationships in communities. Existing SNA tools often involve extensive pre-processing or intensive programming skills that can challenge practitioners and students alike. NodeXL, an open-source template for Microsoft Excel, integrates a library of common network metrics and graph layout algorithms within the familiar spreadsheet format, offering a potentially low-barrier-to-entry framework for teaching and learning SNA. We present the preliminary findings of 2 user studies of 21 graduate students who engaged in SNA using NodeXL. The majority of students, while information professionals, had little technical background or experience with SNA techniques. Six of the participants had more technical backgrounds and were chosen specifically for their experience with graph drawing and information visualization. Our primary objectives were (1) to evaluate NodeXL as an SNA tool for a broad base of users and (2) to explore methods for teaching SNA. Our complementary dual case-study format demonstrates the usability of NodeXL for a diverse set of users, and significantly, the power of a tightly integrated metrics/visualization tool to spark insight and facilitate sense-making for students of SNA. JA - International Conference on Computational Science and Engineering, 2009. CSE '09 PB - IEEE VL - 4 SN - 978-1-4244-5334-4 M3 - 10.1109/CSE.2009.120 ER - TY - JOUR T1 - From New Zealand to Mongolia: Co-designing and deploying a digital library for the world's children JF - Special issue of Children, Youth and Environments: Children in Technological Environments: Interaction, Development, and Design Y1 - 2009 A1 - Druin, Allison A1 - Bederson, Benjamin B. A1 - Rose,A. A1 - Weeks,A. ER - TY - JOUR T1 - Generating simplified trapping probability models from simulation of optical tweezers system JF - Journal of Computing and Information Science in Engineering Y1 - 2009 A1 - Banerjee,A. G. A1 - Balijepalli,A. A1 - Gupta,S.K. A1 - LeBrun,T. W. VL - 9 ER - TY - JOUR T1 - Genome assortment, not serogroup, defines Vibrio cholerae pandemic strains JF - Nature Y1 - 2009 A1 - Brettin,Thomas S[Los Alamos National Laboratory A1 - Bruce,David C[Los Alamos National Laboratory A1 - Challacombe,Jean F[Los Alamos National Laboratory A1 - Detter,John C[Los Alamos National Laboratory A1 - Han,Cliff S[Los Alamos National Laboratory A1 - Munik,A. C[Los Alamos National Laboratory A1 - Chertkov,Olga[Los Alamos National Laboratory A1 - Meincke,Linda[Los Alamos National Laboratory A1 - Saunders,Elizabeth[Los Alamos National Laboratory A1 - Choi,Seon Y[SEOUL NATL UNIV A1 - Haley,Bradd J[U MARYLAND A1 - Taviani,Elisa[U MARYLAND A1 - Jeon,Yoon-Seong[INTL VACCINE INST SEOUL A1 - Kim,Dong Wook[INTL VACCINE INST SEOUL A1 - Lee,Jae-Hak[SEOUL NATL UNIV A1 - Walters,Ronald A[PNNL A1 - Hug,Anwar[NATL INST CHOLERIC ENTERIC DIS A1 - Rita R Colwell KW - 59; CHOLERA; GENES; GENETICS; GENOTYPE; ISLANDS; ORIGIN; PHENOTYPE; PUBLIC HEALTH; RECOMBINATION; STRAINS; TOXINS AB - Vibrio cholerae, the causative agent of cholera, is a bacterium autochthonous to the aquatic environment, and a serious public health threat. V. cholerae serogroup O1 is responsible for the previous two cholera pandemics, in which classical and El Tor biotypes were dominant in the 6th and the current 7th pandemics, respectively. Cholera researchers continually face newly emerging and re-emerging pathogenic clones carrying combinations of new serogroups as well as of phenotypic and genotypic properties. These genotype and phenotype changes have hampered control of the disease. Here we compare the complete genome sequences of 23 strains of V. cholerae isolated from a variety of sources and geographical locations over the past 98 years in an effort to elucidate the evolutionary mechanisms governing genetic diversity and genesis of new pathogenic clones. The genome-based phylogeny revealed 12 distinct V. cholerae phyletic lineages, of which one, designated the V. cholerae core genome (CG), comprises both O1 classical and EI Tor biotypes. All 7th pandemic clones share nearly identical gene content, i.e., the same genome backbone. The transition from 6th to 7th pandemic strains is defined here as a 'shift' between pathogenic clones belonging to the same O1 serogroup, but from significantly different phyletic lineages within the CG clade. In contrast, transition among clones during the present 7th pandemic period can be characterized as a 'drift' between clones, differentiated mainly by varying composition of laterally transferred genomic islands, resulting in emergence of variants, exemplified by V.cholerae serogroup O139 and V.cholerae O1 El Tor hybrid clones that produce cholera toxin of classical biotype. Based on the comprehensive comparative genomics presented in this study it is concluded that V. cholerae undergoes extensive genetic recombination via lateral gene transfer, and, therefore, genome assortment, not serogroup, should be used to define pathogenic V. cholerae clones. UR - http://www.osti.gov/energycitations/servlets/purl/962365-icnke9/ ER - TY - JOUR T1 - Hat guessing games JF - SIAM review Y1 - 2009 A1 - Butler,S. A1 - Hajiaghayi, Mohammad T. A1 - Kleinberg,R. D A1 - Leighton,T. VL - 51 CP - 2 ER - TY - CONF T1 - Identifying close friends on the internet T2 - Proc. of workshop on Hot Topics in Networks (HotNets-VIII) Y1 - 2009 A1 - Baden,R. A1 - Spring, Neil A1 - Bhattacharjee, Bobby AB - Online Social Networks (OSNs) encourage users to createan online presence that reflects their offline identity. OSNs create the illusion that these online accounts correspond to the correct offline person, but in reality the OSN lacks the re- sources to detect impersonation. We propose that OSN users identify each other based on interaction and experience. We believe that impersonation can be thwarted by users who possess exclusive shared knowledge, secret informa- tion shared only between a pair of OSN friends. We describe existing protocols that use shared secrets to exchange public keys without revealing those secrets to attackers. We present results from a user study on Facebook to show that users do share exclusive knowledge with their Facebook friends and attackers are rarely able to guess that knowledge. Finally, we show that friend identification can be extended using a web of trust built on the OSN friend graph. JA - Proc. of workshop on Hot Topics in Networks (HotNets-VIII) ER - TY - CONF T1 - Improved approximation algorithms for prize-collecting Steiner tree and TSP T2 - 2009 50th Annual IEEE Symposium on Foundations of Computer Science Y1 - 2009 A1 - Archer,A. A1 - Bateni,M. H A1 - Hajiaghayi, Mohammad T. A1 - Karloff,H. JA - 2009 50th Annual IEEE Symposium on Foundations of Computer Science ER - TY - JOUR T1 - Improvement and analysis of computational methods for prediction of residual dipolar couplings JF - Journal of Magnetic Resonance Y1 - 2009 A1 - Berlin,Konstantin A1 - O’Leary,Dianne P. A1 - Fushman, David KW - Ab initio prediction KW - Alignment tensor KW - PALES KW - Residual dipolar coupling AB - We describe a new, computationally efficient method for computing the molecular alignment tensor based on the molecular shape. The increase in speed is achieved by re-expressing the problem as one of numerical integration, rather than a simple uniform sampling (as in the PALES method), and by using a convex hull rather than a detailed representation of the surface of a molecule. This method is applicable to bicelles, PEG/hexanol, and other alignment media that can be modeled by steric restrictions introduced by a planar barrier. This method is used to further explore and compare various representations of protein shape by an equivalent ellipsoid. We also examine the accuracy of the alignment tensor and residual dipolar couplings (RDC) prediction using various ab initio methods. We separately quantify the inaccuracy in RDC prediction caused by the inaccuracy in the orientation and in the magnitude of the alignment tensor, concluding that orientation accuracy is much more important in accurate prediction of RDCs. VL - 201 SN - 1090-7807 UR - http://www.sciencedirect.com/science/article/pii/S1090780709002304 CP - 1 M3 - 10.1016/j.jmr.2009.07.028 ER - TY - CONF T1 - Improving search effectiveness in the legal e-discovery process using relevance feedback T2 - Proceedings of the global E-Discovery/E-Disclosure workshop on electronically stored information in discovery at the 12th international conference on artificial intelligence and law (ICAIL09 DESI Workshop). DESI Press, Barcelona Y1 - 2009 A1 - Zhao,F.C. A1 - Oard, Douglas A1 - Baron,J.R. JA - Proceedings of the global E-Discovery/E-Disclosure workshop on electronically stored information in discovery at the 12th international conference on artificial intelligence and law (ICAIL09 DESI Workshop). DESI Press, Barcelona ER - TY - CHAP T1 - In Situ Characterization and Modeling of Strains near Embedded Electronic Components During Processing and Break-in for Multifunctional Polymer Structures T2 - Advances in Mathematical Modeling and Experimental Methods for Materials and Structures Y1 - 2009 A1 - Gershon,Alan L. A1 - Gyger,Lawrence S. A1 - Bruck,Hugh A. A1 - Gupta, Satyandra K. ED - Gilat,Rivka ED - Banks-Sills,Leslie ED - Gladwell,G. M. L. KW - engineering AB - Emerging molding concepts, such as in-mold assembly, are enabling electronic structures to be directly embedded in thermoplastic polymers to provide integrated packaging for better protection and a more multifunctional structure in “in-mold assembly processes”. During the molding process, stress can develop at the interface of the polymer and embedded electronic component due to shrinkage of the polymer that precipitates fracture or fatigue during the life cycle of the product. Additionally, the interaction between a mold and the polymer melt is altered in a multi-stage molding process where a polymer for superior impact protection can be molded over another polymer that is more compatible with the embedded electronic component. Currently, we do not fully understand the impact of various parameters governing the in-mold assembly process on the residual strains that develop in polymers around embedded electronic components in order to develop process models. Therefore, in this chapter experiments are presented that are designed and executed to measure the strains involved and the manner in which they develop. An in situ open mold experiment is employed using the full-field deformation technique of Digital Image Correlation (DIC) to characterize the displacement and corresponding strain fields that evolve near embedded electronic elements as the polymer shrinks from the molten to the solid state during processes and during break-in of the electronic component. It was determined that the use of multi-stage molding may reduce the residual stresses in addition to providing superior impact protection. However, there was a higher concentration of strain near the polymer-component interface during break-due to lower thermal conductivity. Experimental data was consistent with a thermomechanical model up until the point of failure. JA - Advances in Mathematical Modeling and Experimental Methods for Materials and Structures T3 - Solid Mechanics and Its Applications PB - Springer Netherlands VL - 168 SN - 978-90-481-3467-0 UR - http://www.springerlink.com/content/lh52x2475g7x00k7/abstract/ ER - TY - CONF T1 - An Initial Characterization of Industrial Graphical User Interface Systems T2 - Software Testing Verification and Validation, 2009. ICST '09. International Conference on Y1 - 2009 A1 - Brooks,P.A. A1 - Robinson,B.P. A1 - Memon, Atif M. KW - Graphical user interfaces KW - GUI-based software systems KW - industrial graphical user interface systems KW - model-based GUI testing techniques KW - program testing KW - software metrics KW - source code change metrics AB - To date we have developed and applied numerous model-based GUI testing techniques; however, we are unable to provide definitive improvement schemes to real-world GUI test planners, as our data was derived from open source applications, small compared to industrial systems. This paper presents a study of three industrial GUI-based software systems developed at ABB, including data on classified defects detected during late-phase testing and customer usage, test suites, and source code change metrics. The results show that (1) 50% of the defects found through the GUI are categorized as data access and handling, control flow and sequencing, correctness, and processing defects, (2) system crashes exposed defects 12-19% of the time, and (3) GUI and non-GUI components are constructed differently, in terms of source code metrics. JA - Software Testing Verification and Validation, 2009. ICST '09. International Conference on M3 - 10.1109/ICST.2009.11 ER - TY - JOUR T1 - The Ins and Outs of Home Networking: The Case for Useful and Usable Domestic Networking JF - ACM Trans. Comput.-Hum. Interact. Y1 - 2009 A1 - Grinter, Rebecca E. A1 - Edwards, W. Keith A1 - Marshini Chetty A1 - Poole, Erika S. A1 - Sung, Ja-Young A1 - Yang, Jeonghwa A1 - Crabtree, Andy A1 - Tolmie, Peter A1 - Rodden, Tom A1 - Greenhalgh, Chris A1 - Benford, Steve KW - home networking KW - Human computer interaction AB - Householders are increasingly adopting home networking as a solution to the demands created by the presence of multiple computers, devices, and the desire to access the Internet. However, current network solutions are derived from the world of work (and initially the military) and provide poor support for the needs of the home. We present the key findings to emerge from empirical studies of home networks in the UK and US. The studies reveal two key kinds of work that effective home networking relies upon: one, the technical work of setting up and maintaining the home network, and the other, the collaborative and socially organized work of the home which the network is embedded in and supports. The two are thoroughly intertwined and rely upon one another for their realization, yet neither is adequately supported by current networking technologies and applications. Explication of the “work to make the home network work” opens up the design space for the continued integration of the home network in domestic life and elaboration of future support. Key issues for development include the development of networking facilities that do not require advanced networking knowledge, that are flexible and support the local social order of the home and the evolution of its routines, and which ultimately make the home network visible and accountable to household members. VL - 16 SN - 1073-0516 UR - http://doi.acm.org/10.1145/1534903.1534905 CP - 2 ER - TY - JOUR T1 - Integrated product and process design for a flapping wing drive mechanism JF - Journal of Mechanical Design Y1 - 2009 A1 - Bejgerowski,W. A1 - Ananthanarayanan,A. A1 - Mueller,D. A1 - Gupta,S.K. VL - 131 ER - TY - CONF T1 - Interacting with eHealth: towards grand challenges for HCI T2 - Proceedings of the 27th international conference extended abstracts on Human factors in computing systems Y1 - 2009 A1 - André,P. A1 - White,R. A1 - Tan,D. A1 - Berners-Lee,T. A1 - Consolvo,S. A1 - Jacobs,R. A1 - Kohane,I. A1 - Le Dantec,C.A. A1 - Mamykina,L. A1 - Marsden,G. AB - While health records are increasingly stored electronically, we, as citizens, have little access to this data about ourselves. We are not used to thinking of these official records either as ours or as useful to us. We increasingly turn to the Web, however, to query any ache, pain or health goal we may have before consulting with health care professionals. Likewise, for proactive health care such as nutrition or fitness, or to find fellow-sufferers for post diagnosis support, we turn to online resources. There is a potential disconnect between points at which professional and lay eHealth data and resources intersect for preventative or proactive health care. Such gaps in information sharing may have direct impact on practices we decide to take up, the care we seek, or the support professionals offer. In this panel, we consider several places within proactive, preventative health care in particular HCI has a role towards enhancing health knowledge discovery and health support interaction. Our goal is to demonstrate how now is the time for eHealth to come to the forefront of the HCI research agenda. JA - Proceedings of the 27th international conference extended abstracts on Human factors in computing systems ER - TY - CHAP T1 - Interlingual annotation of multilingual text corpora and FrameNet T2 - Multilingual FrameNets in Computational LexicographyMultilingual FrameNets in Computational Lexicography Y1 - 2009 A1 - Farwell,David A1 - Dorr, Bonnie J A1 - Habash,Nizar A1 - Helmreich,Stephen A1 - Hovy,Eduard A1 - Green,Rebecca A1 - Levin,Lori A1 - Miller,Keith A1 - Mitamura,Teruko A1 - Rambow,Owen A1 - Reeder,Flo A1 - Siddharthan,Advaith ED - Bisang,Walter ED - Hock,Hans Henrich ED - Winter,Werner ED - Boas,Hans C. JA - Multilingual FrameNets in Computational LexicographyMultilingual FrameNets in Computational Lexicography PB - Mouton de Gruyter CY - Berlin, New York VL - 200 SN - 978-3-11-021296-9, 978-3-11-021297-6 UR - http://www.degruyter.com/view/books/9783110212976/9783110212976.4.287/9783110212976.4.287.xml ER - TY - CONF T1 - Introducing a test suite similarity metric for event sequence-based test cases T2 - Software Maintenance, 2009. ICSM 2009. IEEE International Conference on Y1 - 2009 A1 - Brooks,P.A. A1 - Memon, Atif M. KW - event driven software systems KW - event sequence-based test cases KW - open source systems KW - program testing KW - public domain software KW - software metrics KW - Software testing KW - test suite similarity metric AB - Most of today's event driven software (EDS) systems are tested using test cases that are carefully constructed as sequences of events; they test the execution of an event in the context of its preceding events. Because sizes of these test suites can be extremely large, researchers have developed techniques, such as reduction and minimization, to obtain test suites that are ldquosimilarrdquo to the original test suite, but smaller. Existing similarity metrics mostly use code coverage; they do not consider the contextual relationships between events. Consequently, reduction based on such metrics may eliminate desirable test cases. In this paper, we present a new parameterized metric, CONTeSSi(n) which uses the context of n preceding events in test cases to develop a new context-aware notion of test suite similarity for EDS. This metric is defined and evaluated by comparing four test suites for each of four open source applications. Our results show that CONT eSSi(n) is a better indicator of the similarity of EDS test suites than existing metrics. JA - Software Maintenance, 2009. ICSM 2009. IEEE International Conference on M3 - 10.1109/ICSM.2009.5306305 ER - TY - CONF T1 - It's Not Easy Being Green: Understanding Home Computer Power Management T2 - SIGCHI '09 Y1 - 2009 A1 - Marshini Chetty A1 - Brush, A.J. Bernheim A1 - Meyers, Brian R. A1 - Johns, Paul KW - home computer use KW - power management KW - Sustainability AB - Although domestic computer use is increasing, most efforts to reduce energy use through improved power management have focused on computers in the workplace. We studied 20 households to understand how people use power management strategies on their home computers. We saw computers in the home, particularly desktop computers, are left on much more than they are actively used suggesting opportunities for economic and energy savings. However, for most of our participants, the economic incentives were too minor to motivate them to turn off devices when not in use, especially given other frustrations such as long boot up times. We suggest research directions for home computer power management that could help users be more green without having to dramatically change their home computing habits. JA - SIGCHI '09 T3 - CHI '09 PB - ACM SN - 978-1-60558-246-7 UR - http://doi.acm.org/10.1145/1518701.1518860 ER - TY - JOUR T1 - Link-based active learning JF - NIPS Workshop on Analyzing Networks and Learning with Graphs Y1 - 2009 A1 - Bilgic,M. A1 - Getoor, Lise AB - Supervised and semi-supervised data mining techniques require labeled data.However, labeling examples is costly for many real-world applications. To ad- dress this problem, active learning techniques have been developed to guide the labeling process in an effort to minimize the amount of labeled data without sac- rificing much from the quality of the learned models. Yet, most of the active learning methods to date have remained relatively agnostic to the rich structure offered by network data, often ignoring the relationships between the nodes of a network. On the other hand, the relational learning community has shown that the relationships can be very informative for various prediction tasks. In this paper, we propose different ways of adapting existing active learning work to network data while utilizing links to select better examples to label. ER - TY - JOUR T1 - Locality bounds on hamiltonians for stabilizer codes JF - Quantum Info. Comput. Y1 - 2009 A1 - Bullock,Stephen S. A1 - O'Leary, Dianne P. AB - In this paper, we study the complexity of Hamiltonians whose groundstate is a stabilizer code. Weintroduce various notions of k-locality of a stabilizer code, inherited from the associated stabilizergroup. A choice of generators leads to a Hamiltonian with the code in its groundspace. We establishbounds on the locality of any other Hamiltonian whose groundspace contains such a code, whetheror not its Pauli tensor summands commute. Our results provide insight into the cost of creating anenergy gap for passive error correction and for adiabatic quantum computing. The results simplify inthe cases of XZ-split codes such as Calderbank-Shor-Steane stabilizer codes and topologically-orderedstabilizer codes arising from surface cellulations. VL - 9 SN - 1533-7146 UR - http://dl.acm.org/citation.cfm?id=2011791.2011800 CP - 5 ER - TY - JOUR T1 - Maturing Software Engineering Knowledge through Classifications: A Case Study on Unit Testing Techniques JF - Software Engineering, IEEE Transactions on Y1 - 2009 A1 - Vegas,S. A1 - Juristo,N. A1 - Basili, Victor R. KW - characteristic;project KW - characteristic;software KW - classification;matching KW - engineering KW - engineering; KW - knowledge;software KW - technique KW - techniques;program KW - Testing KW - testing;software KW - testing;unit AB - Classification makes a significant contribution to advancing knowledge in both science and engineering. It is a way of investigating the relationships between the objects to be classified and identifies gaps in knowledge. Classification in engineering also has a practical application; it supports object selection. They can help mature software engineering knowledge, as classifications constitute an organized structure of knowledge items. Till date, there have been few attempts at classifying in software engineering. In this research, we examine how useful classifications in software engineering are for advancing knowledge by trying to classify testing techniques. The paper presents a preliminary classification of a set of unit testing techniques. To obtain this classification, we enacted a generic process for developing useful software engineering classifications. The proposed classification has been proven useful for maturing knowledge about testing techniques, and therefore, SE, as it helps to: 1) provide a systematic description of the techniques, 2) understand testing techniques by studying the relationships among techniques (measured in terms of differences and similarities), 3) identify potentially useful techniques that do not yet exist by analyzing gaps in the classification, and 4) support practitioners in testing technique selection by matching technique characteristics to project characteristics. VL - 35 SN - 0098-5589 CP - 4 M3 - 10.1109/TSE.2009.13 ER - TY - JOUR T1 - MEASURING 1ST ORDER STRETCH WITH A SINGLE FILTER JF - Relation Y1 - 2009 A1 - Bitsakos,K. A1 - Domke, J. A1 - Fermüller, Cornelia A1 - Aloimonos, J. AB - We analytically develop a filter that is able to measurethe linear stretch of the transformation around a point, and present results of applying it to real signals. We show that this method is a real-time alternative solution for measuring local signal transformations. Experimentally, this method can accurately measure stretch, however, it is sensitive to shift. VL - 10 CP - 1.132 ER - TY - JOUR T1 - Measuring differential gene expression by short read sequencing: quantitative comparison to 2-channel gene expression microarrays JF - BMC Genomics Y1 - 2009 A1 - Bloom, Joshua S. A1 - Zia Khan A1 - Kruglyak, Leonid A1 - Singh, Mona A1 - Caudy, Amy A. KW - Animal Genetics and Genomics KW - Life Sciences, general KW - Microarrays KW - Microbial Genetics and Genomics KW - Plant Genetics & Genomics KW - proteomics AB - Background High-throughput cDNA synthesis and sequencing of poly(A)-enriched RNA is rapidly emerging as a technology competing to replace microarrays as a quantitative platform for measuring gene expression. Results Consequently, we compared full length cDNA sequencing to 2-channel gene expression microarrays in the context of measuring differential gene expression. Because of its comparable cost to a gene expression microarray, our study focused on the data obtainable from a single lane of an Illumina 1 G sequencer. We compared sequencing data to a highly replicated microarray experiment profiling two divergent strains of S. cerevisiae. Conclusion Using a large number of quantitative PCR (qPCR) assays, more than previous studies, we found that neither technology is decisively better at measuring differential gene expression. Further, we report sequencing results from a diploid hybrid of two strains of S. cerevisiae that indicate full length cDNA sequencing can discover heterozygosity and measure quantitative allele-specific expression simultaneously. VL - 10 SN - 1471-2164 UR - http://link.springer.com/article/10.1186/1471-2164-10-221 CP - 1 J1 - BMC Genomics ER - TY - JOUR T1 - Mesh-of-Trees and Alternative Interconnection Networks for Single-Chip Parallelism JF - Very Large Scale Integration (VLSI) Systems, IEEE Transactions on Y1 - 2009 A1 - Balkan,A.O. A1 - Gang Qu A1 - Vishkin, Uzi KW - 90 KW - cache;single KW - complexity;multiprocessor KW - delay;single-chip KW - first-level KW - high-throughput KW - interconnection KW - low-latency KW - network;memory KW - network;shared KW - networks;network-on-chip;parallel KW - nm;wire KW - Parallel KW - parallelism;size KW - processing; KW - processor;single-chip KW - switch KW - topologies;on-chip KW - units;mesh-of-trees;network AB - In single-chip parallel processors, it is crucial to implement a high-throughput low-latency interconnection network to connect the on-chip components, especially the processing units and the memory units. In this paper, we propose a new mesh of trees (MoT) implementation of the interconnection network and evaluate it relative to metrics such as wire complexity, total register count, single switch delay, maximum throughput, tradeoffs between throughput and latency, and post-layout performance. We show that on-chip interconnection networks can provide higher bandwidth between processors and shared first-level cache than previously considered possible, facilitating greater scalability of memory architectures that require that. MoT is also compared, both analytically and experimentally, to some other traditional network topologies, such as hypercube, butterfly, fat trees and butterfly fat trees. When we evaluate a 64-terminal MoT network at 90-nm technology, concrete results show that MoT provides higher throughput and lower latency especially when the input traffic (or the on-chip parallelism) is high, at comparable area. A recurring problem in networking and communication is that of achieving good sustained throughput in contrast to just high theoretical peak performance that does not materialize for typical work loads. Our quantitative results demonstrate a clear advantage of the proposed MoT network in the context of single-chip parallel processing. VL - 17 SN - 1063-8210 CP - 10 M3 - 10.1109/TVLSI.2008.2003999 ER - TY - JOUR T1 - Microbial oceanography in a sea of opportunity JF - Nature Y1 - 2009 A1 - Bowler,Chris A1 - Karl,David M. A1 - Rita R Colwell KW - Astronomy KW - astrophysics KW - Biochemistry KW - Bioinformatics KW - Biology KW - biotechnology KW - cancer KW - cell cycle KW - cell signalling KW - climate change KW - Computational Biology KW - development KW - developmental biology KW - DNA KW - drug discovery KW - earth science KW - ecology KW - environmental science KW - Evolution KW - evolutionary biology KW - functional genomics KW - Genetics KW - Genomics KW - geophysics KW - immunology KW - interdisciplinary science KW - life KW - marine biology KW - materials science KW - medical research KW - medicine KW - metabolomics KW - molecular biology KW - molecular interactions KW - nanotechnology KW - Nature KW - neurobiology KW - neuroscience KW - palaeobiology KW - pharmacology KW - Physics KW - proteomics KW - quantum physics KW - RNA KW - Science KW - science news KW - science policy KW - signal transduction KW - structural biology KW - systems biology KW - transcriptomics AB - Plankton use solar energy to drive the nutrient cycles that make the planet habitable for larger organisms. We can now explore the diversity and functions of plankton using genomics, revealing the gene repertoires associated with survival in the oceans. Such studies will help us to appreciate the sensitivity of ocean systems and of the ocean's response to climate change, improving the predictive power of climate models. VL - 459 SN - 0028-0836 UR - http://www.nature.com/nature/journal/v459/n7244/abs/nature08056.html CP - 7244 M3 - 10.1038/nature08056 ER - TY - JOUR T1 - Modeling and Testing of Ethernet Transformers JF - Magnetics, IEEE Transactions on Y1 - 2009 A1 - Bowen,D. A1 - Mayergoyz, Issak D A1 - Zhang,Zhenyu A1 - McAvoy,P. A1 - Krafft,C. A1 - Kroop,D. KW - area KW - capacitance;differential-mode KW - characteristic;local KW - Ethernet KW - identification;lumped KW - inductances;lumped KW - networks;transformers; KW - PARAMETERS KW - phenomena;transformers KW - signals;leakage KW - testing;resonance KW - transfer KW - transformers;cross-winding AB - In this paper, novel techniques for the testing and identification of lumped parameters of equivalent circuits for Ethernet transformers are presented. It is demonstrated experimentally and theoretically that resonance phenomena may occur in the loop formed by leakage inductances and cross-winding capacitance. This resonance may corrupt the pass band of the transformers transfer characteristic for differential-mode signals. VL - 45 SN - 0018-9464 CP - 10 M3 - 10.1109/TMAG.2009.2023918 ER - TY - JOUR T1 - Motifs and cis-regulatory modules mediating the expression of genes co-expressed in presynaptic neurons JF - Genome Biology Y1 - 2009 A1 - Liu,Rui A1 - Hannenhalli, Sridhar A1 - Bucan,Maja AB - Hundreds of proteins modulate neurotransmitter release and synaptic plasticity during neuronal development and in response to synaptic activity. The expression of genes in the pre- and post-synaptic neurons is under stringent spatio-temporal control, but the mechanism underlying the neuronal expression of these genes remains largely unknown. VL - 10 SN - 1465-6906 UR - http://genomebiology.com/2009/10/7/R72 CP - 7 M3 - 10.1186/gb-2009-10-7-r72 ER - TY - CONF T1 - Multilingual topic models for unaligned text T2 - Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence Y1 - 2009 A1 - Jordan Boyd-Graber A1 - Blei,David M. AB - We develop the multilingual topic model for unaligned text (MuTo), a probabilistic model of text that is designed to analyze corpora composed of documents in two languages. From these documents, MuTo uses stochastic EM to simultaneously discover both a matching between the languages and multilingual latent topics. We demonstrate that MuTo is able to find shared topics on real-world multilingual corpora, successfully pairing related documents across languages. MuTo provides a new framework for creating multilingual topic models without needing carefully curated parallel corpora and allows applications built using the topic model formalism to be applied to a much wider class of corpora. JA - Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence T3 - UAI '09 PB - AUAI Press CY - Arlington, Virginia, United States SN - 978-0-9749039-5-8 UR - http://dl.acm.org/citation.cfm?id=1795114.1795124 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 9. Some rare and a new species JF - Bangladesh Journal of Plant Taxonomy Y1 - 2009 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - Ten taxa belonging to Chlorophyceae, Cyanophyceae, Bacillariophyceae and Euglenophyceae, and one with an uncertain taxonomic position have been described in this paper. Of these, 10 taxa have been found to be globally rare and new records for Bangladesh, whereas Strombomonas islamii Khondker sp. nov. has been described as new to science. VL - 16 SN - 1028-2092 UR - http://www.banglajol.info/bd/index.php/BJPT/article/viewArticle/2734 CP - 1 M3 - 10.3329/bjpt.v16i1.2734 ER - TY - JOUR T1 - Nonlinear Resonant and Chaotic Dynamics in Microwave Assisted Magnetization Switching JF - Magnetics, IEEE Transactions on Y1 - 2009 A1 - d'Aquino,M. A1 - Serpico,C. A1 - Bertotti,G. A1 - Mayergoyz, Issak D A1 - Bonin,R. KW - amplitude;chaotic KW - components;magnetic KW - dynamical KW - dynamics;coercive KW - dynamics;numerical KW - field KW - field;coercivity;linearly-polarized KW - force;magnetic KW - magnetization KW - nanoparticle;microwave-assisted KW - particles;magnetic KW - radiofrequency KW - resonant KW - RF KW - simulations;perturbation KW - switching;nanoparticles;nonlinear KW - switching;nonlinear KW - systems;perturbation KW - technique;chaos;coercive KW - theory; AB - The switching process of a uniformly magnetized magnetic nanoparticle is considered. The particle is subject to applied fields having both dc and linearly-polarized radio-frequency (RF) components. The possibility of using the RF power to obtain a reduced coercivity of the particle is related to the onset of chaotic magnetization dynamics for moderately low values of the RF field amplitude. Perturbation technique for the evaluation of the reduced coercive field is developed and applied to the microwave assisted switching of the particle. Numerical simulations confirm the predictions of the theory. VL - 45 SN - 0018-9464 CP - 10 M3 - 10.1109/TMAG.2009.2023242 ER - TY - JOUR T1 - An oscillatory hebbian network model of short-term memory JF - Neural computation Y1 - 2009 A1 - Winder,R. K A1 - Reggia, James A. A1 - Weems,S. A A1 - Bunting,M. F VL - 21 CP - 3 ER - TY - JOUR T1 - Participatory simulation as a tool for agent-based simulation JF - Proceedings of the International Conference on Agents and Artificial Intelligence (ICAART-09) Y1 - 2009 A1 - Berland,M. A1 - Rand, William AB - Participatory simulation, as described by Wilensky & Stroup (1999c), is a form of agent-based simulation inwhich multiple humans control or design individual agents in the simulation. For instance, in a participatory simulation of an ecosystem, fifty participants might each control the intake and output of one agent, such that the food web emerges from the interactions of the human-controlled agents. We argue that participatory simulation has been under-utilized outside of strictly educational contexts, and that it provides myriad benefits to designers of traditional agent-based simulations. These benefits include increased robustness of the model, increased comprehensibility of the findings, and simpler design of individual agent behaviors. To make this argument, we look to recent research such as that from crowdsourcing (von Ahn, 2005) and the reinforcement learning of autonomous agent behavior (Abbeel, 2008). ER - TY - CONF T1 - Persona: an online social network with user-defined privacy T2 - Proceedings of the ACM SIGCOMM 2009 conference on Data communication Y1 - 2009 A1 - Baden,Randy A1 - Bender,Adam A1 - Spring, Neil A1 - Bhattacharjee, Bobby A1 - Starin,Daniel KW - ABE KW - Facebook KW - OSN KW - persona KW - privacy KW - social networks AB - Online social networks (OSNs) are immensely popular, with some claiming over 200 million users. Users share private content, such as personal information or photographs, using OSN applications. Users must trust the OSN service to protect personal information even as the OSN provider benefits from examining and sharing that information. We present Persona, an OSN where users dictate who may access their information. Persona hides user data with attribute-based encryption (ABE), allowing users to apply fine-grained policies over who may view their data. Persona provides an effective means of creating applications in which users, not the OSN, define policy over access to private data. We demonstrate new cryptographic mechanisms that enhance the general applicability of ABE. We show how Persona provides the functionality of existing online social networks with additional privacy benefits. We describe an implementation of Persona that replicates Facebook applications and show that Persona provides acceptable performance when browsing privacy-enhanced web pages, even on mobile devices. JA - Proceedings of the ACM SIGCOMM 2009 conference on Data communication T3 - SIGCOMM '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-594-9 UR - http://doi.acm.org/10.1145/1592568.1592585 M3 - 10.1145/1592568.1592585 ER - TY - JOUR T1 - Persona : An Online Social Network with User-Defined Privacy Categories and Subject Descriptors JF - Computer Y1 - 2009 A1 - Starin,Daniel A1 - Baden,Randy A1 - Bender,Adam A1 - Spring, Neil A1 - Bhattacharjee, Bobby AB - Online social networks (OSNs) are immensely popular, with some claiming over 200 million users. Users share private content, such as personal information or photographs, using OSN applications. Users must trust the OSN service to protect personal information even as the OSN provider benefits from examining and sharing that information. We present Persona, an OSN where users dictate who may access their information. Persona hides user data with attribute-based encryption (ABE), allowing users to apply fine-grained policies over who may view their data. Persona provides an effective means of creating applications in which users, not the OSN, define policy over access to private data. We demonstrate new cryptographic mechanisms that enhance the general applicability of ABE. We show how Persona provides the functionality of existing online social networks with additional privacy benefits. We describe an implementation of Persona that replicates Facebook applications and show that Persona provides acceptable performance when browsing privacy-enhanced web pages, even on mobile devices. VL - 39 CP - 4 M3 - 10.1145/1594977.1592585 ER - TY - JOUR T1 - A practical algorithm for finding maximal exact matches in large sequence datasets using sparse suffix arrays JF - Bioinformatics Y1 - 2009 A1 - Zia Khan A1 - Bloom, Joshua S. A1 - Kruglyak, Leonid A1 - Singh, Mona AB - Motivation: High-throughput sequencing technologies place ever increasing demands on existing algorithms for sequence analysis. Algorithms for computing maximal exact matches (MEMs) between sequences appear in two contexts where high-throughput sequencing will vastly increase the volume of sequence data: (i) seeding alignments of high-throughput reads for genome assembly and (ii) designating anchor points for genome–genome comparisons.Results: We introduce a new algorithm for finding MEMs. The algorithm leverages a sparse suffix array (SA), a text index that stores every K-th position of the text. In contrast to a full text index that stores every position of the text, a sparse SA occupies much less memory. Even though we use a sparse index, the output of our algorithm is the same as a full text index algorithm as long as the space between the indexed suffixes is not greater than a minimum length of a MEM. By relying on partial matches and additional text scanning between indexed positions, the algorithm trades memory for extra computation. The reduced memory usage makes it possible to determine MEMs between significantly longer sequences. Availability: Source code for the algorithm is available under a BSD open source license at http://compbio.cs.princeton.edu/mems. The implementation can serve as a drop-in replacement for the MEMs algorithm in MUMmer 3. Contact: zkhan@cs.princeton.edu;mona@cs.princeton.edu Supplementary information: Supplementary data are available at Bioinformatics online. VL - 25 SN - 1367-4803, 1460-2059 UR - http://bioinformatics.oxfordjournals.org/content/25/13/1609 CP - 13 J1 - Bioinformatics ER - TY - JOUR T1 - Predicting the distribution of Vibrio spp. in the Chesapeake Bay: a Vibrio cholerae case study JF - EcoHealth Y1 - 2009 A1 - Constantin de Magny,G. A1 - Long,W. A1 - Brown,C. W. A1 - Hood,R. R. A1 - Huq,A. A1 - Murtugudde,R. A1 - Rita R Colwell AB - Vibrio cholerae, the causative agent of cholera, is a naturally occurring inhabitant of the Chesapeake Bay and serves as a predictor for other clinically important vibrios, including Vibrio parahaemolyticus and Vibrio vulnificus. A system was constructed to predict the likelihood of the presence of V. cholerae in surface waters of the Chesapeake Bay, with the goal to provide forecasts of the occurrence of this and related pathogenic Vibrio spp. Prediction was achieved by driving an available multivariate empirical habitat model estimating the probability of V. cholerae within a range of temperatures and salinities in the Bay, with hydrodynamically generated predictions of ambient temperature and salinity. The experimental predictions provided both an improved understanding of the in situ variability of V. cholerae, including identification of potential hotspots of occurrence, and usefulness as an early warning system. With further development of the system, prediction of the probability of the occurrence of related pathogenic vibrios in the Chesapeake Bay, notably V. parahaemolyticus and V. vulnificus, will be possible, as well as its transport to any geographical location where sufficient relevant data are available. VL - 6 CP - 3 M3 - 10.1007/s10393-009-0273-6 ER - TY - JOUR T1 - Protein quantification across hundreds of experimental conditions JF - Proceedings of the National Academy of Sciences Y1 - 2009 A1 - Zia Khan A1 - Bloom, Joshua S. A1 - Garcia, Benjamin A. A1 - Singh, Mona A1 - Kruglyak, Leonid KW - kd-tree KW - orthogonal range query KW - quantitative proteomics KW - space partitioning data structures KW - tandem mass spectrometry AB - Quantitative studies of protein abundance rarely span more than a small number of experimental conditions and replicates. In contrast, quantitative studies of transcript abundance often span hundreds of experimental conditions and replicates. This situation exists, in part, because extracting quantitative data from large proteomics datasets is significantly more difficult than reading quantitative data from a gene expression microarray. To address this problem, we introduce two algorithmic advances in the processing of quantitative proteomics data. First, we use space-partitioning data structures to handle the large size of these datasets. Second, we introduce techniques that combine graph-theoretic algorithms with space-partitioning data structures to collect relative protein abundance data across hundreds of experimental conditions and replicates. We validate these algorithmic techniques by analyzing several datasets and computing both internal and external measures of quantification accuracy. We demonstrate the scalability of these techniques by applying them to a large dataset that comprises a total of 472 experimental conditions and replicates. VL - 106 SN - 0027-8424, 1091-6490 UR - http://www.pnas.org/content/106/37/15544 CP - 37 J1 - PNAS ER - TY - CONF T1 - Reading tea leaves: How humans interpret topic models T2 - Proceedings of the 23rd Annual Conference on Neural Information Processing Systems Y1 - 2009 A1 - Chang,J. A1 - Jordan Boyd-Graber A1 - Gerrish,S. A1 - Wang,C. A1 - Blei,D.M. AB - Probabilistic topic models are a popular tool for the unsupervised analysis of text, providing both a predictive model of future text and a latent topic representation of the corpus. Practitioners typically assume that the latent space is semantically meaningful. It is used to check models, summarize the corpus, and guide explo- ration of its contents. However, whether the latent space is interpretable is in need of quantitative evaluation. In this paper, we present new quantitative methods for measuring semantic meaning in inferred topics. We back these measures with large-scale user studies, showing that they capture aspects of the model that are undetected by previous measures of model quality based on held-out likelihood. Surprisingly, topic models which perform better on held-out likelihood may infer less semantically meaningful topics. JA - Proceedings of the 23rd Annual Conference on Neural Information Processing Systems VL - 31 ER - TY - CONF T1 - Real-time shape retrieval for robotics using skip Tri-Grams T2 - IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009. IROS 2009 Y1 - 2009 A1 - Li,Yi A1 - Bitsakos,K. A1 - Fermüller, Cornelia A1 - Aloimonos, J. KW - Bullseye retrieval test KW - Clocks KW - closed contour shape retrieval KW - Image retrieval KW - Image segmentation KW - Indexing KW - Information retrieval KW - Intelligent robots KW - Jacobian matrices KW - mobile robot KW - Mobile robots KW - MPEG 7 shape dataset KW - piecewise linear segments KW - Piecewise linear techniques KW - Real time systems KW - real-time shape retrieval KW - robot vision KW - SHAPE KW - shape recognition KW - shape representation KW - skip Tri-Grams KW - Testing AB - The real time requirement is an additional constraint on many intelligent applications in robotics, such as shape recognition and retrieval using a mobile robot platform. In this paper, we present a scalable approach for efficiently retrieving closed contour shapes. The contour of an object is represented by piecewise linear segments. A skip Tri-Gram is obtained by selecting three segments in the clockwise order while allowing a constant number of segments to be ¿skipped¿ in between. The main idea is to use skip Tri-Grams of the segments to implicitly encode the distant dependency of the shape. All skip Tri-Grams are used for efficiently retrieving closed contour shapes without pairwise matching feature points from two shapes. The retrieval is at least an order of magnitude faster than other state-of-the-art algorithms. We score 80% in the Bullseye retrieval test on the whole MPEG 7 shape dataset. We further test the algorithm using a mobile robot platform in an indoor environment. 8 objects are used for testing from different viewing directions, and we achieve 82% accuracy. JA - IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009. IROS 2009 PB - IEEE SN - 978-1-4244-3803-7 M3 - 10.1109/IROS.2009.5354738 ER - TY - JOUR T1 - Reflect and correct: A misclassification prediction approach to active inference JF - ACM Transactions on Knowledge Discovery from Data (TKDD) Y1 - 2009 A1 - Bilgic,Mustafa A1 - Getoor, Lise KW - active inference KW - collective classification KW - information diffusion KW - label acquisition KW - viral marketing AB - Information diffusion, viral marketing, graph-based semi-supervised learning, and collective classification all attempt to model and exploit the relationships among nodes in a network to improve the performance of node labeling algorithms. However, sometimes the advantage of exploiting the relationships can become a disadvantage. Simple models like label propagation and iterative classification can aggravate a misclassification by propagating mistakes in the network, while more complex models that define and optimize a global objective function, such as Markov random fields and graph mincuts, can misclassify a set of nodes jointly. This problem can be mitigated if the classification system is allowed to ask for the correct labels for a few of the nodes during inference. However, determining the optimal set of labels to acquire is intractable under relatively general assumptions, which forces us to resort to approximate and heuristic techniques. We describe three such techniques in this article. The first one is based on directly approximating the value of the objective function of label acquisition and greedily acquiring the label that provides the most improvement. The second technique is a simple technique based on the analogy we draw between viral marketing and label acquisition. Finally, we propose a method, which we refer to as reflect and correct, that can learn and predict when the classification system is likely to make mistakes and suggests acquisitions to correct those mistakes. We empirically show on a variety of synthetic and real-world datasets that the reflect and correct method significantly outperforms the other two techniques, as well as other approaches based on network structural measures such as node degree and network clustering. VL - 3 SN - 1556-4681 UR - http://doi.acm.org/10.1145/1631162.1631168 CP - 4 M3 - 10.1145/1631162.1631168 ER - TY - JOUR T1 - Ring signatures: Stronger definitions, and constructions without random oracles JF - Journal of Cryptology Y1 - 2009 A1 - Bender,A. A1 - Katz, Jonathan A1 - Morselli,R. AB - Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so that a ring of possible signers (of which the user is a member) is identified, without revealing exactly which member of that ring actually generated the signature. In contrast to group signatures, ring signatures are completely “ad-hoc” and do not require any central authority or coordination among the various users (indeed, users do not even need to be aware of each other); furthermore, ring signature schemes grant users fine-grained control over the level of anonymity associated with any particular signature.This paper has two main areas of focus. First, we examine previous definitions of security for ring signature schemes and suggest that most of these prior definitions are too weak, in the sense that they do not take into account certain realistic attacks. We propose new definitions of anonymity and unforgeability which address these threats, and give separation results proving that our new notions are strictly stronger than previous ones. Second, we show the first constructions of ring signature schemes in the standard model. One scheme is based on generic assumptions and satisfies our strongest definitions of security. Two additional schemes are more efficient, but achieve weaker security guarantees and more limited functionality. VL - 22 CP - 1 M3 - 10.1007/s00145-007-9011-9 ER - TY - JOUR T1 - Robust Estimation of Albedo for Illumination-Invariant Matching and Shape Recovery JF - Pattern Analysis and Machine Intelligence, IEEE Transactions on Y1 - 2009 A1 - Biswas,S. A1 - Aggarwal,G. A1 - Chellapa, Rama KW - albedo estimation;error statistics;face recognition;illumination-invariant matching;nonstationary stochastic filtering;robust estimation;shape recovery;shape-from-shading approach;error statistics;face recognition;filtering theory;image matching;Algorithm KW - Automated;Photometry;Reproducibility of Results;Sensitivity and Specificity; KW - Computer-Assisted;Imaging KW - Three-Dimensional;Lighting;Pattern Recognition AB - We present a nonstationary stochastic filtering framework for the task of albedo estimation from a single image. There are several approaches in the literature for albedo estimation, but few include the errors in estimates of surface normals and light source direction to improve the albedo estimate. The proposed approach effectively utilizes the error statistics of surface normals and illumination direction for robust estimation of albedo, for images illuminated by single and multiple light sources. The albedo estimate obtained is subsequently used to generate albedo-free normalized images for recovering the shape of an object. Traditional shape-from-shading (SFS) approaches often assume constant/piecewise constant albedo and known light source direction to recover the underlying shape. Using the estimated albedo, the general problem of estimating the shape of an object with varying albedo map and unknown illumination source is reduced to one that can be handled by traditional SFS approaches. Experimental results are provided to show the effectiveness of the approach and its application to illumination-invariant matching and shape recovery. The estimated albedo maps are compared with the ground truth. The maps are used as illumination-invariant signatures for the task of face recognition across illumination variations. The recognition results obtained compare well with the current state-of-the-art approaches. Impressive shape recovery results are obtained using images downloaded from the Web with little control over imaging conditions. The recovered shapes are also used to synthesize novel views under novel illumination conditions. VL - 31 SN - 0162-8828 CP - 5 M3 - 10.1109/TPAMI.2008.135 ER - TY - JOUR T1 - Running memory span: A comparison of behavioral capacity limits with those of an attractor neural network JF - Cognitive Systems Research Y1 - 2009 A1 - Weems,Scott A. A1 - Winder,Ransom K. A1 - Bunting,Michael A1 - Reggia, James A. KW - Attractor neural network KW - Computational model KW - Running span KW - Short term memory KW - Working memory capacity AB - We studied a computational model of short term memory capacity that performs a simulated running memory span task using Hebbian learning and rapid decay of connection strengths to keep recent items active for later recall. This model demonstrates recall performance similar to humans performing the same task, with a capacity limit of approximately three items and a prominent recency effect. The model also shows that this capacity depends on decay to release the model from accumulating interference. Model findings are compared with data from two behavioral experiments that used varying task demands to tax memory capacity limits. Following additional theoretical predictions from the computational model, behavioral data support that when task demands require attention to be spread too thin to keep items available for later recall, capacity limits suffer. These findings are important both for understanding the mechanisms underlying short term memory capacity, and also to memory researchers interested in the role of attention in capacity limitations. VL - 10 SN - 1389-0417 UR - http://www.sciencedirect.com/science/article/pii/S1389041708000569 CP - 2 M3 - 10.1016/j.cogsys.2008.09.001 ER - TY - CONF T1 - Salient Clustering for View-dependent Multiresolution Rendering T2 - Computer Graphics and Image Processing (SIBGRAPI), 2009 XXII Brazilian Symposium on Y1 - 2009 A1 - Barni,R. A1 - Comba,J. A1 - Varshney, Amitabh KW - (computer KW - algorithms;cluster KW - analysis;mesh KW - attention;mesh KW - AUTOMATIC KW - centred KW - clustering KW - clustering;rendering KW - clustering;user-centric KW - clusters;low-level KW - dependent KW - design; KW - framework;salient KW - graphics);user KW - graphics;face KW - human KW - information;propagative KW - mesh KW - multiresolution KW - rendering;image KW - representation;mesh KW - resolution;image KW - saliency;mesh KW - seed KW - segmentation KW - segmentation;pattern KW - segmentation;perceptual KW - selection;computer KW - system;view KW - visual AB - Perceptual information is quickly gaining importance in mesh representation, analysis and rendering. User studies, eye tracking and other techniques are able to provide ever more useful insights for many user-centric systems, which form the bulk of computer graphics applications. In this work we build upon the concept of Mesh Saliency - an automatic measure of visual importance for triangle meshes based on models of low-level human visual attention - applying it to the problem of mesh segmentation and view-dependent rendering. We introduce a technique for segmentation that partitions an object into a set of face clusters, each encompassing a group of locally interesting features; Mesh Saliency is incorporated in a propagative mesh clustering framework, guiding cluster seed selection and triangle propagation costs and leading to a convergence of face clusters around perceptually important features. We compare our technique with different fully automatic segmentation algorithms, showing that it provides similar or better segmentation without the need for user input. We illustrate application of our clustering results through a saliency-guided view-dependent rendering system, achieving significant frame rate increases with little loss of visual detail. JA - Computer Graphics and Image Processing (SIBGRAPI), 2009 XXII Brazilian Symposium on M3 - 10.1109/SIBGRAPI.2009.34 ER - TY - CONF T1 - Scheduling to minimize staleness and stretch in real-time data warehouses T2 - Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures Y1 - 2009 A1 - Bateni,M. H A1 - Golab,L. A1 - Hajiaghayi, Mohammad T. A1 - Karloff,H. JA - Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures ER - TY - CONF T1 - Scope error detection and handling concerning software estimation models T2 - Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement Y1 - 2009 A1 - Sarcia,Salvatore Alessandro A1 - Basili, Victor R. A1 - Cantone,Giovanni AB - Over the last 25+ years, the software community has been searching for the best models for estimating variables of interest (e.g., cost, defects, and fault proneness). However, little research has been done to improve the reliability of the estimates. Over the last decades, scope error and error analysis have been substantially ignored by the community. This work attempts to fill this gap in the research and enhance a common understanding within the community. Results provided in this study can eventually be used to support human judgment-based techniques and be an addition to the portfolio. The novelty of this work is that, we provide a way of detecting and handling the scope error arising from estimation models. The answer whether or not scope error will occur is a pre-condition to safe use of an estimation model. We also provide a handy procedure for dealing with outliers as to whether or not to include them in the training set for building a new version of the estimation model. The majority of the work is empirically based, applying computational intelligence techniques to some COCOMO model variations with respect to a publicly available cost estimation data set in the PROMISE repository. JA - Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement T3 - ESEM '09 PB - IEEE Computer Society CY - Washington, DC, USA SN - 978-1-4244-4842-5 UR - http://dx.doi.org/10.1109/ESEM.2009.5316020 M3 - 10.1109/ESEM.2009.5316020 ER - TY - JOUR T1 - Semantically informed machine translation (SIMT) JF - SCALE summer workshop final report, Human Language Technology Center Of Excellence Y1 - 2009 A1 - Baker,K. A1 - Bethard,S. A1 - Bloodgood,M. A1 - Brown,R. A1 - Callison-Burch,C. A1 - Coppersmith,G. A1 - Dorr, Bonnie J A1 - Filardo,W. A1 - Giles,K. A1 - Irvine,A. A1 - others ER - TY - JOUR T1 - Serogroup, Virulence, and Genetic Traits of Vibrio Parahaemolyticus in the Estuarine Ecosystem of Bangladesh JF - Applied and Environmental MicrobiologyAppl. Environ. Microbiol. Y1 - 2009 A1 - Alam,Munirul A1 - Chowdhury,Wasimul B. A1 - Bhuiyan,N. A. A1 - Islam,Atiqul A1 - Hasan,Nur A. A1 - Nair,G. Balakrish A1 - Watanabe,H. A1 - Siddique,A. K. A1 - Huq,Anwar A1 - Sack,R. Bradley A1 - Akhter,M. Z. A1 - Grim,Christopher J. A1 - Kam,K.-M. A1 - Luey,C. K. Y. A1 - Endtz,Hubert P. A1 - Cravioto,Alejandro A1 - Rita R Colwell AB - Forty-two strains of Vibrio parahaemolyticus were isolated from Bay of Bengal estuaries and, with two clinical strains, analyzed for virulence, phenotypic, and molecular traits. Serological analysis indicated O8, O3, O1, and K21 to be the major O and K serogroups, respectively, and O8:K21, O1:KUT, and O3:KUT to be predominant. The K antigen(s) was untypeable, and pandemic serogroup O3:K6 was not detected. The presence of genes toxR and tlh were confirmed by PCR in all but two strains, which also lacked toxR. A total of 18 (41%) strains possessed the virulence gene encoding thermostable direct hemolysin (TDH), and one had the TDH-related hemolysin (trh) gene, but not tdh. Ten (23%) strains exhibited Kanagawa phenomenon that surrogates virulence, of which six, including the two clinical strains, possessed tdh. Of the 18 tdh-positive strains, 17 (94%), including the two clinical strains, had the seromarker O8:K21, one was O9:KUT, and the single trh-positive strain was O1:KUT. None had the group-specific or ORF8 pandemic marker gene. DNA fingerprinting employing pulsed-field gel electrophoresis (PFGE) of SfiI-digested DNA and cluster analysis showed divergence among the strains. Dendrograms constructed using PFGE (SfiI) images from a soft database, including those of pandemic and nonpandemic strains of diverse geographic origin, however, showed that local strains formed a cluster, i.e., “clonal cluster,” as did pandemic strains of diverse origin. The demonstrated prevalence of tdh-positive and diarrheagenic serogroup O8:K21 strains in coastal villages of Bangladesh indicates a significant human health risk for inhabitants. VL - 75 SN - 0099-2240, 1098-5336 UR - http://aem.asm.org/content/75/19/6268 CP - 19 M3 - 10.1128/AEM.00266-09 ER - TY - JOUR T1 - Signing a linear subspace: Signature schemes for network coding JF - Public Key Cryptography–PKC 2009 Y1 - 2009 A1 - Boneh,D. A1 - Freeman,D. A1 - Katz, Jonathan A1 - Waters,B. AB - Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, network coding requires intermediate nodes to modify data packets en route; for this reason, standard signature schemes are inapplicable and it is a challenge to provide resilience to tampering by malicious nodes.We propose two signature schemes that can be used in conjunction with network coding to prevent malicious modification of data. Our schemes can be viewed as signing linear subspaces in the sense that a signature σ on a subspace V authenticates exactly those vectors in V. Our first scheme is (suitably) homomorphic and has constant public-key size and per-packet overhead. Our second scheme does not rely on random oracles and is based on weaker assumptions. We also prove a lower bound on the length of signatures for linear subspaces showing that our schemes are essentially optimal in this regard. M3 - 10.1007/978-3-642-00468-1_5 ER - TY - CONF T1 - Speaking through pictures: images vs. icons T2 - Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility Y1 - 2009 A1 - Ma,Xiaojuan A1 - Jordan Boyd-Graber A1 - Nikolova,Sonya A1 - Cook,Perry R. KW - aphasia KW - computerized visual communication (C-VIC) KW - visual communication (VIC) AB - People with aphasia, a condition that impairs the ability to understand or generate written or spoken language, are aided by assistive technology that helps them communicate through a vocabulary of icons. These systems are akin to language translation systems, translating icon arrangements into spoken or written language and vice versa. However, these icon-based systems have little vocabulary breadth or depth, making it difficult for people with aphasia to apply their usage to multiple real world situations. Pictures from the web are numerous, varied, and easily accessible and thus, could potentially address the small size issues of icon-based systems. We present results from two studies that investigate this potential and demonstrate that images can be as effective as icons when used as a replacement for English language communication. The first study uses elderly subjects to investigate the efficacy of images vs. icons in conveying word meaning; the second study examines the retention of word-level meaning by both images and icons with a population of aphasics. We conclude that images collected from the web are as functional as icons in conveying information and thus, are feasible to use in assistive technology that supports people with aphasia. JA - Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility T3 - Assets '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-558-1 UR - http://doi.acm.org/10.1145/1639642.1639672 M3 - 10.1145/1639642.1639672 ER - TY - JOUR T1 - A survey of CAD model simplification techniques for physics-based simulation applications JF - Computer-Aided Design Y1 - 2009 A1 - Thakur,Atul A1 - Banerjee,Ashis Gopal A1 - Gupta, Satyandra K. KW - CAD model simplification KW - Physics-based simulation AB - Automated CAD model simplification plays an important role in effectively utilizing physics-based simulation during the product realization process. Currently a rich body of literature exists that describe many successful techniques for fully-automatic or semi-automatic simplification of CAD models for a wide variety of applications. The purpose of this paper is to compile a list of the techniques that are relevant for physics-based simulations problems and to characterize them based on their attributes. We have classified them into the following four categories: techniques based on surface entity based operators, volume entity based operators, explicit feature based operators, and dimension reduction operators. This paper also presents the necessary background information in the CAD model representation to assist the new readers. We conclude the paper by outlining open research directions in this field. VL - 41 SN - 0010-4485 UR - http://www.sciencedirect.com/science/article/pii/S0010448508002285 CP - 2 M3 - 10.1016/j.cad.2008.11.009 ER - TY - CONF T1 - Symbiotic relationships in internet routing overlays T2 - Proceedings of the 6th USENIX symposium on Networked systems design and implementation Y1 - 2009 A1 - Lumezanu,Cristian A1 - Baden,Randy A1 - Levin,Dave A1 - Spring, Neil A1 - Bhattacharjee, Bobby AB - We propose to construct routing overlay networks using the following principle: that overlay edges should be based on mutual advantage between pairs of hosts. Upon this principle, we design, implement, and evaluate Peer-Wise, a latency-reducing overlay network. To show the feasibility of PeerWise, we must show first that mutual advantage exists in the Internet: perhaps contrary to expectation, that there are not only "haves" and "have nots" of low-latency connectivity. Second, we must provide a scalable means of finding promising edges and overlay routes; we seek embedding error in network coordinates to expose both shorter-than-default "detour" routes and longer-than-expected default routes. We evaluate the cost of limiting PeerWise to mutually advantageous links, then build the intelligent components that put PeerWise into practice. We design and evaluate "virtual" network coordinates for destinations not participating in the overlay, neighbor selection algorithms to find promising relays, and relay selection algorithms to choose the neighbor to traverse for a good detour. Finally, we show that PeerWise is practical through a wide-area deployment and evaluation. JA - Proceedings of the 6th USENIX symposium on Networked systems design and implementation T3 - NSDI'09 PB - USENIX Association CY - Berkeley, CA, USA UR - http://dl.acm.org/citation.cfm?id=1558977.1559009 ER - TY - JOUR T1 - A systematic approach for designing multifunctional thermally conducting polymer structures with embedded actuators JF - Journal of Mechanical Design Y1 - 2009 A1 - Bejgerowski,W. A1 - Gupta,S.K. A1 - Bruck,H. A. VL - 131 ER - TY - CONF T1 - System-level Clustering and Timing Analysis for GALS-based Dataflow Architectures T2 - In Proceedings of the ACM International Workshop on Timing Issues in the Specification and Synthesis of Digital Systems, Austin, Texas, February 2009. Y1 - 2009 A1 - Shen,C. A1 - Bhattacharyya, Shuvra S. AB - In this paper, we propose an approach based ondataflow techniques for modeling application-specific, globally asynchronous, locally synchronous (GALS) architectures for digital signal processing (DSP) applications, and analyzing the performance of such architectures. Dataflow-based techniques are attractive for DSP applications because they allow applica- tion behavior to be represented formally, analyzed at a high level of abstraction, and synthesized to software/hardware implementations through an optimized, automated process. In our proposed methodology, we employ dataflow-based compu- tational models to expose relevant structure in the targeted applications, and facilitate the manual or automatic derivation of efficient implementations. We demonstrate the utility of our modeling and analysis techniques by applying them as core parts of a novel clustering algorithm that is geared towards optimizing the throughput of GALS-based DSP architectures. JA - In Proceedings of the ACM International Workshop on Timing Issues in the Specification and Synthesis of Digital Systems, Austin, Texas, February 2009. ER - TY - CONF T1 - Systems-compatible incentives T2 - Game Theory for Networks, 2009. GameNets '09. International Conference on Y1 - 2009 A1 - Levin,D. A1 - Spring, Neil A1 - Bhattacharjee, Bobby KW - computing; KW - incentives;game KW - Internet;distributed KW - system;distributed KW - systems;game KW - systems;systems-compatible KW - theory;incentive-compatible KW - theory;peer-to-peer AB - Selfish participants in a distributed system attempt to gain from the system without regard to how their actions may affect others. To maintain desirable system-wide properties in the presence of selfish users, designers are increasingly turning to the powerful mechanisms offered by economics and game theory. Combining the two fields of economics and systems design introduces new challenges of achieving incentive-compatibility in systems we can deploy in today's Internet. In this paper, we explore the interactions between systems and the mechanisms that give users incentives to cooperate. Using findings from recent work on incentive-compatible systems, we discuss several economic mechanisms and assumptions: money, punishment, and altruism. We seek to understand when these mechanisms violate system properties. Among the potential pitfalls we present is a phenomenon we call the price of altruism: altruistic peers can impose a loss of social good in some systems. We also discuss systems-compatible mechanisms that have been used in real, distributed systems, and attempt to extract the underlying design principles that have led to their success. JA - Game Theory for Networks, 2009. GameNets '09. International Conference on M3 - 10.1109/GAMENETS.2009.5137390 ER - TY - CONF T1 - TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs Y1 - 2009 A1 - Studer, A. A1 - Elaine Shi A1 - Bai, Fan A1 - Perrig, A. KW - ad hoc networks KW - data privacy KW - eavesdropper KW - IEEE 1609.2 standard KW - Message authentication KW - mobile radio KW - public key cryptography KW - public key infrastructure KW - remove malevolent vehicle KW - telecommunication security KW - temporary anonymous certified key KW - valid vehicle identification KW - VANET key management KW - VANET security KW - vehicle-to-vehicle communication KW - Vehicles KW - vehicular ad hoc network AB - Vehicular ad hoc networks (VANETs) require a mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles. A public key infrastructure (PKI) can provide this functionality using certificates and fixed public keys. However, fixed keys allow an eavesdropper to associate a key with a vehicle and a location, violating drivers' privacy. In this work we propose a VANET key management scheme based on temporary anonymous certified keys (TACKs). Our scheme efficiently prevents eavesdroppers from linking a vehicle's different keys and provides timely revocation of misbehaving participants while maintaining the same or less overhead for vehicle-to-vehicle communication as the current IEEE 1609.2 standard for VANET security. ER - TY - CONF T1 - A theory of typed coercions and its applications T2 - Proceedings of the 14th ACM SIGPLAN international conference on Functional programming Y1 - 2009 A1 - Swamy,Nikhil A1 - Hicks, Michael W. A1 - Bierman,Gavin M. KW - coercion insertion KW - gradual typing KW - nonambiguity KW - provenance KW - type-directed translation AB - A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and supporting overloading in type theories, to more practical applications such as integrating static and dynamically typed code using gradual typing, and inlining code to enforce security policies such as access control and provenance tracking. In this paper we give a general theory of type-directed coercion insertion. We specifically explore the inherent tradeoff between expressiveness and ambiguity--the more powerful the strategy for generating coercions, the greater the possibility of several, semantically distinct rewritings for a given program. We consider increasingly powerful coercion generation strategies, work out example applications supported by the increased power (including those mentioned above), and identify the inherent ambiguity problems of each setting, along with various techniques to tame the ambiguities. JA - Proceedings of the 14th ACM SIGPLAN international conference on Functional programming T3 - ICFP '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-332-7 UR - http://doi.acm.org/10.1145/1596550.1596598 M3 - 10.1145/1596550.1596598 ER - TY - JOUR T1 - Three genomes from the phylum Acidobacteria provide insight into the lifestyles of these microorganisms in soils. JF - Appl Environ Microbiol Y1 - 2009 A1 - Ward, Naomi L A1 - Challacombe, Jean F A1 - Janssen, Peter H A1 - Henrissat, Bernard A1 - Coutinho, Pedro M A1 - Wu, Martin A1 - Xie, Gary A1 - Haft, Daniel H A1 - Sait, Michelle A1 - Badger, Jonathan A1 - Barabote, Ravi D A1 - Bradley, Brent A1 - Brettin, Thomas S A1 - Brinkac, Lauren M A1 - Bruce, David A1 - Creasy, Todd A1 - Daugherty, Sean C A1 - Davidsen, Tanja M A1 - DeBoy, Robert T A1 - Detter, J Chris A1 - Dodson, Robert J A1 - Durkin, A Scott A1 - Ganapathy, Anuradha A1 - Gwinn-Giglio, Michelle A1 - Han, Cliff S A1 - Khouri, Hoda A1 - Kiss, Hajnalka A1 - Kothari, Sagar P A1 - Madupu, Ramana A1 - Nelson, Karen E A1 - Nelson, William C A1 - Paulsen, Ian A1 - Penn, Kevin A1 - Ren, Qinghu A1 - Rosovitz, M J A1 - Jeremy D Selengut A1 - Shrivastava, Susmita A1 - Sullivan, Steven A A1 - Tapia, Roxanne A1 - Thompson, L Sue A1 - Watkins, Kisha L A1 - Yang, Qi A1 - Yu, Chunhui A1 - Zafar, Nikhat A1 - Zhou, Liwei A1 - Kuske, Cheryl R KW - Anti-Bacterial Agents KW - bacteria KW - Biological Transport KW - Carbohydrate Metabolism KW - Cyanobacteria KW - DNA, Bacterial KW - Fungi KW - Genome, Bacterial KW - Macrolides KW - Molecular Sequence Data KW - Nitrogen KW - Phylogeny KW - Proteobacteria KW - Sequence Analysis, DNA KW - sequence homology KW - Soil Microbiology AB -

The complete genomes of three strains from the phylum Acidobacteria were compared. Phylogenetic analysis placed them as a unique phylum. They share genomic traits with members of the Proteobacteria, the Cyanobacteria, and the Fungi. The three strains appear to be versatile heterotrophs. Genomic and culture traits indicate the use of carbon sources that span simple sugars to more complex substrates such as hemicellulose, cellulose, and chitin. The genomes encode low-specificity major facilitator superfamily transporters and high-affinity ABC transporters for sugars, suggesting that they are best suited to low-nutrient conditions. They appear capable of nitrate and nitrite reduction but not N(2) fixation or denitrification. The genomes contained numerous genes that encode siderophore receptors, but no evidence of siderophore production was found, suggesting that they may obtain iron via interaction with other microorganisms. The presence of cellulose synthesis genes and a large class of novel high-molecular-weight excreted proteins suggests potential traits for desiccation resistance, biofilm formation, and/or contribution to soil structure. Polyketide synthase and macrolide glycosylation genes suggest the production of novel antimicrobial compounds. Genes that encode a variety of novel proteins were also identified. The abundance of acidobacteria in soils worldwide and the breadth of potential carbon use by the sequenced strains suggest significant and previously unrecognized contributions to the terrestrial carbon cycle. Combining our genomic evidence with available culture traits, we postulate that cells of these isolates are long-lived, divide slowly, exhibit slow metabolic rates under low-nutrient conditions, and are well equipped to tolerate fluctuations in soil hydration.

VL - 75 CP - 7 M3 - 10.1128/AEM.02294-08 ER - TY - JOUR T1 - Together, Rpn10 and Dsk2 Can Serve as a Polyubiquitin Chain-Length Sensor JF - Molecular Cell Y1 - 2009 A1 - Zhang,Daoning A1 - Chen,Tony A1 - Ziv,Inbal A1 - Rosenzweig,Rina A1 - Matiuhin,Yulia A1 - Bronner,Vered A1 - Glickman,Michael H. A1 - Fushman, David KW - Proteins KW - signaling AB - SummaryAs a signal for substrate targeting, polyubiquitin meets various layers of receptors upstream to the 26S proteasome. We obtained structural information on two receptors, Rpn10 and Dsk2, alone and in complex with (poly)ubiquitin or with each other. A hierarchy of affinities emerges with Dsk2 binding monoubiquitin tighter than Rpn10 does, whereas Rpn10 prefers the ubiquitin-like domain of Dsk2 to monoubiquitin, with increasing affinities for longer polyubiquitin chains. We demonstrated the formation of ternary complexes of both receptors simultaneously with (poly)ubiquitin and found that, depending on the ubiquitin chain length, the orientation of the resulting complex is entirely different, providing for alternate signals. Dynamic rearrangement provides a chain-length sensor, possibly explaining how accessibility of Dsk2 to the proteasome is limited unless it carries a properly tagged cargo. We propose a mechanism for a malleable ubiquitin signal that depends both on chain length and combination of receptors to produce tetraubiquitin as an efficient signal threshold. VL - 36 SN - 1097-2765 UR - http://www.sciencedirect.com/science/article/pii/S1097276509008260 CP - 6 M3 - 10.1016/j.molcel.2009.11.012 ER - TY - CONF T1 - Tool supported detection and judgment of nonconformance in process execution T2 - Empirical Software Engineering and Measurement, 2009. ESEM 2009. 3rd International Symposium on Y1 - 2009 A1 - Zazworka, N. A1 - Basili, Victor R. A1 - Shull, F. KW - aerospace KW - community;tool KW - cycle;software KW - detection;software KW - development KW - domain;large-scale KW - engineering KW - execution;process KW - life KW - management;software KW - nonconformance KW - project;nonfunctional KW - requirement;process KW - software KW - supported KW - tools; AB - In the past decades the software engineering community has proposed a large collection of software development life cycles, models, and processes. The goal of a major set of these processes is to assure that the product is finished within time and budget, and that a predefined set of functional and nonfunctional requirements (e.g. quality goals) are satisfied at delivery time. Based upon the assumption that there is a real relationship between the process applied and the characteristics of the product developed from that process, we developed a tool supported approach that uses process nonconformance detection to identify potential risks in achieving the required process characteristics. In this paper we present the approach and a feasibility study that demonstrates its use on a large-scale software development project in the aerospace domain. We demonstrate that our approach, in addition to meeting the criteria above, can be applied to a real system of reasonable size; can represent a useful and adequate set of rules of relevance in such an environment; and can detect relevant examples of process nonconformance that provide useful insight to the project manager. JA - Empirical Software Engineering and Measurement, 2009. ESEM 2009. 3rd International Symposium on M3 - 10.1109/ESEM.2009.5315983 ER - TY - JOUR T1 - Toward reconstructing the evolution of advanced moths and butterflies (Lepidoptera: Ditrysia): an initial molecular study JF - BMC Evol Biol Y1 - 2009 A1 - Regier,J. C A1 - Zwick,A. A1 - Cummings, Michael P. A1 - Kawahara,A. Y A1 - Cho,S. A1 - Weller,S. A1 - Roe,A. A1 - Baixeras,J. A1 - Brown,J. W A1 - Parr,C. A1 - Davis,DR A1 - Epstein,M A1 - Hallwachs,W A1 - Hausmann,A A1 - Janzen,DH A1 - Kitching,IJ A1 - Solis,MA A1 - Yen,S-H A1 - Bazinet,A. L A1 - Mitter,C AB - BACKGROUND: In the mega-diverse insect order Lepidoptera (butterflies and moths; 165,000 described species), deeper relationships are little understood within the clade Ditrysia, to which 98% of the species belong. To begin addressing this problem, we tested the ability of five protein-coding nuclear genes (6.7 kb total), and character subsets therein, to resolve relationships among 123 species representing 27 (of 33) superfamilies and 55 (of 100) families of Ditrysia under maximum likelihood analysis. RESULTS: Our trees show broad concordance with previous morphological hypotheses of ditrysian phylogeny, although most relationships among superfamilies are weakly supported. There are also notable surprises, such as a consistently closer relationship of Pyraloidea than of butterflies to most Macrolepidoptera. Monophyly is significantly rejected by one or more character sets for the putative clades Macrolepidoptera as currently defined (P < 0.05) and Macrolepidoptera excluding Noctuoidea and Bombycoidea sensu lato (P < or = 0.005), and nearly so for the superfamily Drepanoidea as currently defined (P < 0.08). Superfamilies are typically recovered or nearly so, but usually without strong support. Relationships within superfamilies and families, however, are often robustly resolved. We provide some of the first strong molecular evidence on deeper splits within Pyraloidea, Tortricoidea, Geometroidea, Noctuoidea and others.Separate analyses of mostly synonymous versus non-synonymous character sets revealed notable differences (though not strong conflict), including a marked influence of compositional heterogeneity on apparent signal in the third codon position (nt3). As available model partitioning methods cannot correct for this variation, we assessed overall phylogeny resolution through separate examination of trees from each character set. Exploration of "tree space" with GARLI, using grid computing, showed that hundreds of searches are typically needed to find the best-feasible phylogeny estimate for these data. CONCLUSION: Our results (a) corroborate the broad outlines of the current working phylogenetic hypothesis for Ditrysia, (b) demonstrate that some prominent features of that hypothesis, including the position of the butterflies, need revision, and (c) resolve the majority of family and subfamily relationships within superfamilies as thus far sampled. Much further gene and taxon sampling will be needed, however, to strongly resolve individual deeper nodes. VL - 9 M3 - 10.1186/1471-2148-9-280 ER - TY - CHAP T1 - Triangle Inequality and Routing Policy Violations in the Internet T2 - Passive and Active Network MeasurementPassive and Active Network Measurement Y1 - 2009 A1 - Lumezanu,Cristian A1 - Baden,Randy A1 - Spring, Neil A1 - Bhattacharjee, Bobby ED - Moon,Sue ED - Teixeira,Renata ED - Uhlig,Steve KW - Computer KW - Science AB - Triangle inequality violations (TIVs) are the effect of packets between two nodes being routed on the longer direct path between them when a shorter detour path through an intermediary is available. TIVs are a natural, widespread and persistent consequence of Internet routing policies. By exposing opportunities to improve the delay between two nodes, TIVs can help myriad applications that seek to minimize end-to-end latency. However, sending traffic along the detour paths revealed by TIVs may influence Internet routing negatively. In this paper we study the interaction between triangle inequality violations and policy routing in the Internet. We use measured and predicted AS paths between Internet nodes to show that 25% of the detour paths exposed by TIVs are in fact available to BGP but are simply deemed “less efficient”. We also compare the AS paths of detours and direct paths and find that detours use AS edges that are rarely followed by default Internet paths, while avoiding others that BGP seems to prefer. Our study is important both for understanding the various interactions that occur at the routing layer as well as their effects on applications that seek to use TIVs to minimize latency. JA - Passive and Active Network MeasurementPassive and Active Network Measurement T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 5448 SN - 978-3-642-00974-7 UR - http://dx.doi.org/10.1007/978-3-642-00975-4_5 ER - TY - CONF T1 - Triangle inequality variations in the internet T2 - Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference Y1 - 2009 A1 - Lumezanu,Cristian A1 - Baden,Randy A1 - Spring, Neil A1 - Bhattacharjee, Bobby KW - latency KW - tiv KW - triangle inequality violation KW - variation AB - Triangle inequality violations (TIVs) are important for latency sensitive distributed applications. On one hand, they can expose opportunities to improve network routing by finding shorter paths between nodes. On the other hand, TIVs can frustrate network embedding or positioning systems that treat the Internet as a metric space where the triangle inequality holds. Even though triangle inequality violations are both significant and curious, their study has been limited to aggregate data sets that combine measurements taken over long periods of time. The limitations of these data sets open crucial questions in the design of systems that exploit (or avoid) TIVs: are TIVs stable or transient? Or are they illusions caused by aggregating measurements taken at different times? We collect latency matrices at varying sizes and time granularities and study dynamic properties of triangle inequality violations in the Internet. We show that TIVs are not results of measurement error and that their number varies with time. We examine how latency aggregates of data measured over longer periods of time preserve TIVs. Using medians to compute violations eliminates most of the TIVs that appear sporadically during the measurement but it misses many of the ones that are present for more than five hours. JA - Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference T3 - IMC '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-771-4 UR - http://doi.acm.org/10.1145/1644893.1644914 M3 - 10.1145/1644893.1644914 ER - TY - RPRT T1 - Understanding the design tradeoffs for cooperative streaming multicast Y1 - 2009 A1 - Nandi,A. A1 - Bhattacharjee, Bobby A1 - Druschel,P. AB - Video streaming over the Internet is rapidly increasing in popular-ity, but the availability and quality of the content is limited by the high bandwidth cost for server-based solutions. Cooperative end- system multicast (CEM) has emerged as a promising paradigm for content distribution in the Internet, because the bandwidth over- head of disseminating content is shared among the participants of the CEM overlay network. Several CEM systems have been pro- posed and deployed, but the tradeoffs inherent in the different de- signs are not well understood. In this work, we provide a common framework in which different CEM design choices can be empirically and systematically evalu- ated. Our results show that all CEM protocols are inherently lim- ited in certain aspects of their performance. We distill our observa- tions into a novel model that explains the inherent tradeoffs of CEM design choices and provides bounds on the practical performance limits of any future CEM protocol. In particular, the model conjec- tures that no CEM design can simultaneously achieve all three of low overhead, low lag, and high streaming quality. PB - Technical report MPI-SWS-2009-002, Max Planck Institute for Software Systems ER - TY - RPRT T1 - The Use of Empirical Studies in the Development of High End Computing Applications Y1 - 2009 A1 - Basili, Victor R. A1 - Zelowitz,Marvin V KW - *COMPUTER PROGRAMMING KW - *EMPIRICAL STUDIES KW - *HPC(HIGH PERFORMANCE COMPUTING) KW - *METHODOLOGY KW - *PARALLEL PROCESSING KW - *PARALLEL PROGRAMMING KW - *PRODUCTIVITY KW - *SOFTWARE ENGINEERING KW - *SOFTWARE METRICS KW - ADMINISTRATION AND MANAGEMENT KW - APMS(AUTOMATED PERFORMANCE MEASUREMENT SYSTEM) KW - COMPUTER PROGRAMMING AND SOFTWARE KW - COMPUTER SYSTEMS MANAGEMENT AND STANDARDS KW - data acquisition KW - efficiency KW - ENVIRONMENTS KW - HIGH END COMPUTING KW - HPCBUGBASE KW - HUMAN FACTORS ENGINEERING & MAN MACHINE SYSTEM KW - learning KW - measurement KW - MPI(MESSAGE PASSING INTERFACE) KW - PARALLEL ORIENTATION KW - PE62303E KW - PROGRAMMERS KW - SE(SOFTWARE ENGINEERING) KW - SUPERVISORS KW - TEST AND EVALUATION KW - TEST FACILITIES, EQUIPMENT AND METEORS KW - TIME KW - tools KW - United States KW - WUAFRLT810HECA AB - This report provides a description of the research and development activities towards learning much about the development and measurement of productivity in high performance computing environments. Many objectives were accomplished including the development of a methodology for measuring productivity in the parallel programming domain. This methodology was tested over 25 times at 8 universities across the United States and can be used to aid other researchers studying similar environments. The productivity measurement methodology incorporates both development time and performance into a single productivity number. An Experiment Manager tool for collecting data on the development of parallel programs, as well as a suite of tools to aid in the capture and analysis of such data was also developed. Lastly, several large scale development environments were studied in order to better understand the environment used to build large parallel programming applications. That work also included several surveys and interviews with many professional programmers in these environments. PB - University of Maryland, College Park UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA511351 ER - TY - JOUR T1 - Using formal specifications to support testing JF - ACM Computing Surveys Y1 - 2009 A1 - Hierons,Robert M. A1 - Krause,Paul A1 - Lüttgen,Gerald A1 - Simons,Anthony J. H. A1 - Vilkomir,Sergiy A1 - Woodward,Martin R. A1 - Zedan,Hussein A1 - Bogdanov,Kirill A1 - Bowen,Jonathan P. A1 - Cleaveland, Rance A1 - Derrick,John A1 - Dick,Jeremy A1 - Gheorghe,Marian A1 - Harman,Mark A1 - Kapoor,Kalpesh VL - 41 SN - 03600300 UR - http://dl.acm.org/citation.cfm?id=1459352.1459354 M3 - 10.1145/1459352.1459354 ER - TY - CONF T1 - Using uncertainty as a model selection and comparison criterion T2 - Proceedings of the 5th International Conference on Predictor Models in Software Engineering Y1 - 2009 A1 - Sarcia',Salvatore Alessandro A1 - Basili, Victor R. A1 - Cantone,Giovanni KW - accuracy KW - Bayesian prediction intervals KW - Calibration KW - cost estimation KW - cost model KW - model evaluation KW - model selection KW - prediction interval KW - Uncertainty AB - Over the last 25+ years, software estimation research has been searching for the best model for estimating variables of interest (e.g., cost, defects, and fault proneness). This research effort has not lead to a common agreement. One problem is that, they have been using accuracy as the basis for selection and comparison. But accuracy is not invariant; it depends on the test sample, the error measure, and the chosen error statistics (e.g., MMRE, PRED, Mean and Standard Deviation of error samples). Ideally, we would like an invariant criterion. In this paper, we show that uncertainty can be used as an invariant criterion to figure out which estimation model should be preferred over others. The majority of this work is empirically based, applying Bayesian prediction intervals to some COCOMO model variations with respect to a publicly available cost estimation data set coming from the PROMISE repository. JA - Proceedings of the 5th International Conference on Predictor Models in Software Engineering T3 - PROMISE '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-634-2 UR - http://doi.acm.org/10.1145/1540438.1540464 M3 - 10.1145/1540438.1540464 ER - TY - JOUR T1 - Video-Based Face Recognition Algorithms JF - Handbook of Remote Biometrics Y1 - 2009 A1 - Chellapa, Rama A1 - Bicego, M. A1 - Turaga,P. AB - Traditional face recognition systems have relied on a gallery of still images for learning and a probe of still images for recognition. While the advantage of using motion information in face videos has been widely recognized, computational models for video-based face recognition have only recently gained attention. This chapter reviews some recent advances in this novel framework. In particular, the utility of videos in enhancing performance of image-based tasks (such as recognition or localization) will be summarized. Subsequently, spatiotemporal video-based face recognition systems based on particle filters, hidden Markov models , and system theoretic approaches will be presented. Further, some useful face databases employable by researchers interested in this field will be described. Finally, some open research issues will be proposed and discussed. ER - TY - CONF T1 - Visibility constraints on features of 3D objects T2 - Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on Y1 - 2009 A1 - Basri,R. A1 - Felzenszwalb,P. F A1 - Girshick,R. B A1 - Jacobs, David W. A1 - Klivans,C. J KW - 3D KW - algorithms;synthetic KW - complexity;iterative KW - constraints;computational KW - data;synthetic KW - dataset;NP-hard;image-based KW - features;COIL KW - framework;iterative KW - images;three-dimensional KW - methods;object KW - object KW - recognition; KW - recognition;viewing KW - sphere;visibility AB - To recognize three-dimensional objects it is important to model how their appearances can change due to changes in viewpoint. A key aspect of this involves understanding which object features can be simultaneously visible under different viewpoints. We address this problem in an image-based framework, in which we use a limited number of images of an object taken from unknown viewpoints to determine which subsets of features might be simultaneously visible in other views. This leads to the problem of determining whether a set of images, each containing a set of features, is consistent with a single 3D object. We assume that each feature is visible from a disk of viewpoints on the viewing sphere. In this case we show the problem is NP-hard in general, but can be solved efficiently when all views come from a circle on the viewing sphere. We also give iterative algorithms that can handle noisy data and converge to locally optimal solutions in the general case. Our techniques can also be used to recover viewpoint information from the set of features that are visible in different images. We show that these algorithms perform well both on synthetic data and images from the COIL dataset. JA - Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on M3 - 10.1109/CVPR.2009.5206726 ER - TY - PAT T1 - Visual Tag Y1 - 2009 A1 - BRETEY,STEVE A1 - Kuhnly,Keith A1 - Davis, Larry S. AB - An improved animal tag for application to an animal's ear which comprises a male portion that includes a flat segment and a projection segment, a female portion that includes a generally square or generally oval shaped flat segment and a raised segment with an aperture; wherein the projection segment of the male portion is adapted to be inserted through the animal's ear and into the aperture when pressure is applied thereto. VL - 12/533,231 UR - http://www.google.com/patents?id=ZXTTAAAAEBAJ ER - TY - JOUR T1 - What a mesh: understanding the design tradeoffs for streaming multicast JF - SIGMETRICS Perform. Eval. Rev. Y1 - 2009 A1 - Nandi,Animesh A1 - Bhattacharjee, Bobby A1 - Druschel,Peter AB - Cooperative end-system multicast (CEM) is a promising paradigm for Internet video distribution. Several CEM systems have been proposed and deployed, but the tradeoffs inherent in the different designs are not well understood. In this work, we provide a common framework in which different CEM design choices can be empirically and systematically evaluated. Based on our results, we conjecture that all CEM systems must abide by a set of fundamental design constraints, which we express in a simple model. By necessity, existing system implementations couple the data- and control-planes and often use different transport protocols. VL - 37 SN - 0163-5999 UR - http://doi.acm.org/10.1145/1639562.1639598 CP - 2 M3 - 10.1145/1639562.1639598 ER - TY - JOUR T1 - Accountable internet protocol (aip) JF - SIGCOMM Comput. Commun. Rev. Y1 - 2008 A1 - Andersen,David G. A1 - Balakrishnan,Hari A1 - Feamster, Nick A1 - Koponen,Teemu A1 - Moon,Daekyeong A1 - Shenker,Scott KW - accountability KW - address KW - internet architecture KW - scalability KW - Security AB - This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding entity. We discuss how AIP enables simple solutions to source spoofing, denial-of-service, route hijacking, and route forgery. We also discuss how AIP's design meets the challenges of scaling, key management, and traffic engineering. VL - 38 SN - 0146-4833 UR - http://doi.acm.org/10.1145/1402946.1402997 CP - 4 M3 - 10.1145/1402946.1402997 ER - TY - JOUR T1 - The acl anthology reference corpus: A reference dataset for bibliographic research in computational linguistics JF - Proc. of the 6th International Conference on Language Resources and Evaluation Conference (LREC’08) Y1 - 2008 A1 - Bird,S. A1 - Dale,R. A1 - Dorr, Bonnie J A1 - Gibson,B. A1 - Joseph,M.T. A1 - Kan,M.Y. A1 - Lee,D. A1 - Powley,B. A1 - Radev,D.R. A1 - Tan,Y.F. AB - The ACL Anthology is a digital archive of conference and journal papers in natural language processing and computational linguistics.Its primary purpose is to serve as a reference repository of research results, but we believe that it can also be an object of study and a platform for research in its own right. We describe an enriched and standardized reference corpus derived from the ACL Anthology that can be used for research in scholarly document processing. This corpus, which we call the ACL Anthology Reference Corpus (ACL ARC), brings together the recent activities of a number of research groups around the world. Our goal is to make the corpus widely available, and to encourage other researchers to use it as a standard testbed for experiments in both bibliographic and bibliometric research. ER - TY - CONF T1 - Adopting Curvilinear Component Analysis to Improve Software Cost Estimation Accuracy. Model, Application Strategy, and an Experimental Verification T2 - In G. Visaggio (Ed.), 12 th International Conference on Evaluation and Assessment in Software Engineering. BCS eWIC Y1 - 2008 A1 - Sarcia,Salvatore A. A1 - Cantone,Giovanni A1 - Basili, Victor R. AB - Cost estimation is a critical issue for software organizations. Good estimates can help us make more informed decisions (controlling and planning software risks), if they are reliable (correct) and valid (stable). In this study, we apply a variable reduction technique (based on auto-associative feed--forward neural networks – called Curvilinear component analysis) to log-linear regression functions calibrated with ordinary least squares. Based on a COCOMO 81 data set, we show that Curvilinear component analysis can improve the estimation model accuracy by turning the initial input variables into an equivalent and more compact representation. We show that, the models obtained by applying Curvilinear component analysis are more parsimonious, correct, and reliable. JA - In G. Visaggio (Ed.), 12 th International Conference on Evaluation and Assessment in Software Engineering. BCS eWIC ER - TY - CONF T1 - An area-efficient high-throughput hybrid interconnection network for single-chip parallel processing T2 - Proceedings of the 45th annual Design Automation Conference Y1 - 2008 A1 - Balkan,Aydin O. A1 - Gang Qu A1 - Vishkin, Uzi KW - hybrid networks KW - mesh-of-trees KW - on-chip networks AB - Single-chip parallel processing requires high bandwidth between processors and on-chip memory modules. A recently proposed Mesh-of-Trees (MoT) network provides high throughput and low latency at relatively high area cost. In this paper, we introduce a hybrid MoT-BF network that combines MoT network with the area efficient butterfly network. We prove that the hybrid network reduces MoT network's area cost. Cycle-accurate simulation and post-layout results all show that significant area reduction can be achieved with negligible performance degradation, when operating at same clock rate. JA - Proceedings of the 45th annual Design Automation Conference T3 - DAC '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-115-6 UR - http://doi.acm.org/10.1145/1391469.1391583 M3 - 10.1145/1391469.1391583 ER - TY - JOUR T1 - The ASC-Alliance Projects: A Case Study of Large-Scale Parallel Scientific Code Development JF - Computer Y1 - 2008 A1 - Hochstein, L. A1 - Basili, Victor R. KW - ASC-Alliance KW - code KW - development;large-scale KW - development;parallel KW - engineering; KW - machines;software KW - Parallel KW - projects;computational KW - scale KW - Science KW - scientific KW - scientists;large KW - software KW - systems;parallel AB - Computational scientists face many challenges when developing software that runs on large-scale parallel machines. However, software-engineering researchers haven't studied their software development processes in much detail. To better understand the nature of software development in this context, the authors examined five large-scale computational science software projects operated at the five ASC-Alliance centers. VL - 41 SN - 0018-9162 CP - 3 M3 - 10.1109/MC.2008.101 ER - TY - JOUR T1 - An assessment of systems and software engineering scholars and institutions (2001–2005) JF - Journal of Systems and Software Y1 - 2008 A1 - Wong,W. Eric A1 - Tse,T.H. A1 - Glass,Robert L. A1 - Basili, Victor R. A1 - Chen,T.Y. KW - Research publications KW - Systems and software engineering KW - Top institutions KW - Top scholars AB - This paper presents the findings of a five-year study of the top scholars and institutions in the systems and software engineering field, as measured by the quantity of papers published in the journals of the field in 2001–2005. The top scholar is Magne Jørgensen of Simula Research Laboratory, Norway, and the top institution is Korea Advanced Institute of Science and Technology, Korea.This paper is part of an ongoing study, conducted annually, that identifies the top 15 scholars and institutions in the most recent five-year period. VL - 81 SN - 0164-1212 UR - http://www.sciencedirect.com/science/article/pii/S0164121207002300 CP - 6 M3 - 10.1016/j.jss.2007.09.018 ER - TY - CONF T1 - BELIV'08: Beyond time and errors: novel evaluation methods for information visualization T2 - CHI '08 extended abstracts on Human factors in computing systems Y1 - 2008 A1 - Bertini,Enrico A1 - Perer,Adam A1 - Plaisant, Catherine A1 - Santucci,Giuseppe KW - Evaluation KW - Information Visualization AB - Information visualization systems allow users to produce insights, innovations and discoveries. Evaluating such tools is a challenging task and the goal of BELIV'08 is to make a step ahead in the comprehension of such a complex activity. Current evaluation methods exhibit noticeable limitations and researchers in the area experiment some frustration with evaluation processes that are time consuming and too often leading to unsatisfactory results. The most used evaluation metrics such as task time completion and number of errors appear insufficient to quantify the quality of an information visualization system; thus the name of the workshop: "beyond time and errors". JA - CHI '08 extended abstracts on Human factors in computing systems T3 - CHI EA '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-012-8 UR - http://doi.acm.org/10.1145/1358628.1358955 M3 - 10.1145/1358628.1358955 ER - TY - CONF T1 - Bilateral symmetry of object silhouettes under perspective projection T2 - 19th International Conference on Pattern Recognition, 2008. ICPR 2008 Y1 - 2008 A1 - Bitsakos,K. A1 - Yi,H. A1 - Yi,L. A1 - Fermüller, Cornelia KW - Automation KW - bilateral symmetry KW - Computer vision KW - Frequency KW - Image analysis KW - Image coding KW - Image reconstruction KW - Internet KW - Internet images KW - Object detection KW - object silhouettes KW - perspective distortion KW - perspective projection KW - SHAPE KW - symmetric objects AB - Symmetry is an important property of objects and is exhibited in different forms e.g., bilateral, rotational, etc. This paper presents an algorithm for computing the bilateral symmetry of silhouettes of shallow objects under perspective distortion, exploiting the invariance of the cross ratio to projective transformations. The basic idea is to use the cross ratio to compute a number of midpoints of cross sections and then fit a straight line through them. The goodness-of-fit determines the likelihood of the line to be the axis of symmetry. We analytically estimate the midpointpsilas location as a function of the vanishing point for a given object silhouette. Hence finding the symmetry axis amounts to a 2D search in the space of vanishing points. We present experiments on two datasets as well as Internet images of symmetric objects that validate our approach. JA - 19th International Conference on Pattern Recognition, 2008. ICPR 2008 PB - IEEE SN - 978-1-4244-2174-9 M3 - 10.1109/ICPR.2008.4761501 ER - TY - CONF T1 - Bittorrent is an auction: analyzing and improving bittorrent's incentives T2 - Proceedings of the ACM SIGCOMM 2008 conference on Data communication Y1 - 2008 A1 - Levin,Dave A1 - LaCurts,Katrina A1 - Spring, Neil A1 - Bhattacharjee, Bobby KW - auctions KW - bittorrent KW - incentive systems KW - proportional share KW - tit-for-tat AB - Incentives play a crucial role in BitTorrent, motivating users to upload to others to achieve fast download times for all peers. Though long believed to be robust to strategic manipulation, recent work has empirically shown that BitTorrent does not provide its users incentive to follow the protocol. We propose an auction-based model to study and improve upon BitTorrent's incentives. The insight behind our model is that BitTorrent uses, not tit-for-tat as widely believed, but an auction to decide which peers to serve. Our model not only captures known, performance-improving strategies, it shapes our thinking toward new, effective strategies. For example, our analysis demonstrates, counter-intuitively, that BitTorrent peers have incentive to intelligently under-report what pieces of the file they have to their neighbors. We implement and evaluate a modification to BitTorrent in which peers reward one another with proportional shares of bandwidth. Within our game-theoretic model, we prove that a proportional-share client is strategy-proof. With experiments on PlanetLab, a local cluster, and live downloads, we show that a proportional-share unchoker yields faster downloads against BitTorrent and BitTyrant clients, and that under-reporting pieces yields prolonged neighbor interest. JA - Proceedings of the ACM SIGCOMM 2008 conference on Data communication T3 - SIGCOMM '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-175-0 UR - http://doi.acm.org/10.1145/1402958.1402987 M3 - 10.1145/1402958.1402987 ER - TY - JOUR T1 - Collective Classification in Network Data JF - AI Magazine Y1 - 2008 A1 - Sen,Prithviraj A1 - Namata,Galileo A1 - Bilgic,Mustafa A1 - Getoor, Lise A1 - Galligher,Brian A1 - Eliassi-Rad,Tina AB - Collective Classification in Network Data VL - 29 SN - 0738-4602 UR - http://www.aaai.org/ojs/index.php/aimagazine/article/viewArticle/2157 CP - 3 M3 - 10.1609/aimag.v29i3.2157 ER - TY - CONF T1 - On the Comparison of Network Attack Datasets: An Empirical Analysis Y1 - 2008 A1 - Berthier,R. A1 - Korman,D. A1 - Michel Cukier A1 - Hiltunen,M. A1 - Vesonder,G. A1 - Sheleheda,D. KW - ATLAS KW - distributed network telescope KW - Internet KW - intrusion detection systems KW - network attack datasets KW - network malicious activity KW - network security operators KW - security of data AB - Network malicious activity can be collected and reported by various sources using different attack detection solutions. The granularity of these solutions provides either very detailed information (intrusion detection systems, honeypots) or high-level trends (CAIDA, SANS). The problem for network security operators is often to select the sources of information to better protect their network. How much information from these sources is redundant and how much is unique? The goal of this paper is to show empirically that while some global attack events can be correlated across various sensors, the majority of incoming malicious activity has local specificities. This study presents a comparative analysis of four different attack datasets offering three different levels of granularity: 1) two high interaction honeynets deployed at two different locations (i.e., a corporate and an academic environment); 2) ATLAS which is a distributed network telescope from Arbor; and 3) Internet Protecttrade which is a global alerting service from AT amp;T. M3 - 10.1109/HASE.2008.50 ER - TY - JOUR T1 - The Complete Genome Sequence of Thermococcus Onnurineus NA1 Reveals a Mixed Heterotrophic and Carboxydotrophic Metabolism JF - Journal of BacteriologyJ. Bacteriol. Y1 - 2008 A1 - Lee,Hyun Sook A1 - Kang,Sung Gyun A1 - Bae,Seung Seob A1 - Lim,Jae Kyu A1 - Cho,Yona A1 - Kim,Yun Jae A1 - Jeon,Jeong Ho A1 - Cha,Sun-Shin A1 - Kwon,Kae Kyoung A1 - Kim,Hyung-Tae A1 - Park,Cheol-Joo A1 - Lee,Hee-Wook A1 - Kim,Seung Il A1 - Jongsik Chun A1 - Rita R Colwell A1 - Kim,Sang-Jin A1 - Lee,Jung-Hyun AB - Members of the genus Thermococcus, sulfur-reducing hyperthermophilic archaea, are ubiquitously present in various deep-sea hydrothermal vent systems and are considered to play a significant role in the microbial consortia. We present the complete genome sequence and feature analysis of Thermococcus onnurineus NA1 isolated from a deep-sea hydrothermal vent area, which reveal clues to its physiology. Based on results of genomic analysis, T. onnurineus NA1 possesses the metabolic pathways for organotrophic growth on peptides, amino acids, or sugars. More interesting was the discovery that the genome encoded unique proteins that are involved in carboxydotrophy to generate energy by oxidation of CO to CO2, thereby providing a mechanistic basis for growth with CO as a substrate. This lithotrophic feature in combination with carbon fixation via RuBisCO (ribulose 1,5-bisphosphate carboxylase/oxygenase) introduces a new strategy with a complementing energy supply for T. onnurineus NA1 potentially allowing it to cope with nutrient stress in the surrounding of hydrothermal vents, providing the first genomic evidence for the carboxydotrophy in Thermococcus. VL - 190 SN - 0021-9193, 1098-5530 UR - http://jb.asm.org/content/190/22/7491 CP - 22 M3 - 10.1128/JB.00746-08 ER - TY - JOUR T1 - Compressive sensing for background subtraction JF - Computer Vision–ECCV 2008 Y1 - 2008 A1 - Cevher, V. A1 - Sankaranarayanan, A. A1 - Duarte, M. A1 - Reddy, D. A1 - Baraniuk, R. A1 - Chellapa, Rama AB - Compressive sensing (CS) is an emerging field that provides a framework for image recovery using sub-Nyquist sampling rates. The CS theory shows that a signal can be reconstructed from a small set of random projections, provided that the signal is sparse in some basis, e.g., wavelets. In this paper, we describe a method to directly recover background subtracted images using CS and discuss its applications in some communication constrained multi-camera computer vision problems. We show how to apply the CS theory to recover object silhouettes (binary background subtracted images) when the objects of interest occupy a small portion of the camera view, i.e., when they are sparse in the spatial domain. We cast the background subtraction as a sparse approximation problem and provide different solutions based on convex optimization and total variation. In our method, as opposed to learning the background, we learn and adapt a low dimensional compressed representation of it, which is sufficient to determine spatial innovations; object silhouettes are then estimated directly using the compressive samples without any auxiliary image reconstruction. We also discuss simultaneous appearance recovery of the objects using compressive measurements. In this case, we show that it may be necessary to reconstruct one auxiliary image. To demonstrate the performance of the proposed algorithm, we provide results on data captured using a compressive single-pixel camera. We also illustrate that our approach is suitable for image coding in communication constrained problems by using data captured by multiple conventional cameras to provide 2D tracking and 3D shape reconstruction results with compressive measurements. ER - TY - JOUR T1 - Content-based assembly search: A step towards assembly reuse JF - Computer-Aided Design Y1 - 2008 A1 - Deshmukh,Abhijit S. A1 - Banerjee,Ashis Gopal A1 - Gupta, Satyandra K. A1 - Sriram,Ram D. KW - Assembly characteristics KW - Assembly mating conditions KW - Content-based assembly search KW - Graph compatibility AB - The increased use of CAD systems by product development organizations has resulted in the creation of large databases of assemblies. This explosion of assembly data is likely to continue in the future. In many situations, a text-based search alone may not be sufficient to search for assemblies and it may be desirable to search for assemblies based on the content of the assembly models. The ability to perform content-based searches on these databases is expected to help the designers in the following two ways. First, it can facilitate the reuse of existing assembly designs, thereby reducing the design time. Second, a lot of useful designs for manufacturing, and assembly knowledge are implicitly embedded in existing assemblies. Therefore a capability to locate existing assemblies and examine them can be used as a learning tool by designers to learn from the existing assembly designs. This paper describes a system for performing content-based searches on assembly databases. We identify templates for comprehensive search definitions and describe algorithms to perform content-based searches for mechanical assemblies. We also illustrate the capabilities of our system through several examples. VL - 40 SN - 0010-4485 UR - http://www.sciencedirect.com/science/article/pii/S0010448507002424 CP - 2 M3 - 10.1016/j.cad.2007.10.012 ER - TY - RPRT T1 - CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008 Y1 - 2008 A1 - Basili, Victor R. A1 - Dangle,K. A1 - Esker,L. A1 - Marotta,F. A1 - Rus,I. A1 - Brosgol,B. M A1 - Jamin,S. A1 - Arthur,J. D A1 - Ravichandar,R. A1 - Wisnosky,D. E PB - DTIC Document ER - TY - CONF T1 - The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis Y1 - 2008 A1 - Berthier,R. A1 - Michel Cukier KW - attack traffic KW - backscatter KW - darknet sensors KW - external source IP address KW - malicious traffic KW - organization network KW - organization-wide network KW - TCP scan KW - telecommunication congestion control KW - transmission control protocol KW - Transport protocols AB - Darknet sensors have the interesting property of collecting only suspicious traffic, including misconfiguration, backscatter and malicious traffic. The type of traffic collected highly depends on two parameters: the size and the location of the darknet sensor. The goals of this paper are to study empirically the relationship between these two parameters and to try to increase the volume of attackers detected by a given darknet sensor. Our empirical results reveal that on average, on a daily basis, 485 distinct external source IP addresses perform a TCP scan on one of the two /16 networks of our organizationpsilas network. Moreover, a given darknet sensor of 77 IP addresses deployed in the same /16 network collects on average attack traffic from 26% of these attackers. M3 - 10.1109/HASE.2008.54 ER - TY - JOUR T1 - Development of a multi-piece multi-gate mold for manufacturing a flapping wing drive-mechanism JF - Transactions of North American Manufacturing Research Institution of SME Y1 - 2008 A1 - Ananthanarayanan,A. A1 - Bejgerowski,W. A1 - Mueller,D. A1 - Gupta,S.K. AB - Successful realization a flapping wing microair vehicle (MAV) requires development of a light weight drive-mechanism that can convert the continuous rotary motion to oscillatory flapping motion. Molded compliant drive-mechanisms are an attractive design option because of manufacturing scalability and reduction in the number of parts. The unique characteristics of this mechanism require development of a complex multi-piece multi-gate mold design. This paper describes a systematic approach for determining the part shape and size, optimizing the mold pieces, and placing the gates on the multi-piece mold. The novel aspects of this work include (1) selecting non-critical shape features to optimize the mold design and (2) the use of sacrificial structural elements to reduce the impact of the weld lines on the structural performance. The mold developed using our approach was utilized to realize a working flapping wing MAV. VL - 36 UR - http://web.mit.edu/arvinda/www/NAMRI_2008_Draft.pdf ER - TY - JOUR T1 - Discarte: a disjunctive internet cartographer JF - ACM SIGCOMM Computer Communication Review Y1 - 2008 A1 - Sherwood,R. A1 - Bender,A. A1 - Spring, Neil VL - 38 CP - 4 ER - TY - JOUR T1 - Dynamic Rebinding for Marshalling and Update, Via Redex-Time and Destruct-Time Reduction JF - Journal of Functional Programming Y1 - 2008 A1 - Sewell,Peter A1 - Stoyle,Gareth A1 - Hicks, Michael W. A1 - Bierman,Gavin A1 - Wansbrough,Keith AB - Most programming languages adopt static binding, but for distributed programming an exclusive reliance on static binding is too restrictive: dynamic binding is required in various guises, for example, when a marshalled value is received from the network, containing identifiers that must be rebound to local resources. Typically, it is provided only by ad hoc mechanisms that lack clean semantics. In this paper, we adopt a foundational approach, developing core dynamic rebinding mechanisms as extensions to the simply typed call-by-value λ calculus. To do so, we must first explore refinements of the call-by-value reduction strategy that delay instantiation, to ensure computations make use of the most recent versions of rebound definitions. We introduce redex-time and destruct-time strategies. The latter forms the basis for a λmarsh calculus that supports dynamic rebinding of marshalled values, while remaining as far as possible statically typed. We sketch an extension of λmarsh with concurrency and communication, giving examples showing how wrappers for encapsulating untrusted code can be expressed. Finally, we show that a high-level semantics for dynamic updating can also be based on the destruct-time strategy, defining a λupdate calculus with simple primitives to provide type-safe updating of running code. We show how the ideas of this simple calculus extend to more real-world, module-level dynamic updating in the style of Erlang. We thereby establish primitives and a common semantic foundation for a variety of real-world dynamic rebinding requirements. VL - 18 CP - 04 M3 - 10.1017/S0956796807006600 ER - TY - CONF T1 - Effective label acquisition for collective classification T2 - Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining Y1 - 2008 A1 - Bilgic,Mustafa A1 - Getoor, Lise KW - active inference KW - collective classification KW - label acquisition AB - Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes. A variety of techniques have been introduced and methods that combine attribute information and neighboring label information have been shown to be effective for collective labeling of the nodes in a network. However, in part because of the correlation between node labels that the techniques exploit, it is easy to find cases in which, once a misclassification is made, incorrect information propagates throughout the network. This problem can be mitigated if the system is allowed to judiciously acquire the labels for a small number of nodes. Unfortunately, under relatively general assumptions, determining the optimal set of labels to acquire is intractable. Here we propose an acquisition method that learns the cases when a given collective classification algorithm makes mistakes, and suggests acquisitions to correct those mistakes. We empirically show on both real and synthetic datasets that this method significantly outperforms a greedy approximate inference approach, a viral marketing approach, and approaches based on network structural measures such as node degree and network clustering. In addition to significantly improving accuracy with just a small amount of labeled data, our method is tractable on large networks. JA - Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining T3 - KDD '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-193-4 UR - http://doi.acm.org/10.1145/1401890.1401901 M3 - 10.1145/1401890.1401901 ER - TY - JOUR T1 - Efficient and Resilient Backbones for Multihop Wireless Networks JF - Mobile Computing, IEEE Transactions on Y1 - 2008 A1 - Lee,Seungjoon A1 - Bhattacharjee, Bobby A1 - Srinivasan, Aravind A1 - Khuller, Samir KW - algorithm;protocols;wireless KW - backbone KW - channels; KW - CONSTRUCTION KW - distributed KW - networks;parameterized KW - protocol;multihop KW - wireless AB - We consider the problem of finding "backbones" in multihop wireless networks. The backbone provides end-to-end connectivity, allowing nonbackbone nodes to save energy since they do not have to route nonlocal data or participate in the routing protocol. Ideally, such a backbone would be small, consist primarily of high capacity nodes, and remain connected even when nodes are mobile or fail. Unfortunately, it is often infeasible to construct a backbone that has all of these properties; e.g., a small optimal backbone is often too sparse to handle node failures or high mobility. We present a parameterized backbone construction algorithm that permits explicit trade-offs between backbone size, resilience to node movement and failure, energy consumption, and path lengths. We prove that our scheme can construct essentially best possible backbones (with respect to energy consumption and backbone size) when the network is relatively static. We generalize our scheme to build more robust structures better suited to networks with higher mobility. We present a distributed protocol based upon our algorithm and show that this protocol builds and maintains a connected backbone in dynamic networks. Finally, we present detailed packet-level simulation results to evaluate and compare our scheme with existing energy-saving techniques. Our results show that, depending on the network environment, our scheme increases network lifetimes by 20 percent to 220 percent without adversely affecting delivery ratio or end-to-end latency. VL - 7 SN - 1536-1233 CP - 11 M3 - 10.1109/TMC.2008.69 ER - TY - CHAP T1 - Energy Efficient Monitoring in Sensor Networks T2 - LATIN 2008: Theoretical InformaticsLATIN 2008: Theoretical Informatics Y1 - 2008 A1 - Deshpande, Amol A1 - Khuller, Samir A1 - Malekian,Azarakhsh A1 - Toossi,Mohammed ED - Laber,Eduardo ED - Bornstein,Claudson ED - Nogueira,Loana ED - Faria,Luerbio AB - In this paper we study a set of problems related to efficient energy management for monitoring applications in wireless sensor networks. We study several generalizations of a basic problem called Set k -Cover, which can be described as follows: we are given a set of sensors, and a set of regions to be monitored. Each region can be monitored by a subset of the sensors. To increase the lifetime of the sensor network, we would like to partition the sensors into k sets (or time-slots) and activate each partition in a different time-slot. The goal is to find the partitioning that maximizes the coverage of the regions. This problem is known to be NP -hard. We first develop improved approximation algorithms for this problem based on its similarities to the max k -cut problem. We then consider a variation, called Set ( k , α )-cover, where each sensor is allowed to be active in α different time-slots. We develop a randomized routing algorithm for this problem. We then consider extensions where each sensor can monitor only a bounded number of regions in any time-slot. We develop the first approximation algorithms for this problem. An experimental evaluation of the algorithms we propose can be found in the full version of the paper. JA - LATIN 2008: Theoretical InformaticsLATIN 2008: Theoretical Informatics T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 4957 SN - 978-3-540-78772-3 UR - http://dx.doi.org/10.1007/978-3-540-78773-0_38 ER - TY - JOUR T1 - Enhancing In-Car Navigation Systems with Personal Experience JF - Transportation Research Record: Journal of the Transportation Research Board Y1 - 2008 A1 - Bederson, Benjamin B. A1 - Clamage,Aaron A1 - Plaisant, Catherine AB - Computers are extremely powerful for data processing but less adept at handling problems that involve subjective reasoning. People, on the other hand, are good at such tasks. A framework is presented for adding subjective human experience to in-car navigation systems. People often rely on personal experience when planning trips, choosing the route that is fastest, prettiest, or recommended by a friend. A set of methods was developed to help people record personal driving history, add textual annotations describing subjective experiences, and share data with friends and family or even the broader community. Users can then learn from personal data or harness the multiplicity of individual experiences to enjoy new routes. This approach can be used in conjunction with traditional in-car navigation systems. VL - 2064 UR - http://dx.doi.org/10.3141/2064-06 CP - -1 M3 - 10.3141/2064-06 ER - TY - CHAP T1 - An Environment for Conducting Families of Software Engineering Experiments T2 - Software Development Y1 - 2008 A1 - Hochstein, Lorin A1 - Nakamura,Taiga A1 - Shull, Forrest A1 - Zazworka, Nico A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V ED - Zelkowitz, Marvin V AB - The classroom is a valuable resource for conducting software engineering experiments. However, coordinating a family of experiments in classroom environments presents a number of challenges to researchers. Understanding how to run such experiments, developing procedures to collect accurate data, and collecting data that is consistent across multiple studies are major problems. This paper describes an environment, the Experiment Manager that simplifies the process of collecting, managing, and sanitizing data from classroom experiments, while minimizing disruption to natural subject behavior. We have successfully used this environment to study the impact of parallel programming languages in the high‐performance computing domain on programmer productivity at multiple universities across the United States. JA - Software Development PB - Elsevier VL - Volume 74 SN - 0065-2458 UR - http://www.sciencedirect.com/science/article/pii/S0065245808006050 ER - TY - JOUR T1 - Environmental signatures associated with cholera epidemics JF - Proceedings of the National Academy of Sciences Y1 - 2008 A1 - Constantin de Magny,G. A1 - Murtugudde,R. A1 - Sapiano,M. R. P. A1 - Nizam,A. A1 - Brown,C. W. A1 - Busalacchi,A. J. A1 - Yunus,M. A1 - Nair,G. B. A1 - Gil,A. I. A1 - Lanata,C. F. A1 - Rita R Colwell AB - The causative agent of cholera, Vibrio cholerae, has been shown to be autochthonous to riverine, estuarine, and coastal waters along with its host, the copepod, a significant member of the zooplankton community. Temperature, salinity, rainfall and plankton have proven to be important factors in the ecology of V. cholerae, influencing the transmission of the disease in those regions of the world where the human population relies on untreated water as a source of drinking water. In this study, the pattern of cholera outbreaks during 1998–2006 in Kolkata, India, and Matlab, Bangladesh, and the earth observation data were analyzed with the objective of developing a prediction model for cholera. Satellite sensors were used to measure chlorophyll a concentration (CHL) and sea surface temperature (SST). In addition, rainfall data were obtained from both satellite and in situ gauge measurements. From the analyses, a statistically significant relationship between the time series for cholera in Kolkata, India, and CHL and rainfall anomalies was determined. A statistically significant one month lag was observed between CHL anomaly and number of cholera cases in Matlab, Bangladesh. From the results of the study, it is concluded that ocean and climate patterns are useful predictors of cholera epidemics, with the dynamics of endemic cholera being related to climate and/or changes in the aquatic ecosystem. When the ecology of V. cholerae is considered in predictive models, a robust early warning system for cholera in endemic regions of the world can be developed for public health planning and decision making.ecology epidemiology microbiology remote sensing VL - 105 SN - 0027-8424, 1091-6490 UR - http://www.pnas.org/content/105/46/17676 CP - 46 M3 - 10.1073/pnas.0809654105 ER - TY - JOUR T1 - Environmental Vibrio spp., isolated in Mozambique, contain a polymorphic group of integrative conjugative elements and class 1 integrons JF - FEMS Microbiology Ecology Y1 - 2008 A1 - Taviani,Elisa A1 - Ceccarelli,Daniela A1 - Lazaro,Nivalda A1 - Bani,Stefania A1 - Cappuccinelli,Piero A1 - Rita R Colwell A1 - Colombo,Mauro M. KW - ICE KW - integron KW - Mozambique KW - Vibrio AB - Circulation of mobile genetic elements linked to drug resistance spread was studied in Vibrio strains isolated from surface urban water (river and sea) and shellfish samples in 2002–2003 in Maputo, Mozambique. Class 1 integrons and integrating conjugative elements (ICE) were investigated by PCR and mating experiments in strains of major health interest: 10 Vibrio cholerae, six Vibrio parahaemolyticus, two Vibrio alginolyticus and one Vibrio fluvialis. Resistance to at least two antibiotics (predominantly β-lactams) was detected in all the strains, with additional resistances to sulfamethoxazole, spectinomycin, streptomycin and/or trimethoprim. Class 1 integrons contributed partially to the expression of drug resistance and were found in five isolates: four V. cholerae (blaP1 cassette, one strain also contained the dfrA15 cassette) and one V. alginolyticus (aadA2 cassette). ICEs, apparently devoid of resistance genes, were found in eight V. cholerae, three V. parahaemolyticus and one V. fluvialis isolates. A wide variability was observed by molecular characterization of ICEs. Five ICEs were included in the SXT/R391 family and seven ICEs were not classified. Our results indicate that the SXT/R391 family and related ICEs comprise a large class of polymorphic genetic elements widely circulating in environmental Vibrio strains in Africa, beside those evidently linked to drug resistance in clinical isolates. VL - 64 SN - 1574-6941 UR - http://onlinelibrary.wiley.com/doi/10.1111/j.1574-6941.2008.00455.x/full CP - 1 M3 - 10.1111/j.1574-6941.2008.00455.x ER - TY - CHAP T1 - Expanding the reach of Grid computing: combining Globus- and BOINC-based systems T2 - Grids for Bioinformatics and Computational BiologyGrids for Bioinformatics and Computational Biology Y1 - 2008 A1 - Myers,D. S A1 - Bazinet,A. L A1 - Cummings, Michael P. ED - Talbi,E-G ED - Zomaya,AY JA - Grids for Bioinformatics and Computational BiologyGrids for Bioinformatics and Computational Biology T3 - Wiley Book Series on Bioinformatics: Computational Techniques and Engineering PB - Wiley-Interscience CY - Hoboken ER - TY - JOUR T1 - Exurbia from the bottom-up: Confronting empirical challenges to characterizing a complex system JF - Geoforum Y1 - 2008 A1 - Brown,Daniel G. A1 - Robinson,Derek T. A1 - An,Li A1 - Nassauer,Joan I. A1 - Zellner,Moira A1 - Rand, William A1 - Riolo,Rick A1 - Page,Scott E. A1 - Low,Bobbi A1 - Wang,Zhifang KW - Ecological effects KW - Land-cover change KW - Land-use change KW - spatial modeling KW - Urban sprawl AB - We describe empirical results from a multi-disciplinary project that support modeling complex processes of land-use and land-cover change in exurban parts of Southeastern Michigan. Based on two different conceptual models, one describing the evolution of urban form as a consequence of residential preferences and the other describing land-cover changes in an exurban township as a consequence of residential preferences, local policies, and a diversity of development types, we describe a variety of empirical data collected to support the mechanisms that we encoded in computational agent-based models. We used multiple methods, including social surveys, remote sensing, and statistical analysis of spatial data, to collect data that could be used to validate the structure of our models, calibrate their specific parameters, and evaluate their output. The data were used to investigate this system in the context of several themes from complexity science, including have (a) macro-level patterns; (b) autonomous decision making entities (i.e., agents); (c) heterogeneity among those entities; (d) social and spatial interactions that operate across multiple scales and (e) nonlinear feedback mechanisms. The results point to the importance of collecting data on agents and their interactions when producing agent-based models, the general validity of our conceptual models, and some changes that we needed to make to these models following data analysis. The calibrated models have been and are being used to evaluate landscape dynamics and the effects of various policy interventions on urban land-cover patterns. VL - 39 SN - 0016-7185 UR - http://www.sciencedirect.com/science/article/pii/S0016718507000371 CP - 2 M3 - 10.1016/j.geoforum.2007.02.010 ER - TY - CONF T1 - Fixing ally's growing pains with velocity modeling T2 - Proceedings of the 8th ACM SIGCOMM conference on Internet measurement Y1 - 2008 A1 - Bender,Adam A1 - Sherwood,Rob A1 - Spring, Neil KW - alias resolution KW - ally KW - ip identifier KW - velocity modeling AB - Mapping the router topology is an important component of Internet measurement. Alias resolution, the process of mapping IP addresses to routers, is critical to accurate Internet mapping. Ally, a popular alias resolution tool, was developed to resolve aliases in individual ISPs, but its probabilistic accuracy and need to send O(n2) probes to infer aliases among n IP addresses make it unappealing for large-scale Internet mapping. In this paper, we present RadarGun, a tool that uses IP identifier velocity modeling to improve the accuracy and scalability of the Ally-based resolution technique. We provide analytical bounds on Ally's accuracy and validate our predicted aliases against Ally. Additionally, we show that velocity modeling requires only O(n) probes and thus scales to Internet-sized mapping efforts. JA - Proceedings of the 8th ACM SIGCOMM conference on Internet measurement T3 - IMC '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-334-1 UR - http://doi.acm.org/10.1145/1452520.1452560 M3 - 10.1145/1452520.1452560 ER - TY - CONF T1 - A Framework for Software Engineering Experimental Replications T2 - Engineering of Complex Computer Systems, 2008. ICECCS 2008. 13th IEEE International Conference on Y1 - 2008 A1 - Mendonca,M.G. A1 - Maldonado,J.C. A1 - de Oliveira,M.C.F. A1 - Carver, J. A1 - Fabbri,C.P.F. A1 - Shull, F. A1 - Travassos,G.H. A1 - Hohn,E.N. A1 - Basili, Victor R. KW - engineering KW - engineering; KW - evidence;experimental KW - experimental KW - Experiments;experimental KW - for KW - Framework KW - Improving KW - knowledge KW - of KW - replication KW - replication;software KW - sharing;software KW - the KW - transfer;knowledge AB - Experimental replications are very important to the advancement of empirical software engineering. Replications are one of the key mechanisms to confirm previous experimental findings. They are also used to transfer experimental knowledge, to train people, and to expand a base of experimental evidence. Unfortunately, experimental replications are difficult endeavors. It is not easy to transfer experimental know-how and experimental findings. Based on our experience, this paper discusses this problem and proposes a Framework for Improving the Replication of Experiments (FIRE). The FIRE addresses knowledge sharing issues both at the intra-group (internal replications) and inter-group (external replications) levels. It encourages coordination of replications in order to facilitate knowledge transfer for lower cost, higher quality replications and more generalizable results. JA - Engineering of Complex Computer Systems, 2008. ICECCS 2008. 13th IEEE International Conference on M3 - 10.1109/ICECCS.2008.38 ER - TY - CONF T1 - GoGoBot: group collaboration, multi-agent modeling, and robots T2 - Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems: demo papers Y1 - 2008 A1 - Rand, William A1 - Blikstein,Paulo A1 - Wilensky,Uri KW - multi-agent simulation KW - participatory simulation KW - ROBOTICS AB - Multi-agent simulation is a powerful technique used to encode real-world simple rules in virtual agents and then simulate their interactions [1]. Participatory simulations are similar to multi-agent simulation except individuals play the role of virtual agents, sometimes in combination with these virtual agents [2]. Finally, the bifocal modeling framework has enabled the examination of agents embodied in physical entities using sensors and actuators [3]. All three of these technologies are concerned with the creation, manipulation, and development of agents in one form or another. Thus combining these three disparate systems in to one unified platform would be useful. Multi-agent simulation platforms, participatory simulations, and bifocal modeling have all been demonstrated separately in the past. However many extant systems are difficult if not impossible to integrate. JA - Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems: demo papers T3 - AAMAS '08 PB - International Foundation for Autonomous Agents and Multiagent Systems CY - Richland, SC UR - http://dl.acm.org/citation.cfm?id=1402744.1402780 ER - TY - CONF T1 - Growth of the flickr social network T2 - Proceedings of the first workshop on Online social networks Y1 - 2008 A1 - Mislove,Alan A1 - Koppula,Hema Swetha A1 - Gummadi,Krishna P. A1 - Druschel,Peter A1 - Bhattacharjee, Bobby KW - growth KW - measurement KW - social networks AB - Online social networking sites like MySpace, Orkut, and Flickr are among the most popular sites on the Web and continue to experience dramatic growth in their user population. The popularity of these sites offers a unique opportunity to study the dynamics of social networks at scale. Having a proper understanding of how online social networks grow can provide insights into the network structure, allow predictions of future growth, and enable simulation of systems on networks of arbitrary size. However, to date, most empirical studies have focused on static network snapshots rather than growth dynamics. In this paper, we collect and examine detailed growth data from the Flickr online social network, focusing on the ways in which new links are formed. Our study makes two contributions. First, we collect detailed data covering three months of growth, encompassing 950,143 new users and over 9.7 million new links, and we make this data available to the research community. Second, we use a first-principles approach to investigate the link formation process. In short, we find that links tend to be created by users who already have many links, that users tend to respond to incoming links by creating links back to the source, and that users link to other users who are already close in the network. JA - Proceedings of the first workshop on Online social networks T3 - WOSN '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-182-8 UR - http://doi.acm.org/10.1145/1397735.1397742 M3 - 10.1145/1397735.1397742 ER - TY - CONF T1 - Hci for community and international development T2 - SIGCHI EA '08 Y1 - 2008 A1 - Thomas, John A1 - Dearden, Andy A1 - Dray, Susan A1 - Light, Ann A1 - Best, Michael A1 - Arkin, Nuray A1 - Maunder, Andrew A1 - Kam, Mathew A1 - Marshini Chetty A1 - Sambasivan, Nithya A1 - Buckhalter, Celeste A1 - Krishnan, Gaurishankar KW - community design KW - ict4d KW - information and communication technology KW - international development KW - participatory design KW - ucd4id KW - User centered design AB - This workshop explores the challenges in applying, extending and inventing appropriate methods and contributions of Human Computer Interaction (HCI) to International economic and community Development. We address interaction design for parts of the world that are often marginalized by the Global North as well as people in the Global North who are themselves similarly marginalized by poverty or other barriers. We hope to extend the boundaries of the field of Human Computer Interaction by spurring a discussion on how existing methods and practices can be adapted and modified, and how new practices can be developed, to deal with the unique challenges posed by these contexts. JA - SIGCHI EA '08 T3 - CHI EA '08 PB - ACM SN - 978-1-60558-012-8 UR - http://doi.acm.org/10.1145/1358628.1358954 ER - TY - JOUR T1 - Hierarchical infrastructure for internet mapping services JF - Geospatial Services and Applications for the Internet Y1 - 2008 A1 - Brabec,F. A1 - Samet, Hanan M3 - 10.1007/978-0-387-74674-6_1 ER - TY - RPRT T1 - High Performance Computing Algorithms for Land Cover Y1 - 2008 A1 - Dynamics Using Remote A1 - Satya Kalluri A1 - Bader,David A. A1 - John Townshend A1 - JaJa, Joseph F. A1 - Zengyan Zhang A1 - Fallah-adl,Hassan AB - Global and regional land cover studies require the ability to apply complex models on selected subsets of large amounts of multi-sensor and multi-temporal data sets that have been derived from raw instrument measurements using widely accepted pre-processing algorithms. The computational and storage requirements of most such studies far exceed what is possible on a single workstation environment. We have been pursuing a new approach that couples scalable and open distributed heterogeneous hardware with the development of high performance software for processing, indexing, and organizing remotely sensed data. Hierarchical data management tools are used to ingest raw data, create metadata, and organize the archived data so as to automatically achieve computational load balancing among the available nodes and minimize I/O overheads. We illustrate our approach with four specific examples. The first is the development of the first fast operational scheme for the atmospheric correction of Landsat TM scenes, while the second example focuses on image segmentation using a novel hierarchical connected components algorithm. Retrieval of global BRDF (Bidirectional Reflectance Distribution Function) in the red and near infrared wavelengths using four years (1983 to 1986) of Pathfinder AVHRR Land (PAL) data set is the focus of our third example. The fourth example is the development of a hierarchical data organization scheme that allows on-demand processing and retrieval of regional and global AVHRR data sets. Our results show that substantial improvements in computational times can be achieved by using the high performance computing technology. PB - CiteSeerX UR - http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.4213 ER - TY - RPRT T1 - Hosting virtual networks on commodity hardware Y1 - 2008 A1 - Bhatia,S. A1 - Motiwala,M. A1 - Muhlbauer,W. A1 - Valancius,V. A1 - Bavier,A. A1 - Feamster, Nick A1 - Peterson,L. A1 - Rexford,J. AB - This paper describes Trellis, a software platform for hostingmultiple virtual networks on shared commodity hardware. Trellis allows each virtual network to define its own topol- ogy, control protocols, and forwarding tables, which low- ers the barrier for deploying custom services on an isolated, reconfigurable, and programmable network, while amor- tizing costs by sharing the physical infrastructure. Trellis synthesizes two container-based virtualization technologies, VServer and NetNS, as well as a new tunneling mechanism, EGRE, into a coherent platform that enables high-speed vir- tual networks. We describe the design and implementation, of Trellis, including kernel-level performance optimizations, and evaluate its supported packet-forwarding rates against other virtualization technologies. We are in the process of upgrading the VINI facility to use Trellis. We also plan to release Trellis as part of MyVINI, a standalone software dis- tribution that allows researchers and application developers to deploy their own virtual network hosting platforms. PB - Georgia Institute of Technology VL - GT-CS-07-10 ER - TY - CONF T1 - Integrating categorical resource types into a P2P desktop grid system T2 - Grid Computing, 2008 9th IEEE/ACM International Conference on Y1 - 2008 A1 - Kim,Jik-Soo A1 - Nam,Beomseok A1 - Marsh,M. A1 - Keleher,P. A1 - Bhattacharjee, Bobby A1 - Sussman, Alan KW - computing;peer-to-peer KW - computing;protocols; KW - computing;protocols;scalability KW - desktop KW - Grid KW - grid;distributed KW - grid;peer-to-peer KW - N-dimensional KW - resource KW - space;P2P KW - system;categorical KW - technique;grid KW - types;decentralized AB - We describe and evaluate a set of protocols that implement a distributed, decentralized desktop grid. Incoming jobs are matched with system nodes through proximity in an N-dimensional resource space. This work improves on prior work by (1) efficiently accommodating node and job characterizations that include both continuous and categorical resource types, and (2) scaling gracefully to large system sizes even with highly non-uniform distributions of job and node types. We use extensive simulation results to show that the resulting system handles both continuous and categorical constraints efficiently, and that the new scalability techniques are effective. JA - Grid Computing, 2008 9th IEEE/ACM International Conference on M3 - 10.1109/GRID.2008.4662810 ER - TY - JOUR T1 - Interactive Entity Resolution in Relational Data: A Visual Analytic Tool and Its Evaluation JF - IEEE Transactions on Visualization and Computer Graphics Y1 - 2008 A1 - Kang,Hyunmo A1 - Getoor, Lise A1 - Shneiderman, Ben A1 - Bilgic,M. A1 - Licamele,L. KW - algorithms KW - Computer Graphics KW - D-Dupe KW - data visualisation KW - database management systems KW - Databases, Factual KW - graphical user interface KW - Graphical user interfaces KW - human-centered computing KW - Image Interpretation, Computer-Assisted KW - Information Storage and Retrieval KW - Information Visualization KW - interactive entity resolution KW - relational context visualization KW - Relational databases KW - relational entity resolution algorithm KW - User interfaces KW - user-centered design KW - User-Computer Interface KW - visual analytic tool AB - Databases often contain uncertain and imprecise references to real-world entities. Entity resolution, the process of reconciling multiple references to underlying real-world entities, is an important data cleaning process required before accurate visualization or analysis of the data is possible. In many cases, in addition to noisy data describing entities, there is data describing the relationships among the entities. This relational data is important during the entity resolution process; it is useful both for the algorithms which determine likely database references to be resolved and for visual analytic tools which support the entity resolution process. In this paper, we introduce a novel user interface, D-Dupe, for interactive entity resolution in relational data. D-Dupe effectively combines relational entity resolution algorithms with a novel network visualization that enables users to make use of an entity's relational context for making resolution decisions. Since resolution decisions often are interdependent, D-Dupe facilitates understanding this complex process through animations which highlight combined inferences and a history mechanism which allows users to inspect chains of resolution decisions. An empirical study with 12 users confirmed the benefits of the relational context visualization on the performance of entity resolution tasks in relational data in terms of time as well as users' confidence and satisfaction. VL - 14 SN - 1077-2626 CP - 5 M3 - 10.1109/TVCG.2008.55 ER - TY - CHAP T1 - The Lattice Project: a Grid research and production environment combining multiple Grid computing models T2 - Distributed & Grid Computing — Science Made Transparent for Everyone. Principles, Applications and Supporting CommunitiesDistributed & Grid Computing — Science Made Transparent for Everyone. Principles, Applications and Supporting Communities Y1 - 2008 A1 - Bazinet,A. L A1 - Cummings, Michael P. ED - Weber,MHW JA - Distributed & Grid Computing — Science Made Transparent for Everyone. Principles, Applications and Supporting CommunitiesDistributed & Grid Computing — Science Made Transparent for Everyone. Principles, Applications and Supporting Communities PB - Rechenkraft.net CY - Marburg ER - TY - CONF T1 - Leveraging social context for searching social media T2 - Proceedings of the 2008 ACM workshop on Search in social media Y1 - 2008 A1 - Smith,Marc A1 - Barash,Vladimir A1 - Getoor, Lise A1 - Lauw,Hady W. KW - social context KW - social media KW - social search AB - The ability to utilize and benefit from today's explosion of social media sites depends on providing tools that allow users to productively participate. In order to participate, users must be able to find resources (both people and information) that they find valuable. Here, we argue that in order to do this effectively, we should make use of a user's "social context". A user's social context includes both their personal social context (their friends and the communities to which they belong) and their community social context (their role and identity in different communities). JA - Proceedings of the 2008 ACM workshop on Search in social media T3 - SSM '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-258-0 UR - http://doi.acm.org/10.1145/1458583.1458602 M3 - 10.1145/1458583.1458602 ER - TY - CONF T1 - Matchmaking and implementation issues for a P2P desktop grid T2 - Parallel and Distributed Processing, 2008. IPDPS 2008. IEEE International Symposium on Y1 - 2008 A1 - Marsh,M. A1 - Kim,Jik-Soo A1 - Nam,Beomseok A1 - Jaehwan Lee A1 - Ratanasanya,S. A1 - Bhattacharjee, Bobby A1 - Keleher,P. A1 - Richardson,D. A1 - Wellnitz,D. KW - computing KW - computing; KW - computing;peer-to-peer KW - desktop KW - grid;decentralized KW - grid;grid KW - grid;peer-to-peer KW - P2P AB - We present some recent and ongoing work in our decentralized desktop computing grid project. Specifically, we discuss matching jobs with compute nodes in a peer-to-peer grid of heterogeneous platforms, and the implementation of our algorithms in a concrete system. JA - Parallel and Distributed Processing, 2008. IPDPS 2008. IEEE International Symposium on M3 - 10.1109/IPDPS.2008.4536388 ER - TY - JOUR T1 - Maternal depletion of CTCF reveals multiple functions during oocyte and preimplantation embryo development JF - Development Y1 - 2008 A1 - Wan,Le-Ben A1 - Pan,Hua A1 - Hannenhalli, Sridhar A1 - Cheng,Yong A1 - Ma,Jun A1 - Fedoriw,Andrew A1 - Lobanenkov,Victor A1 - Latham,Keith E. A1 - Schultz,Richard M. A1 - Bartolomei,Marisa S. AB - CTCF is a multifunctional nuclear factor involved in epigenetic regulation. Despite recent advances that include the systematic discovery of CTCF-binding sites throughout the mammalian genome, the in vivo roles of CTCF in adult tissues and during embryonic development are largely unknown. Using transgenic RNAi, we depleted maternal stores of CTCF from growing mouse oocytes, and identified hundreds of misregulated genes. Moreover, our analysis suggests that CTCF predominantly activates or derepresses transcription in oocytes. CTCF depletion causes meiotic defects in the egg, and mitotic defects in the embryo that are accompanied by defects in zygotic gene expression, and culminate in apoptosis. Maternal pronuclear transfer and CTCF mRNA microinjection experiments indicate that CTCF is a mammalian maternal effect gene, and that persistent transcriptional defects rather than persistent chromosomal defects perturb early embryonic development. This is the first study detailing a global and essential role for CTCF in mouse oocytes and preimplantation embryos. VL - 135 UR - http://dev.biologists.org/content/135/16/2729.abstract CP - 16 M3 - 10.1242/dev.024539 ER - TY - RPRT T1 - Measures and Risk Indicators for Early Insight into Software Safety. Development of Fault-Tolerant Systems Y1 - 2008 A1 - Basili, Victor R. A1 - Marotta,Frank A1 - Dangle,Kathleen A1 - Esker,Linda A1 - Rus,Ioana KW - *SOFTWARE ENGINEERING KW - *SYSTEM SAFETY KW - COMPUTER PROGRAMMING AND SOFTWARE KW - fault tolerant computing KW - INDICATORS KW - measurement KW - REPRINTS KW - risk KW - SAFETY ENGINEERING AB - Software contributes an ever-increasing level of functionality and control in today's systems. This increased use of software can dramatically increase the complexity and time needed to evaluate the safety of a system. Although the actual system safety cannot be verified during its development, measures can reveal early insights into potential safety problems and risks. An approach for developing early software safety measures is presented in this article. The approach and the example software measures presented are based on experience working with the safety engineering group on a large Department of Defense program. PB - ABERDEEN TEST CENTER MD UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA487120 ER - TY - CONF T1 - Measuring 1st order stretchwith a single filter T2 - IEEE International Conference on Acoustics, Speech and Signal Processing, 2008. ICASSP 2008 Y1 - 2008 A1 - Bitsakos,K. A1 - Domke, J. A1 - Fermüller, Cornelia A1 - Aloimonos, J. KW - Cepstral analysis KW - Educational institutions KW - filter KW - filtering theory KW - Fourier transforms KW - Frequency domain analysis KW - Frequency estimation KW - Gabor filters KW - Image analysis KW - IMAGE PROCESSING KW - linear stretch measurement KW - local signal transformation measurement KW - Nonlinear filters KW - Phase estimation KW - Signal analysis KW - Speech processing AB - We analytically develop a filter that is able to measure the linear stretch of the transformation around a point, and present results of applying it to real signals. We show that this method is a real-time alternative solution for measuring local signal transformations. Experimentally, this method can accurately measure stretch, however, it is sensitive to shift. JA - IEEE International Conference on Acoustics, Speech and Signal Processing, 2008. ICASSP 2008 PB - IEEE SN - 978-1-4244-1483-3 M3 - 10.1109/ICASSP.2008.4517758 ER - TY - JOUR T1 - Memory-constrained block processing for dsp software optimization JF - Journal of Signal Processing Systems Y1 - 2008 A1 - Ko,M. Y A1 - Shen,C. C A1 - Bhattacharyya, Shuvra S. VL - 50 CP - 2 ER - TY - CONF T1 - Methods to directly measure the trapping potential in optical tweezers Y1 - 2008 A1 - Balijepalli,A. A1 - LeBrun,T. W. A1 - Gorman,J. J. A1 - Gupta,S.K. AB - Techniques to measure the trapping force in an optical tweezers without any prior assumptions about the trapshape have been developed. The response of a trapped micro or nanoparticle to a step input is measured and then used to calculate the trapping force experienced by the particle as a function of it’s position in the trap. This method will provide new insight into the trapping behavior of nanoparticles, which are more weakly bound than microparticles and thereby explore larger regions of the trapping potential due to Brownian motion. Langevin dynamics simulations are presented to model the system and are used to demonstrate this technique. Preliminary experimental results are then presented to validate the simulations. Finally, the measured trapping forces, from simulations and laboratory experiments, are integrated to recover the trapping potential. UR - http://144.206.159.178/FT/CONF/16419087/16419102.pdf ER - TY - CONF T1 - Motivating participation in internet routing overlays T2 - Proceedings of the 3rd international workshop on Economics of networked systems Y1 - 2008 A1 - Levin,Dave A1 - Baden,Randolph A1 - Lumezanu,Cristian A1 - Spring, Neil A1 - Bhattacharjee, Bobby KW - incentives KW - internet routing overlays KW - service-level agreements AB - PeerWise is an Internet routing overlay that reduces end-to-end latencies by allowing peers to forward through a relay instead of connecting directly to their destinations. Fundamental to PeerWise is the notion of peering agreements between two peers, wherein they agree to forward for one another. In this paper, we consider the problem of motivating users to establish and maintain peerings in a completely decentralized, scalable manner. We show that routing overlays present unique challenges and goals. For instance, since participants can always "fall back" on standard Internet routing, we must encourage users to stay in the system and maintain long-lived peering agreements. To address these challenges, we propose two mechanisms: First, we use Service Level Agreements (SLAs) to expressively negotiate peers' demands and the recourses they will take when SLAs are violated. Second, we propose a mechanism to address SLA violations that differs from the standard notion of punishment via service degradation. Our simulation results demonstrate that our mechanism causes peers to avoid SLA violators in favor of long-lived peerings. Lastly, we discuss potential, emergent behaviors in a selfish routing overlay. JA - Proceedings of the 3rd international workshop on Economics of networked systems T3 - NetEcon '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-179-8 UR - http://doi.acm.org/10.1145/1403027.1403048 M3 - 10.1145/1403027.1403048 ER - TY - CONF T1 - Multi-biometric cohort analysis for biometric fusion T2 - Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on Y1 - 2008 A1 - Aggarwal,G. A1 - Ratha,N. K A1 - Bolle, R.M. A1 - Chellapa, Rama KW - (access KW - analysis;biometrics KW - biometric KW - biometrics;fingerprint KW - biometrics;multi-biometric KW - cohort KW - control);face KW - data; KW - decisions;face KW - fusion;biometric KW - identification;security KW - MATCHING KW - of KW - recognition;fingerprint AB - Biometric matching decisions have traditionally been made based solely on a score that represents the similarity of the query biometric to the enrolled biometric(s) of the claimed identity. Fusion schemes have been proposed to benefit from the availability of multiple biometric samples (e.g., multiple samples of the same fingerprint) or multiple different biometrics (e.g., face and fingerprint). These commonly adopted fusion approaches rarely make use of the large number of non-matching biometric samples available in the database in the form of other enrolled identities or training data. In this paper, we study the impact of combining this information with the existing fusion methodologies in a cohort analysis framework. Experimental results are provided to show the usefulness of such a cohort-based fusion of face and fingerprint biometrics. JA - Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on M3 - 10.1109/ICASSP.2008.4518837 ER - TY - JOUR T1 - Mutations in the Hydrophobic Core of Ubiquitin Differentially Affect Its Recognition by Receptor Proteins JF - Journal of Molecular Biology Y1 - 2008 A1 - Haririnia,Aydin A1 - Verma,Rati A1 - Purohit,Nisha A1 - Twarog,Michael Z. A1 - Deshaies,Raymond J. A1 - Bolon,Dan A1 - Fushman, David KW - hydrophobic core mutation KW - molecular recognition KW - proteasomal degradation KW - ubiquitin KW - ubiquitin receptors AB - Ubiquitin (Ub) is one of the most highly conserved signaling proteins in eukaryotes. In carrying out its myriad functions, Ub conjugated to substrate proteins interacts with dozens of receptor proteins that link the Ub signal to various biological outcomes. Here we report mutations in conserved residues of Ub's hydrophobic core that have surprisingly potent and specific effects on molecular recognition. Mutant Ubs bind tightly to the Ub-associated domain of the receptor proteins Rad23 and hHR23A but fail to bind the Ub-interacting motif present in the receptors Rpn10 and S5a. Moreover, chains assembled on target substrates with mutant Ubs are unable to support substrate degradation by the proteasome in vitro or sustain viability of yeast cells. The mutations have relatively little effect on Ub's overall structure but reduce its rigidity and cause a slight displacement of the C-terminal β-sheet, thereby compromising association with Ub-interacting motif but not with Ub-associated domains. These studies emphasize an unexpected role for Ub's core in molecular recognition and suggest that the diversity of protein–protein interactions in which Ub engages placed enormous constraints on its evolvability. VL - 375 SN - 0022-2836 UR - http://www.sciencedirect.com/science/article/pii/S0022283607014763 CP - 4 M3 - 10.1016/j.jmb.2007.11.016 ER - TY - JOUR T1 - NASDAQ Velocity and Forces: An Interactive Visualization of Activity and Change JF - Journal of Universal Computer Science Y1 - 2008 A1 - Dao,H.T. A1 - Bazinet,A. A1 - Berthier,R. A1 - Shneiderman, Ben VL - 14 CP - 9 ER - TY - CONF T1 - Network-Aware Join Processing in Global-Scale Database Federations T2 - IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008 Y1 - 2008 A1 - Xiaodan Wang A1 - Burns,R. A1 - Terzis,A. A1 - Deshpande, Amol KW - Astronomy KW - Computer networks KW - Concurrent computing KW - global-scale database federations KW - join scheduling algorithms KW - network utilization KW - network-aware join processing KW - parallel schedules KW - polynomial-time algorithm KW - Polynomials KW - Processor scheduling KW - Query processing KW - reduce resource usage KW - Scheduling algorithm KW - Spatial databases KW - spatial-join queries KW - Telecommunication traffic KW - Throughput AB - We introduce join scheduling algorithms that employ a balanced network utilization metric to optimize the use of all network paths in a global-scale database federation. This metric allows algorithms to exploit excess capacity in the network, while avoiding narrow, long-haul paths. We give a two- approximate, polynomial-time algorithm for serial (left-deep) join schedules. We also present extensions to this algorithm that explore parallel schedules, reduce resource usage, and define tradeoffs between computation and network utilization. We evaluate these techniques within the SkyQuery federation of Astronomy databases using spatial-join queries submitted by SkyQuery's users. Experiments show that our algorithms realize near-optimal network utilization with minor computational overhead. JA - IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008 PB - IEEE SN - 978-1-4244-1836-7 M3 - 10.1109/ICDE.2008.4497467 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 2. Cryptophyceae and Synurophyceae JF - Bangladesh Journal of Botany Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents two species of Rhodomonas, four species of Chroomonas, six species of Cryptomonas and Cryptochrysis minor, Cyanomonas coeruleus, Chrysodidymus synuroideus and Mallomonas akrokomos. These species have been reported from some ponds of Mathbaria in Pirojpur and Bakerganj of Barisal district in Bangladesh. VL - 36 SN - 0253-5416 UR - http://www.banglajol.info/bd/index.php/BJB/article/viewArticle/1549 CP - 1 M3 - 10.3329/bjb.v36i1.1549 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 5. Euglena, Euglenocapsa JF - Bangladesh Journal of Plant Taxonomy Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents 20 taxa of the genus Euglena and one species of the rare euglenoid genus Euglenocapsa. All these taxa are reported for the first time from some pond ecosystems of Mathbaria in Pirojpur and Bakerganj of Barisal districts of Bangladesh. VL - 15 SN - 1028-2092 UR - http://www.banglajol.info/index.php/BJPT/article/viewArticle/910 CP - 1 M3 - 10.3329/bjpt.v15i1.910 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 7. Phacus spp. JF - Bangladesh Journal of Botany Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - Thirteen species of Phacus hitherto not reported from Bangladesh have been described and illustrated. Freshwater ponds at southern districts of Pirojpur and Barisal revealed these presence of the species. VL - 37 SN - 0253-5416 UR - http://www.banglajol.info/bd/index.php/BJB/article/viewArticle/1564 CP - 1 M3 - 10.3329/bjb.v37i1.1564 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 8. Trachelomonas Ehr. (Euglenophyceae) JF - Bangladesh Journal of Botany Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - Investigation of pelagic plankton communities from some freshwater ponds of Pirojpur and Barisal districts revealed the presence of 17 species under the genus Trachelomonas Ehr. for the first time in Bangladesh. VL - 37 SN - 0253-5416 UR - http://www.banglajol.info/bd/index.php/BJB/article/viewArticle/1719 CP - 2 M3 - 10.3329/bjb.v37i2.1719 ER - TY - CONF T1 - A Non-generative Approach for Face Recognition Across Aging T2 - Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on Y1 - 2008 A1 - Biswas,S. A1 - Aggarwal,G. A1 - Ramanathan,N. A1 - Chellapa, Rama KW - appearance;nongenerative KW - approach;face KW - Face KW - image KW - matching; KW - recognition;facial KW - recognition;image KW - synthesis;face AB - Human faces undergo a lot of change in appearance as they age. Though facial aging has been studied for decades, it is only recently that attempts have been made to address the problem from a computational point of view. Most of these early efforts follow a simulation approach in which matching is performed by synthesizing face images at the target age. Given the innumerable different ways in which a face can potentially age, the synthesized aged image may not be similar to the actual aged image. In this paper, we bypass the synthesis step and directly analyze the drifts of facial features with aging from a purely matching perspective. Our analysis is based on the observation that facial appearance changes in a coherent manner as people age. We provide measures to capture this coherency in feature drifts. Illustrations and experimental results show the efficacy of such an approach for matching faces across age progression. JA - Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on M3 - 10.1109/BTAS.2008.4699331 ER - TY - CONF T1 - One-handed touchscreen input for legacy applications T2 - Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems Y1 - 2008 A1 - Karlson,A.K. A1 - Bederson, Benjamin B. JA - Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems ER - TY - RPRT T1 - Packets with provenance Y1 - 2008 A1 - Ramachandran,A. A1 - Bhandankar,K. A1 - Tariq,M.B. A1 - Feamster, Nick AB - Traffic classification and distinction allows network operators to provision resources, enforce trust, control unwanted traffic, and traceback unwanted traffic to its source. Today’s classification mechanisms rely primarily on IP addresses and port numbers; unfortunately, these fields are often too coarse and ephemeral, and moreover, they do not reflect traffic’s provenance, associated trust, or relationship to other processes or hosts. This paper presents the design, analysis, user-space implementation, and evaluation of Pedigree, which consists of two components: a trusted tagger that resides on hosts and tags packets with information about their provenance (i.e., identity and history of potential input from hosts and resources for the process that generated them), and an arbiter, which decides what to do with the traffic that carries certain tags. Pedigree allows operators to write traffic classification policies with expressive semantics that reflect properties of the actual process that generated the traffic. Beyond offering new function and flexibility in traffic classification, Pedigree represents a new and interesting point in the design space between filtering and capabilities, and it allows network operators to leverage host-based trust models to decide treatment of network traffic. PB - Georgia Institute of Technology VL - GT-CS-08-02 UR - http://hdl.handle.net/1853/25467 ER - TY - CONF T1 - Photo-based authentication using social networks T2 - Proceedings of the first workshop on Online social networks Y1 - 2008 A1 - Yardi,Sarita A1 - Feamster, Nick A1 - Bruckman,Amy KW - social networks KW - trust AB - We present Lineup, a system that uses the social network graph in Facebook and auxiliary information (e.g., "tagged" user photos) to build a photo-based Web site authentication framework. Lineup's underlying mechanism leverages the concept of CAPTCHAs, programs that are designed to distinguish bots from human users. Lineup extends this functionality to help a Web site ascertain a user's identity or membership in a certain group (e.g., an interest group, invitees to a certain event) in order to infer some level of trust. Lineup works by presenting a user with photographs and asking the user to identify subjects in the photo whom a user with the appropriate identity or group membership should know. We present the design and implementation for Lineup, describe a preliminary prototype implementation, and discuss Lineup's security properties, including possible guarantees and threats. JA - Proceedings of the first workshop on Online social networks T3 - WOSN '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-182-8 UR - http://doi.acm.org/10.1145/1397735.1397748 M3 - 10.1145/1397735.1397748 ER - TY - JOUR T1 - A pilot study to compare programming effort for two parallel programming models JF - Journal of Systems and Software Y1 - 2008 A1 - Hochstein, Lorin A1 - Basili, Victor R. A1 - Vishkin, Uzi A1 - Gilbert,John KW - effort KW - empirical study KW - Message-passing KW - MPI KW - parallel programming KW - PRAM KW - XMT AB - ContextWriting software for the current generation of parallel systems requires significant programmer effort, and the community is seeking alternatives that reduce effort while still achieving good performance. Objective Measure the effect of parallel programming models (message-passing vs. PRAM-like) on programmer effort. Design, setting, and subjects One group of subjects implemented sparse-matrix dense-vector multiplication using message-passing (MPI), and a second group solved the same problem using a PRAM-like model (XMTC). The subjects were students in two graduate-level classes: one class was taught MPI and the other was taught XMTC. Main outcome measures Development time, program correctness. Results Mean XMTC development time was 4.8 h less than mean MPI development time (95% confidence interval, 2.0–7.7), a 46% reduction. XMTC programs were more likely to be correct, but the difference in correctness rates was not statistically significant (p = .16). Conclusions XMTC solutions for this particular problem required less effort than MPI equivalents, but further studies are necessary which examine different types of problems and different levels of programmer experience. VL - 81 SN - 0164-1212 UR - http://www.sciencedirect.com/science/article/pii/S0164121208000125 CP - 11 M3 - 10.1016/j.jss.2007.12.798 ER - TY - CONF T1 - Readability of scanned books in digital libraries T2 - Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems Y1 - 2008 A1 - Quinn,A.J. A1 - Hu,C. A1 - Arisaka,T. A1 - Rose,A. A1 - Bederson, Benjamin B. JA - Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems ER - TY - JOUR T1 - Resolving arthropod phylogeny: exploring phylogenetic signal within 41 kb of protein-coding nuclear gene sequence JF - Syst Biol Y1 - 2008 A1 - Regier,J. C A1 - Shultz,J. W A1 - Ganley,A. R.D A1 - Hussey,A. A1 - Shi,D. A1 - Ball,B. A1 - Zwick,A. A1 - Stajich,J. E A1 - Cummings, Michael P. A1 - Martin,J. W A1 - Cunningham,CW AB - This study attempts to resolve relationships among and within the four basal arthropod lineages (Pancrustacea, Myriapoda, Euchelicerata, Pycnogonida) and to assess the widespread expectation that remaining phylogenetic problems will yield to increasing amounts of sequence data. Sixty-eight regions of 62 protein-coding nuclear genes (approximately 41 kilobases (kb)/taxon) were sequenced for 12 taxonomically diverse arthropod taxa and a tardigrade outgroup. Parsimony, likelihood, and Bayesian analyses of total nucleotide data generally strongly supported the monophyly of each of the basal lineages represented by more than one species. Other relationships within the Arthropoda were also supported, with support levels depending on method of analysis and inclusion/exclusion of synonymous changes. Removing third codon positions, where the assumption of base compositional homogeneity was rejected, altered the results. Removing the final class of synonymous mutations–first codon positions encoding leucine and arginine, which were also compositionally heterogeneous–yielded a data set that was consistent with a hypothesis of base compositional homogeneity. Furthermore, under such a data-exclusion regime, all 68 gene regions individually were consistent with base compositional homogeneity. Restricting likelihood analyses to nonsynonymous change recovered trees with strong support for the basal lineages but not for other groups that were variably supported with more inclusive data sets. In a further effort to increase phylogenetic signal, three types of data exploration were undertaken. (1) Individual genes were ranked by their average rate of nonsynonymous change, and three rate categories were assigned–fast, intermediate, and slow. Then, bootstrap analysis of each gene was performed separately to see which taxonomic groups received strong support. Five taxonomic groups were strongly supported independently by two or more genes, and these genes mostly belonged to the slow or intermediate categories, whereas groups supported only by a single gene region tended to be from genes of the fast category, arguing that fast genes provide a less consistent signal. (2) A sensitivity analysis was performed in which increasing numbers of genes were excluded, beginning with the fastest. The number of strongly supported nodes increased up to a point and then decreased slightly. Recovery of Hexapoda required removal of fast genes. Support for Mandibulata (Pancrustacea + Myriapoda) also increased, at times to "strong" levels, with removal of the fastest genes. (3) Concordance selection was evaluated by clustering genes according to their ability to recover Pancrustacea, Euchelicerata, or Myriapoda and analyzing the three clusters separately. All clusters of genes recovered the three concordance clades but were at times inconsistent in the relationships recovered among and within these clades, a result that indicates that the a priori concordance criteria may bias phylogenetic signal in unexpected ways. In a further attempt to increase support of taxonomic relationships, sequence data from 49 additional taxa for three slow genes (i.e., EF-1 alpha, EF-2, and Pol II) were combined with the various 13-taxon data sets. The 62-taxon analyses supported the results of the 13-taxon analyses and provided increased support for additional pancrustacean clades found in an earlier analysis including only EF-1 alpha, EF-2, and Pol II. VL - 57 CP - 6 M3 - 10.1080/10635150802570791 ER - TY - JOUR T1 - A review of overview+ detail, zooming, and focus+ context interfaces JF - ACM Computing Surveys (CSUR) Y1 - 2008 A1 - Cockburn,A. A1 - Karlson,A. A1 - Bederson, Benjamin B. VL - 41 CP - 1 ER - TY - JOUR T1 - Role of transposable elements in trypanosomatids JF - Microbes and Infection Y1 - 2008 A1 - Bringaud,Frédéric A1 - Ghedin,Elodie A1 - El‐Sayed, Najib M. A1 - Papadopoulou,Barbara KW - Cellular function KW - Domestication KW - Evolution KW - Gene expression KW - Leishmania KW - Regulation of mRNA stability KW - Retroposon KW - Transposable element KW - Trypanosoma AB - Transposable elements constitute 2-5% of the genome content in trypanosomatid parasites. Some of them are involved in critical cellular functions, such as the regulation of gene expression in Leishmania spp. In this review, we highlight the remarkable role extinct transposable elements can play as the source of potential new functions. VL - 10 SN - 1286-4579 UR - http://www.sciencedirect.com/science/article/pii/S1286457908000464 CP - 6 M3 - 16/j.micinf.2008.02.009 ER - TY - JOUR T1 - A scalable key management and clustering scheme for wireless ad hoc and sensor networks JF - Future Generation Computer Systems Y1 - 2008 A1 - Li,Jason H. A1 - Bhattacharjee, Bobby A1 - Yu,Miao A1 - Levy,Renato KW - ad hoc networks KW - clustering KW - Group communications KW - Key management KW - sensor networks AB - This paper describes a scalable key management and clustering scheme for secure group communications in ad hoc and sensor networks. The scalability problem is solved by partitioning the communicating devices into subgroups, with a leader in each subgroup, and further organizing the subgroups into hierarchies. Each level of the hierarchy is called a tier or layer. Key generation, distribution, and actual data transmissions follow the hierarchy. The distributed, efficient clustering approach (DECA) provides robust clustering to form subgroups, and analytical and simulation results demonstrate that DECA is energy-efficient and resilient against node mobility. Comparing with most other schemes, our approach is extremely scalable and efficient, provides more security guarantees, and is selective, adaptive and robust. VL - 24 SN - 0167-739X UR - http://www.sciencedirect.com/science/article/pii/S0167739X08000782 CP - 8 M3 - 10.1016/j.future.2008.03.007 ER - TY - JOUR T1 - Searching the world’s herbaria: A system for visual identification of plant species JF - Computer Vision–ECCV 2008 Y1 - 2008 A1 - Belhumeur,P. A1 - Chen,D. A1 - Feiner,S. A1 - Jacobs, David W. A1 - Kress,W. A1 - Ling,H. A1 - Lopez,I. A1 - Ramamoorthi,R. A1 - Sheorey,S. A1 - White,S. AB - We describe a working computer vision system that aids in the identification of plant species. A user photographs an isolated leaf on a blank background, and the system extracts the leaf shape and matches it to the shape of leaves of known species. In a few seconds, the system displays the top matching species, along with textual descriptions and additional images. This system is currently in use by botanists at the Smithsonian Institution National Museum of Natural History. The primary contributions of this paper are: a description of a working computer vision system and its user interface for an important new application area; the introduction of three new datasets containing thousands of single leaf images, each labeled by species and verified by botanists at the US National Herbarium; recognition results for two of the three leaf datasets; and descriptions throughout of practical lessons learned in constructing this system. M3 - 10.1007/978-3-540-88693-8_9 ER - TY - JOUR T1 - Sequence diversity and evolution of multigene families in Trypanosoma cruzi JF - Molecular and Biochemical Parasitology Y1 - 2008 A1 - Cerqueira,Gustavo C. A1 - Bartholomeu,Daniella C. A1 - DaRocha,Wanderson D. A1 - Hou,Lihua A1 - Freitas-Silva,Danielle M. A1 - Machado,Carlos Renato A1 - El‐Sayed, Najib M. A1 - Teixeira,Santuza M.R. KW - Amastin KW - Gene conversion KW - Genetic diversity KW - Multigene families KW - Trypanosoma cruzi AB - Several copies of genes belonging to three multigene families present in the genome of Trypanosoma cruzi were sequenced and comparatively analyzed across six different strains of the parasite belonging to the T. cruzi I lineage (Colombiana, Silvio X10 and Dm28c), the T. cruzi II lineage (Esmeraldo and JG) and a hybrid strain (CL Brener). For all three gene families analyzed, our results support the division in T. cruzi I and II lineages. Furthermore, in agreement with its hybrid nature, sequences derived from the CL Brener clone clustered together with T. cruzi II sequences as well as with a third group of sequences. Paralogous sequences encoding Amastin, an amastigote surface glycoprotein and TcAG48, an antigenic RNA binding protein, which are clustered in the parasite genome, present higher intragenomic variability in T. cruzi II and CL Brener strains, when compared to T. cruzi I strains. Paralogous sequences derived from the TcADC gene family, which encode various isoforms of adenylyl cyclases and are dispersed throughout the T. cruzi genome, exhibit similar degree of variability in all strains, except in the CL Brener strain, in which the sequences were more divergent. Several factors including mutation rates and gene conversion mechanisms, acting differently within the T. cruzi population, may contribute to create such distinct levels of sequence diversity in multigene families that are clustered in the T. cruzi genome. VL - 157 SN - 0166-6851 UR - http://www.sciencedirect.com/science/article/pii/S0166685107002769 CP - 1 M3 - 16/j.molbiopara.2007.10.002 ER - TY - JOUR T1 - Sex and Age Dimorphism of Myocardial Gene Expression in Nonischemic Human Heart Failure JF - Circulation: Cardiovascular Genetics Y1 - 2008 A1 - Fermin,David R. A1 - Barac,Ana A1 - Lee,Sangjin A1 - Polster,Sean P. A1 - Hannenhalli, Sridhar A1 - Bergemann,Tracy L. A1 - Grindle,Suzanne A1 - Dyke,David B. A1 - Pagani,Francis A1 - Miller,Leslie W. A1 - Tan,Sarah A1 - dos Remedios,Cris A1 - Cappola,Thomas P. A1 - Margulies,Kenneth B. A1 - Hall,Jennifer L. AB - Background— We report the first comprehensive analysis of gene expression differences by sex and age in left ventricular samples from 102 patients with dilated cardiomyopathy.Methods and Results— Gene expression data (HG-U133A gene chip, Affymetrix) were analyzed from 30 females and 72 males from 3 separate centers. More than 1800 genes displayed sexual dimorphism in the heart (adjusted P value <0.05). A significant number of these genes were highly represented in gene ontology pathways involved in ion transport and G-protein-coupled receptor signaling. Localization of these genes revealed enrichment on both the sex chromosomes as well as chromosomes 3, 4, and 14. The second goal of this study was to determine the effect of age on gene expression. Within the female cohort, >140 genes were differentially expressed in the <55 years age group compared with the >55 years age group. These genes were highly represented in gene ontology pathways involved in DNA damage. In contrast, zero genes in the male cohort <55 years met statistical significance when compared with the >55 years age group.Conclusions— Gene expression in dilated cardiomyopathy displayed evidence of sexual dimorphism similar to other somatic tissues and age dimorphism within the female cohort. VL - 1 UR - http://circgenetics.ahajournals.org/content/1/2/117.abstract CP - 2 M3 - 10.1161/CIRCGENETICS.108.802652 ER - TY - JOUR T1 - Structural Sampling for Statistical Software Testing JF - Probabilistic, Logical and Relational Learning-A Further Synthesis Y1 - 2008 A1 - Baskiotis,N. A1 - Sebag,M. A1 - De Raedt,L. A1 - Dietterich,T. A1 - Getoor, Lise A1 - Kersting,K. A1 - Muggleton,S. H AB - Structural Statistical Software Testing exploits the control flow graph of the program being tested to construct test cases. While test cases can easily be extracted from {em feasible paths} in the control flow graph, that is, paths which are actually exerted for some values of the program input, the feasible path region is a tiny fraction of the graph paths (less than $10^{-5}]$ for medium size programs). The S4T algorithm presented in this paper aims to address this limitation; as an Active Relational Learning Algorithm, it uses the few feasible paths initially available to sample new feasible paths. The difficulty comes from the non-Markovian nature of the feasible path concept, due to the long-range dependencies between the nodes in the control flow graph. Experimental validation on real-world and artificial problems demonstrates significant improvements compared to the state of the art. ER - TY - CONF T1 - A Survey of the Virtual Environments-based Assembly Training Applications Y1 - 2008 A1 - Gupta,S.K. A1 - Anand,D. K. A1 - Brough,J. E. A1 - Kavetsky,R. A. A1 - Schwartz,M. A1 - Thakur,A. AB - The advent of virtual environments is presenting new ways of trainingtomorrow’s workforce. Virtual environments offer numerous benefits in training applications. First, virtual environments allow extensive user interactions in a very convenient and natural manner. This interaction is greatly beneficial for increasing the user’s retention of spatial information compared to text-based or video-based instructions that are non-interactive in nature. Second, virtual environments provide users with a 3D immersive experience. This feature helps users gain a better understanding of spatial relationships compared to 2D displays. Third, virtual environments support multi-media instructions. One can watch standard videos, view 3D animations, view text instructions, listen to audio instructions, and interact with 3D objects in the scene. This paper describes representative research and associated systems that use of virtual environments in assembly training applications. UR - http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.151.2892&rep=rep1&type=pdf ER - TY - CONF T1 - Towards Design and Fabrication of a Miniature MRI-Compatible Robot for Applications in Neurosurgery Y1 - 2008 A1 - Pappafotis,Nicholas A1 - Bejgerowski,Wojciech A1 - Gullapalli,Rao A1 - Simard,J. Marc A1 - Gupta, Satyandra K. A1 - Desai,Jaydev P. AB - Brain tumors are among the most feared complications of cancer and they occur in 20–40% of adult cancer patients. Despite numerous advances in treatment, the prognosis for these patients is poor, with a median survival of 4–8 months. The primary reasons for poor survival rate are the lack of good continuous imaging modality for intraoperative intracranial procedures and the inability to remove the complete tumor tissue due to its placement in the brain and the corresponding space constraints to reach it. Intraoperative magnetic resonance imaging (MRI) supplements the surgeon's visual and tactile senses in a way that no other imaging device can achieve resulting in less trauma to surrounding healthy brain tissue during surgery. To minimize the trauma to surrounding healthy brain tissue, it would be beneficial to operate through a narrow surgical corridor dissected by the neurosurgeon. Facilitating tumor removal by accessing regions outside the direct “line-of-sight” of the neurosurgical corridor will require a highly dexterous, small cross section, and MRI-compatible robot. Developing such a robot is extremely challenging task. In this paper we report a preliminary design of 6-DOF robot for possible application in neurosurgery. The robot actuators and body parts are constructed from MRI compatible materials. The current prototype is 0.36” in diameter and weighs only 0.0289 N (2.95 grams). The device was actuated using Flexinol® which is a shape memory alloy manufactured by Dynalloy, Inc. The end-effector forces ranged from 12 mN to 50 mN depending on the robot configuration. The end-effector force to robot weight ratio varied from 0.41 to 1.73. During trials the robot motion was repeatable and the range of motion of the robot was about 90 degrees for the end-effector when one side shape memory alloy (SMA) channel was actuated. The actuation time from the start to finish was about 2.5 s. PB - ASME SN - 978-0-7918-4326-0 UR - http://link.aip.org/link/ASMECP/v2008/i43260/p747/s1&Agg=doi M3 - 10.1115/DETC2008-49587 ER - TY - JOUR T1 - Trade-offs in matching jobs and balancing load for distributed desktop grids JF - Future Generation Computer Systems Y1 - 2008 A1 - Kim,Jik-Soo A1 - Nam,Beomseok A1 - Keleher,Peter A1 - Marsh,Michael A1 - Bhattacharjee, Bobby A1 - Sussman, Alan KW - Desktop grid KW - load balancing KW - Matchmaking KW - peer-to-peer computing KW - Resource discovery AB - Desktop grids can achieve tremendous computing power at low cost through opportunistic sharing of resources. However, traditional client–server Grid architectures do not deal with all types of failures, and do not always cope well with very dynamic environments. This paper describes the design of a desktop grid implemented over a modified Peer-to-Peer (P2P) architecture. The underlying P2P system is decentralized and inherently adaptable, giving the Grid robustness, scalability, and the ability to cope with dynamic environments, while still efficiently mapping application instances to available resources throughout the system.We use simulation to compare three different types of matching algorithms under differing workloads. Overall, the P2P approach produces significantly lower wait times than prior approaches, while adapting efficiently to the dynamic environment. VL - 24 SN - 0167-739X UR - http://www.sciencedirect.com/science/article/pii/S0167739X07001240 CP - 5 M3 - 10.1016/j.future.2007.07.007 ER - TY - CONF T1 - Trellis: a platform for building flexible, fast virtual networks on commodity hardware T2 - Proceedings of the 2008 ACM CoNEXT Conference Y1 - 2008 A1 - Bhatia,Sapan A1 - Motiwala,Murtaza A1 - Muhlbauer,Wolfgang A1 - Mundada,Yogesh A1 - Valancius,Vytautas A1 - Bavier,Andy A1 - Feamster, Nick A1 - Peterson,Larry A1 - Rexford,Jennifer AB - We describe Trellis, a platform for hosting virtual networks on shared commodity hardware. Trellis allows each virtual network to define its own topology, control protocols, and forwarding tables, while amortizing costs by sharing the physical infrastructure. Trellis synthesizes two container-based virtualization technologies, VServer and NetNS, as well as a new tunneling mechanism, EGRE, into a coherent platform that enables high-speed virtual networks. We describe the design and implementation of Trellis and evaluate its packet-forwarding rates relative to other virtualization technologies and native kernel forwarding performance. JA - Proceedings of the 2008 ACM CoNEXT Conference T3 - CoNEXT '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-210-8 UR - http://doi.acm.org/10.1145/1544012.1544084 M3 - 10.1145/1544012.1544084 ER - TY - JOUR T1 - UFO: a resilient layered routing architecture JF - ACM SIGCOMM Computer Communication Review Y1 - 2008 A1 - Zhu,Yaping A1 - Bavier,Andy A1 - Feamster, Nick A1 - Rangarajan,Sampath A1 - Rexford,Jennifer KW - network monitoring KW - overlay networks KW - routing architecture AB - Conventional wisdom has held that routing protocols cannot achieve both scalability and high availability. Despite scaling relatively well, today's Internet routing system does not react quickly to changing network conditions (e.g., link failures or excessive congestion). Overlay networks, on the other hand, can respond quickly to changing network conditions, but their reliance on aggressive probing does not scale to large topologies. The paper presents a layered routing architecture called UFO (Underlay Fused with Overlays), which achieves the best of both worlds by having the "underlay" provide explicit notification about network conditions to help improve the efficiency and scalability of routing overlays. VL - 38 SN - 0146-4833 UR - http://doi.acm.org/10.1145/1452335.1452344 CP - 5 M3 - 10.1145/1452335.1452344 ER - TY - JOUR T1 - Understanding the High-Performance-Computing Community: A Software Engineer's Perspective JF - Software, IEEE Y1 - 2008 A1 - Basili, Victor R. A1 - Carver, J. C A1 - Cruzes, D. A1 - Hochstein, L. M A1 - Hollingsworth, Jeffrey K A1 - Shull, F. A1 - Zelkowitz, Marvin V KW - community;software KW - computational KW - engineering; KW - engineering;software KW - Science KW - software;high-performance-computing AB - Computational scientists developing software for HPC systems face unique software engineering issues. Attempts to transfer SE technologies to this domain must take these issues into account. VL - 25 SN - 0740-7459 CP - 4 M3 - 10.1109/MS.2008.103 ER - TY - JOUR T1 - A Unified Framework for Multipath Routing for Unicast and Multicast Traffic JF - Networking, IEEE/ACM Transactions on Y1 - 2008 A1 - Guven,T. A1 - La,R.J. A1 - Shayman,M.A. A1 - Bhattacharjee, Bobby KW - application-layer KW - approximation;unicast KW - balancing;multicast KW - channels;stochastic KW - communication;multipath KW - cost KW - function;optimization KW - network KW - overlay;load KW - perturbation KW - problem;simultaneous KW - processes;telecommunication KW - routing;network KW - routing;telecommunication KW - Stochastic KW - traffic; KW - traffic;multicast KW - traffic;multipath AB - We study the problem of load balancing the traffic from a set of unicast and multicast sessions. The problem is formulated as an optimization problem. However, we assume that the gradient of the network cost function is not available and needs to be estimated. Multiple paths are provided between a source and a destination using application-layer overlay. We propose a novel algorithm that is based on what is known as simultaneous perturbation stochastic approximation and utilizes only noisy measurements collected and reported to the sources, using an overlay architecture. We consider three network models that reflect different sets of assumptions regarding multicast capabilities of the network. Using an analytical model we first prove the almost sure convergence of the algorithm to a corresponding optimal solution under each network model considered in this paper with decreasing step sizes. Then, we establish the weak convergence (or convergence in distribution) with a fixed step size. In addition, we investigate the benefits acquired from implementing additional multicast capabilities by studying the relative performance of our algorithm under the three network models. VL - 16 SN - 1063-6692 CP - 5 M3 - 10.1109/TNET.2007.909686 ER - TY - CONF T1 - Accountability as a service T2 - Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet Y1 - 2007 A1 - Bender,Adam A1 - Spring, Neil A1 - Levin,Dave A1 - Bhattacharjee, Bobby AB - We propose that accountability be a first-class network service, independent of addressing and routing. We design a scheme for allowing accountability services, rather than connectivity-providing ISPs, to vouch for traffic, allowing victims to report abuse, filter abusive traffic, and isolate malicious senders. We discuss how accountability services may evolve, how they may facilitate new applications, and the implications of shifting the burden of network policing to a dedicated service. JA - Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet T3 - SRUTI'07 PB - USENIX Association CY - Berkeley, CA, USA UR - http://dl.acm.org/citation.cfm?id=1361436.1361441 ER - TY - JOUR T1 - Algorithms for on-line monitoring of micro spheres in an optical tweezers-based assembly cell JF - Journal of Computing and Information Science in Engineering Y1 - 2007 A1 - Peng,T. A1 - Balijepalli,A. A1 - Gupta,S.K. A1 - LeBrun,T. AB - Optical tweezers have emerged as a powerful tool for microand nanomanipulation. Using optical tweezers to perform auto- mated assembly requires on-line monitoring of components in the assembly workspace. This paper presents algorithms for estimat- ing positions and orientations of microscale and nanoscale com- ponents in the 3-Dimensional assembly workspace. Algorithms presented in this paper use images obtained by optical section microscopy. The images are first segmented to locate areas of in- terest and then image gradient information from the areas of in- terest is used to generate probable locations and orientations of components in the XY-plane. Finally, signature curves are com- puted and utilized to obtain component locations and orienta- tions in 3-D space. We have tested these algorithms with silica micro-spheres as well as metallic nanowires. We believe that the algorithms described in this paper will provide the foundation for realizing automated assembly operations in optical tweezers- based assembly cells. VL - 7 ER - TY - JOUR T1 - Amino acid quantitative structure property relationship database: a web-based platform for quantitative investigations of amino acids JF - Protein Engineering Design and SelectionProtein Engineering, Design and Selection Y1 - 2007 A1 - Lu,Yi A1 - Bulka,Blazej A1 - desJardins, Marie A1 - Freeland,Stephen J KW - Amino acids KW - database KW - QSPR KW - XML AB - Here, we present the AA-QSPR Db (Amino Acid Quantitative Structure Property Relationship Database): a novel, freely available web-resource of data pertaining to amino acids, both engineered and naturally occurring. In addition to presenting fundamental molecular descriptors of size, charge and hydrophobicity, it also includes online visualization tools for users to perform instant, interactive analyses of amino acid sub-sets in which they are interested. The database has been designed with extensible markup language technology to provide a flexible structure, suitable for future development. In addition to providing easy access for queries by external computers, it also offers a user-friendly web-based interface that facilitates human interactions (submission, storage and retrieval of amino acid data) and an associated e-forum that encourages users to question and discuss current and future database contents. VL - 20 SN - 1741-0126, 1741-0134 UR - http://peds.oxfordjournals.org/content/20/7/347 CP - 7 M3 - 10.1093/protein/gzm027 ER - TY - CONF T1 - Automated gui testing guided by usage profiles T2 - Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering Y1 - 2007 A1 - Brooks,Penelope A. A1 - Memon, Atif M. KW - event-driven software KW - GUI testing KW - usage profiles AB - Most software developed in recent years has a graphical userinterface (GUI). The only way for the end-user to interact with the software application is through the GUI. Hence, acceptance and system testing of the software requires GUI testing. This paper presents a new technique for testing of GUI applications. Information on the actual usage of the application, in the form of "usage profiles," is used to ensure that a new version of the application will function correctly. Usage profiles, sequences of events that end-users execute on a GUI, are used to develop a probabilistic usage model of the application. An algorithm uses the model to generate test cases that represent events the user is most likely to execute. Reverse engineering methods are used to extract the underlying structure of the application. An empirical study on four open source GUI applications reveals that test suites generated from the probabilistic model are 0.2-22% of the size of test suites produced directly from usage profiles. Furthermore, the test suites generated from the model detect more faults per test case than those detected directly from the usage profiles, and detect faults not detected by the original profiles JA - Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering T3 - ASE '07 PB - ACM CY - New York, NY, USA SN - 978-1-59593-882-4 UR - http://doi.acm.org/10.1145/1321631.1321681 M3 - 10.1145/1321631.1321681 ER - TY - JOUR T1 - Autonomic computing JF - IEEE internet computing Y1 - 2007 A1 - Brabec,F. A1 - Samet, Hanan VL - 11 CP - 1 ER - TY - CONF T1 - Backbone construction in selfish wireless networks T2 - Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems Y1 - 2007 A1 - Lee,Seungjoon A1 - Levin,Dave A1 - Gopalakrishnan,Vijay A1 - Bhattacharjee, Bobby KW - incentives KW - public good KW - selfish network KW - volunteer's dilemma KW - wireless backbone AB - We present a protocol to construct routing backbones in wireless networks composed of selfish participants. Backbones are inherently cooperative, so constructing them in selfish environments is particularly difficult; participants want a backbone to exist (soothers relay their packets) but do not want to join the backbone (so they do not have to relay packets for others). We model the wireless backbone as a public good and use impatience as an incentive for cooperation. To determine if and when to donate to this public good, each participant calculates how patient it should be in obtaining the public good. We quantify patience using the Volunteer's Timing Dilemma (VTD), which we extend to general multihop network settings. Using our generalized VTD analysis, each node individually computes as its dominant strategy the amount of time to wait before joining the backbone. We evaluate our protocol using both simulations and an implementation. Our results show that, even though participants in our system deliberately wait before volunteering, a backbone is formed quickly. Further, the quality of the backbone (such as the size and resulting network lifetime) is comparable to that of existing backbone protocols that assume altruistic behavior. JA - Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems T3 - SIGMETRICS '07 PB - ACM CY - New York, NY, USA SN - 978-1-59593-639-4 UR - http://doi.acm.org/10.1145/1254882.1254896 M3 - 10.1145/1254882.1254896 ER - TY - JOUR T1 - BELIV'06: beyond time and errors: novel evaluation methods for information visualization JF - interactions Y1 - 2007 A1 - Bertini,Enrico A1 - Plaisant, Catherine A1 - Santucci,Giuseppe VL - 14 SN - 1072-5520 UR - http://doi.acm.org/10.1145/1242421.1242460 CP - 3 M3 - 10.1145/1242421.1242460 ER - TY - JOUR T1 - Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls JF - ACM Transactions on Embedded Computing Systems (TECS) Y1 - 2007 A1 - Ko,M. Y A1 - Murthy,P. K A1 - Bhattacharyya, Shuvra S. VL - 6 CP - 2 ER - TY - JOUR T1 - Boycotting and extorting nodes in an internetwork JF - NetE-con+ IBC Y1 - 2007 A1 - Levin,D. A1 - Bender,A. A1 - Lumezanu,C. A1 - Spring, Neil A1 - Bhattacharjee, Bobby ER - TY - JOUR T1 - Capture, annotate, browse, find, share: novel interfaces for personal photo management JF - International Journal of Human-] Computer Interaction Y1 - 2007 A1 - Kang,H. A1 - Bederson, Benjamin B. A1 - Suh,B. VL - 23 CP - 3 ER - TY - JOUR T1 - Cell breathing in wireless LANs: Algorithms and evaluation JF - IEEE Transactions on Mobile Computing Y1 - 2007 A1 - Hajiaghayi, Mohammad T. A1 - Mirrokni,S. V. A1 - Saberi,A. A1 - Bahl,P. A1 - Jain,K. A1 - Qiu,L. VL - 6 CP - 2 ER - TY - CONF T1 - Children's interests and concerns when using the international children's digital library: a four-country case study T2 - Proceedings of the 7th ACM/IEEE-CS joint conference on Digital libraries Y1 - 2007 A1 - Druin, Allison A1 - Weeks,A. A1 - Massey,S. A1 - Bederson, Benjamin B. JA - Proceedings of the 7th ACM/IEEE-CS joint conference on Digital libraries ER - TY - RPRT T1 - Chit-based access control Y1 - 2007 A1 - Keleher,P. J A1 - Spring, Neil A1 - Bhattacharjee, Bobby PB - Technical Report CS-TR-4878, University of Maryland at College Park ER - TY - JOUR T1 - Chosen-ciphertext security from identity-based encryption JF - SIAM Journal on Computing Y1 - 2007 A1 - Boneh,D. A1 - Canetti,R. A1 - Halevi,S. A1 - Katz, Jonathan AB - We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemessecure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. Our constructions have ramifications of both theoretical and practical interest. First, our schemes give a new paradigm for achieving CCA-security; this paradigm avoids “proofs of well-formedness” that have been shown to underlie previous constructions. Second, instantiating our construction using known IBE constructions we obtain CCA-secure encryption schemes whose performance is competitive with the most efficient CCA-secure schemes to date. Our techniques extend naturally to give an efficient method for securing IBE schemes (even hierarchical ones) against adaptive chosen-ciphertext attacks. Coupled with previous work, this gives the first efficient constructions of CCA-secure IBE schemes. VL - 36 CP - 5 ER - TY - JOUR T1 - Client-Based Spatial Browsing on the World Wide Web JF - IEEE Internet Computing Y1 - 2007 A1 - Brabec,Frantisek A1 - Samet, Hanan KW - client-server spatial browsing KW - geographic information systems (GIS) KW - Spatial databases KW - web access KW - web-based mapping AB - Being able to visualize both spatial and nonspatial data is becoming increasingly important to today's Internet users. Spatial data viewers and query tools can aid in visualization, but they should also let users access data instantly and with minimal effort. The authors explore new ways to allow visualization of data stored in a central server database on a simple client. They also consider usage scenarios in which transferring the whole database to the client for processing isn't feasible due to the amount of data on the server, insufficient computing power on the client, and a slow link between the two. VL - 11 SN - 1089-7801 CP - 1 ER - TY - JOUR T1 - Cofactor-independent phosphoglycerate mutase is an essential gene in procyclic form Trypanosoma brucei JF - Parasitology research Y1 - 2007 A1 - Djikeng,A. A1 - Raverdy,S. A1 - Foster, Jeffrey S. A1 - Bartholomeu,D. A1 - Zhang,Y. A1 - El‐Sayed, Najib M. A1 - Carlow,C. VL - 100 CP - 4 ER - TY - JOUR T1 - Collective entity resolution in relational data JF - ACM Trans. Knowl. Discov. Data Y1 - 2007 A1 - Bhattacharya,Indrajit A1 - Getoor, Lise KW - data cleaning KW - entity resolution KW - graph clustering KW - record linkage AB - Many databases contain uncertain and imprecise references to real-world entities. The absence of identifiers for the underlying entities often results in a database which contains multiple references to the same entity. This can lead not only to data redundancy, but also inaccuracies in query processing and knowledge extraction. These problems can be alleviated through the use of entity resolution. Entity resolution involves discovering the underlying entities and mapping each database reference to these entities. Traditionally, entities are resolved using pairwise similarity over the attributes of references. However, there is often additional relational information in the data. Specifically, references to different entities may cooccur. In these cases, collective entity resolution, in which entities for cooccurring references are determined jointly rather than independently, can improve entity resolution accuracy. We propose a novel relational clustering algorithm that uses both attribute and relational information for determining the underlying domain entities, and we give an efficient implementation. We investigate the impact that different relational similarity measures have on entity resolution quality. We evaluate our collective entity resolution algorithm on multiple real-world databases. We show that it improves entity resolution performance over both attribute-based baselines and over algorithms that consider relational information but do not resolve entities collectively. In addition, we perform detailed experiments on synthetically generated data to identify data characteristics that favor collective relational resolution over purely attribute-based algorithms. VL - 1 SN - 1556-4681 UR - http://doi.acm.org/10.1145/1217299.1217304 CP - 1 M3 - 10.1145/1217299.1217304 ER - TY - CONF T1 - Combining Collective Classification and Link Prediction T2 - Data Mining Workshops, 2007. ICDM Workshops 2007. Seventh IEEE International Conference on Y1 - 2007 A1 - Bilgic,M. A1 - Namata,G.M. A1 - Getoor, Lise KW - algorithm;link KW - classification; KW - classification;graph KW - collective KW - prediction;object KW - theory;pattern AB - The problems of object classification (labeling the nodes of a graph) and link prediction (predicting the links in a graph) have been largely studied independently. Commonly, object classification is performed assuming a complete set of known links and link prediction is done assuming a fully observed set of node attributes. In most real world domains, however, attributes and links are often missing or incorrect. Object classification is not provided with all the links relevant to correct classification and link prediction is not provided all the labels needed for accurate link prediction. In this paper, we propose an approach that addresses these two problems by interleaving object classification and link prediction in a collective algorithm. We investigate empirically the conditions under which an integrated approach to object classification and link prediction improves performance, and find that performance improves over a wide range of network types, and algorithm settings. JA - Data Mining Workshops, 2007. ICDM Workshops 2007. Seventh IEEE International Conference on M3 - 10.1109/ICDMW.2007.35 ER - TY - CONF T1 - Combining motion from texture and lines for visual navigation T2 - IEEE/RSJ International Conference on Intelligent Robots and Systems, 2007. IROS 2007 Y1 - 2007 A1 - Bitsakos,K. A1 - Li Yi A1 - Fermüller, Cornelia KW - 3D structure information KW - CAMERAS KW - Computer vision KW - extended Kalman filter KW - Frequency KW - image frequencies KW - Image motion analysis KW - Image texture KW - Kalman filters KW - Layout KW - motion control KW - Motion estimation KW - Navigation KW - Optical computing KW - phase correlation KW - piecewise planar scene KW - Robustness KW - Simultaneous localization and mapping KW - Speech processing KW - textured plane KW - video signal processing KW - visual navigation AB - Two novel methods for computing 3D structure information from video for a piecewise planar scene are presented. The first method is based on a new line constraint, which clearly separates the estimation of distance from the estimation of slant. The second method exploits the concepts of phase correlation to compute from the change of image frequencies of a textured plane, distance and slant information. The two different estimates together with structure estimates from classical image motion are combined and integrated over time using an extended Kalman filter. The estimation of the scene structure is demonstrated experimentally in a motion control algorithm that allows the robot to move along a corridor. We demonstrate the efficacy of each individual method and their combination and show that the method allows for visual navigation in textured as well as un-textured environments. JA - IEEE/RSJ International Conference on Intelligent Robots and Systems, 2007. IROS 2007 PB - IEEE SN - 978-1-4244-0912-9 M3 - 10.1109/IROS.2007.4399568 ER - TY - CONF T1 - Compact, low power wireless sensor network system for line crossing recognition T2 - Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on Y1 - 2007 A1 - Shen,C. C A1 - Kupershtok,R. A1 - Yang,B. A1 - Vanin,F. M A1 - Shao,X. A1 - Sheth,D. A1 - Goldsman,N. A1 - Balzano,Q. A1 - Bhattacharyya, Shuvra S. JA - Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on ER - TY - CONF T1 - Creating a Robust Desktop Grid using Peer-to-Peer Services T2 - Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International Y1 - 2007 A1 - Kim,J.-S. A1 - Nam,B. A1 - Marsh,M. A1 - Keleher,P. A1 - Bhattacharjee, Bobby A1 - Richardson,D. A1 - Wellnitz,D. A1 - Sussman, Alan KW - allocation; KW - architecture;load KW - balancing;peer-to-peer KW - client-server KW - computing;peer-to-peer KW - computing;resource KW - desktop KW - grid;scalable KW - infrastructure;client-server KW - system;robust KW - systems;grid AB - The goal of the work described in this paper is to design and build a scalable infrastructure for executing grid applications on a widely distributed set of resources. Such grid infrastructure must be decentralized, robust, highly available, and scalable, while efficiently mapping application instances to available resources in the system. However, current desktop grid computing platforms are typically based on a client-server architecture, which has inherent shortcomings with respect to robustness, reliability and scalability. Fortunately, these problems can be addressed through the capabilities promised by new techniques and approaches in peer-to-peer (P2P) systems. By employing P2P services, our system allows users to submit jobs to be run in the system and to run jobs submitted by other users on any resources available in the system, essentially allowing a group of users to form an ad-hoc set of shared resources. The initial target application areas for the desktop grid system are in astronomy and space science simulation and data analysis. JA - Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International M3 - 10.1109/IPDPS.2007.370505 ER - TY - JOUR T1 - Data Management in the Worldwide Sensor Web JF - IEEE Pervasive Computing Y1 - 2007 A1 - Balazinska,Magdalena A1 - Deshpande, Amol A1 - Franklin,Michael J. A1 - Gibbons,Phillip B. A1 - Gray,Jim A1 - Hansen,Mark A1 - Liebhold,Michael A1 - Nath,Suman A1 - Szalay,Alexander A1 - Tao,Vincent KW - data modeling KW - data streams KW - data uncertainty KW - distributed systems KW - interoperability KW - sensor networks AB - Advances in hardware and miniaturization technologies have led to a rapid increase in the number of large-scale sensor network deployments around the world, bringing us closer to the vision of a worldwide sensor web. Exploiting the sensor web to its full potential, however, raises several hard data management challenges. Addressing these challenges requires a concerted multidisciplinary effort encompassing many computer science fields. This article outlines some of the key data management challenges of a worldwide sensor web. It also presents recent advances in data management research that aim to address these challenges. Hopefully, the scientific, ubiquitous computing, and sensor network communities will adopt some of these solutions for managing their data. The article also attempts to bring many of the remaining open issues to the attention of the database community. This article is part of a special issue on Building a Sensor-Rich World. VL - 6 SN - 1536-1268 CP - 2 ER - TY - JOUR T1 - Dataflow-based mapping of computer vision algorithms onto FPGAs JF - EURASIP Journal on Embedded Systems Y1 - 2007 A1 - Sen,M. A1 - Corretjer,I. A1 - Haim,F. A1 - Saha,S. A1 - Schlessman,J. A1 - Lv,T. A1 - Bhattacharyya, Shuvra S. A1 - Wolf,W. VL - 2007 CP - 1 ER - TY - ABST T1 - Description of Computer Science Higher Education in Sub-Saharan Africa: Initial Explorations Y1 - 2007 A1 - Marshini Chetty A1 - Buckhalter, Celeste A1 - Best, Michael L. A1 - Grinter, Rebecca E. A1 - Guzdial, Mark KW - Sub-Saharan Africa KW - Undergraduate computing education AB - Many countries in Sub-Saharan Africa (SSA) are in need oftechnology innovators who are equipped to leverage technologies in locally relevant domains such as health, government and education. To create skilled graduates who can build and shape locally relevant technologies, higher education institutes in Africa must have Computer Science (CS) education programs that meet local needs, for example, to satisfy the demand for entrepreneurs to build industry and strengthen an economy. This paper characterizes the current state of CS education in SSA in order to identify opportunities for addressing education challenges and to make suggestions that may improve the Information and Communication Technology (ICT) infrastructure in this region. We present the results of a survey of CS educators in SSA institutions of higher education, which was aimed at exploring the issues they face. In addition to the continued chronic under-funding of SSA education, we found that universities in SSA have smaller departments, less focus on Human Computer Interaction (HCI) and offer a variety of courses aside from undergraduate Bachelors degrees. We discuss directions to improve CS curricula through investing in locally tailored courses and changing perceptions of the value of SSA CS higher education programs, standards and educators. Further, we reflect on the challenges of conducting research on SSA. We conclude that further research in this area is needed to build on the ideas we offer here to continue to strengthen CS higher education in SSA. UR - https://smartech.gatech.edu/handle/1853/20060 M3 - Technical Report ER - TY - JOUR T1 - Development of in-mold assembly process for realizing mesoscale revolute joints JF - Transactions of North American Manufacturing Research Institution of SME Y1 - 2007 A1 - Ananthanarayanan,A. A1 - Gupta,S.K. A1 - Bruck,H. A. A1 - Yu,Z. A1 - Rajurkar,K. P. AB - In-mold Assembly process at the mesoscalepresents several manufacturing challenges. Results reported in this paper demonstrate the technical feasibility of creating rigid body mesoscale revolute joints using In-Mold Assembly process. The following new results are reported in this paper. First, we describe a mold design with varying cavity shape to perform In-Mold Assembly. This mold design uses an accurate mold piece positioning method to avoid damage to delicate mesoscale parts during the cavity change step. Second, we describe a mold insert fabrication process for making mold inserts with the desired surface characteristics for mesoscale molding. Finally, we describe methods to limit the adhesion at the interfaces and hence create articulated revolute joint. Using the advances reported in this paper we have successfully molded a mesoscale revolute joint. To the best of our knowledge, this is the first demonstration of In-Mold Assembly process using a varying cavity shape mold to create a mesoscale revolute joint. VL - 35 UR - ftp://ftp.eng.umd.edu/:/home/glue/s/k/skgupta/pub/Publication/NAMRC07_Ananthanarayanan_draft.pdf ER - TY - CHAP T1 - Distributed Ranked Search T2 - High Performance Computing – HiPC 2007High Performance Computing – HiPC 2007 Y1 - 2007 A1 - Gopalakrishnan,Vijay A1 - Morselli,Ruggero A1 - Bhattacharjee, Bobby A1 - Keleher,Pete A1 - Srinivasan, Aravind ED - Aluru,Srinivas ED - Parashar,Manish ED - Badrinath,Ramamurthy ED - Prasanna,Viktor AB - P2P deployments are a natural infrastructure for building distributed search networks. Proposed systems support locating and retrieving all results, but lack the information necessary to rank them. Users, however, are primarily interested in the most relevant results, not necessarily all possible results. Using random sampling, we extend a class of well-known information retrieval ranking algorithms such that they can be applied in this decentralized setting. We analyze the overhead of our approach, and quantify how our system scales with increasing number of documents, system size, document to node mapping (uniform versus non-uniform), and types of queries (rare versus popular terms). Our analysis and simulations show that a) these extensions are efficient, and scale with little overhead to large systems, and b) the accuracy of the results obtained using distributed ranking is comparable to that of a centralized implementation. JA - High Performance Computing – HiPC 2007High Performance Computing – HiPC 2007 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 4873 SN - 978-3-540-77219-4 UR - http://dx.doi.org/10.1007/978-3-540-77220-0_6 ER - TY - JOUR T1 - Distributed ranked search JF - High Performance Computing–HiPC 2007 Y1 - 2007 A1 - Gopalakrishnan,V. A1 - Morselli,R. A1 - Bhattacharjee, Bobby A1 - Keleher,P. A1 - Srinivasan, Aravind AB - P2P deployments are a natural infrastructure for building distributed search networks. Proposed systems support locating and retrieving all results, but lack the information necessary to rank them. Users, however, are primarily interested in the most relevant results, not necessarily all possible results.Using random sampling, we extend a class of well-known information retrieval ranking algorithms such that they can be applied in this decentralized setting. We analyze the overhead of our approach, and quantify how our system scales with increasing number of documents, system size, document to node mapping (uniform versus non-uniform), and types of queries (rare versus popular terms). Our analysis and simulations show that a) these extensions are efficient, and scale with little overhead to large systems, and b) the accuracy of the results obtained using distributed ranking is comparable to that of a centralized implementation. ER - TY - JOUR T1 - Draft Genome of the Filarial Nematode Parasite Brugia Malayi JF - Science Y1 - 2007 A1 - Ghedin,Elodie A1 - Wang,Shiliang A1 - Spiro,David A1 - Caler,Elisabet A1 - Zhao,Qi A1 - Crabtree,Jonathan A1 - Allen,Jonathan E A1 - Delcher,Arthur L. A1 - Guiliano,David B A1 - Miranda-Saavedra,Diego A1 - Angiuoli,Samuel V A1 - Creasy,Todd A1 - Amedeo,Paolo A1 - Haas,Brian A1 - El‐Sayed, Najib M. A1 - Wortman,Jennifer R. A1 - Feldblyum,Tamara A1 - Tallon,Luke A1 - Schatz,Michael A1 - Shumway,Martin A1 - Koo,Hean A1 - Salzberg,Steven L. A1 - Schobel,Seth A1 - Pertea,Mihaela A1 - Pop, Mihai A1 - White,Owen A1 - Barton,Geoffrey J A1 - Carlow,Clotilde K. S A1 - Crawford,Michael J A1 - Daub,Jennifer A1 - Dimmic,Matthew W A1 - Estes,Chris F A1 - Foster,Jeremy M A1 - Ganatra,Mehul A1 - Gregory,William F A1 - Johnson,Nicholas M A1 - Jin,Jinming A1 - Komuniecki,Richard A1 - Korf,Ian A1 - Kumar,Sanjay A1 - Laney,Sandra A1 - Li,Ben-Wen A1 - Li,Wen A1 - Lindblom,Tim H A1 - Lustigman,Sara A1 - Ma,Dong A1 - Maina,Claude V A1 - Martin,David M. A A1 - McCarter,James P A1 - McReynolds,Larry A1 - Mitreva,Makedonka A1 - Nutman,Thomas B A1 - Parkinson,John A1 - Peregrín-Alvarez,José M A1 - Poole,Catherine A1 - Ren,Qinghu A1 - Saunders,Lori A1 - Sluder,Ann E A1 - Smith,Katherine A1 - Stanke,Mario A1 - Unnasch,Thomas R A1 - Ware,Jenna A1 - Wei,Aguan D A1 - Weil,Gary A1 - Williams,Deryck J A1 - Zhang,Yinhua A1 - Williams,Steven A A1 - Fraser-Liggett,Claire A1 - Slatko,Barton A1 - Blaxter,Mark L A1 - Scott,Alan L AB - Parasitic nematodes that cause elephantiasis and river blindness threaten hundreds of millions of people in the developing world. We have sequenced the ∼90 megabase (Mb) genome of the human filarial parasite Brugia malayi and predict ∼11,500 protein coding genes in 71 Mb of robustly assembled sequence. Comparative analysis with the free-living, model nematode Caenorhabditis elegans revealed that, despite these genes having maintained little conservation of local synteny during ∼350 million years of evolution, they largely remain in linkage on chromosomal units. More than 100 conserved operons were identified. Analysis of the predicted proteome provides evidence for adaptations of B. malayi to niches in its human and vector hosts and insights into the molecular basis of a mutualistic relationship with its Wolbachia endosymbiont. These findings offer a foundation for rational drug design. VL - 317 SN - 0036-8075, 1095-9203 UR - http://www.sciencemag.org/content/317/5845/1756 CP - 5845 M3 - 10.1126/science.1145406 ER - TY - JOUR T1 - EcoLens: Integration and interactive visualization of ecological datasets JF - Ecological Informatics Y1 - 2007 A1 - Parr,Cynthia Sims A1 - Lee,Bongshin A1 - Bederson, Benjamin B. KW - Data integration KW - Food webs KW - Taxonomy KW - Visualization AB - Complex multi-dimensional datasets are now pervasive in science and elsewhere in society. Better interactive tools are needed for visual data exploration so that patterns in such data may be easily discovered, data can be proofread, and subsets of data can be chosen for algorithmic analysis. In particular, synthetic research such as ecological interaction research demands effective ways to examine multiple datasets. This paper describes our integration of hundreds of food-web datasets into a common platform, and the visualization software, EcoLens, we developed for exploring this information. This publicly-available application and integrated dataset have been useful for our research predicting large complex food webs, and EcoLens is favorably reviewed by other researchers. Many habitats are not well represented in our large database. We confirm earlier results about the small size and lack of taxonomic resolution in early food webs but find that they and a non-food-web source provide trophic information about a large number of taxa absent from more modern studies. Corroboration of Tuesday Lake trophic links across studies is usually possible, but lack of links among congeners may have several explanations. While EcoLens does not provide all kinds of analytical support, its label- and item-based approach is effective at addressing concerns about the comparability and taxonomic resolution of food-web data. VL - 2 SN - 1574-9541 UR - http://www.sciencedirect.com/science/article/pii/S1574954107000118 CP - 1 M3 - 10.1016/j.ecoinf.2007.03.005 ER - TY - CONF T1 - Efficient Indexing For Articulation Invariant Shape Matching And Retrieval T2 - Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on Y1 - 2007 A1 - Biswas,S. A1 - Aggarwal,G. A1 - Chellapa, Rama KW - alignment;image KW - articulation KW - geometric KW - invariant KW - matching;image KW - matching;indexing;invariant KW - relationships;shape-wise KW - retrieval;indexing; KW - retrieval;pairwise KW - SHAPE AB - Most shape matching methods are either fast but too simplistic to give the desired performance or promising as far as performance is concerned but computationally demanding. In this paper, we present a very simple and efficient approach that not only performs almost as good as many state-of-the-art techniques but also scales up to large databases. In the proposed approach, each shape is indexed based on a variety of simple and easily computable features which are invariant to articulations and rigid transformations. The features characterize pairwise geometric relationships between interest points on the shape, thereby providing robustness to the approach. Shapes are retrieved using an efficient scheme which does not involve costly operations like shape-wise alignment or establishing correspondences. Even for a moderate size database of 1000 shapes, the retrieval process is several times faster than most techniques with similar performance. Extensive experimental results are presented to illustrate the advantages of our approach as compared to the best in the field. JA - Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on M3 - 10.1109/CVPR.2007.383227 ER - TY - JOUR T1 - Efficient lookup on unstructured topologies JF - IEEE Journal on Selected Areas in Communications Y1 - 2007 A1 - Morselli,R. A1 - Bhattacharjee, Bobby A1 - Marsh,M.A. A1 - Srinivasan, Aravind KW - Computer science KW - DHT KW - distributed algorithms KW - Distributed computing KW - distributed hash table KW - Least squares approximation KW - LMS KW - local minima search KW - lookup protocol KW - Network topology KW - node failures KW - Peer to peer computing KW - Performance analysis KW - Protocols KW - replication strategy KW - Resilience KW - Robustness KW - table lookup KW - telecommunication network topology KW - unstructured network topology AB - We present LMS, a protocol for efficient lookup on unstructured networks. Our protocol uses a virtual namespace without imposing specific topologies. It is more efficient than existing lookup protocols for unstructured networks, and thus is an attractive alternative for applications in which the topology cannot be structured as a Distributed Hash Table (DHT). We present analytic bounds for the worst-case performance of LMS. Through detailed simulations (with up to 100,000 nodes), we show that the actual performance on realistic topologies is significantly better. We also show in both simulations and a complete implementation (which includes over five hundred nodes) that our protocol is inherently robust against multiple node failures and can adapt its replication strategy to optimize searches according to a specific heuristic. Moreover, the simulation demonstrates the resilience of LMS to high node turnover rates, and that it can easily adapt to orders of magnitude changes in network size. The overhead incurred by LMS is small, and its performance approaches that of DHTs on networks of similar size VL - 25 SN - 0733-8716 CP - 1 M3 - 10.1109/JSAC.2007.07007 ER - TY - JOUR T1 - Efficient parallel memory organization for turbo decoders JF - Red Y1 - 2007 A1 - Salmela,P. A1 - Gu,R. A1 - Bhattacharyya, Shuvra S. A1 - Takala,J. VL - 5 ER - TY - JOUR T1 - Efficient simulation of critical synchronous dataflow graphs JF - ACM Transactions on Design Automation of Electronic Systems (TODAES) Y1 - 2007 A1 - Hsu,C. J A1 - Ko,M. Y A1 - Bhattacharyya, Shuvra S. A1 - Ramasubbu,S. A1 - Pino,J. L VL - 12 CP - 3 ER - TY - JOUR T1 - Empirical studies to build a science of computer science JF - Communications of the ACM Y1 - 2007 A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V AB - We learn to develop software by building, testing, and evolving models. VL - 50 SN - 0001-0782 UR - http://doi.acm.org/10.1145/1297797.1297819 CP - 11 M3 - 10.1145/1297797.1297819 ER - TY - CONF T1 - Energy-aware data compression for wireless sensor networks T2 - Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on Y1 - 2007 A1 - Puthenpurayil,S. A1 - Gu,R. A1 - Bhattacharyya, Shuvra S. JA - Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on VL - 2 ER - TY - CONF T1 - An energy-driven design methodology for distributing DSP applications across wireless sensor networks T2 - Proceedings of RTSS Y1 - 2007 A1 - Shen,C. C A1 - Plishker,W. A1 - Bhattacharyya, Shuvra S. A1 - Goldsman,N. JA - Proceedings of RTSS ER - TY - RPRT T1 - An Environment of Conducting Families of Software Engineering Experiments Y1 - 2007 A1 - Hochstein, Lorin A1 - Nakamura,Taiga A1 - Shull, Forrest A1 - Zazworka, Nico A1 - Voelp,Martin A1 - Zelkowitz, Marvin V A1 - Basili, Victor R. KW - collecting data KW - managing data KW - parallel programming languages KW - sanitizing data KW - software engineering experiments KW - universities AB - The classroom is a valuable resource for conducting software engineering experiments. However, coordinating a family of experiments in classroom environments presents a number of challenges to researchers. This paper describes an environment that simplifies the process of collecting, managing and sanitizing data from classroom experiments, while minimizing disruption to natural subject behavior. We have successfully used this environment to study the impact of parallel programming languages on programmer productivity at multiple universities across the United States. PB - University of Maryland, College Park UR - http://drum.lib.umd.edu/handle/1903/7545 ER - TY - JOUR T1 - Evolution of genes and genomes on the Drosophila phylogeny JF - Nature Y1 - 2007 A1 - Clark,Andrew G. A1 - Eisen,Michael B. A1 - Smith,Douglas R. A1 - Bergman,Casey M. A1 - Oliver,Brian A1 - Markow,Therese A. A1 - Kaufman,Thomas C. A1 - Kellis,Manolis A1 - Gelbart,William A1 - Iyer,Venky N. A1 - Pollard,Daniel A. A1 - Sackton,Timothy B. A1 - Larracuente,Amanda M. A1 - Singh,Nadia D. A1 - Abad,Jose P. A1 - Abt,Dawn N. A1 - Adryan,Boris A1 - Aguade,Montserrat A1 - Akashi,Hiroshi A1 - Anderson,Wyatt W. A1 - Aquadro,Charles F. A1 - Ardell,David H. A1 - Arguello,Roman A1 - Artieri,Carlo G. A1 - Barbash,Daniel A. A1 - Barker,Daniel A1 - Barsanti,Paolo A1 - Batterham,Phil A1 - Batzoglou,Serafim A1 - Begun,Dave A1 - Bhutkar,Arjun A1 - Blanco,Enrico A1 - Bosak,Stephanie A. A1 - Bradley,Robert K. A1 - Brand,Adrianne D. A1 - Brent,Michael R. A1 - Brooks,Angela N. A1 - Brown,Randall H. A1 - Butlin,Roger K. A1 - Caggese,Corrado A1 - Calvi,Brian R. A1 - Carvalho,A. Bernardo de A1 - Caspi,Anat A1 - Castrezana,Sergio A1 - Celniker,Susan E. A1 - Chang,Jean L. A1 - Chapple,Charles A1 - Chatterji,Sourav A1 - Chinwalla,Asif A1 - Civetta,Alberto A1 - Clifton,Sandra W. A1 - Comeron,Josep M. A1 - Costello,James C. A1 - Coyne,Jerry A. A1 - Daub,Jennifer A1 - David,Robert G. A1 - Delcher,Arthur L. A1 - Delehaunty,Kim A1 - Do,Chuong B. A1 - Ebling,Heather A1 - Edwards,Kevin A1 - Eickbush,Thomas A1 - Evans,Jay D. A1 - Filipski,Alan A1 - Findei|[szlig]|,Sven A1 - Freyhult,Eva A1 - Fulton,Lucinda A1 - Fulton,Robert A1 - Garcia,Ana C. L. A1 - Gardiner,Anastasia A1 - Garfield,David A. A1 - Garvin,Barry E. A1 - Gibson,Greg A1 - Gilbert,Don A1 - Gnerre,Sante A1 - Godfrey,Jennifer A1 - Good,Robert A1 - Gotea,Valer A1 - Gravely,Brenton A1 - Greenberg,Anthony J. A1 - Griffiths-Jones,Sam A1 - Gross,Samuel A1 - Guigo,Roderic A1 - Gustafson,Erik A. A1 - Haerty,Wilfried A1 - Hahn,Matthew W. A1 - Halligan,Daniel L. A1 - Halpern,Aaron L. A1 - Halter,Gillian M. A1 - Han,Mira V. A1 - Heger,Andreas A1 - Hillier,LaDeana A1 - Hinrichs,Angie S. A1 - Holmes,Ian A1 - Hoskins,Roger A. A1 - Hubisz,Melissa J. A1 - Hultmark,Dan A1 - Huntley,Melanie A. A1 - Jaffe,David B. A1 - Jagadeeshan,Santosh A1 - Jeck,William R. A1 - Johnson,Justin A1 - Jones,Corbin D. A1 - Jordan,William C. A1 - Karpen,Gary H. A1 - Kataoka,Eiko A1 - Keightley,Peter D. A1 - Kheradpour,Pouya A1 - Kirkness,Ewen F. A1 - Koerich,Leonardo B. A1 - Kristiansen,Karsten A1 - Kudrna,Dave A1 - Kulathinal,Rob J. A1 - Kumar,Sudhir A1 - Kwok,Roberta A1 - Lander,Eric A1 - Langley,Charles H. A1 - Lapoint,Richard A1 - Lazzaro,Brian P. A1 - Lee,So-Jeong A1 - Levesque,Lisa A1 - Li,Ruiqiang A1 - Lin,Chiao-Feng A1 - Lin,Michael F. A1 - Lindblad-Toh,Kerstin A1 - Llopart,Ana A1 - Long,Manyuan A1 - Low,Lloyd A1 - Lozovsky,Elena A1 - Lu,Jian A1 - Luo,Meizhong A1 - Machado,Carlos A. A1 - Makalowski,Wojciech A1 - Marzo,Mar A1 - Matsuda,Muneo A1 - Matzkin,Luciano A1 - McAllister,Bryant A1 - McBride,Carolyn S. A1 - McKernan,Brendan A1 - McKernan,Kevin A1 - Mendez-Lago,Maria A1 - Minx,Patrick A1 - Mollenhauer,Michael U. A1 - Montooth,Kristi A1 - Mount, Stephen M. A1 - Mu,Xu A1 - Myers,Eugene A1 - Negre,Barbara A1 - Newfeld,Stuart A1 - Nielsen,Rasmus A1 - Noor,Mohamed A. F. A1 - O'Grady,Patrick A1 - Pachter,Lior A1 - Papaceit,Montserrat A1 - Parisi,Matthew J. A1 - Parisi,Michael A1 - Parts,Leopold A1 - Pedersen,Jakob S. A1 - Pesole,Graziano A1 - Phillippy,Adam M A1 - Ponting,Chris P. A1 - Pop, Mihai A1 - Porcelli,Damiano A1 - Powell,Jeffrey R. A1 - Prohaska,Sonja A1 - Pruitt,Kim A1 - Puig,Marta A1 - Quesneville,Hadi A1 - Ram,Kristipati Ravi A1 - Rand,David A1 - Rasmussen,Matthew D. A1 - Reed,Laura K. A1 - Reenan,Robert A1 - Reily,Amy A1 - Remington,Karin A. A1 - Rieger,Tania T. A1 - Ritchie,Michael G. A1 - Robin,Charles A1 - Rogers,Yu-Hui A1 - Rohde,Claudia A1 - Rozas,Julio A1 - Rubenfield,Marc J. A1 - Ruiz,Alfredo A1 - Russo,Susan A1 - Salzberg,Steven L. A1 - Sanchez-Gracia,Alejandro A1 - Saranga,David J. A1 - Sato,Hajime A1 - Schaeffer,Stephen W. A1 - Schatz,Michael C A1 - Schlenke,Todd A1 - Schwartz,Russell A1 - Segarra,Carmen A1 - Singh,Rama S. A1 - Sirot,Laura A1 - Sirota,Marina A1 - Sisneros,Nicholas B. A1 - Smith,Chris D. A1 - Smith,Temple F. A1 - Spieth,John A1 - Stage,Deborah E. A1 - Stark,Alexander A1 - Stephan,Wolfgang A1 - Strausberg,Robert L. A1 - Strempel,Sebastian A1 - Sturgill,David A1 - Sutton,Granger A1 - Sutton,Granger G. A1 - Tao,Wei A1 - Teichmann,Sarah A1 - Tobari,Yoshiko N. A1 - Tomimura,Yoshihiko A1 - Tsolas,Jason M. A1 - Valente,Vera L. S. A1 - Venter,Eli A1 - Venter,J. Craig A1 - Vicario,Saverio A1 - Vieira,Filipe G. A1 - Vilella,Albert J. A1 - Villasante,Alfredo A1 - Walenz,Brian A1 - Wang,Jun A1 - Wasserman,Marvin A1 - Watts,Thomas A1 - Wilson,Derek A1 - Wilson,Richard K. A1 - Wing,Rod A. A1 - Wolfner,Mariana F. A1 - Wong,Alex A1 - Wong,Gane Ka-Shu A1 - Wu,Chung-I A1 - Wu,Gabriel A1 - Yamamoto,Daisuke A1 - Yang,Hsiao-Pei A1 - Yang,Shiaw-Pyng A1 - Yorke,James A. A1 - Yoshida,Kiyohito A1 - Zdobnov,Evgeny A1 - Zhang,Peili A1 - Zhang,Yu A1 - Zimin,Aleksey V. A1 - Baldwin,Jennifer A1 - Abdouelleil,Amr A1 - Abdulkadir,Jamal A1 - Abebe,Adal A1 - Abera,Brikti A1 - Abreu,Justin A1 - Acer,St Christophe A1 - Aftuck,Lynne A1 - Alexander,Allen A1 - An,Peter A1 - Anderson,Erica A1 - Anderson,Scott A1 - Arachi,Harindra A1 - Azer,Marc A1 - Bachantsang,Pasang A1 - Barry,Andrew A1 - Bayul,Tashi A1 - Berlin,Aaron A1 - Bessette,Daniel A1 - Bloom,Toby A1 - Blye,Jason A1 - Boguslavskiy,Leonid A1 - Bonnet,Claude A1 - Boukhgalter,Boris A1 - Bourzgui,Imane A1 - Brown,Adam A1 - Cahill,Patrick A1 - Channer,Sheridon A1 - Cheshatsang,Yama A1 - Chuda,Lisa A1 - Citroen,Mieke A1 - Collymore,Alville A1 - Cooke,Patrick A1 - Costello,Maura A1 - D'Aco,Katie A1 - Daza,Riza A1 - Haan,Georgius De A1 - DeGray,Stuart A1 - DeMaso,Christina A1 - Dhargay,Norbu A1 - Dooley,Kimberly A1 - Dooley,Erin A1 - Doricent,Missole A1 - Dorje,Passang A1 - Dorjee,Kunsang A1 - Dupes,Alan A1 - Elong,Richard A1 - Falk,Jill A1 - Farina,Abderrahim A1 - Faro,Susan A1 - Ferguson,Diallo A1 - Fisher,Sheila A1 - Foley,Chelsea D. A1 - Franke,Alicia A1 - Friedrich,Dennis A1 - Gadbois,Loryn A1 - Gearin,Gary A1 - Gearin,Christina R. A1 - Giannoukos,Georgia A1 - Goode,Tina A1 - Graham,Joseph A1 - Grandbois,Edward A1 - Grewal,Sharleen A1 - Gyaltsen,Kunsang A1 - Hafez,Nabil A1 - Hagos,Birhane A1 - Hall,Jennifer A1 - Henson,Charlotte A1 - Hollinger,Andrew A1 - Honan,Tracey A1 - Huard,Monika D. A1 - Hughes,Leanne A1 - Hurhula,Brian A1 - Husby,M Erii A1 - Kamat,Asha A1 - Kanga,Ben A1 - Kashin,Seva A1 - Khazanovich,Dmitry A1 - Kisner,Peter A1 - Lance,Krista A1 - Lara,Marcia A1 - Lee,William A1 - Lennon,Niall A1 - Letendre,Frances A1 - LeVine,Rosie A1 - Lipovsky,Alex A1 - Liu,Xiaohong A1 - Liu,Jinlei A1 - Liu,Shangtao A1 - Lokyitsang,Tashi A1 - Lokyitsang,Yeshi A1 - Lubonja,Rakela A1 - Lui,Annie A1 - MacDonald,Pen A1 - Magnisalis,Vasilia A1 - Maru,Kebede A1 - Matthews,Charles A1 - McCusker,William A1 - McDonough,Susan A1 - Mehta,Teena A1 - Meldrim,James A1 - Meneus,Louis A1 - Mihai,Oana A1 - Mihalev,Atanas A1 - Mihova,Tanya A1 - Mittelman,Rachel A1 - Mlenga,Valentine A1 - Montmayeur,Anna A1 - Mulrain,Leonidas A1 - Navidi,Adam A1 - Naylor,Jerome A1 - Negash,Tamrat A1 - Nguyen,Thu A1 - Nguyen,Nga A1 - Nicol,Robert A1 - Norbu,Choe A1 - Norbu,Nyima A1 - Novod,Nathaniel A1 - O'Neill,Barry A1 - Osman,Sahal A1 - Markiewicz,Eva A1 - Oyono,Otero L. A1 - Patti,Christopher A1 - Phunkhang,Pema A1 - Pierre,Fritz A1 - Priest,Margaret A1 - Raghuraman,Sujaa A1 - Rege,Filip A1 - Reyes,Rebecca A1 - Rise,Cecil A1 - Rogov,Peter A1 - Ross,Keenan A1 - Ryan,Elizabeth A1 - Settipalli,Sampath A1 - Shea,Terry A1 - Sherpa,Ngawang A1 - Shi,Lu A1 - Shih,Diana A1 - Sparrow,Todd A1 - Spaulding,Jessica A1 - Stalker,John A1 - Stange-Thomann,Nicole A1 - Stavropoulos,Sharon A1 - Stone,Catherine A1 - Strader,Christopher A1 - Tesfaye,Senait A1 - Thomson,Talene A1 - Thoulutsang,Yama A1 - Thoulutsang,Dawa A1 - Topham,Kerri A1 - Topping,Ira A1 - Tsamla,Tsamla A1 - Vassiliev,Helen A1 - Vo,Andy A1 - Wangchuk,Tsering A1 - Wangdi,Tsering A1 - Weiand,Michael A1 - Wilkinson,Jane A1 - Wilson,Adam A1 - Yadav,Shailendra A1 - Young,Geneva A1 - Yu,Qing A1 - Zembek,Lisa A1 - Zhong,Danni A1 - Zimmer,Andrew A1 - Zwirko,Zac A1 - Jaffe,David B. A1 - Alvarez,Pablo A1 - Brockman,Will A1 - Butler,Jonathan A1 - Chin,CheeWhye A1 - Gnerre,Sante A1 - Grabherr,Manfred A1 - Kleber,Michael A1 - Mauceli,Evan A1 - MacCallum,Iain AB - Comparative analysis of multiple genomes in a phylogenetic framework dramatically improves the precision and sensitivity of evolutionary inference, producing more robust results than single-genome analyses can provide. The genomes of 12 Drosophila species, ten of which are presented here for the first time (sechellia, simulans, yakuba, erecta, ananassae, persimilis, willistoni, mojavensis, virilis and grimshawi), illustrate how rates and patterns of sequence divergence across taxa can illuminate evolutionary processes on a genomic scale. These genome sequences augment the formidable genetic tools that have made Drosophila melanogaster a pre-eminent model for animal genetics, and will further catalyse fundamental research on mechanisms of development, cell biology, genetics, disease, neurobiology, behaviour, physiology and evolution. Despite remarkable similarities among these Drosophila species, we identified many putatively non-neutral changes in protein-coding genes, non-coding RNA genes, and cis-regulatory regions. These may prove to underlie differences in the ecology and behaviour of these diverse species. VL - 450 SN - 0028-0836 UR - http://www.nature.com/nature/journal/v450/n7167/full/nature06341.html CP - 7167 M3 - 10.1038/nature06341 ER - TY - JOUR T1 - Evolution of genes and genomes on the Drosophila phylogeny JF - Nature Y1 - 2007 A1 - Clark, A.G. A1 - Eisen,M. B A1 - Smith,D. R A1 - Bergman, C.M. A1 - Oliver, B. A1 - Markow, T.A. A1 - Kaufman, T.C. A1 - Kellis, M. A1 - Gelbart, W. A1 - Iyer, V.N. A1 - others VL - 450 CP - 7167 ER - TY - JOUR T1 - Examining Group Behavior and Collaboration using ABM and Robots JF - Proc. of Agent Y1 - 2007 A1 - Blikstein,P. A1 - Rand, William A1 - Wilensky,Uri AB - Agent-based modeling has been extensively used by scientists to study complex systems.Participatory simulations are similar to agent-based models except that humans play the role of the virtual agents. The Bifocal modeling approach uses sensors to gather data about the real-world phenomena being modeled and uses that information to affect the model. In this work, we are interested in automatically extracting, analyzing and modeling group behaviors in problem solving. Combining these three systems into one unified platform would be useful for those purposes, since it would facilitate a synthesis of their main affordances: understanding the role of locality, mapping human action to emergent behaviors, and controlling embedded physical objects in noisy environments while receiving sensory feedback. We will demonstrate a technological platform based on the NetLogo/HubNet architecture that supports simulated agents, participatory agents and physical agents. We place this platform within a more general framework that we call Human, Embedded and Virtual agents in Mediation (HEV-M). We have run several studies using an instantiation of this platform that consists of a robot-car with four users who navigate a maze. We believe that this tool has potential for three main reasons (1) it facilitates logging of participant’s actions, so as to identify patterns, (2) it offers researchers in the field of computer-supported collaborative learning an easy-to-use tool to design engaging collaborative learning activities and, (3) it foregrounds the role of individual actions within the accomplishment of a collective goal, highlighting the connections between simple individual actions and the resultant macroscopic behaviors of the system. ER - TY - JOUR T1 - Experimenting with software testbeds for evaluating new technologies JF - Empirical Software Engineering Y1 - 2007 A1 - Lindvall,M. A1 - Rus,I. A1 - Donzelli,P. A1 - Memon, Atif M. A1 - Zelkowitz, Marvin V A1 - Betin-Can,A. A1 - Bultan,T. A1 - Ackermann,C. A1 - Anders,B. A1 - Asgari, S. A1 - Basili, Victor R. AB - The evolution of a new technology depends upon a good theoretical basis for developing the technology, as well as upon its experimental validation. In order to provide for this experimentation, we have investigated the creation of a software testbed and the feasibility of using the same testbed for experimenting with a broad set of technologies. The testbed is a set of programs, data, and supporting documentation that allows researchers to test their new technology on a standard software platform. An important component of this testbed is the Unified Model of Dependability (UMD), which was used to elicit dependability requirements for the testbed software. With a collection of seeded faults and known issues of the target system, we are able to determine if a new technology is adept at uncovering defects or providing other aids proposed by its developers. In this paper, we present the Tactical Separation Assisted Flight Environment (TSAFE) testbed environment for which we modeled and evaluated dependability requirements and defined faults to be seeded for experimentation. We describe two completed experiments that we conducted on the testbed. The first experiment studies a technology that identifies architectural violations and evaluates its ability to detect the violations. The second experiment studies model checking as part of design for verification. We conclude by describing ongoing experimental work studying testing, using the same testbed. Our conclusion is that even though these three experiments are very different in terms of the studied technology, using and re-using the same testbed is beneficial and cost effective. VL - 12 CP - 4 M3 - 10.1007/s10664-006-9034-0 ER - TY - CONF T1 - Exploiting approximate transitivity of trust T2 - Broadband Communications, Networks and Systems, 2007. BROADNETS 2007. Fourth International Conference on Y1 - 2007 A1 - Morselli,Ruggero A1 - Bhattacharjee, Bobby A1 - Katz, Jonathan A1 - Marsh,Michael AB - Social networks, of which webs of trust are a particular type, have been shown to be effective ways of moving information with minimal external configuration, setup, or management. For applications requiring information assurance, a web of trust is an appealing system architecture, since trust is an inherent component of both the network design and assurance. The trust in a typical web of trust is not transitive, however, making the construction of an application with strong assurance difficult or impossible. Instead, in this paper we examine a notion of weak assurance that can be provided by a web of trust, and might be #x201C;good enough #x201D; for many applications. As a motivating example, and to provide a more concrete basis for exposition, we present KeyChains, a peer-to-peer system that operates over a distributed web of trust to provide fully decentralized public key publishing and retrieval. In addition to weak assurance guarantees, KeyChains also provides an audit trail for public keys retrieved. Our analysis and simulations show that the resulting system is both efficient and secure. JA - Broadband Communications, Networks and Systems, 2007. BROADNETS 2007. Fourth International Conference on M3 - 10.1109/BROADNETS.2007.4550477 ER - TY - JOUR T1 - A fast implementation of the ISODATA clustering algorithm JF - International Journal of Computational Geometry and Applications Y1 - 2007 A1 - Memarsadeghi,N. A1 - Mount, Dave A1 - Netanyahu,N. S A1 - Le Moigne,J. A1 - de Berg,M. AB - Clustering is central to many image processing and remote sensing applications. isodatais one of the most popular and widely used clustering methods in geoscience applications, but it can run slowly, particularly with large data sets. We present a more efficient approach to isodata clustering, which achieves better running times by storing the points in a kd-tree and through a modification of the way in which the algorithm estimates the dispersion of each cluster. We also present an approximate version of the algorithm which allows the user to further improve the running time, at the expense of lower fidelity in computing the nearest cluster center to each point. We provide both theoretical and empirical justification that our modified approach produces clusterings that are very similar to those produced by the standard isodata approach. We also provide empirical studies on both synthetic data and remotely sensed Landsat and MODIS images that show that our approach has significantly lower running times. VL - 17 CP - 1 ER - TY - JOUR T1 - GATA and Nkx factors synergistically regulate tissue-specific gene expression and development in vivo JF - Development Y1 - 2007 A1 - Zhang,Yuzhen A1 - Rath,Nibedita A1 - Hannenhalli, Sridhar A1 - Wang,Zhishan A1 - Cappola,Thomas A1 - Kimura,Shioko A1 - Atochina-Vasserman,Elena A1 - Lu,Min Min A1 - Beers,Michael F. A1 - Morrisey,Edward E. AB - In vitro studies have suggested that members of the GATA and Nkx transcription factor families physically interact, and synergistically activate pulmonary epithelial- and cardiac-gene promoters. However, the relevance of this synergy has not been demonstrated in vivo. We show that Gata6-Titf1 (Gata6-Nkx2.1) double heterozygous (G6-Nkx DH) embryos and mice have severe defects in pulmonary epithelial differentiation and distal airway development, as well as reduced phospholipid production. The defects in G6-Nkx DH embryos and mice are similar to those observed in human neonates with respiratory distress syndromes, including bronchopulmonary dysplasia, and differential gene expression analysis reveals essential developmental pathways requiring synergistic regulation by both Gata6 and Titf1 (Nkx2.1). These studies indicate that Gata6 and Nkx2.1 act in a synergistic manner to direct pulmonary epithelial differentiation and development in vivo, providing direct evidence that interactions between these two transcription factor families are crucial for the development of the tissues in which they are co-expressed. VL - 134 UR - http://dev.biologists.org/content/134/1/189.abstract CP - 1 M3 - 10.1242/dev.02720 ER - TY - JOUR T1 - Genome Analysis Linking Recent European and African Influenza (H5N1) Viruses JF - Emerging Infectious DiseasesEmerg Infect Dis Y1 - 2007 A1 - Salzberg,Steven L. A1 - Kingsford, Carl A1 - Cattoli,Giovanni A1 - Spiro,David J. A1 - Janies,Daniel A. A1 - Aly,Mona Mehrez A1 - Brown,Ian H. A1 - Couacy-Hymann,Emmanuel A1 - De Mia,Gian Mario A1 - Dung,Do Huu A1 - Guercio,Annalisa A1 - Joannis,Tony A1 - Ali,Ali Safar Maken A1 - Osmani,Azizullah A1 - Padalino,Iolanda A1 - Saad,Magdi D. A1 - Savić,Vladimir A1 - Sengamalay,Naomi A. A1 - Yingst,Samuel A1 - Zaborsky,Jennifer A1 - Zorman-Rojs,Olga A1 - Ghedin,Elodie A1 - Capua,Ilaria AB - Although linked, these viruses are distinct from earlier outbreak strains., To better understand the ecology and epidemiology of the highly pathogenic avian influenza virus in its transcontinental spread, we sequenced and analyzed the complete genomes of 36 recent influenza A (H5N1) viruses collected from birds in Europe, northern Africa, and southeastern Asia. These sequences, among the first complete genomes of influenza (H5N1) viruses outside Asia, clearly depict the lineages now infecting wild and domestic birds in Europe and Africa and show the relationships among these isolates and other strains affecting both birds and humans. The isolates fall into 3 distinct lineages, 1 of which contains all known non-Asian isolates. This new Euro-African lineage, which was the cause of several recent (2006) fatal human infections in Egypt and Iraq, has been introduced at least 3 times into the European-African region and has split into 3 distinct, independently evolving sublineages. One isolate provides evidence that 2 of these sublineages have recently reassorted. VL - 13 SN - 1080-6040 CP - 5 M3 - 10.3201/eid1305.070013 ER - TY - JOUR T1 - Genome-wide expression profiling and bioinformatics analysis of diurnally regulated genes in the mouse prefrontal cortex JF - Genome Biology Y1 - 2007 A1 - Yang,Shuzhang A1 - Wang,Kai A1 - Valladares,Otto A1 - Hannenhalli, Sridhar A1 - Bucan,Maja AB - The prefrontal cortex is important in regulating sleep and mood. Diurnally regulated genes in the prefrontal cortex may be controlled by the circadian system, by sleep:wake states, or by cellular metabolism or environmental responses. Bioinformatics analysis of these genes will provide insights into a wide-range of pathways that are involved in the pathophysiology of sleep disorders and psychiatric disorders with sleep disturbances. VL - 8 SN - 1465-6906 UR - http://genomebiology.com/2007/8/11/R247 CP - 11 M3 - 10.1186/gb-2007-8-11-r247 ER - TY - JOUR T1 - Geometrical algorithms for automated design of side actions in injection moulding of complex parts JF - Computer-Aided Design Y1 - 2007 A1 - Banerjee,Ashis Gopal A1 - Gupta, Satyandra K. KW - Configuration spaces KW - Geometrical reasoning KW - Mould design AB - This paper describes algorithms for generating shapes of side actions to minimize a customizable injection moulding cost function. Given a set of undercut facets on a polyhedral part and the main mold opening directions, our approach works in the following manner: first, we compute candidate retraction space for every undercut facet. This space represents the set of candidate translation vectors that can be used by the side action to completely disengage from the undercut facet. As the next step, we generate a discrete set of feasible, nondominated retractions. Then we group the undercut facets into undercut regions by performing state space search over such retractions. This search step is performed by minimizing the given moulding cost function. After identifying the undercut regions, we generate the shapes of individual side actions. We believe that the results presented in this paper will provide the foundations for developing fully automated software for designing side actions. VL - 39 SN - 0010-4485 UR - http://www.sciencedirect.com/science/article/pii/S0010448507001339 CP - 10 M3 - 10.1016/j.cad.2007.05.014 ER - TY - CONF T1 - Get Your Experience Factory Ready for the Next Decade–Ten Years after "How to Build and Run One" T2 - Companion to the proceedings of the 29th International Conference on Software Engineering Y1 - 2007 A1 - Basili, Victor R. A1 - Bomarius,Frank A1 - Feldmann,Raimund L. AB - This one-day tutorial aims at industry practitioners, managers and developers alike, who want to learn more about how to successfully design, implement and run an Experience Factory, to systematically build up and manage the experience of an organization. State-of- the art methods and techniques on how to initially set-up or to further develop and improve an organization's Experience Factory are discussed. Participants should come from organizations (not only from the software domain) that are interested in implementing an Experience Factory to help effectively support improvement activities (such as TQM, ISO 9000, CMMI, SPICE, or TSP) to gain competitive advantages. JA - Companion to the proceedings of the 29th International Conference on Software Engineering T3 - ICSE COMPANION '07 PB - IEEE Computer Society CY - Washington, DC, USA SN - 0-7695-2892-9 UR - http://dx.doi.org/10.1109/ICSECOMPANION.2007.41 M3 - 10.1109/ICSECOMPANION.2007.41 ER - TY - JOUR T1 - Grid Services Base Library: A high-level, procedural application programming interface for writing Globus-based Grid services JF - Future Generation Comp Syst Y1 - 2007 A1 - Bazinet,A. L A1 - Myers,D. S A1 - Fuetsch,J. A1 - Cummings, Michael P. AB - The Grid Services Base Library (GSBL) is a procedural application programming interface (API) that abstracts many of the high-level functions performed by Globus Grid services, thus dramatically lowering the barriers to writing Grid services. The library has been extensively tested and used for computational biology research in a Globus Toolkit-based Grid system, in which no fewer than twenty Grid services written with this API are deployed. VL - 23 CP - 3 ER - TY - JOUR T1 - Guest Editorial: Special Issue on Human Detection and Recognition JF - Information Forensics and Security, IEEE Transactions on Y1 - 2007 A1 - Bhanu, B. A1 - Ratha,N. K A1 - Kumar, V. A1 - Chellapa, Rama A1 - Bigun, J. AB - The 12 regular papers and three correspondences in this special issue focus on human detection and recognition. The papers represent gait, face (3-D, 2-D, video), iris, palmprint, cardiac sounds, and vulnerability of biometrics and protection against the spoof attacks. VL - 2 SN - 1556-6013 CP - 3 M3 - 10.1109/TIFS.2007.905740 ER - TY - JOUR T1 - Heuristic Search and Information Visualization Methods for School Redistricting JF - AI Magazine Y1 - 2007 A1 - desJardins, Marie A1 - Bulka,Blazej A1 - Carr,Ryan A1 - Jordan,Eric A1 - Rheingans,Penny AB - We describe an application of AI search and information visualization techniques to the problem of school redistricting, in which students are assigned to home schools within a county or school district. This is a multicriteria optimization problem in which competing objectives, such as school capacity, busing costs, and socioeconomic distribution, must be considered. Because of the complexity of the decision-making problem, tools are needed to help end users generate, evaluate, and compare alternative school assignment plans. A key goal of our research is to aid users in finding multiple qualitatively different redistricting plans that represent different trade-offs in the decision space. We present heuristic search methods that can be used to find a set of qualitatively different plans, and give empirical results of these search methods on population data from the school district of Howard County, Maryland. We show the resulting plans using novel visualization methods that we have developed for summarizing and comparing alternative plans. VL - 28 SN - 0738-4602 UR - https://www.aaai.org/ojs/index.php/aimagazine/article/viewArticle/2055 CP - 3 M3 - 10.1609/aimag.v28i3.2055 ER - TY - CONF T1 - Holding the Internet Accountable T2 - Proc. 6th ACM Workshop on Hot Topics in Networks (Hotnets-VI) Y1 - 2007 A1 - Andersen,David A1 - Balakrishnan,Hari A1 - Feamster, Nick A1 - Koponen,Teemu A1 - Moon,Daekyong A1 - Shenker,Scott AB - Today’s IP network layer provides little to no protection against misconfiguration or malice. Despite some progress in improving the robustness and security of the IP layer, misconfigurations and attacks still occur frequently. We show how a network layer that provides accountability, i.e., the ability to associate each action with the responsible entity, provides a firm foundation for defenses against misconfiguration and malice. We present the design of a network layer that incorporates accountability called AIP (Accountable Internet Protocol) and show how its features—notably, its use of self-certifying addresses— can improve both source accountability (the ability to trace actions to a particular end host and stop that host from misbehaving) and control-plane accountability (the ability to pinpoint and prevent attacks on routing). JA - Proc. 6th ACM Workshop on Hot Topics in Networks (Hotnets-VI) UR - http://repository.cmu.edu/compsci/66 ER - TY - CHAP T1 - Human Values for Shaping the Made World T2 - Human-Computer Interaction – INTERACT 2007Human-Computer Interaction – INTERACT 2007 Y1 - 2007 A1 - Shneiderman, Ben ED - Baranauskas,Cécilia ED - Palanque,Philippe ED - Abascal,Julio ED - Barbosa,Simone AB - Interface design principles have been effective in shaping new desktop applications, web-based resources, and mobile devices. Usability and sociability promote successful online communities and social network services. The contributions of human-computer interaction researchers have been effective in raising the quality of design of many products and services. As our influence grows, we can play an even more profound role in guaranteeing that enduring human values are embedded in the next generation of technology. This talk identifies which goals are realistic, such as universality, responsibility, trust, empathy, and privacy, and how we might ensure that they become part of future services and systems. JA - Human-Computer Interaction – INTERACT 2007Human-Computer Interaction – INTERACT 2007 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 4662 SN - 978-3-540-74794-9 UR - http://dx.doi.org/10.1007/978-3-540-74796-3_1 ER - TY - JOUR T1 - Hybrid Detectors for Subpixel Targets JF - Pattern Analysis and Machine Intelligence, IEEE Transactions on Y1 - 2007 A1 - Broadwater, J. A1 - Chellapa, Rama KW - ACE subpixel algorithm;AMSD subpixel algorithm;hybrid detectors;hyperspectral imagery analysis;physics;statistics;subpixel target detection;subspace detection;object detection;spectral analysis;statistical analysis;target tracking;Algorithms;Artificial In KW - Automated;Reproducibility of Results;Sensitivity and Specificity;Signal Processing KW - Computer-Assisted; KW - Computer-Assisted;Models KW - Computer-Assisted;Pattern Recognition KW - Statistical;Image Enhancement;Image Interpretation KW - Statistical;Numerical Analysis AB - Subpixel detection is a challenging problem in hyperspectral imagery analysis. Since the target size is smaller than the size of a pixel, detection algorithms must rely solely on spectral information. A number of different algorithms have been developed over the years to accomplish this task, but most detectors have taken either a purely statistical or a physics-based approach to the problem. We present two new hybrid detectors that take advantage of these approaches by modeling the background using both physics and statistics. Results demonstrate improved performance over the well-known AMSD and ACE subpixel algorithms in experiments that include multiple targets, images, and area types - especially when dealing with weak targets in complex backgrounds. VL - 29 SN - 0162-8828 CP - 11 M3 - 10.1109/TPAMI.2007.1104 ER - TY - JOUR T1 - Implications of Autonomy for the Expressiveness of Policy Routing JF - Networking, IEEE/ACM Transactions on Y1 - 2007 A1 - Feamster, Nick A1 - Johari,R. A1 - Balakrishnan,H. KW - autonomous systems KW - global Internet connectivity KW - interdomain routing system KW - Internet KW - next-hop rankings KW - routing protocol KW - routing protocols KW - routing stability KW - stable path assignment AB - Thousands of competing autonomous systems must cooperate with each other to provide global Internet connectivity. Each autonomous system (AS) encodes various economic, business, and performance decisions in its routing policy. The current interdomain routing system enables each AS to express policy using rankings that determine how each router in the AS chooses among different routes to a destination, and filters that determine which routes are hidden from each neighboring AS. Because the Internet is composed of many independent, competing networks, the interdomain routing system should provide autonomy, allowing network operators to set their rankings independently, and to have no constraints on allowed filters. This paper studies routing protocol stability under these conditions. We first demonstrate that ldquonext-hop rankings,rdquo commonly used in practice, may not ensure routing stability. We then prove that, when providers can set rankings and filters autonomously, guaranteeing that the routing system will converge to a stable path assignment imposes strong restrictions on the rankings ASes are allowed to choose. We discuss the implications of these results for the future of interdomain routing. VL - 15 SN - 1063-6692 CP - 6 M3 - 10.1109/TNET.2007.896531 ER - TY - JOUR T1 - Incorporating manufacturability considerations during design of injection molded multi-material objects JF - Research in Engineering Design Y1 - 2007 A1 - Banerjee,Ashis A1 - Li,Xuejun A1 - Fowler,Greg A1 - Gupta, Satyandra K. KW - engineering AB - The presence of an already molded component during the second and subsequent molding stages makes multi-material injection molding different from traditional injection molding process. Therefore, designing multi-material molded objects requires addressing many additional manufacturability considerations. In this paper, we first present an approach to systematically identifying potential manufacturability problems that are unique to the multi-material molding processes and design rules to avoid these problems. Then we present a comprehensive manufacturability analysis approach that incorporates both the traditional single material molding rules as well as the specific rules that have been identified for multi-material molding. Our analysis shows that sometimes the traditional rules need to be suppressed or modified. Lastly, for each of the new manufacturability problem, this paper describes algorithms for automatically detecting potential occurrences and generating redesign suggestions. These algorithms have been implemented in a computer-aided manufacturability analysis system. The approach presented in this paper is applicable to multi-shot and over molding processes. We expect that the manufacturability analysis techniques presented in this paper will help in decreasing the product development time for the injection molded multi-material objects. VL - 17 SN - 0934-9839 UR - http://www.springerlink.com/content/c35337h3r5129525/abstract/ CP - 4 M3 - 10.1007/s00163-007-0027-9 ER - TY - CONF T1 - Just a cog in the machine: participatory robotics as a tool for understanding collaborative learning and decision-making T2 - Proceedings of the 8th iternational conference on Computer supported collaborative learning Y1 - 2007 A1 - Blikstein,Paulo A1 - Rand, William A1 - Wilensky,Uri AB - We will demonstrate the integration of a software-based multi-agent modeling platform with a participatory simulation environment and a real-time control system for a physical robotic agent. Both real and virtual participants will be able to act collaboratively in a simulation that will control a physical agent. The backbone of this demonstration is a widely used, freely available, mature modeling platform (NetLogo). We posit that this technological platform can be of use for researchers interested in investigating collaborative learning and decision-making, as well as to design collaborative learning activities. We will present preliminary findings from pilot studies with the tool. JA - Proceedings of the 8th iternational conference on Computer supported collaborative learning T3 - CSCL'07 PB - International Society of the Learning Sciences SN - 978-0-6151-5436-7 UR - http://dl.acm.org/citation.cfm?id=1599600.1599614 ER - TY - CONF T1 - Kernel fully constrained least squares abundance estimates T2 - Geoscience and Remote Sensing Symposium, 2007. IGARSS 2007. IEEE International Y1 - 2007 A1 - Broadwater, J. A1 - Chellapa, Rama A1 - Banerjee, A. A1 - Burlina, P. KW - abundance KW - algorithm;kernel KW - analysis; KW - AVIRIS KW - based KW - constrained KW - constraint;feature KW - constraint;spectral KW - estimates;linear KW - extraction;geophysical KW - feature KW - fully KW - image;hyperspectral KW - imagery;kernel KW - least KW - mixing KW - model;nonnegativity KW - processing;geophysical KW - processing;multidimensional KW - processing;spectral KW - signal KW - space;kernel KW - squares KW - techniques;image KW - unmixing;sum-to-one AB - A critical step for fitting a linear mixing model to hyperspectral imagery is the estimation of the abundances. The abundances are the percentage of each end member within a given pixel; therefore, they should be non-negative and sum to one. With the advent of kernel based algorithms for hyperspectral imagery, kernel based abundance estimates have become necessary. This paper presents such an algorithm that estimates the abundances in the kernel feature space while maintaining the non-negativity and sum-to-one constraints. The usefulness of the algorithm is shown using the AVIRIS Cuprite, Nevada image. JA - Geoscience and Remote Sensing Symposium, 2007. IGARSS 2007. IEEE International M3 - 10.1109/IGARSS.2007.4423736 ER - TY - CONF T1 - Large-scale byzantine fault tolerance: safe but not always live T2 - Proceedings of the 3rd workshop on on Hot Topics in System Dependability Y1 - 2007 A1 - Rodrigues,Rodrigo A1 - Kouznetsov,Petr A1 - Bhattacharjee, Bobby AB - The overall correctness of large-scale systems composed of many groups of replicas executing BFT protocols scales poorly with the number of groups. This is because the probability of at least one group being compromised (more than 1/3 faulty replicas) increases rapidly as the number of groups increases. In this paper we address this problem with a simple modification to Castro and Liskov's BFT replication that allows for arbitrary choice of n (number of replicas) and f (failure threshold). The price to pay is a more restrictive liveness requirement, and we present the design of a large-scale BFT replicated system that obviates this problem. JA - Proceedings of the 3rd workshop on on Hot Topics in System Dependability T3 - HotDep'07 PB - USENIX Association CY - Berkeley, CA, USA UR - http://dl.acm.org/citation.cfm?id=1323140.1323157 ER - TY - CONF T1 - Layout-Accurate Design and Implementation of a High-Throughput Interconnection Network for Single-Chip Parallel Processing T2 - High-Performance Interconnects, 2007. HOTI 2007. 15th Annual IEEE Symposium on Y1 - 2007 A1 - Balkan,A.O. A1 - Horak,M.N. A1 - Gang Qu A1 - Vishkin, Uzi KW - description KW - design;mesh KW - interconnection KW - languages;multi-threading;multiprocessor KW - MoT KW - multi-threading;layout-accurate KW - network;on-chip KW - network;Verilog KW - networks;parallel KW - of KW - on-chip KW - Parallel KW - processing; KW - processing;hardware KW - processor;parallel KW - processors;on-chip KW - programming;pipeline KW - registers;single-chip KW - simulations;eXplicit KW - TREES KW - XMT AB - A mesh of trees (MoT) on-chip interconnection network has been proposed recently to provide high throughput between memory units and processors for single-chip parallel processing (Balkan et al., 2006). In this paper, we report our findings in bringing this concept to silicon. Specifically, we conduct cycle-accurate Verilog simulations to verify the analytical results claimed in (Balkan et al., 2006). We synthesize and obtain the layout of the MoT interconnection networks of various sizes. To further improve throughput, we investigate different arbitration primitives to handle load and store, the two most common memory operations. We also study the use of pipeline registers in large networks when there are long wires. Simulation based on full network layout demonstrates that significant throughput improvement can be achieved over the original proposed MoT interconnection network. The importance of this work lies in its validation of performance features of the MoT interconnection network, as they were previously shown to be competitive with traditional network solutions. The MoT network is currently used in an eXplicit multi-threading (XMT) on-chip parallel processor, which is engineered to support parallel programming. In that context, a 32-terminal MoT network could support up to 512 on-chip XMT processors. Our 8-terminal network that could serve 8 processor clusters (or 128 total processors), was also accepted recently for fabrication. JA - High-Performance Interconnects, 2007. HOTI 2007. 15th Annual IEEE Symposium on M3 - 10.1109/HOTI.2007.11 ER - TY - JOUR T1 - Local strategy learning in networked multi-agent team formation JF - Autonomous Agents and Multi-Agent Systems Y1 - 2007 A1 - Bulka,Blazej A1 - Gaston,Matthew A1 - desJardins, Marie AB - Networked multi-agent systems are comprised of many autonomous yet interdependent agents situated in a virtual social network. Two examples of such systems are supply chain networks and sensor networks. A common challenge in many networked multi-agent systems is decentralized team formation among the spatially and logically extended agents. Even in cooperative multi-agent systems, efficient team formation is made difficult by the limited local information available to the individual agents. We present a model of distributed multi-agent team formation in networked multi-agent systems, describe a policy learning framework for joining teams based on local information, and give empirical results on improving team formation performance. In particular, we show that local policy learning from limited information leads to a significant increase in organizational team formation performance compared to a random policy. VL - 15 SN - 1387-2532 UR - http://dx.doi.org/10.1007/s10458-006-0007-x CP - 1 ER - TY - CONF T1 - Low-overhead run-time scheduling for fine-grained acceleration of signal processing systems T2 - Signal Processing Systems, 2007 IEEE Workshop on Y1 - 2007 A1 - Boutellier,J. A1 - Bhattacharyya, Shuvra S. A1 - Silvén,O. JA - Signal Processing Systems, 2007 IEEE Workshop on ER - TY - CONF T1 - Measurement and analysis of online social networks T2 - Proceedings of the 7th ACM SIGCOMM conference on Internet measurement Y1 - 2007 A1 - Mislove,Alan A1 - Marcon,Massimiliano A1 - Gummadi,Krishna P. A1 - Druschel,Peter A1 - Bhattacharjee, Bobby KW - analysis KW - measurement KW - social networks AB - Online social networking sites like Orkut, YouTube, and Flickr are among the most popular sites on the Internet. Users of these sites form a social network, which provides a powerful means of sharing, organizing, and finding content and contacts. The popularity of these sites provides an opportunity to study the characteristics of online social network graphs at large scale. Understanding these graphs is important, both to improve current systems and to design new applications of online social networks. This paper presents a large-scale measurement study and analysis of the structure of multiple online social networks. We examine data gathered from four popular online social networks: Flickr, YouTube, LiveJournal, and Orkut. We crawled the publicly accessible user links on each site, obtaining a large portion of each social network's graph. Our data set contains over 11.3 million users and 328 million links. We believe that this is the first study to examine multiple online social networks at scale. Our results confirm the power-law, small-world, and scale-free properties of online social networks. We observe that the indegree of user nodes tends to match the outdegree; that the networks contain a densely connected core of high-degree nodes; and that this core links small groups of strongly clustered, low-degree nodes at the fringes of the network. Finally, we discuss the implications of these structural properties for the design of social network based systems. JA - Proceedings of the 7th ACM SIGCOMM conference on Internet measurement T3 - IMC '07 PB - ACM CY - New York, NY, USA SN - 978-1-59593-908-1 UR - http://doi.acm.org/10.1145/1298306.1298311 M3 - 10.1145/1298306.1298311 ER - TY - CONF T1 - Multi-Dimensional Range Query over Encrypted Data Y1 - 2007 A1 - Elaine Shi A1 - Bethencourt, J. A1 - Chan, T.-H.H. A1 - Song, Dawn A1 - Perrig, A. KW - auditing KW - cryptography KW - data privacy KW - decision bilinear Diffie-Hellman KW - decision linear assumptions KW - encrypted data KW - multi-dimensional range query KW - network audit logs KW - network gateway KW - network intrusions AB - We design an encryption scheme called multi-dimensional range query over encrypted data (MRQED), to address the privacy concerns related to the sharing of network audit logs and various other applications. Our scheme allows a network gateway to encrypt summaries of network flows before submitting them to an untrusted repository. When network intrusions are suspected, an authority can release a key to an auditor, allowing the auditor to decrypt flows whose attributes (e.g., source and destination addresses, port numbers, etc.) fall within specific ranges. However, the privacy of all irrelevant flows are still preserved. We formally define the security for MRQED and prove the security of our construction under the decision bilinear Diffie-Hellman and decision linear assumptions in certain bilinear groups. We study the practical performance of our construction in the context of network audit logs. Apart from network audit logs, our scheme also has interesting applications for financial audit logs, medical privacy, untrusted remote storage, etc. In particular, we show that MRQED implies a solution to its dual problem, which enables investors to trade stocks through a broker in a privacy-preserving manner. ER - TY - JOUR T1 - Mutatis Mutandis: Safe and predictable dynamic software updating JF - ACM Trans. Program. Lang. Syst. Y1 - 2007 A1 - Stoyle,Gareth A1 - Hicks, Michael W. A1 - Bierman,Gavin A1 - Sewell,Peter A1 - Neamtiu,Iulian KW - capability KW - dynamic software updating KW - proteus KW - Type inference KW - updateability analysis AB - This article presents Proteus, a core calculus that models dynamic software updating, a service for fixing bugs and adding features to a running program. Proteus permits a program's type structure to change dynamically but guarantees the updated program remains type-correct by ensuring a property we call con-freeness. We show how con-freeness can be enforced dynamically, and how it can be approximated via a novel static analysis. This analysis can be used to assess the implications of a program's structure on future updates in order to make update success more predictable. We have implemented Proteus for C, and briefly discuss our implementation which we have tested on several well-known programs. VL - 29 SN - 0164-0925 UR - http://doi.acm.org/10.1145/1255450.1255455 CP - 4 M3 - 10.1145/1255450.1255455 ER - TY - JOUR T1 - NetLens: Iterative Exploration of Content-Actor Network Data JF - Information VisualizationInformation Visualization Y1 - 2007 A1 - Kang,Hyunmo A1 - Plaisant, Catherine A1 - Lee,Bongshin A1 - Bederson, Benjamin B. KW - content-actor network data KW - digital library KW - incremental data exploration KW - iterative query refinement KW - User interfaces AB - Networks have remained a challenge for information retrieval and visualization because of the rich set of tasks that users want to accomplish. This paper offers an abstract Content-Actor network data model, a classification of tasks, and a tool to support them. The NetLens interface was designed around the abstract Content-Actor network data model to allow users to pose a series of elementary queries and iteratively refine visual overviews and sorted lists. This enables the support of complex queries that are traditionally hard to specify. NetLens is general and scalable in that it applies to any data set that can be represented with our abstract data model. This paper describes the use of NetLens with a subset of the ACM Digital Library consisting of about 4000 papers from the CHI conference written by about 6000 authors, and reports on a usability study with nine participants. VL - 6 SN - 1473-8716, 1473-8724 UR - http://ivi.sagepub.com/content/6/1/18 CP - 1 M3 - 10.1057/palgrave.ivs.9500143 ER - TY - JOUR T1 - NetLens: iterative exploration of content-actor network data JF - Information Visualization Y1 - 2007 A1 - Kang,H. A1 - Plaisant, Catherine A1 - Lee,B. A1 - Bederson, Benjamin B. VL - 6 CP - 1 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 3. Volvocales JF - Bangladesh Journal of Plant Taxonomy Y1 - 2007 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents 21 species of Chlamydomonas, four species of Carteria, two species of each of Nephroselmis, Pyramidomonas and Scherffelia, and Collodictyon triciliatum, Polytoma minus, Tetrachloridium ? allorgei and Tetraselmis cordiformis. These species have been reported from some ponds of Mathbaria of Pirojpur and Bakerganj of Barisal districts in Bangladesh. VL - 14 SN - 1028-2092 UR - http://www.banglajol.info/bd/index.php/BJPT/article/viewArticle/518 CP - 1 M3 - 10.3329/bjpt.v14i1.518 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 4. Chlorococcales JF - Bangladesh Journal of Plant Taxonomy Y1 - 2007 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasim,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents three species from each of Schroederia, Monoraphidium and Ankistrodesmus, two species and one variety of Dictyosphaerium, two varieties of Pediastrum, and Tetraedron arthrodesmiforme var. contorta, Chlorotetraedron polymorphum, Myrmecia aquatica, Oocystis tainoensis, Nephrocytium spirale, Kirchneriella irregularis, Coelastrum indicum and Scenedesmus similagineus. These taxa have been reported from some ponds of Mathbaria of Pirojpur and Bakerganj of Barisal Districts in Bangladesh. VL - 14 SN - 1028-2092 UR - http://www.banglajol.info/bd/index.php/BJPT/article/viewArticle/528 CP - 2 M3 - 10.3329/bjpt.v14i2.528 ER - TY - PAT T1 - Object recognition using linear subspaces Y1 - 2007 A1 - Jacobs, David W. A1 - Basri,Ronen The Weizmann Institute ED - NEC Laboratories America, Inc. (4 Independence Way, Princeton, New Jersey 08540, US) AB - Abstract of EP1204069A method for choosing an image from a plurality of three-dimensional models which is most similar to an input image is provided. The method includes the steps of: (a) providing a database of the plurality of three-dimensional models; (b) providing an input image; (c) positioning each three-dimensional model relative to the input image; (d) for each three-dimensional model, determining a rendered image that is most similar to the input image by: (d)(i) computing a linear subspace that describes an approximation to the set of all possible rendered images that each three-dimensional model can produce under all possible lighting conditions where each point in the linear subspace represents a possible image; and one of(d)(ii) finding the point on the linear subspace that is closest to the input image or finding a rendered image in a subset of the linear subspace obtained by projecting the set of images that are generated by positive lights onto the linear subspace; (e) computing a measure of similarly between the input image and each rendered image; and (f) selecting the three-dimensional model corresponding to the rendered image whose measure of similarity is most similar to the input image. Step (d) is preferably repeated for each of a red, green, and blue color component for each three-dimensional model. The linear subspace is preferably either four-dimensional or nine-dimensional. VL - EP20010117763 UR - http://www.freepatentsonline.com/EP1204069.html CP - EP1204069 ER - TY - JOUR T1 - Online collective entity resolution JF - PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE Y1 - 2007 A1 - Bhattacharya,I. A1 - Getoor, Lise AB - Entity resolution is a critical component of data integration where the goal is to reconcile database references correspond- ing to the same real-world entities. Given the abundance of publicly available databases that have unresolved entities, we motivate the problem of quick and accurate resolution for an- swering queries over such ‘unclean’ databases. Since collec- tive entity resolution approaches — where related references are resolved jointly — have been shown to be more accu- rate than independent attribute-based resolution, we focus on adapting collective resolution for answering queries. We pro- pose a two-stage collective resolution strategy for processing queries. We then show how it can be performed on-the-fly by adaptively extracting and resolving those database references that are the most helpful for resolving the query. We validate our approach on two large real-world publication databases where we show the usefulness of collective resolution and at the same time demonstrate the need for adaptive strategies for query processing. We then show how the same queries can be answered in real time using our adaptive approach while pre- serving the gains of collective resolution. This work extends work presented in (Bhattacharya, Licamele, & Getoor 2006). VL - 22 CP - 2 ER - TY - JOUR T1 - Parameterized Looped Schedules for Compact Representation of Execution Sequences in DSP Hardware and Software Implementation JF - IEEE Transactions on Signal Processing Y1 - 2007 A1 - Ming-Yung Ko A1 - Zissulescu,C. A1 - Puthenpurayil,S. A1 - Bhattacharyya, Shuvra S. A1 - Kienhuis,B. A1 - Deprettere,E. F KW - Application software KW - array signal processing KW - code compression methodology KW - compact representation KW - Compaction KW - data compression KW - Design automation KW - Digital signal processing KW - digital signal processing chips KW - DSP KW - DSP hardware KW - embedded systems KW - Encoding KW - Field programmable gate arrays KW - field-programmable gate arrays (FPGAs) KW - FPGA KW - Hardware KW - hierarchical runlength encoding KW - high-level synthesis KW - Kahn process KW - loop-based code compaction KW - looping construct KW - parameterized loop schedules KW - program compilers KW - reconfigurable design KW - runlength codes KW - scheduling KW - Signal generators KW - Signal processing KW - Signal synthesis KW - software engineering KW - software implementation KW - static dataflow models KW - Very large scale integration KW - VLSI AB - In this paper, we present a technique for compact representation of execution sequences in terms of efficient looping constructs. Here, by a looping construct, we mean a compact way of specifying a finite repetition of a set of execution primitives. Such compaction, which can be viewed as a form of hierarchical run-length encoding (RLE), has application in many very large scale integration (VLSI) signal processing contexts, including efficient control generation for Kahn processes on field-programmable gate arrays (FPGAs), and software synthesis for static dataflow models of computation. In this paper, we significantly generalize previous models for loop-based code compaction of digital signal processing (DSP) programs to yield a configurable code compression methodology that exhibits a broad range of achievable tradeoffs. Specifically, we formally develop and apply to DSP hardware and software synthesis a parameterizable loop scheduling approach with compact format, dynamic reconfigurability, and low-overhead decompression VL - 55 SN - 1053-587X CP - 6 M3 - 10.1109/TSP.2007.893964 ER - TY - JOUR T1 - Photometric stereo with general, unknown lighting JF - International Journal of Computer Vision Y1 - 2007 A1 - Basri,R. A1 - Jacobs, David W. A1 - Kemelmacher,I. AB - Work on photometric stereo has shown how to recover the shape and reflectance properties of an object using multiple images taken with a fixed viewpoint and variable lighting conditions. This work has primarily relied on known lighting conditions or the presence of a single point source of light in each image. In this paper we show how to perform photometric stereo assuming that all lights in a scene are distant from the object but otherwise unconstrained. Lighting in each image may be an unknown and may include arbitrary combination of diffuse, point and extended sources. Our work is based on recent results showing that for Lambertian objects, general lighting conditions can be represented using low order spherical harmonics. Using this representation we can recover shape by performing a simple optimization in a low-dimensional space. We also analyze the shape ambiguities that arise in such a representation. We demonstrate our method by reconstructing the shape of objects from images obtained under a variety of lightings. We further compare the reconstructed shapes against shapes obtained with a laser scanner. VL - 72 CP - 3 M3 - 10.1007/s11263-006-8815-7 ER - TY - JOUR T1 - Probabilistic design of multimedia embedded systems JF - ACM Transactions on Embedded Computing Systems (TECS) Y1 - 2007 A1 - Hua,S. A1 - Qu,G. A1 - Bhattacharyya, Shuvra S. VL - 6 CP - 3 ER - TY - CONF T1 - Profiling Attacker Behavior Following SSH Compromises Y1 - 2007 A1 - Ramsbrock,D. A1 - Berthier,R. A1 - Michel Cukier KW - Linux KW - Linux honeypot computers KW - profiling attacker behavior KW - remote compromise KW - rogue code KW - security of data KW - SSH compromises KW - system configuration AB - This practical experience report presents the results of an experiment aimed at building a profile of attacker behavior following a remote compromise. For this experiment, we utilized four Linux honeypot computers running SSH with easily guessable passwords. During the course of our research, we also determined the most commonly attempted usernames and passwords, the average number of attempted logins per day, and the ratio of failed to successful attempts. To build a profile of attacker behavior, we looked for specific actions taken by the attacker and the order in which they occurred. These actions were: checking the configuration, changing the password, downloading a file, installing/running rogue code, and changing the system configuration. M3 - 10.1109/DSN.2007.76 ER - TY - CHAP T1 - Protocols in the use of empirical software engineering artifacts T2 - Empirical Software EngineeringEmpirical Software Engineering Y1 - 2007 A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V A1 - Sjøberg,D. I.K A1 - Johnson,P. A1 - Cowling,A. J AB - If empirical software engineering is to grow as a valid scientific endeavor, the ability to acquire, use, share, and compare data collected from a variety of sources must be encouraged. This is necessary to validate the formal models being developed within computer science. However, within the empirical software engineering community this has not been easily accomplished. This paper analyses experiences from a number of projects, and defines the issues, which include the following: (1) How should data, testbeds, and artifacts be shared? (2) What limits should be placed on who can use them and how? How does one limit potential misuse? (3) What is the appropriate way to credit the organization and individual that spent the effort collecting the data, developing the testbed, and building the artifact? (4) Once shared, who owns the evolved asset? As a solution to these issues, the paper proposes a framework for an empirical software engineering artifact agreement. Such an agreement is intended to address the needs for both creator and user of such artifacts and should foster a market in making available and using such artifacts. If this framework for sharing software engineering artifacts is commonly accepted, it should encourage artifact owners to make the artifacts accessible to others (gaining credit is more likely and misuse is less likely). It may be easier for other researchers to request artifacts since there will be a well-defined protocol for how to deal with relevant matters. JA - Empirical Software EngineeringEmpirical Software Engineering PB - Springer VL - 12 ER - TY - CONF T1 - PUTOP: turning predominant senses into a topic model for word sense disambiguation T2 - Proceedings of the 4th International Workshop on Semantic Evaluations Y1 - 2007 A1 - Jordan Boyd-Graber A1 - Blei,David AB - We extend on McCarthy et al.'s predominant sense method to create an unsupervised method of word sense disambiguation that uses automatically derived topics using Latent Dirichlet allocation. Using topic-specific synset similarity measures, we create predictions for each word in each document using only word frequency information. It is hoped that this procedure can improve upon the method for larger numbers of topics by providing more relevant training corpora for the individual topics. This method is evaluated on SemEval-2007 Task 1 and Task 17. JA - Proceedings of the 4th International Workshop on Semantic Evaluations T3 - SemEval '07 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dl.acm.org/citation.cfm?id=1621474.1621534 ER - TY - JOUR T1 - Report on the Fourth International Workshop on Data Management for Sensor Networks (DMSN 2007) JF - SIGMOD Rec. Y1 - 2007 A1 - Balazinska,Magdalena A1 - Deshpande, Amol A1 - Labrinidis,Alexandros A1 - Luo,Qiong A1 - Madden,Samuel A1 - Yang,Jun AB - Sensor networks enable an unprecedented level of access to the physical world, and hold tremendous potential to revolutionize many application domains. Research on sensor networks spans many areas of computer science, and there are now major conferences, e.g., IPSN and SenSys, devoted to sensor networks. However, there is no focused forum for discussion of early and innovative work on data management in sensor networks. The International Workshop on Data Management for Sensor Networks (DMSN), inaugurated in 2004, aims to fill this significant gap in the database and sensor network communities. VL - 36 SN - 0163-5808 UR - http://doi.acm.org/10.1145/1361348.1361362 CP - 4 M3 - 10.1145/1361348.1361362 ER - TY - CONF T1 - Robust Routing with Unknown Traffic Matrices T2 - INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE Y1 - 2007 A1 - Tabatabaee,V. A1 - Kashyap,A. A1 - Bhattacharjee, Bobby A1 - La,R.J. A1 - Shayman,M.A. KW - engineering;linear KW - inequalities;maximum KW - intradomain KW - linear KW - link KW - matrices;linear KW - matrix KW - network KW - nodes;polynomial KW - of KW - point KW - presence KW - problem;traffic KW - Programming KW - programming;semiinfinite KW - programming;telecommunication KW - region;unknown KW - routing;telecommunication KW - size KW - traffic KW - traffic; KW - utilization;network AB - In this paper, we present an algorithm for intra-domain traffic engineering. We assume that the traffic matrix, which specifies traffic load between every source-destination pair in the network, is unknown and varies with time, but that always lies inside an explicitly defined region. Our goal is to compute a fixed robust routing with best worst case performance for all traffic matrices inside the bounding region. We formulate this problem as a semi-infinite programming problem. Then, we focus on a special case with practical merits, where (1) the traffic matrix region is assumed to be a polytope specified by a finite set of linear inequalities, and (2) our objective is to find the routing that minimizes the maximum link utilization. Under these assumptions, the problem can be formulated as a polynomial size linear programming (LP) problem with finite number of constraints. We further consider two specific set of constraints for the traffic matrix region. The first set is based on the hose model and limits the total traffic rate of network point of presence (PoP) nodes. The second set is based on the pipe model and limits the traffic between source-destination pairs. We study the effectiveness of each set of constraints using extensive simulations. JA - INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE M3 - 10.1109/INFCOM.2007.296 ER - TY - JOUR T1 - SAAR: A shared control plane for overlay multicast JF - Proceedings of 4th USENIX Symposium on Networked Systems Design & Implementation Y1 - 2007 A1 - Nandi,A. A1 - Ganjam,A. A1 - Druschel,P. A1 - Ng,T. S.E A1 - Stoica,I. A1 - Zhang,H. A1 - Bhattacharjee, Bobby AB - Many cooperative overlay multicast systems of diverse designs have been implemented and deployed. In this paper, we explore a new architecture for overlay multicast: we factor out the control plane into a separate overlay that provides a single primitive: a configurable anycast for peer selection. This separation of control and data overlays has several advantages. Data overlays can be optimized for efficient content delivery, while the control overlay can be optimized for flexible and efficient peer selection. Several data channels can share a control plane for fast switching among content channels, which is particularly important for IPTV. And, the control overlay can be reused in multicast systems with different data plane organizations.We designed and evaluated a decentralized control overlay for endsystem multicast. The overlay proactively aggregates system state and implements a powerful anycast primitive for peer selection. We demonstrate that SAAR's efficiency in locating peers reduces channel switching time, improves the quality of content delivery, and reduces overhead, even under dynamic conditions and at scale. An experimental evaluation demonstrates that the system can efficiently support single-tree, multi-tree and block-based multicast systems. ER - TY - JOUR T1 - Schistosoma mansoni genome: Closing in on a final gene set JF - Experimental Parasitology Y1 - 2007 A1 - Haas,Brian J. A1 - Berriman,Matthew A1 - Hirai,Hirohisa A1 - Cerqueira,Gustavo G. A1 - LoVerde,Philip T. A1 - El‐Sayed, Najib M. KW - Annotation KW - Gene finding KW - Genome KW - Schistosoma mansoni AB - The Schistosoma mansoni genome sequencing consortium has recently released the latest versions of the genome assembly as well as an automated preliminary gene structure annotation. The combined datasets constitute a vast resource for researchers to exploit in a variety of post-genomic studies with an emphasis of transcriptomic and proteomic tools. Here we present an innovative method used for combining diverse sources of evidence including ab initio gene predictions, protein and transcript sequence homologies, and cross-genome sequence homologies between S. mansoni and Schistosoma japonicum to define a comprehensive list of protein-coding genes. VL - 117 SN - 0014-4894 UR - http://www.sciencedirect.com/science/article/pii/S0014489407001683 CP - 3 M3 - 16/j.exppara.2007.06.005 ER - TY - JOUR T1 - A Secure DHT via the Pigeonhole Principle JF - Technical Reports of the Computer Science Department, CS-TR-4884 Y1 - 2007 A1 - Baden,Randy A1 - Bender,Adam A1 - Levin,Dave A1 - Sherwood,Rob A1 - Spring, Neil A1 - Bhattacharjee, Bobby KW - Technical Report AB - The standard Byzantine attack model assumes no more than some fixedfraction of the participants are faulty. This assumption does not accurately apply to peer-to-peer settings, where Sybil attacks and botnets are realistic threats. We propose an attack model that permits an arbitrary number of malicious nodes under the assumption that each node can be classified based on some of its attributes, such as autonomous system number or operating system, and that the number of classes with malicious nodes is bounded (e.g., an attacker may exploit at most a few operating systems at a time). In this model, we present a secure DHT, evilTwin, which replaces a single, large DHT with sufficiently many smaller instances such that it is impossible for an adversary to corrupt every instance. Our system ensures high availability and low-latency lookups, is easy to implement, does not require a complex Byzantine agreement protocol, and its proof of security is a straightforward application of the pigeonhole principle. The cost of security comes in the form of increased storage and bandwidth overhead; we show how to reduce these costs by replicating data and adaptively querying participants who historically perform well. We use implementation and simulation to show that evilTwin imposes a relatively small additional cost compared to conventional DHTs. UR - http://drum.lib.umd.edu/handle/1903/7136 ER - TY - JOUR T1 - Secure lookup without (constrained) flooding JF - WRAITS 2007 Y1 - 2007 A1 - Bhattacharjee, Bobby A1 - Rodrigues,R. A1 - Kouznetsov,P. ER - TY - JOUR T1 - Semantics-Preserving Design of Embedded Control Software from Synchronous Models JF - Software Engineering, IEEE Transactions on Y1 - 2007 A1 - Mangeruca,L. A1 - Baleani,M. A1 - Ferrari,A. A1 - Sangiovanni-Vincentelli,A. KW - embedded control software KW - embedded systems KW - multiprocessing programs KW - multiprocessor KW - multitasking KW - semantics-preserving design KW - software engineering KW - software implementation KW - systems analysis AB - The design of embedded controllers is experiencing a growth in complexity as embedded systems increase their functionality while they become ubiquitous in electronic appliances, cars, airplanes, etc. As requirements become more challenging, mathematical models gain importance for mastering complexity. Among the different computational models proposed, synchronous models have proved to be the most widely used for control dominated applications. While synchronous models simplify the way of dealing with concurrency by decoupling functional and timing aspects, their software implementation on multitasking and multiprocessor platforms is far from straightforward, because of the asynchronous nature of most industrial software platforms. Known solutions in the literature either restrict the solution space or focus on special cases. We present a method for preserving the synchronous semantics through buffer-based intertask communication mechanisms, grounded on an abstraction of the target platform. This allows us to deal with any task set and, most importantly, being independent of the implementation, to explore the design space effectively. VL - 33 SN - 0098-5589 CP - 8 M3 - 10.1109/TSE.2007.70718 ER - TY - JOUR T1 - Semi-automatic photo annotation strategies using event based clustering and clothing based person recognition JF - Interacting with Computers Y1 - 2007 A1 - Suh,B. A1 - Bederson, Benjamin B. VL - 19 CP - 4 ER - TY - CONF T1 - Sentiment analysis: Adjectives and adverbs are better than adjectives alone T2 - Proceedings of the International Conference on Weblogs and Social Media (ICWSM) Y1 - 2007 A1 - Benamara,F. A1 - Cesarano,C. A1 - Picariello, A. A1 - Reforgiato,D. A1 - V.S. Subrahmanian AB - Most past work on determining the strength of subjective expres-sions within a sentence or a document use specific parts of speech such as adjectives, verbs and nouns. To date, there is almost no work on the use of adverbs in sentiment analysis, nor has there been any work on the use of adverb-adjective combinations (AACs). We propose an AAC-based sentiment analysis technique that uses a lin- guistic analysis of adverbs of degree. We define a set of general axioms (based on a classification of adverbs of degree into five cat- egories) that all adverb scoring techniques must satisfy. Instead of aggregating scores of both adverbs and adjectives using simple scor- ing functions, we propose an axiomatic treatment of AACs based on the linguistic classification of adverbs. Three specific AAC scor- ing methods that satisfy the axioms are presented. We describe the results of experiments on an annotated set of 200 news articles (an- notated by 10 students) and compare our algorithms with some exist- ing sentiment analysis algorithms. We show that our results lead to higher accuracy based on Pearson correlation with human subjects. JA - Proceedings of the International Conference on Weblogs and Social Media (ICWSM) ER - TY - CONF T1 - Similarity-Based Forecasting with Simultaneous Previews: A River Plot Interface for Time Series Forecasting T2 - Information Visualization, 2007. IV '07. 11th International Conference Y1 - 2007 A1 - Buono,P. A1 - Plaisant, Catherine A1 - Simeone,A. A1 - Aris,A. A1 - Shneiderman, Ben A1 - Shmueli,G. A1 - Jank,W. KW - data driven forecasting method KW - data visualisation KW - Data visualization KW - Economic forecasting KW - forecasting preview interface KW - Graphical user interfaces KW - historical time series dataset KW - Laboratories KW - new stock offerings KW - partial time series KW - pattern matching KW - pattern matching search KW - Predictive models KW - river plot interface KW - Rivers KW - similarity-based forecasting KW - Smoothing methods KW - Technological innovation KW - Testing KW - time series KW - time series forecasting KW - Weather forecasting AB - Time-series forecasting has a large number of applications. Users with a partial time series for auctions, new stock offerings, or industrial processes desire estimates of the future behavior. We present a data driven forecasting method and interface called similarity-based forecasting (SBF). A pattern matching search in an historical time series dataset produces a subset of curves similar to the partial time series. The forecast is displayed graphically as a river plot showing statistical information about the SBF subset. A forecasting preview interface allows users to interactively explore alternative pattern matching parameters and see multiple forecasts simultaneously. User testing with 8 users demonstrated advantages and led to improvements. JA - Information Visualization, 2007. IV '07. 11th International Conference PB - IEEE SN - 0-7695-2900-3 M3 - 10.1109/IV.2007.101 ER - TY - JOUR T1 - Stochastic Communication: A New Paradigm for Fault-Tolerant Networks-on-Chip JF - VLSI Design Y1 - 2007 A1 - Bogdan, Paul A1 - Dumitraş A1 - Tudor A1 - Marculescu, Radu AB - As CMOS technology scales down into the deep-submicron (DSM) domain, the costs of design and verification for Systems-on-Chip (SoCs) are rapidly increasing. Relaxing the requirement of 100% correctness for devices and interconnects drastically reduces the costs of design but, at the same time, requires SoCs to be designed with some degree of system-level fault-tolerance. Towards this end, this paper introduces a novel communication paradigm for SoCs, called stochastic communication. This scheme separates communication from computation by allowing the on-chip interconnect to be designed as a reusable IP and also provides a built-in tolerance to DSM failures, without a significant performance penalty. By using this communication scheme, a large percentage of data upsets, packet losses due to buffers overflow, and severe levels of synchronization failures can be tolerated, while providing high levels of performance. VL - 2007 SN - 1065-514X UR - http://www.hindawi.com/journals/vlsi/2007/095348/abs/ ER - TY - JOUR T1 - Supporting elementary-age children's searching and browsing: Design and evaluation using the international children's digital library JF - Journal of the American Society for Information Science and Technology Y1 - 2007 A1 - Hutchinson,H.B. A1 - Druin, Allison A1 - Bederson, Benjamin B. VL - 58 CP - 11 ER - TY - CONF T1 - Symmetric Objects are Hardly Ambiguous T2 - Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on Y1 - 2007 A1 - Aggarwal,G. A1 - Biswas,S. A1 - Chellapa, Rama KW - algorithm;symmetric KW - bilaterally KW - images;image KW - Lambertian KW - MATCHING KW - matching; KW - objects KW - objects;illumination-invariant KW - objects;symmetric KW - symmetric AB - Given any two images taken under different illumination conditions, there always exist a physically realizable object which is consistent with both the images even if the lighting in each scene is constrained to be a known point light source at infinity. In this paper, we show that images are much less ambiguous for the class of bilaterally symmetric Lambertian objects. In fact, the set of such objects can be partitioned into equivalence classes such that it is always possible to distinguish between two objects belonging to different equivalence classes using just one image per object. The conditions required for two objects to belong to the same equivalence class are very restrictive, thereby leading to the conclusion that images of symmetric objects are hardly ambiguous. The observation leads to an illumination-invariant matching algorithm to compare images of bilaterally symmetric Lambertian objects. Experiments on real data are performed to show the implications of the theoretical result even when the symmetry and Lambertian assumptions are not strictly satisfied. JA - Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on M3 - 10.1109/CVPR.2007.383289 ER - TY - CONF T1 - A taxonomy for medical image registration acceleration techniques T2 - Life Science Systems and Applications Workshop, 2007. LISA 2007. IEEE/NIH Y1 - 2007 A1 - Plishker,W. A1 - Dandekar,O. A1 - Bhattacharyya, Shuvra S. A1 - Shekhar,R. JA - Life Science Systems and Applications Workshop, 2007. LISA 2007. IEEE/NIH ER - TY - CONF T1 - Test suite prioritization by interaction coverage T2 - Workshop on Domain specific approaches to software test automation: in conjunction with the 6th ESEC/FSE joint meeting Y1 - 2007 A1 - Bryce,Renée C. A1 - Memon, Atif M. KW - t-way interaction coverage KW - combinatorial interaction testing KW - covering arrays KW - event driven software KW - test suite prioritization AB - Event-driven software (EDS) is a widely used class of software that takes sequences of events as input, changes state, and outputs new event sequences. Managing the size of tests suites for EDS is difficult as the number of event combinations and sequences grow exponentially with the number of events. We propose a new testing technique that extends software interaction testing. Traditional software interaction testing systematically examines all t-way interactions of parameters for a program. This paper extends the notion to t-way interactions over sequences of events. The technique applies to many classes of software; we focus on that of EDS. As a proof-of-concept, we prioritize existing test suites for four GUI-based programs by t-way interaction coverage. We compare the rate of fault detection with that of several other prioritization criteria. Results show that prioritization by interaction coverage has the fastest rate of fault detection in half of our experiments, making the most impact when tests have high interaction coverage. JA - Workshop on Domain specific approaches to software test automation: in conjunction with the 6th ESEC/FSE joint meeting T3 - DOSTA '07 PB - ACM CY - New York, NY, USA SN - 978-1-59593-726-1 UR - http://doi.acm.org/10.1145/1294921.1294922 M3 - 10.1145/1294921.1294922 ER - TY - CONF T1 - Thumbspace: Generalized one-handed input for touchscreen-based mobile devices T2 - Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction Y1 - 2007 A1 - Karlson,A.K. A1 - Bederson, Benjamin B. JA - Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction ER - TY - CONF T1 - A topic model for word sense disambiguation T2 - Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL) Y1 - 2007 A1 - Jordan Boyd-Graber A1 - Blei,D. A1 - Zhu,X. JA - Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL) ER - TY - CONF T1 - Towards a heterogeneous medical image registration acceleration platform T2 - Biomedical Circuits and Systems Conference, 2007. BIOCAS 2007. IEEE Y1 - 2007 A1 - Plishker,W. A1 - Dandekar,O. A1 - Bhattacharyya, Shuvra S. A1 - Shekhar,R. JA - Biomedical Circuits and Systems Conference, 2007. BIOCAS 2007. IEEE ER - TY - JOUR T1 - Towards the development of a virtual environment-based training system for mechanical assembly operations JF - Virtual Reality Y1 - 2007 A1 - Brough,John A1 - Schwartz,Maxim A1 - Gupta, Satyandra K. A1 - Anand,Davinder A1 - Kavetsky,Robert A1 - Pettersen,Ralph KW - Computer science AB - In this paper, we discuss the development of Virtual Training Studio (VTS), a virtual environment-based training system that allows training supervisors to create training instructions and allows trainees to learn assembly operations in a virtual environment. Our system is mainly focused on the cognitive side of training so that trainees can learn to recognize parts, remember assembly sequences, and correctly orient the parts during assembly operations. Our system enables users to train using the following three training modes: (1) Interactive Simulation, (2) 3D Animation, and (3) Video. Implementing these training modes required us to develop several new system features. This paper presents an overview of the VTS system and describes a few main features of the system. We also report user test results that show how people train using our system. The user test results indicate that the system is able to support a wide variety of training preferences and works well to support training for assembly operations. VL - 11 SN - 1359-4338 UR - http://www.springerlink.com/content/g7760422m13l83x1/abstract/ CP - 4 M3 - 10.1007/s10055-007-0076-4 ER - TY - RPRT T1 - Using Content-Addressable Networks for Load Balancing in Desktop Grids Y1 - 2007 A1 - Kim,Jik-Soo A1 - Keleher,Peter A1 - Marsh,Michael A1 - Bhattacharjee, Bobby A1 - Sussman, Alan KW - Technical Report AB - Desktop grids combine Peer-to-Peer and Grid computing techniques to improvethe robustness, reliability and scalability of job execution infrastructures. However, efficiently matching incoming jobs to available system resources and achieving good load balance in a fully decentralized and heterogeneous computing environment is a challenging problem. In this paper, we extend our prior work with a new decentralized algorithm for maintaining approximate global load information, and a job pushing mechanism that uses the global information to push jobs towards underutilized portions of the system. The resulting system more effectively balances load and improves overall system throughput. Through a comparative analysis of experimental results across different system configurations and job profiles, performed via simulation, we show that our system can reliably execute Grid applications on a distributed set of resources both with low cost and with good load balance. PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-2007-16 UR - http://drum.lib.umd.edu//handle/1903/4355 ER - TY - CONF T1 - Using virtual demonstrations for creating multi-media training instructions Y1 - 2007 A1 - Schwartz,M. A1 - Gupta,S.K. A1 - Anand,D. K. A1 - Brough,J. E. A1 - Kavetsky,R. AB - Often generating training instructions for virtual environments is a long and tedious process. In thispaper, we discuss the development of a virtual environment (VE) instruction generating tool called Virtual Author which is the main component of the Virtual Training Studio (VTS). VTS is a virtual environment-based training system that provides instructors with a tool to create training instructions and allows trainees to learn assembly operations in a personal virtual environment. The Virtual Author tool is designed to allow an instructor to perform virtual demonstrations using CAD models in the virtual environment in order to quickly generate VE-based training instructions for use in VTS. This paper describes the algorithms used to carry out motion smoothening of instructor’s actions, automated text instruction generation based on part and assembly motions, and extraction of alignment constraints from 3D CAD models to support instruction generation. We also present examples to illustrate how the use of the Virtual Author tool leads to a significant reduction in the training instruction generation time. UR - http://www.cadanda.com/CAD_4_1-4__11.PDF ER - TY - JOUR T1 - Variola virus topoisomerase: DNA cleavage specificity and distribution of sites in Poxvirus genomes JF - Virology Y1 - 2007 A1 - Minkah,Nana A1 - Hwang,Young A1 - Perry,Kay A1 - Van Duyne,Gregory D. A1 - Hendrickson,Robert A1 - Lefkowitz,Elliot J. A1 - Hannenhalli, Sridhar A1 - Bushman,Frederic D. KW - Annotation of topoisomerase sites KW - Sequence specific recognition KW - Topoisomerase IB KW - Variola virus AB - Topoisomerase enzymes regulate superhelical tension in DNA resulting from transcription, replication, repair, and other molecular transactions. Poxviruses encode an unusual type IB topoisomerase that acts only at conserved DNA sequences containing the core pentanucleotide 5'-(T/C)CCTT-3'. In X-ray structures of the variola virus topoisomerase bound to DNA, protein-DNA contacts were found to extend beyond the core pentanucleotide, indicating that the full recognition site has not yet been fully defined in functional studies. Here we report quantitation of DNA cleavage rates for an optimized 13 bp site and for all possible single base substitutions (40 total sites), with the goals of understanding the molecular mechanism of recognition and mapping topoisomerase sites in poxvirus genome sequences. The data allow a precise definition of enzyme-DNA interactions and the energetic contributions of each. We then used the resulting "action matrix" to show that favorable topoisomerase sites are distributed all along the length of poxvirus DNA sequences, consistent with a requirement for local release of superhelical tension in constrained topological domains. In orthopox genomes, an additional central cluster of sites was also evident. A negative correlation of predicted topoisomerase sites was seen relative to early terminators, but no correlation was seen with early or late promoters. These data define the full variola virus topoisomerase recognition site and provide a new window on topoisomerase function in vivo. VL - 365 SN - 0042-6822 UR - http://www.sciencedirect.com/science/article/pii/S0042682207001225 CP - 1 M3 - 16/j.virol.2007.02.037 ER - TY - CONF T1 - Visual Mining of Multi-Modal Social Networks at Different Abstraction Levels T2 - Information Visualization, 2007. IV '07. 11th International Conference Y1 - 2007 A1 - Singh,L. A1 - Beard,M. A1 - Getoor, Lise A1 - Blake,M.B. KW - computing; KW - database;interactive KW - graph KW - management KW - mining;data KW - network;structural KW - property;visual KW - sciences KW - social KW - systems;graph KW - systems;social KW - theory;interactive KW - visualisation;database KW - visualization;multimodal AB - Social networks continue to become more and more feature rich. Using local and global structural properties and descriptive attributes are necessary for more sophisticated social network analysis and support for visual mining tasks. While a number of visualization tools for social network applications have been developed, most of them are limited to uni-modal graph representations. Some of the tools support a wide range of visualization options, including interactive views. Others have better support for calculating structural graph properties such as the density of the graph or deploying traditional statistical social network analysis. We present Invenio, a new tool for visual mining of socials. Invenio integrates a wide range of interactive visualization options from Prefuse, with graph mining algorithm support from JUNG. While the integration expands the breadth of functionality within the core engine of the tool, our goal is to interactively explore multi-modal, multi-relational social networks. Invenio also supports construction of views using both database operations and basic graph mining operations. JA - Information Visualization, 2007. IV '07. 11th International Conference M3 - 10.1109/IV.2007.126 ER - TY - JOUR T1 - Voila: Efficient feature-value acquisition for classification JF - PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE Y1 - 2007 A1 - Bilgic,M. A1 - Getoor, Lise AB - We address the problem of efficient feature-value acquisi- tion for classification in domains in which there are varying costs associated with both feature acquisition and misclassi- fication. The objective is to minimize the sum of the infor- mation acquisition cost and misclassification cost. Any de- cision theoretic strategy tackling this problem needs to com- pute value of information for sets of features. Having cal- culated this information, different acquisition strategies are possible (acquiring one feature at time, acquiring features in sets, etc.). However, because the value of information cal- culation for arbitrary subsets of features is computationally intractable, most traditional approaches have been greedy, computing values of features one at a time. We make the problem of value of information calculation tractable in prac- tice by introducing a novel data structure called the Value of Information Lattice (VOILA). VOILA exploits dependencies between missing features and makes sharing of information value computations between different feature subsets possi- ble. To the best of our knowledge, performance differences between greedy acquisition, acquiring features in sets, and a mixed strategy have not been investigated empirically in the past, due to inherit intractability of the problem. With the help of VOILA, we are able to evaluate these strategies on five real world datasets under various cost assumptions. We show that VOILA reduces computation time dramatically. We also show that the mixed strategy outperforms both greedy acqui- sition and acquisition in sets. VL - 22 CP - 2 ER - TY - JOUR T1 - Adaptive pull-based policies for wide area data delivery JF - ACM Transactions on Database Systems (TODS) Y1 - 2006 A1 - Bright,L. A1 - Gal,A. A1 - Raschid, Louiqa VL - 31 CP - 2 ER - TY - CONF T1 - An Adaptive Threshold Method for Hyperspectral Target Detection T2 - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on Y1 - 2006 A1 - Broadwater, J. A1 - Chellapa, Rama KW - adaptive KW - blind KW - detection; KW - detection;inverse KW - importance KW - method;background KW - processing;importance KW - sampling;geophysical KW - sampling;object KW - signal KW - statistics;hyperspectral KW - target KW - threshold AB - In this paper, we present a new approach to automatically determine a detector threshold. This research problem is especially important in hyperspectral target detection as targets are typically very similar to the background. While a number of methods exist to determine the threshold, these methods require either large amounts of data or make simplifying assumptions about the background distribution. We use a method called inverse blind importance sampling which requires few samples and makes no a-priori assumptions about the background statistics. Results show the promise of this algorithm to determine thresholds for fixed false alarm densities in hyperspectral detectors JA - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on VL - 5 M3 - 10.1109/ICASSP.2006.1661497 ER - TY - JOUR T1 - Adding dense, weighted connections to wordnet JF - Proceedings of the Third International WordNet Conference Y1 - 2006 A1 - Jordan Boyd-Graber A1 - Fellbaum,C. A1 - Osherson,D. A1 - Schapire,R. AB - WORDNET, a ubiquitous tool for natural language processing, suffers from sparsity of connectionsbetween its component concepts (synsets). Through the use of human annotators, a subset of the connections between 1000 hand-chosen synsets was assigned a value of “evocation” representing how much the first concept brings to mind the second. These data, along with existing similarity measures, constitute the basis of a method for predicting evocation between previously unrated pairs. ER - TY - CONF T1 - Algorithms for on-line monitoring of components in an optical tweezers-based assembly cell Y1 - 2006 A1 - Peng,T. A1 - Balijepalli,A. A1 - Gupta,S.K. A1 - LeBrun,T. W. AB - Optical tweezers have emerged as a powerful tool for microand nanomanipulation. Using optical tweezers to perform auto- mated assembly requires on-line monitoring of components in the assembly workspace. This paper presents algorithms for estimat- ing positions and orientations of microscale and nanoscale com- ponents in the 3-Dimensional assembly workspace. Algorithms presented in this paper use images obtained by optical section microscopy. The images are first segmented to locate areas of in- terest and then image gradient information from the areas of in- terest is used to generate probable locations and orientations of components in the XY-plane. Finally, signature curves are com- puted and utilized to obtain component locations and orienta- tions in 3-D space. We have tested these algorithms with silica micro-spheres as well as metallic nanowires. We believe that the algorithms described in this paper will provide the foundation for realizing automated assembly operations in optical tweezers- based assembly cells. UR - http://www.glue.umd.edu/~skgupta/Publication/CIE06_Peng1.pdf ER - TY - RPRT T1 - Anonymous multi-attribute encryption with range query and conditional decryption Y1 - 2006 A1 - Bethencourt, J. A1 - Chan, H. A1 - Perrig, A. A1 - Elaine Shi A1 - Song,D. AB - We introduce the concept of Anonymous Multi-Attribute Encryption with Range Query and Con-ditional Decryption (AMERQCD). In AMERQCD, a plaintext is encrypted under a point in multi- dimensional space. To a computationally bounded adversary, the ciphertext hides both the plaintext and the point under which it is encrypted. In a range query, a master key owner releases the decryp- tion key for an arbitrary hyper-rectangle in space, thus allowing decryption of ciphertexts previ- ously encrypted under any point within the hyper-rectangle. However, a computationally bounded adversary cannot learn any information on ciphertexts outside the range covered by the decryption key (except the fact that they do not lie within this range). We give an efficient construction based on the Decision Bilinear Diffie-Hellman (D-BDH) and Decision Linear (D-Linear) assumption. PB - Carnegie Mellon University SN - CMU-CS-06-135 UR - http://reports-archive.adm.cs.cmu.edu/anon/anon/home/ftp/2006/CMU-CS-06-135.pdf M3 - Technical Report ER - TY - CONF T1 - Bio-inspired, Modular, and Multifunctional Thermal and Impact Protected (TIPed) Embedded Sensing Controls Actuation Power Element (ESCAPE) Structures Y1 - 2006 A1 - Gyger Jr,L. S. A1 - Spranklin,B. W. A1 - Gupta,S.K. A1 - Bruck,H. A. AB - There is a great deal of interest in creating new structural concepts, such as snake robots, from analogousbiological systems. These biological systems are typically composed of materials that serve multiple functions. For example, the skin of a snake is a system consisting of a soft, hyperelastic covering, with nerves providing thermal and pressure sensitivity, and a hard, scaly coating to resist wear and tear from hard particles such as sand. Therefore, bio-inspired structures can also be composed of multifunctional materials. There are currently many approaches to fabricating bio-inspired structures with conventional materials. These concepts typically utilize a system-of-systems design approach where the structure will be composed of a structural framework, an actuation system, a power source for the actuation system, controllers, and external sensors. The drawbacks to these structures include the need to assemble all of the components, interfaces between components that can compromise reliability, constraints on scaling down the structure, and very high power consumption and power generation requirements. These problems have been addressed by developing a new scalable approach to creating multifunctional materials for bio-inspired structures where the controllers, actuators, and sensors are integrated into a modular, multifunctional structure. This approach is facilitated by using multi-material multi-stage molding processes with fully embedded electronic systems, and has resulted in new Thermal and Impact Protected (TIPed) Embedded Sensing Controls Actuation Power Element (ESCAPE) Structures for compact and rugged robotic applications. UR - http://sem-proceedings.com/06s/sem.org-2006-SEM-Ann-Conf-s89p07-Bio-inspired-Modular-Multifunctional-Thermal-Impact-Protected-TIPed.pdf ER - TY - CONF T1 - CAM04-6: Single-Path Routing of Time-varying Traffic T2 - Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE Y1 - 2006 A1 - Kashyap,A. A1 - Bhattacharjee, Bobby A1 - La,R. A1 - Shayman,M. A1 - Tabatabaee,V. KW - algorithm;linear KW - algorithm;time-varying KW - algorithms;telecommunication KW - bound;IP KW - case KW - complexity;iterative KW - intra-domain KW - IP KW - methods;linear KW - multipath KW - network KW - network;ISP KW - networks;Internet;computational KW - optimal KW - performance KW - problem;heuristic KW - profile;worst KW - programming;optimal KW - programming;probability;randomised KW - rounding KW - routing;iterated KW - routing;probability;randomized KW - routing;telecommunication KW - single-path KW - topology;NP-hard KW - topology;telecommunication KW - traffic KW - traffic; AB - We consider the problem of finding a single-path intra-domain routing for time-varying traffic. We characterize the traffic variations by a finite set of traffic profiles with given non-zero fractions of occurrence. Our goal is to optimize the average performance over all of these traffic profiles. We solve the optimal multi-path version of this problem using linear programming and develop heuristic single-path solutions using randomized rounding and iterated rounding. We analyze our single-path heuristic (finding the optimal single-path routing is NP-hard), and prove that the randomized rounding algorithm has a worst case performance bound of O(log(KN)/log(log(KN))) compared to the optimal multi-path routing with a high probability, where K is the number of traffic profiles, and N the number of nodes in the network. Further, our simulations show the iterated rounding heuristics perform close to the optimal multi-path routing on a wide range of measured ISP topologies, in both the average and the worst-case. Overall, these results are extremely positive since they show that in a wide-range of practical situations, it is not necessary to deploy multi-path routing; instead, an appropriately computed single-path routing is sufficient to provide good performance. JA - Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE M3 - 10.1109/GLOCOM.2006.29 ER - TY - CONF T1 - A case study of tangible flags: a collaborative technology to enhance field trips T2 - Proceedings of the 2006 conference on Interaction design and children Y1 - 2006 A1 - Chipman,G. A1 - Druin, Allison A1 - Beer,D. A1 - Fails,J. A A1 - Guha,M.L. A1 - Simms,S. JA - Proceedings of the 2006 conference on Interaction design and children ER - TY - JOUR T1 - A client-driven approach for channel management in wireless LANs JF - IEEE Infocom Y1 - 2006 A1 - Mishra,A. A1 - Brik,V. A1 - Banerjee,S. A1 - Srinivasan, Aravind A1 - Arbaugh, William A. AB - We propose an efficient client-based approach for channel man-agement (channel assignment and load balancing) in 802.11-based WLANs that lead to better usage of the wireless spectrum. This approach is based on a “conflict set coloring” formulation that jointly performs load balancing along with channel assignment. Such a formulation has a number of advantages. First, it explicitly captures interference effects at clients. Next, it intrinsically ex- poses opportunities for better channel re-use. Finally, algorithms based on this formulation do not depend on specific physical RF models and hence can be applied efficiently to a wide-range of in- building as well as outdoor scenarios. We have performed extensive packet-level simulations and mea- surements on a deployed wireless testbed of 70 APs to validate the performance of our proposed algorithms. We show that in addi- tion to single network scenarios, the conflict set coloring formu- lation is well suited for channel assignment where multiple wire- less networks share and contend for spectrum in the same physical space. Our results over a wide range of both simulated topologies and in-building testbed experiments indicate that our approach improves application level performance at the clients by upto three times (and atleast 50%) in comparison to current best-known tech- niques. VL - 6 ER - TY - JOUR T1 - Client-driven channel management for wireless LANs JF - SIGMOBILE Mob. Comput. Commun. Rev. Y1 - 2006 A1 - Mishra,Arunesh A1 - Brik,Vladimir A1 - Banerjee,Suman A1 - Srinivasan, Aravind A1 - Arbaugh, William A. AB - With the explosive growth in the density of 802.11 access points (APs) in the form of hotspots and public/home access networks, coordinating the shared use of spectrum has become an important problem. The irregular coverage topologies present in WLANs due to the vagaries of the indoor RF environment make the channel assignment algorithms in cellular networks inapplicable [1, 2]. VL - 10 SN - 1559-1662 UR - http://doi.acm.org/10.1145/1215976.1215981 CP - 4 M3 - 10.1145/1215976.1215981 ER - TY - CONF T1 - A Communication Interface for Multiprocessor Signal Processing Systems T2 - Proceedings of the 2006 IEEE/ACM/IFIP Workshop on Embedded Systems for Real Time Multimedia Y1 - 2006 A1 - Sankalita Saha A1 - Bhattacharyya, Shuvra S. A1 - Wayne Wolf KW - application program interfaces KW - Application software KW - coarse-grain dataflow modeling KW - Computer applications KW - Concurrent computing KW - Context KW - data flow graphs KW - Embedded computing KW - Embedded software KW - face detection system KW - Hardware KW - Message passing KW - message passing interface KW - MPI KW - Multiprocessing systems KW - multiprocessor signal processing system KW - PARALLEL PROCESSING KW - signal passing interface KW - Signal processing KW - SPI AB - Parallelization of embedded software is often desirable for power/performance-related considerations for computation-intensive applications that frequently occur in the signal-processing domain. Although hardware support for parallel computation is increasingly available in embedded processing platforms, there is a distinct lack of effective software support. One of the most widely known efforts in support of parallel software is the message passing interface (MPI). However, MPI suffers from several drawbacks with regards to customization to specialized parallel processing contexts, and performance degradation for communication-intensive applications. In this paper, we propose a new interface, the signal passing interface (SPI), that is targeted toward signal processing applications and addresses the limitations of MPI for this important domain of embedded software by integrating relevant properties of MPI and coarse-grain dataflow modeling. SPI is much easier and more intuitive to use, and due to its careful specialization, more performance-efficient for the targeted application domain. We present our preliminary version of SPI, along with experiments using SPI on a practical face detection system that demonstrate the capabilities of SPI JA - Proceedings of the 2006 IEEE/ACM/IFIP Workshop on Embedded Systems for Real Time Multimedia PB - IEEE SN - 0-7803-9783-5 M3 - 10.1109/ESTMED.2006.321285 ER - TY - JOUR T1 - Comprehensive analysis of alternative splicing in rice and comparative analyses with Arabidopsis JF - BMC Genomics Y1 - 2006 A1 - Campbell,Matthew A. A1 - Haas,Brian J. A1 - Hamilton,John P. A1 - Mount, Stephen M. A1 - Buell,C. Robin AB - Recently, genomic sequencing efforts were finished for Oryza sativa (cultivated rice) and Arabidopsis thaliana (Arabidopsis). Additionally, these two plant species have extensive cDNA and expressed sequence tag (EST) libraries. We employed the Program to Assemble Spliced Alignments (PASA) to identify and analyze alternatively spliced isoforms in both species. VL - 7 SN - 1471-2164 UR - http://www.biomedcentral.com/1471-2164/7/327/abstract CP - 1 M3 - 10.1186/1471-2164-7-327 ER - TY - CONF T1 - Compression techniques for minimum energy consumption T2 - 25th Army Science Conference Y1 - 2006 A1 - Puthenpurayil,S. A1 - Gu,R. A1 - Bhattacharyya, Shuvra S. JA - 25th Army Science Conference ER - TY - CONF T1 - Configuration and representation of large-scale dataflow graphs using the dataflow interchange format T2 - Proceedings of the IEEE Workshop on Signal Processing Systems, Banff, Canada Y1 - 2006 A1 - Corretjer,I. A1 - Hsu,C. A1 - Bhattacharyya, Shuvra S. JA - Proceedings of the IEEE Workshop on Signal Processing Systems, Banff, Canada ER - TY - CHAP T1 - Conservation Patterns in cis-Elements Reveal Compensatory Mutations T2 - Comparative GenomicsComparative Genomics Y1 - 2006 A1 - Evans,Perry A1 - Donahue,Greg A1 - Hannenhalli, Sridhar ED - Bourque,Guillaume ED - El-Mabrouk,Nadia AB - Transcriptional regulation critically depends on proper interactions between transcription factors (TF) and their cognate DNA binding sites or cis elements. A better understanding and modelling of the TF-DNA interaction is an important area of research. The Positional Weight Matrix (PWM) is the most common model of TF-DNA binding and it presumes that the nucleotide preferences at individual positions within the binding site are independent. However, studies have shown that this independence assumption does not always hold. If the nucleotide preference at one position depends on the nucleotide at another position, a chance mutation at one position should exert selection pressures at the other position. By comparing the patterns of evolutionary conservation at individual positions within cis elements, here we show that positional dependence within binding sites is highly prevalent. We also show that dependent positions are more likely to be functional, as evidenced by a higher information content and higher conservation. We discuss two examples—Elk-1 and SAP-1 where the inferred compensatory mutation is consistent with known TF-DNA crystal structure. JA - Comparative GenomicsComparative Genomics T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 4205 SN - 978-3-540-44529-6 UR - http://dx.doi.org/10.1007/11864127_15 ER - TY - JOUR T1 - Contention-conscious transaction ordering in multiprocessor DSP systems JF - IEEE Transactions on Signal Processing Y1 - 2006 A1 - Khandelia,M. A1 - Bambha,N. K A1 - Bhattacharyya, Shuvra S. KW - contention-conscious transaction ordering KW - Costs KW - data flow graphs KW - Dataflow KW - Delay KW - Digital signal processing KW - digital signal processing chips KW - Embedded system KW - graph-theoretic analysis KW - Instruments KW - Internet telephony KW - interprocessor communication KW - iterative dataflow graphs KW - iterative methods KW - Message passing KW - multiprocessor KW - multiprocessor DSP systems KW - NP-complete problem KW - Processor scheduling KW - scheduling KW - Signal processing KW - synchronization KW - Throughput AB - This paper explores the problem of efficiently ordering interprocessor communication (IPC) operations in statically scheduled multiprocessors for iterative dataflow graphs. In most digital signal processing (DSP) applications, the throughput of the system is significantly affected by communication costs. By explicitly modeling these costs within an effective graph-theoretic analysis framework, we show that ordered transaction schedules can significantly outperform self-timed schedules even when synchronization costs are low. However, we also show that when communication latencies are nonnegligible, finding an optimal transaction order given a static schedule is an NP-complete problem, and that this intractability holds both under iterative and noniterative execution. We develop new heuristics for finding efficient transaction orders, and perform an extensive experimental comparison to gauge the performance of these heuristics. VL - 54 SN - 1053-587X CP - 2 M3 - 10.1109/TSP.2005.861074 ER - TY - JOUR T1 - Cooperative peer groups in NICE JF - Computer Networks Y1 - 2006 A1 - Sherwood,Rob A1 - Lee,Seungjoon A1 - Bhattacharjee, Bobby KW - distributed algorithms KW - P2P KW - Reputation base trust AB - We present a distributed scheme for trust inference in peer-to-peer networks. Our work is in the context of the NICE system, which is a platform for implementing cooperative applications over the Internet. We describe a technique for efficiently storing user reputation information in a completely decentralized manner, and show how this information can be used to efficiently identify non-cooperative users in NICE. We present a simulation-based study of our algorithms, in which we show our scheme scales to thousands of users using modest amounts of storage, processing, and bandwidth at any individual node. Lastly we show that our scheme is robust and can form cooperative groups in systems where the vast majority of users are malicious. VL - 50 SN - 1389-1286 UR - http://www.sciencedirect.com/science/article/pii/S1389128605002185 CP - 4 M3 - 10.1016/j.comnet.2005.07.012 ER - TY - CHAP T1 - Cross-Language Access to Recorded Speech in the MALACH Project T2 - Text, Speech and DialogueText, Speech and Dialogue Y1 - 2006 A1 - Oard, Douglas A1 - Demner-Fushman,Dina A1 - Hajič,Jan A1 - Ramabhadran,Bhuvana A1 - Gustman,Samuel A1 - Byrne,William A1 - Soergel,Dagobert A1 - Dorr, Bonnie J A1 - Resnik, Philip A1 - Picheny,Michael ED - Sojka,Petr ED - Kopecek,Ivan ED - Pala,Karel AB - The MALACH project seeks to help users find information in a vast multilingual collections of untranscribed oral history interviews. This paper introduces the goals of the project and focuses on supporting access by users who are unfamiliar with the interview language. It begins with a review of the state of the art in crosslanguage speech retrieval; approaches that will be investigated in the project are then described. Czech was selected as the first non-English language to be supported, so results of an initial experiment with Czech/English cross-language retrieval are reported. JA - Text, Speech and DialogueText, Speech and Dialogue T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 2448 SN - 978-3-540-44129-8 UR - http://dx.doi.org/10.1007/3-540-46154-X_8 ER - TY - JOUR T1 - Data redistribution and remote method invocation for coupled components JF - Journal of Parallel and Distributed Computing Y1 - 2006 A1 - Bertrand,Felipe A1 - Bramley,Randall A1 - Bernholdt,David E. A1 - Kohl,James A. A1 - Sussman, Alan A1 - Larson,Jay W. A1 - Damevski,Kostadin B. KW - Common component architecture KW - Model coupling KW - Parallel data redistribution KW - Parallel remote method invocation AB - With the increasing availability of high-performance massively parallel computer systems, the prevalence of sophisticated scientific simulation has grown rapidly. The complexity of the scientific models being simulated has also evolved, leading to a variety of coupled multi-physics simulation codes. Such cooperating parallel programs require fundamentally new interaction capabilities, to efficiently exchange parallel data structures and collectively invoke methods across programs. So-called “ M × N ” research, as part of the common component architecture (CCA) effort, addresses these special and challenging needs, to provide generalized interfaces and tools that support flexible parallel data redistribution and parallel remote method invocation. Using this technology, distinct simulation codes with disparate distributed data decompositions can work together to achieve greater scientific discoveries. VL - 66 SN - 0743-7315 UR - http://www.sciencedirect.com/science/article/pii/S0743731506000700 CP - 7 M3 - 10.1016/j.jpdc.2005.12.009 ER - TY - CONF T1 - Dataflow transformations in high-level DSP system design T2 - Proceedings of the International Symposium on System-on-Chip, Tampere, Finland Y1 - 2006 A1 - Saha,S. A1 - Puthenpurayil,S. A1 - Bhattacharyya, Shuvra S. JA - Proceedings of the International Symposium on System-on-Chip, Tampere, Finland ER - TY - CONF T1 - D-Dupe: An Interactive Tool for Entity Resolution in Social Networks T2 - Visual Analytics Science And Technology, 2006 IEEE Symposium On Y1 - 2006 A1 - Bilgic,M. A1 - Licamele,L. A1 - Getoor, Lise A1 - Shneiderman, Ben KW - algorithm;data KW - analysis;social KW - computing;user KW - D-Dupe KW - interactive KW - interface;data KW - interfaces; KW - mining KW - mining;interactive KW - network KW - problem;entity KW - QUALITY KW - resolution;entity-resolution;social KW - sciences KW - systems;social KW - tool;data KW - visual KW - visualization;task-specific AB - Visualizing and analyzing social networks is a challenging problem that has been receiving growing attention. An important first step, before analysis can begin, is ensuring that the data is accurate. A common data quality problem is that the data may inadvertently contain several distinct references to the same underlying entity; the process of reconciling these references is called entity-resolution. D-Dupe is an interactive tool that combines data mining algorithms for entity resolution with a task-specific network visualization. Users cope with complexity of cleaning large networks by focusing on a small subnetwork containing a potential duplicate pair. The subnetwork highlights relationships in the social network, making the common relationships easy to visually identify. D-Dupe users resolve ambiguities either by merging nodes or by marking them distinct. The entity resolution process is iterative: as pairs of nodes are resolved, additional duplicates may be revealed; therefore, resolution decisions are often chained together. We give examples of how users can flexibly apply sequences of actions to produce a high quality entity resolution result. We illustrate and evaluate the benefits of D-Dupe on three bibliographic collections. Two of the datasets had already been cleaned, and therefore should not have contained duplicates; despite this fact, many duplicates were rapidly identified using D-Dupe's unique combination of entity resolution algorithms within a task-specific visual interface JA - Visual Analytics Science And Technology, 2006 IEEE Symposium On M3 - 10.1109/VAST.2006.261429 ER - TY - CONF T1 - Decentralized message ordering for publish/subscribe systems T2 - Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware Y1 - 2006 A1 - Lumezanu,Cristian A1 - Spring, Neil A1 - Bhattacharjee, Bobby AB - We describe a method to order messages across groups in a publish/subscribe system without centralized control or large vector timestamps. We show that our scheme is practical---little state is required; that it is scalable---the maximum message load is limited by receivers; and that it performs well---the paths messages traverse to be ordered are not made much longer than necessary. Our insight is that only messages to groups that overlap in membership can be observed to arrive out of order: sequencing messages to these groups is sufficient to provide a consistent order, and when publishers subscribe to the groups to which they send, this message order is a causal order. JA - Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware T3 - Middleware '06 PB - Springer-Verlag New York, Inc. CY - New York, NY, USA UR - http://dl.acm.org/citation.cfm?id=1515984.1515997 ER - TY - JOUR T1 - Depth estimation using the compound eye of dipteran flies JF - Biological Cybernetics Y1 - 2006 A1 - Bitsakos,Konstantinos A1 - Fermüller, Cornelia AB - In the neural superposition eye of a dipteran fly every ommatidium has eight photoreceptors, each associated with a rhabdomere, two central and six peripheral, which altogether result in seven functional light guides. Groups of eight rhabdomeres in neighboring ommatidia have largely overlapping fields of view. Based on the hypothesis that the light signals collected by these rhabdomeres can be used individually, we investigated the feasibility of estimating 3D scene information. According to Pick (Biol Cybern 26:215–224, 1977) the visual axes of these rhabdomeres are not parallel, but converge to a point 3–6 mm in front of the cornea. Such a structure theoretically could estimate depth in a very simple way by assuming that locally the image intensity is well approximated by a linear function of the spatial coordinates. Using the measurements of Pick (Biol Cybern 26:215–224, 1977) we performed simulation experiments to find whether this is practically possible. Our results indicate that depth estimation at small distances (up to about 1.5–2 cm) is reasonably accurate. This would allow the insect to obtain at least an ordinal spatial layout of its operational space when walking. VL - 95 SN - 0340-1200 UR - http://dx.doi.org/10.1007/s00422-006-0097-1 CP - 5 ER - TY - CONF T1 - Distributing Google T2 - Data Engineering Workshops, 2006. Proceedings. 22nd International Conference on Y1 - 2006 A1 - Gopalakrishnan,V. A1 - Bhattacharjee, Bobby A1 - Keleher,P. AB - We consider the problem of wide-area large-scale text search over a peer-to-peer infrastructure. A wide-area search infrastructure with billions of documents and millions of search terms presents unique challenges in terms of the amount of state that must be maintained and updated. Distributing such a system would require tens of thousands of hosts leading to the usual problems associated with node failures, churn and data migration. Localities inherent in query patterns will cause load imbalances and hot spots that can severely impair performance. In this paper, we describe an architecture for constructing a scalable search infrastructure that is designed to cope with the challenges of scale described above. Our architecture consists of a data store layer which is used to reliably store and recompute indexes over a slow timescale and a caching layer that is used to respond to most queries. Our primary insight is that the problem of efficiently retrieving a small number of relevant results must be decoupled from the problem of reliably storing potentially huge indexes. Relevant results can be quickly retrieved from caches of ranked results, which can be replicated based upon query load. An entirely different set of mechanisms, such as encoded storage and/or data partitioning, should be used to store large indexes reliably. These indexes should only be used to compute results when there is a miss in the cache. JA - Data Engineering Workshops, 2006. Proceedings. 22nd International Conference on M3 - 10.1109/ICDEW.2006.49 ER - TY - JOUR T1 - Effect of transport at ambient temperature on detection and isolation of Vibrio cholerae from environmental samples JF - Applied and environmental microbiology Y1 - 2006 A1 - Alam,M. A1 - Sadique,A. A1 - Bhuiyan,N. A. A1 - Nair,G. B. A1 - Siddique,A. K. A1 - Sack,D. A. A1 - Ahsan,S. A1 - Huq,A. A1 - Sack,R. B. A1 - Rita R Colwell A1 - others AB - It has long been assumed that prolonged holding of environmental samples at the ambient air temperature prior to bacteriological analysis is detrimental to isolation and detection of Vibrio cholerae, the causative agent of pandemic cholera. The present study was aimed at understanding the effect of transporting environmental samples at the ambient air temperature on isolation and enumeration of V. cholerae. For water and plankton samples held at ambient temperatures ranging from 31°C to 35°C for 20 h, the total counts did not increase significantly but the number of culturable V. cholerae increased significantly compared to samples processed within 1 h of collection, as measured by culture, acridine orange direct count, direct fluorescent-antibody-direct viable count (DFA-DVC), and multiplex PCR analyses. For total coliform counts, total bacterial counts, and DFA-DVC counts, the numbers did not increase significantly, but the culturable plate counts for V. cholerae increased significantly after samples were held at the ambient temperature during transport to the laboratory for analysis. An increase in the recovery of V. cholerae O1 and improved detection of V. cholerae O1 rfb and ctxA also occurred when samples were enriched after they were kept for 20 h at the ambient temperature during transport. Improved detection and isolation of toxigenic V. cholerae from freshwater ecosystems can be achieved by holding samples at the ambient temperature, an observation that has significant implications for tracking this pathogen in diverse aquatic environments. VL - 72 CP - 3 ER - TY - JOUR T1 - Efficient Circuits for Exact-Universal Computation with Qudits JF - Quantum Information and Computation Y1 - 2006 A1 - Brennen,Gavin K. A1 - Bullock,Stephen S. A1 - O'Leary, Dianne P. VL - 6 ER - TY - CONF T1 - Efficient simulation of critical synchronous dataflow graphs T2 - Proceedings of the 43rd annual Design Automation Conference Y1 - 2006 A1 - Hsu,C. J A1 - Ramasubbu,S. A1 - Ko,M. Y A1 - Pino,J. L A1 - Bhattacharyya, Shuvra S. JA - Proceedings of the 43rd annual Design Automation Conference ER - TY - JOUR T1 - Efficient techniques for clustering and scheduling onto embedded multiprocessors JF - IEEE Transactions on Parallel and Distributed Systems Y1 - 2006 A1 - Kianzad,V. A1 - Bhattacharyya, Shuvra S. ER - TY - CONF T1 - An empirical study to compare two parallel programming models T2 - Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures Y1 - 2006 A1 - Hochstein, Lorin A1 - Basili, Victor R. KW - effort KW - empirical study KW - HPC KW - Message-passing KW - MPI KW - parallel programming KW - PRAM KW - Productivity KW - XMT AB - While there are strong beliefs within the community about whether one particular parallel programming model is easier to use than another, there has been little research to analyze these claims empirically. Currently, the most popular paradigm is message-passing, as implemented by the MPI library [1]. However, MPI is considered to be difficult for developing programs, because it forces the programmer to work at a very low level of abstraction. One alternative parallel programming model is the PRAM model, which supports fine-grained parallelism and has a substantial history of algorithmic theory [2]. It is not possible to program current parallel machines using the PRAM model because modern architectures are not designed to support such a model efficiently. However, current trends towards multicore chips suggest that large-scale, fine-grained uniform-memory access parallel machines may soon be feasible. XMT-C is an extension of the C language that supports parallel directives to provide a PRAM-like model to the programmer. A prototype compiler exists that generates code which runs on a simulator for an XMT architecture [3].To better understand how much benefit a PRAM-like model could provide over a message-passing model, we conducted a feasibility study in an academic setting to compare the effort required to solve a particular problem. The questions under study were: can we measure the effort in developing a program using these two programming models and can we differentiate the amount of effort for each model?.The subjects participating in the study were divided up into two groups. One group solved a problem using the MPI library in either C,C++, or Fortran, and the other group solved the problem using XMT-C. The task was to write a function to multiply a sparse matrix with a dense vector. To obtain subjects, we leveraged existing graduate-level parallel programming courses at two different universities: University of California, Santa Barbara (UCSB), and University of Maryland (UMD). At UCSB, the students solved the problem in MPI, and at UMD, the students solved the same problem in XMT-C. The focus of the UCSB class was on developing parallel programs to run on the current generation of architectures, and the students were taught MPI, as well as other models. The focus of the UMD class was parallel algorithms in the PRAM model, and the students were taught XMT-C. The students were assigned to treatment groups by class. The study was integrated into each class, as the problem was a required assignment in each class.Subjects kept track of their effort with a self-reported effort log. We also collected automatic effort data by instrumenting the compilers, which recorded data at each compile. We computed three effort measures: self-reported, instrumented, and combined. Self-reported effort measures are based entirely on effort logs, instrumented effort measures are based entirely on timestamps from the instrumented compilers, and combined effort measures are based on compiler timestamps when the subject is working on the instrumented machine, and self-reported effort when the subject is working off the instrumented machine.The results of this preliminary study answer both of our questions in the positive. In this case, on average, students required less effort to solve the problem using XMT-C compared to MPI. The reduction in mean effort was approximately 50% for all three measures, which was statistically significant at the level of p < .05 using a t-test.This study demonstrates that the effect of programming model on effort can be directly measured through empirical studies with human subjects. While no single study can conclusively demonstrate the advantage of one programming model over another, a series of studies examining different models and different problems can provide insights into the relative strengths of parallel programming models in different contexts. The study described above is one of a series of such studies that we are currently conducting. JA - Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures T3 - SPAA '06 PB - ACM CY - New York, NY, USA SN - 1-59593-452-9 UR - http://doi.acm.org/10.1145/1148109.1148127 M3 - 10.1145/1148109.1148127 ER - TY - JOUR T1 - Energy-efficient embedded software implementation on multiprocessor system-on-chip with multiple voltages JF - ACM Transactions on Embedded Computing Systems (TECS) Y1 - 2006 A1 - Hua,S. A1 - Qu,G. A1 - Bhattacharyya, Shuvra S. VL - 5 CP - 2 ER - TY - CHAP T1 - Entity Resolution in Graphs T2 - Mining Graph DataMining Graph Data Y1 - 2006 A1 - Bhattacharya,Indrajit A1 - Getoor, Lise ED - Cook,Diane J. ED - Holder,Lawrence B. KW - entity resolution in graphs KW - graph‐based clustering for entity resolution KW - graph‐based entity resolution problem AB - This chapter contains sections titled:Introduction Related Work Motivating Example for Graph-Based Entity Resolution Graph-Based Entity Resolution: Problem Formulation Similarity Measures for Entity Resolution Graph-Based Clustering for Entity Resolution Experimental Evaluation Conclusion References JA - Mining Graph DataMining Graph Data PB - John Wiley & Sons, Inc. SN - 9780470073049 UR - http://onlinelibrary.wiley.com/doi/10.1002/9780470073049.ch13/summary ER - TY - CONF T1 - Estimation of Anthropomeasures from a Single Calibrated Camera T2 - Automatic Face and Gesture Recognition, 2006. FGR 2006. 7th International Conference on Y1 - 2006 A1 - BenAbdelkader,C. A1 - Davis, Larry S. KW - anthropomeasures KW - calibrated KW - camera;anthropometry;error KW - estimation;error KW - estimation;gait KW - identification;image KW - phase;image KW - recovery;image KW - resolution;image KW - resolution;monocular KW - restoration;image KW - sensors;image KW - sequences; KW - sequences;single KW - statistics;image AB - We are interested in the recovery of anthropometric dimensions of the human body from calibrated monocular sequences, and their use in multi-target tracking across multiple cameras and identification of individual people. In this paper, we focus on two specific anthropomeasures that are relatively easy to estimate from low-resolution images: stature and shoulder breadth. Precise average estimates are obtained for each anthropomeasure by combining measurements from multiple frames in the sequence. Our contribution is two-fold: (i) a novel technique for automatic and passive estimation of shoulder breadth, that is based on modelling the shoulders as an ellipse, and (U) a novel method for increasing the accuracy of the mean estimates of both anthropomeasures. The latter is based on the observation that major sources of error in the measurements are landmark localization the 2D image and 3D modelling error, and that both of these are correlated with gait phase and body orientation with respect to the camera. Consequently, estimation error can be significantly reduced via appropriate selection or control of these two variables JA - Automatic Face and Gesture Recognition, 2006. FGR 2006. 7th International Conference on M3 - 10.1109/FGR.2006.37 ER - TY - JOUR T1 - Evolution of non-LTR retrotransposons in the trypanosomatid genomes: Leishmania major has lost the active elements JF - Molecular and Biochemical Parasitology Y1 - 2006 A1 - Bringaud,Frédéric A1 - Ghedin,Elodie A1 - Blandin,Gaëlle A1 - Bartholomeu,Daniella C. A1 - Caler,Elisabet A1 - Levin,Mariano J. A1 - Baltz,Théo A1 - El‐Sayed, Najib M. KW - Degenerate retroelement KW - Evolution KW - Ingi KW - L1Tc KW - Leishmania major KW - Non-LTR retrotransposon KW - Retroposon KW - Trypanosoma brucei KW - Trypanosoma cruzi AB - The ingi and L1Tc non-LTR retrotransposons - which constitute the ingi clade - are abundant in the genome of the trypanosomatid species Trypanosoma brucei and Trypanosoma cruzi, respectively. The corresponding retroelements, however, are not present in the genome of a closely related trypanosomatid, Leishmania major. To study the evolution of non-LTR retrotransposons in trypanosomatids, we have analyzed all ingi/L1Tc elements and highly degenerate ingi/L1Tc-related sequences identified in the recently completed T. brucei, T. cruzi and L. major genomes. The coding sequences of 242 degenerate ingi/L1Tc-related elements (DIREs) in all three genomes were reconstituted by removing the numerous frame shifts. Three independent phylogenetic analyses conducted on the conserved domains encoded by these elements show that all DIREs, including the 52 L. major DIREs, form a monophyletic group belonging to the ingi clade. This indicates that the trypanosomatid ancestor contained active mobile elements that have been retained in the Trypanosoma species, but were lost from L. major genome, where only remnants (DIRE) are detectable. All 242 DIREs analyzed group together according to their species origin with the exception of 11 T. cruzi DIREs which are close to the T. brucei ingi/DIRE families. Considering the absence of known horizontal transfer between the African T. brucei and the South-American T. cruzi, this suggests that this group of elements evolved at a lower rate when compared to the other trypanosomatid elements. Interestingly, the only nucleotide sequence conserved between ingi and L1Tc (the first 79 residues) is also present at the 5'-extremity of all the full length DIREs and suggests a possible role for this conserved motif, as well as for DIREs. VL - 145 SN - 0166-6851 UR - http://www.sciencedirect.com/science/article/pii/S0166685105002963 CP - 2 M3 - 16/j.molbiopara.2005.09.017 ER - TY - CONF T1 - The evolution of the international children's digital library searching and browsing interface T2 - Proceedings of the 2006 conference on Interaction design and children Y1 - 2006 A1 - Hutchinson,H.B. A1 - Bederson, Benjamin B. A1 - Druin, Allison JA - Proceedings of the 2006 conference on Interaction design and children ER - TY - JOUR T1 - Experiments to understand HPC time to development JF - CTWatch Quarterly Y1 - 2006 A1 - Hochstein, Lorin A1 - Nakamura,Taiga A1 - Basili, Victor R. A1 - Asgari, Sima A1 - Zelkowitz, Marvin V A1 - Hollingsworth, Jeffrey K A1 - Shull, Forrest A1 - Carver,Jeffrey A1 - Voelp,Martin A1 - Zazworka, Nico A1 - Johnson,Philip KW - hackystat KW - HPC KW - publications-journals AB - In order to understand how high performance computing (HPC) programs are developed, a series of experiments, using students in graduate level HPC classes, have been conducted at many universities in the US. In this paper we discuss the general process of conducting those experiments, give some of the early results of those experiments, and describe a web-based process we are developing that will allow us to run additional experiments at other universities and laboratories that will be easier to conduct and generate results that more accurately reflect the process of building HPC programs. UR - http://csdl.ics.hawaii.edu/techreports/06-08/06-08.pdf ER - TY - CONF T1 - Exploring content-actor paired network data using iterative query refinement with NetLens T2 - Digital Libraries, 2006. JCDL '06. Proceedings of the 6th ACM/IEEE-CS Joint Conference on Y1 - 2006 A1 - Lee,Bongshin A1 - Kang,Hyunmo A1 - Plaisant, Catherine A1 - Bederson, Benjamin B. KW - data KW - interface KW - libraries;query KW - management KW - model;data KW - models;data KW - NetLens;content-actor KW - network KW - pair KW - processing;user KW - query KW - refinement;data KW - retrieval;iterative KW - systems; KW - visualisation;digital KW - visualization;information AB - Networks have remained a challenge for information retrieval and visualization because of the rich set of tasks that users want to accomplish. This paper demonstrates a tool, NetLens, to explore a content-actor paired network data model. The NetLens interface was designed to allow users to pose a series of elementary queries and iteratively refine visual overviews and sorted lists. This enables the support of complex queries that are traditionally hard to specify in node-link visualizations. NetLens is general and scalable in that it applies to any dataset that can be represented with our abstract content-actor data model JA - Digital Libraries, 2006. JCDL '06. Proceedings of the 6th ACM/IEEE-CS Joint Conference on M3 - 10.1145/1141753.1141868 ER - TY - CONF T1 - Fair file swarming with FOX T2 - Proc. 5th IPTPS Y1 - 2006 A1 - Levin,D. A1 - Sherwood,R. A1 - Bhattacharjee, Bobby AB - File swarming is a popular method of coordi-nated download by which peers obtain a file from an under- provisioned server. Critical problems arise within this domain when users act selfishly, yet most systems are built with altru- ism assumed. Working under the assumption that all peers are greedy, we introduce the Fair, Optimal eXchange (FOX) protocol. FOX, in addition to effective and robust application of the tit-for-tat incentive mechanism, provides theoretically optimal download times when everyone cooperates. Under our assumption of server and peer capabilities, we develop a strong threat model that provides peers with the incentives to not deviate from the protocol. From a theoretical perspective, we prove FOX’s optimality and incentive properties, even when the network consists only of purely self-interested peers. We also discuss issues in implementing and deploying such a system, and address the cost of ensuring fairness in a domain where efficiency is so important. JA - Proc. 5th IPTPS ER - TY - CONF T1 - File System Support for Collaboration in theWide Area T2 - Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on Y1 - 2006 A1 - Gaburici,V. A1 - Keleher,P. A1 - Bhattacharjee, Bobby AB - We describe the design, implementation, and performance of MFS, a new file system designed to support efficient widearea collaboration. MFS is structured around the twin abstractions of lightweight sessions and snapshots, along with a highly configurable capability-based security architecture. Sessions simplify and clarify collaborative semantics. Snapshots allow atomic access to arbitrary collections of files, and allow sharing to be defined in a simple and expressive fashion. MFS #146;s security architecture is a layered system that allows diverse usage scenarios. Pure capability-based access allows clients to access data without needing expensive public key or authentication servers, or complicated administration. However, MFS #146;s capabilities can also be watermarked, allowing a range of services to be added on a per-mount basis, up to and including traditional user authentication based on passwords or public keys. Basing the system around the use of immutable snapshots enables the underlying system to use several performance optimizations aggressively. Performance results from our MFS prototype show that, far from adding overhead, the use of snapshots allows the system to perform comparably to NFS in the local-area case and significantly outperform existing systems in wide-area environments. JA - Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on M3 - 10.1109/ICDCS.2006.41 ER - TY - JOUR T1 - Find that photo!: interface strategies to annotate, browse, and share JF - Communications of the ACM - Supporting exploratory search Y1 - 2006 A1 - Shneiderman, Ben A1 - Bederson, Benjamin B. A1 - Drucker,Steven M. VL - 49 SN - 0001-0782 UR - http://doi.acm.org/10.1145/1121949.1121985 CP - 4 M3 - 10.1145/1121949.1121985 ER - TY - JOUR T1 - First Steps Toward an Electronic Field Guide for Plants JF - Taxon Y1 - 2006 A1 - Haibin,Gaurav Agarwal A1 - Agarwal,Gaurav A1 - Ling,Haibin A1 - Jacobs, David W. A1 - Shirdhonkar,Sameer A1 - Kress,W. John A1 - Russell,Rusty A1 - Belhumeur,Peter A1 - Dixit,An A1 - Feiner,Steve A1 - Mahajan,Dhruv A1 - Sunkavalli,Kalyan A1 - Ramamoorthi,Ravi A1 - White,Sean AB - this paper, we will describe our progress towards building a digital collection of the Smithsonian's type specimens, developing recognition algorithms that can match an image of a leaf to the species of plant from which it comes, and designing user interfaces for interacting with an electronic field guide. To start, we are developing a prototype electronic field guide for the flora of Plummers Island, a small, well-studied island in the Potomac River. This prototype system contains multiple images for each of about 130 species of plants on the island, and should soon grow to cover all 200+ species currently recorded (Shetler et al., 2005). Images of full specimens are available, as well as images of isolated leaves of each species. A zoomable user interface allows a user to browse these images, zooming in on ones of interest. Visual recognition algorithms assist a botanist in locating the specimens that are most relevant to identify the species of a plant. The system currently runs on a small hand-held computer. We will describe the components of this prototype, and also describe some of the future challenges we anticipate if we are to provide botanists in the field with all the resources that are now currently available in the world's museums and herbaria. Type Specimen Digital Collection The first challenge in producing our electronic field guide is to create a digital collection covering all of the Smithsonian's 85,000 vascular plant type specimens. For each type specimen, the database should eventually include systematically acquired high-resolution digital images of the specimen, textual descriptions, links to decision trees, images of live plants, and 3D models. Figure 1: On the left, our set-up at the Smithsonian for digitally photographing type specimens. On the... VL - 55 ER - TY - CONF T1 - A flexible system framework for a nanoassembly cell using optical tweezers Y1 - 2006 A1 - Balijepalli,A. A1 - LeBrun,T. W. A1 - Gupta,S.K. AB - The optical tweezers instrument is a unique tool fordirected assembly of nanocomponents. In order to function as a viable nanomanufacturing tool, a software architecture is needed to run the optical tweezers hardware, provide an effective user interface, and allow automated operation. A flexible software system framework is described to utilize the optical tweezers hardware to its full potential. Initially we lay out the requirements for the system framework and define the broad architectural choices made while implementing the different modules. Implementation details of key system modules are then described. The flexible nature of the architecture is demonstrated by showing how a simulation module can be seamlessly included into the framework to replace the optical tweezers hardware as necessary. Finally, we show some representative assembly operations to demonstrate the capabilities of the system. CY - Philadelphia, Pennsylvania, USA UR - http://terpconnect.umd.edu/~skgupta/Publication/CIE06_Balijepalli.pdf ER - TY - JOUR T1 - The Goal Question Metric Approach JF - 5th ACM-IEEE International Symposium on Empirical Software Engineering (ISESE’06) Y1 - 2006 A1 - Basili, Victor R. A1 - Caldiera,G. A1 - Rombach,H. D ER - TY - CONF T1 - Heuristic search and information visualization methods for school redistricting T2 - Proceedings of the 18th conference on Innovative applications of artificial intelligence - Volume 2 Y1 - 2006 A1 - desJardins, Marie A1 - Bulka,Blazej A1 - Carr,Ryan A1 - Hunt,Andrew A1 - Rathod,Priyang A1 - Rheingans,Penny AB - We describe an application of AI search and information visualization techniques to the problem of school redistricting, in which students are assigned to home schools within a county or school district. This is a multicriteria optimization problem in which competing objectives must be considered, such as school capacity, busing costs, and socioeconomic distribution. Because of the complexity of the decision-making problem, tools are needed to help end users generate, evaluate, and compare alternative school assignment plans. A key goal of our research is to aid users in finding multiple qualitatively different redistricting plans that represent different tradeoffs in the decision space.We present heuristic search methods that can be used to find a set of qualitatively different plans, and give empirical results of these search methods on population data from the school district of Howard County, Maryland. We show the resulting plans using novel visualization methods that we have developed for summarizing and comparing alternative plans. JA - Proceedings of the 18th conference on Innovative applications of artificial intelligence - Volume 2 T3 - IAAI'06 PB - AAAI Press SN - 978-1-57735-281-5 UR - http://dl.acm.org/citation.cfm?id=1597122.1597136 ER - TY - JOUR T1 - How Multirobot Systems Research will Accelerate our Understanding of Social Animal Behavior JF - Proceedings of the IEEE Y1 - 2006 A1 - Balch, T. A1 - Dellaert, F. A1 - Feldman, A. A1 - Guillory, A. A1 - Isbell, C.L. A1 - Zia Khan A1 - Pratt, S.C. A1 - Stein, A.N. A1 - Wilde, H. KW - Acceleration KW - Animal behavior KW - ant movement tracking KW - Artificial intelligence KW - biology computing KW - Computer vision KW - control engineering computing KW - Insects KW - Intelligent robots KW - Labeling KW - monkey movement tracking KW - multi-robot systems KW - multirobot systems KW - robotics algorithms KW - Robotics and automation KW - social animal behavior KW - social animals KW - social insect behavior KW - Speech recognition KW - tracking AB - Our understanding of social insect behavior has significantly influenced artificial intelligence (AI) and multirobot systems' research (e.g., ant algorithms and swarm robotics). In this work, however, we focus on the opposite question: "How can multirobot systems research contribute to the understanding of social animal behavior?" As we show, we are able to contribute at several levels. First, using algorithms that originated in the robotics community, we can track animals under observation to provide essential quantitative data for animal behavior research. Second, by developing and applying algorithms originating in speech recognition and computer vision, we can automatically label the behavior of animals under observation. In some cases the automatic labeling is more accurate and consistent than manual behavior identification. Our ultimate goal, however, is to automatically create, from observation, executable models of behavior. An executable model is a control program for an agent that can run in simulation (or on a robot). The representation for these executable models is drawn from research in multirobot systems programming. In this paper we present the algorithms we have developed for tracking, recognizing, and learning models of social animal behavior, details of their implementation, and quantitative experimental results using them to study social insects VL - 94 SN - 0018-9219 CP - 7 ER - TY - CONF T1 - Identifying domain-specific defect classes using inspections and change history T2 - Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering Y1 - 2006 A1 - Nakamura,Taiga A1 - Hochstein, Lorin A1 - Basili, Victor R. KW - change history KW - code reading KW - domain specific defects KW - Inspection AB - We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge of recurring defects in a specific domain, even if other sources of defect data such as defect reports and change requests are unavailable, incomplete or at the wrong level of abstraction for the purposes of the defect analysis. After defining the methodology, we present the results of an empirical study where our method was applied to analyze defects in parallel programs which use the MPI (Message Passing Interface) library to express parallelism. This library is often used in the domain of high performance computing, where there is much discussion but little empirical data about the frequency and severity of defect types. Preliminary results indicate the methodology is feasible and can provide insights into the nature of real defects. We present the results, derived hypothesis, and lessons learned. JA - Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering T3 - ISESE '06 PB - ACM CY - New York, NY, USA SN - 1-59593-218-6 UR - http://doi.acm.org/10.1145/1159733.1159785 M3 - 10.1145/1159733.1159785 ER - TY - JOUR T1 - In VINI veritas: realistic and controlled network experimentation JF - SIGCOMM Comput. Commun. Rev. Y1 - 2006 A1 - Bavier,Andy A1 - Feamster, Nick A1 - Huang,Mark A1 - Peterson,Larry A1 - Rexford,Jennifer KW - architecture KW - experimentation KW - Internet KW - Routing KW - virtualization AB - This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides a high degree of control over network conditions. VINI allows researchers to deploy and evaluate their ideas with real routing software, traffic loads, and network events. To provide researchers flexibility in designing their experiments, VINI supports simultaneous experiments with arbitrary network topologies on a shared physical infrastructure. This paper tackles the following important design question: What set of concepts and techniques facilitate flexible, realistic, and controlled experimentation (e.g., multiple topologies and the ability to tweak routing algorithms) on a fixed physical infrastructure? We first present VINI's high-level design and the challenges of virtualizing a single network. We then present PL-VINI, an implementation of VINI on PlanetLab, running the "Internet In a Slice". Our evaluation of PL-VINI shows that it provides a realistic and controlled environment for evaluating new protocols and services. VL - 36 SN - 0146-4833 UR - http://doi.acm.org/10.1145/1151659.1159916 CP - 4 M3 - 10.1145/1151659.1159916 ER - TY - JOUR T1 - Interactive sonification for blind people exploration of geo-referenced data: comparison between a keyboard-exploration and a haptic-exploration interfaces JF - Cognitive Processing Y1 - 2006 A1 - Delogu,Franco A1 - Belardinelli,Marta A1 - Palmiero,Massimiliano A1 - Pasqualotto,Emanuele A1 - Zhao,Haixia A1 - Plaisant, Catherine A1 - Federici,Stefano VL - 7 SN - 1612-4782 UR - http://dx.doi.org/10.1007/s10339-006-0137-8 ER - TY - CONF T1 - Invariant Geometric Representation of 3D Point Clouds for Registration and Matching T2 - Image Processing, 2006 IEEE International Conference on Y1 - 2006 A1 - Biswas,S. A1 - Aggarwal,G. A1 - Chellapa, Rama KW - 3D KW - cloud;computer KW - function KW - geometric KW - graphics;geophysical KW - graphics;image KW - Interpolation KW - matching;image KW - point KW - processing;image KW - reconstruction;image KW - registration;image KW - registration;implicit KW - representation;interpolation; KW - representation;variational KW - signal KW - technique;clouds;computer KW - value;invariant AB - Though implicit representations of surfaces have often been used for various computer graphics tasks like modeling and morphing of objects, it has rarely been used for registration and matching of 3D point clouds. Unlike in graphics, where the goal is precise reconstruction, we use isosurfaces to derive a smooth and approximate representation of the underlying point cloud which helps in generalization. Implicit surfaces are generated using a variational interpolation technique. Implicit function values on a set of concentric spheres around the 3D point cloud of object are used as features for matching. Geometric-invariance is achieved by decomposing implicit values based feature set into various spherical harmonics. The decomposition provides a compact representation of 3D point clouds while achieving rotation invariance JA - Image Processing, 2006 IEEE International Conference on M3 - 10.1109/ICIP.2006.312542 ER - TY - RPRT T1 - Issues in writing a parallel compiler starting from a serial compiler Y1 - 2006 A1 - Tzannes,A. A1 - Barua,R. A1 - Caragea,G. A1 - Vishkin, Uzi PB - draft. Technical report, University of Maryland Institute for Advanced Compuer Studies ER - TY - JOUR T1 - KeyChains: A Decentralized Public-Key Infrastructure JF - Technical Reports from UMIACS, UMIACS-TR-2006-12 Y1 - 2006 A1 - Morselli,Ruggero A1 - Bhattacharjee, Bobby A1 - Katz, Jonathan A1 - Marsh,Michael A KW - Technical Report AB - A Certification Authority (CA) can be used to certify keys and build apublic-key infrastructure (PKI) when all users trust the same CA. A decentralized PKI trades off absolute assurance on keys for independence from central control and improved scalability and robustness. The PGP ``web of trust'' model has been suggested as a decentralized certification system, and has been used with great success for secure email. Although the PGP web of trust model allows anyone to issue certificates which can be used to form certificate chains, the discovery and construction of certificate chains relies on centralized keyservers to store certificates and respond to queries. In this paper, we design and implement KeyChains, a peer-to-peer system which incorporates a novel lookup mechanism specifically tailored to the task of generating and retrieving certificate chains in completely unstructured networks. By layering our system on top of the web of trust model, we thus obtain the first PKI which is truly decentralized in all respects. Our analysis and simulations show that the resulting system is both efficient and secure. UR - http://drum.lib.umd.edu/handle/1903/3332 ER - TY - JOUR T1 - A latent dirichlet allocation model for entity resolution JF - 6th SIAM Conference on Data Mining (SDM), Bethesda, USA Y1 - 2006 A1 - Bhattacharya,I. A1 - Getoor, Lise AB - In this paper, we address the problem of entity resolution, where given many references to un-derlying objects, the task is to predict which references correspond to the same object. We propose a probabilistic model for collective entity resolution. Our approach differs from other recently pro- posed entity resolution approaches in that it is a) unsupervised, b) generative and c) introduces a hidden ‘group’ variable to capture collections of entities which are commonly observed together. The entity resolution decisions are not considered on an independent pairwise basis, but instead decisions are made collectively. We focus on how the use of relational links among the references can be exploited. We show how we can use Gibbs Sampling to infer the collaboration groups and the entities jointly from the observed co-author relationships among entity references and how this improves entity resolution performance. We demonstrate the utility of our approach on two real-world bibliographic datasets. In addition, we present preliminary results on characterizing conditions under which collaborative infor- mation is useful. ER - TY - CHAP T1 - Machine Translation: Interlingual Methods T2 - Encyclopedia of Language & Linguistics (Second Edition)Encyclopedia of Language & Linguistics (Second Edition) Y1 - 2006 A1 - Dorr, Bonnie J A1 - Hovy,E. A1 - Levin,L. ED - Editor-in-Chief:   Keith Brown KW - approximate interlingua KW - compositionality KW - conceptual knowledge KW - cross-language divergences KW - interlingua KW - interlingual speech translation KW - language-independent representation KW - lexical-conceptual structure KW - Machine translation KW - ontology KW - predicate-argument structure KW - semantic annotation KW - semantic frames KW - semantic zones KW - text-meaning representations KW - THEMATIC ROLES AB - An interlingua is a notation for representing the content of a text that abstracts away from the characteristics of the language itself and focuses on the meaning (semantics) alone. Interlinguas are typically used as pivot representations in machine translation, allowing the contents of a source text to be generated in many different target languages. Because of the complexities involved, few interlinguas are more than demonstration prototypes, and only one has been used in a commercial MT system. In this article, we define the components of an interlingua and the principal issues faced by designers and builders of interlinguas and interlingua MT systems, illustrating with examples from operational systems and research prototypes. We discuss current efforts to annotate texts with interlingua-based information. JA - Encyclopedia of Language & Linguistics (Second Edition)Encyclopedia of Language & Linguistics (Second Edition) PB - Elsevier CY - Oxford SN - 978-0-08-044854-1 UR - http://www.sciencedirect.com/science/article/pii/B0080448542009391 ER - TY - CONF T1 - Making a difference: integrating socially relevant projects into HCI teaching T2 - CHI '06 extended abstracts on Human factors in computing systems Y1 - 2006 A1 - Shneiderman, Ben A1 - Bishop,Ann A1 - Friedman,Batya A1 - Lazar,Jonathan A1 - Marsden,Gary A1 - Nass,Cliff KW - education KW - making a difference KW - relevance KW - service learning KW - social impact KW - team projects AB - Enriching courses on human-computer interaction with socially-relevant projects provides a compelling opportunity for students to improve their education and make socially beneficial contributions. By having clearly defined user communities outside the classroom, students have the chance to practice their interview, observation, and usability testing skills, while developing projects that continue beyond the semester. These projects often give students life-changing exposure to genuine needs and impressive results to include in their portfolio when seeking employment. Educators will present their strategies for arranging, supervising, and grading these projects. Students will describe their experience and how it influenced them. JA - CHI '06 extended abstracts on Human factors in computing systems T3 - CHI EA '06 PB - ACM CY - New York, NY, USA SN - 1-59593-298-4 UR - http://doi.acm.org/10.1145/1125451.1125463 M3 - 10.1145/1125451.1125463 ER - TY - JOUR T1 - Manufacturing of multi-material compliant mechanisms using multi-material molding JF - The International Journal of Advanced Manufacturing Technology Y1 - 2006 A1 - Gouker,Regina A1 - Gupta, Satyandra K. A1 - Bruck,Hugh A1 - Holzschuh,Tobias KW - engineering AB - Multi-material compliant mechanisms enable many new design possibilities. Significant progress has been made in the area of design and analysis of multi-material compliant mechanisms. What is now needed is a method to mass-produce such mechanisms economically. A feasible and practical way of producing such mechanisms is through multi-material molding. Devices based on compliant mechanisms usually consist of compliant joints. Compliant joints in turn are created by carefully engineering interfaces between a compliant and a rigid material. This paper presents an overview of multi-material molding technology and describes feasible mold designs for creating different types of compliant joints found in multi-material compliant mechanisms. It also describes guidelines essential to successfully utilizing the multi-material molding process for creating compliant mechanisms. Finally, practical applications for the use of multi-material molding to create compliant mechanisms are demonstrated. VL - 30 SN - 0268-3768 UR - http://www.springerlink.com/content/djk6wq2213447pqn/abstract/ CP - 11 M3 - 10.1007/s00170-005-0152-4 ER - TY - CONF T1 - Mapping Multimedia Applications Onto Configurable Hardware With Parameterized Cyclo-Static Dataflow Graphs T2 - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on Y1 - 2006 A1 - Haim,F. A1 - Sen,M. A1 - Ko,Dong-Ik A1 - Bhattacharyya, Shuvra S. A1 - Wolf,W. KW - configurable hardware KW - Data communication KW - Gesture recognition KW - gesture recognition application KW - graph theory KW - hardware mapping KW - image processing applications KW - mapping multimedia applications KW - meta-modeling technique KW - model-based design KW - Multimedia communication KW - parameterized cyclo-static dataflow graphs AB - This paper develops methods for model-based design and implementation of image processing applications. We apply our previously developed meta-modeling technique of homogeneous parameterized dataflow (HPDF) (M. Sen et al., 2005) to the framework of cyclostatic dataflow (CSDF) (G. Bilsen et al., 1996), and demonstrate this integrated modeling methodology through hardware mapping of a gesture recognition application. We also provide a comparative study between HPDF/CSDF-based representation of the gesture recognition application, and a previously developed version based on applying HPDF in conjunction with conventional synchronous dataflow (SDF) semantics (M. Sen et al., 2005) JA - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on VL - 3 M3 - 10.1109/ICASSP.2006.1660838 ER - TY - JOUR T1 - Matching Jobs to Resources in Distributed Desktop Grid Environments JF - Technical Reports from UMIACS, UMIACS-TR-2006-15 Y1 - 2006 A1 - Kim,Jik-Soo A1 - Bhattacharjee, Bobby A1 - Keleher, Peter J. A1 - Sussman, Alan KW - Technical Report AB - Desktop grids use opportunistic sharing to exploit large collectionsof personal computers and workstations across the Internet and can achieve tremendous computing power with low cost. However, current systems are typically based on a traditional client-server architecture, which has inherent shortcomings with respect to robustness, reliability and scalability. In this paper, we propose a decentralized, robust, highly available, and scalable infrastructure to match incoming jobs to available resources. The key idea behind our proposed system is to leverage information provided by an underlying peer-to-peer system to create a hierarchical Rendezvous Node Tree, which performs the matching efficiently. Our experimental results obtained via simulation show that we can effectively match jobs with varying levels of resource constraints to available nodes and maintain good load balance in a fully decentralized heterogeneous computational environment. UR - http://drum.lib.umd.edu/handle/1903/3669 ER - TY - JOUR T1 - MCMC Data Association and Sparse Factorization Updating for Real Time Multitarget Tracking with Merged and Multiple Measurements JF - IEEE Transactions on Pattern Analysis and Machine Intelligence Y1 - 2006 A1 - Zia Khan A1 - Balch, T. A1 - Dellaert, F. KW - algorithms KW - approximate inference KW - Artificial intelligence KW - auxiliary variable particle filter KW - Computational efficiency KW - continuous state space KW - downdating KW - Image Enhancement KW - Image Interpretation, Computer-Assisted KW - Inference algorithms KW - Information Storage and Retrieval KW - laser range scanner KW - laser range scanner. KW - Least squares approximation KW - least squares approximations KW - Least squares methods KW - linear least squares KW - Markov chain Monte Carlo KW - Markov processes KW - MCMC data association KW - merged measurements KW - Monte Carlo methods KW - Movement KW - multiple merged measurements KW - multitarget tracking KW - particle filter KW - particle filtering (numerical methods) KW - Particle filters KW - Pattern Recognition, Automated KW - probabilistic model KW - QR factorization KW - Radar tracking KW - Rao-Blackwellized KW - real time multitarget tracking KW - Reproducibility of results KW - Sampling methods KW - Sensitivity and Specificity KW - sensor fusion KW - sparse factorization updating KW - sparse least squares KW - State-space methods KW - Subtraction Technique KW - target tracking KW - updating AB - In several multitarget tracking applications, a target may return more than one measurement per target and interacting targets may return multiple merged measurements between targets. Existing algorithms for tracking and data association, initially applied to radar tracking, do not adequately address these types of measurements. Here, we introduce a probabilistic model for interacting targets that addresses both types of measurements simultaneously. We provide an algorithm for approximate inference in this model using a Markov chain Monte Carlo (MCMC)-based auxiliary variable particle filter. We Rao-Blackwellize the Markov chain to eliminate sampling over the continuous state space of the targets. A major contribution of this work is the use of sparse least squares updating and downdating techniques, which significantly reduce the computational cost per iteration of the Markov chain. Also, when combined with a simple heuristic, they enable the algorithm to correctly focus computation on interacting targets. We include experimental results on a challenging simulation sequence. We test the accuracy of the algorithm using two sensor modalities, video, and laser range data. We also show the algorithm exhibits real time performance on a conventional PC VL - 28 SN - 0162-8828 CP - 12 ER - TY - JOUR T1 - Measurement-based optimal routing on overlay architectures for unicast sessions JF - Computer Networks Y1 - 2006 A1 - La,R.J. A1 - Shayman,M.A. A1 - Bhattacharjee, Bobby AB - We propose a measurement-based routing algorithm to load-balance intradomain traffic along multiple paths for multi-ple unicast sources. Multiple paths are established using overlay nodes. The distributed algorithm is derived from simul- taneous perturbation stochastic approximation (SPSA) and does not assume that the gradient of an analytical cost function is known. Instead, we rely on (potentially) noisy estimates from local measurements. Using the analytical model presented in the paper, we first show the almost sure convergence of the algorithm to the optimal solution under a decreas- ing step size policy (as with a standard SPSA model). Motivated by practical concerns, we next consider the constant step size case, for which we establish weak convergence. We provide simulation results to demonstrate the advantages of our proposed algorithm under various network scenarios, and also present a comparative study with MATE (an existing opti- mal routing algorithm) VL - 50 CP - 12 ER - TY - BOOK T1 - Memory management for synthesis of DSP software Y1 - 2006 A1 - Murthy,P. K A1 - Bhattacharyya, Shuvra S. PB - CRC ER - TY - CONF T1 - Memory-constrained block processing optimization for synthesis of DSP software T2 - Embedded Computer Systems: Architectures, Modeling and Simulation, 2006. IC-SAMOS 2006. International Conference on Y1 - 2006 A1 - Ko,M. Y A1 - Shen,C. C A1 - Bhattacharyya, Shuvra S. JA - Embedded Computer Systems: Architectures, Modeling and Simulation, 2006. IC-SAMOS 2006. International Conference on ER - TY - RPRT T1 - Mesh-of-Trees and Alternative Interconnection Networks for Single Chip Parallel Processing (Extended Abstract) Y1 - 2006 A1 - Balkan,Aydin O. A1 - Gang Qu A1 - Vishkin, Uzi KW - Technical Report AB - Many applications have stimulated the recent surge of interest single-chip parallel processing. In such machines, it is crucial to implement a high-throughput low-latency interconnection network to connect the on-chip components, especially the processing units and the memory units. In this paper, we propose a new mesh of trees (MoT) implementation of the interconnection network and evaluate it relative to metrics such as wire area, register count, total switch delay, maximum throughput, latency-throughput relation and delay effects of long wires. We show that on-chip interconnection networks can facilitate higher bandwidth between processors and shared first-level cache than previously considered possible. This has significant impact for chip multiprocessing. MoT is also compared, both analytically and experimentally, to some other traditional network topologies, such as hypercube, butterfly, fat trees and butterfly fat trees. When we evaluate a 64-terminal MoT network at 65nm technology, concrete results show that MoT provides higher throughput and lower latency especially when the input traffic (or the on-chip parallelism) is high, at the cost of larger area. A recurring problem in networking and communication is that of achieving good sustained throughput in contrast to just high theoretical peak performance that does not materialize for typical work loads. Our quantitative results demonstrate a clear advantage of the proposed MoT network in the context of single-chip parallel processing. JA - Technical Reports from UMIACS, UMIACS-TR-2006-32 UR - http://drum.lib.umd.edu/handle/1903/3678 ER - TY - JOUR T1 - A model for computer frustration: the role of instrumental and dispositional factors on incident, session, and post-session frustration and mood JF - Computers in Human Behavior Y1 - 2006 A1 - Bessière,Katie A1 - Newhagen,John E. A1 - Robinson,John P. A1 - Shneiderman, Ben KW - Efficacy KW - Emotion KW - Frustration KW - Mood KW - problem solving KW - usability AB - Frustration is almost universally accepted as the emotional outcome of a negative computing experience. Despite the wide use of the term, however, it has not been rigorously conceptualized as a factor in the study of the human–computer interface. This project sets out to explicate frustration as a pre-emotional state generated by the user’s appraisal of the interface as an impediment to goal attainment, and looks at how user characteristics, such as self-efficacy, relate to it. This project employed episode report methodology to capture data from 144 computer users’ reports of actual frustrating events as they took place. Diaries taken as users worked at their everyday tasks yield detailed data about the problems they encountered and included information about session length and an estimate of the time lost due to the experiences. Outcomes were measured as either situational or dispositional factors. Situational factors, having to do with specific events, predicted incident frustration. However, disposition variables, especially user self-efficacy, were much stronger, predicting incident and session frustration, and post-session mood. One surprising outcome was the failure of demographic variables as predictors of frustration. VL - 22 SN - 0747-5632 UR - http://www.sciencedirect.com/science/article/pii/S0747563204000615 CP - 6 M3 - 10.1016/j.chb.2004.03.015 ER - TY - CONF T1 - Model-based mapping of image registration applications onto configurable hardware T2 - Signals, Systems and Computers, 2006. ACSSC'06. Fortieth Asilomar Conference on Y1 - 2006 A1 - Hemaraj,Y. A1 - Sen,M. A1 - Shekhar,R. A1 - Bhattacharyya, Shuvra S. JA - Signals, Systems and Computers, 2006. ACSSC'06. Fortieth Asilomar Conference on ER - TY - CONF T1 - Model-based OpenMP implementation of a 3D facial pose tracking system T2 - 2006 International Conference on Parallel Processing Workshops, 2006. ICPP 2006 Workshops Y1 - 2006 A1 - Saha,S. A1 - Chung-Ching Shen A1 - Chia-Jui Hsu A1 - Aggarwal,G. A1 - Veeraraghavan,A. A1 - Sussman, Alan A1 - Bhattacharyya, Shuvra S. KW - 3D facial pose tracking system KW - application modeling KW - application program interfaces KW - application scheduling KW - coarse-grain dataflow graphs KW - Concurrent computing KW - data flow graphs KW - Educational institutions KW - face recognition KW - IMAGE PROCESSING KW - image processing applications KW - Inference algorithms KW - Message passing KW - OpenMP platform KW - parallel implementation KW - PARALLEL PROCESSING KW - parallel programming KW - Particle tracking KW - Processor scheduling KW - SHAPE KW - shared memory systems KW - shared-memory systems KW - Solid modeling KW - tracking AB - Most image processing applications are characterized by computation-intensive operations, and high memory and performance requirements. Parallelized implementation on shared-memory systems offer an attractive solution to this class of applications. However, we cannot thoroughly exploit the advantages of such architectures without proper modeling and analysis of the application. In this paper, we describe our implementation of a 3D facial pose tracking system using the OpenMP platform. Our implementation is based on a design methodology that uses coarse-grain dataflow graphs to model and schedule the application. We present our modeling approach, details of the implementation that we derived based on this modeling approach, and associated performance results. The parallelized implementation achieves significant speedup, and meets or exceeds the target frame rate under various configurations JA - 2006 International Conference on Parallel Processing Workshops, 2006. ICPP 2006 Workshops PB - IEEE SN - 0-7695-2637-3 M3 - 10.1109/ICPPW.2006.55 ER - TY - JOUR T1 - Molecular Characterization of Serine-, Alanine-, and Proline-Rich Proteins of Trypanosoma cruzi and Their Possible Role in Host Cell Infection JF - Infect. Immun. Y1 - 2006 A1 - Baida,Renata C. P. A1 - Santos,Marcia R. M. A1 - Carmo,Mirian S. A1 - Yoshida,Nobuko A1 - Ferreira,Danielle A1 - Ferreira,Alice Teixeira A1 - El Sayed,Najib M. A1 - Andersson,Bjorn A1 - da Silveira,Jose Franco AB - We previously reported the isolation of a novel protein gene family, termed SAP (serine-, alanine-, and proline-rich protein), from Trypanosoma cruzi. Aided by the availability of the completed genome sequence of T. cruzi, we have now identified 39 full-length sequences of SAP, six pseudogenes and four partial genes. SAPs share a central domain of about 55 amino acids and can be divided into four groups based on their amino (N)- and carboxy (C)-terminal sequences. Some SAPs have conserved N- and C-terminal domains encoding a signal peptide and a glycosylphosphatidylinositol anchor addition site, respectively. Analysis of the expression of SAPs in metacyclic trypomastigotes by two-dimensional electrophoresis and immunoblotting revealed that they are likely to be posttranslationally modified in vivo. We have also demonstrated that some SAPs are shed into the extracellular medium. The recombinant SAP exhibited an adhesive capacity toward mammalian cells, where binding was dose dependent and saturable, indicating a possible ligand-receptor interaction. SAP triggered the host cell Ca2+ response required for parasite internalization. A cell invasion assay performed in the presence of SAP showed inhibition of internalization of the metacyclic forms of the CL strain. Taken together, these results show that SAP is involved in the invasion of mammalian cells by metacyclic trypomastigotes, and they confirm the hypothesis that infective trypomastigotes exploit an arsenal of surface glycoproteins and shed proteins to induce signaling events required for their internalization. VL - 74 UR - http://iai.asm.org/cgi/content/abstract/74/3/1537 CP - 3 M3 -

10.1128/IAI.74.3.1537-1546.2006

ER - TY - CONF T1 - Motion Based Correspondence for 3D Tracking of Multiple Dim Objects T2 - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on Y1 - 2006 A1 - Veeraraghavan,A. A1 - Srinivasan, M. A1 - Chellapa, Rama A1 - Baird, E. A1 - Lamont, R. KW - 3D KW - analysis;motion KW - analysis;video KW - based KW - cameras;feature KW - correspondence;motion KW - dim KW - extraction;image KW - extraction;multiple KW - features KW - MOTION KW - objects;video KW - processing; KW - signal KW - tracking;motion AB - Tracking multiple objects in a video is a demanding task that is frequently encountered in several systems such as surveillance and motion analysis. Ability to track objects in 3D requires the use of multiple cameras. While tracking multiple objects using multiples video cameras, establishing correspondence between objects in the various cameras is a nontrivial task. Specifically, when the targets are dim or are very far away from the camera, appearance cannot be used in order to establish this correspondence. Here, we propose a technique to establish correspondence across cameras using the motion features extracted from the targets, even when the relative position of the cameras is unknown. Experimental results are provided for the problem of tracking multiple bees in natural flight using two cameras. The reconstructed 3D flight paths of the bees show some interesting flight patterns JA - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on VL - 2 M3 - 10.1109/ICASSP.2006.1660431 ER - TY - JOUR T1 - A New Hardware Monitor Design to Measure Data Structure-Specific Cache Eviction Information JF - International Journal of High Performance Computing Applications Y1 - 2006 A1 - Buck, B. R A1 - Hollingsworth, Jeffrey K AB - In this paper, we propose a hardware performance monitor that provides support not only for measuring cache misses and the addresses associated with them, but also for determining what data is being evicted from the cache when a miss occurs. We describe how to use this hardware support to efficiently determine the cache behavior of application data structures at the source code level. We also present the results of a simulation-based study of this technique, in which we examined the overhead, perturbation of results, and usefulness of collecting this information. VL - 20 UR - http://hpc.sagepub.com/content/20/3/353.abstract CP - 3 M3 - 10.1177/1094342006067470 ER - TY - JOUR T1 - Nuclear Envelope Dystrophies Show a Transcriptional Fingerprint Suggesting Disruption of Rb–MyoD Pathways in Muscle Regeneration JF - BrainBrain Y1 - 2006 A1 - Bakay,Marina A1 - Wang,Zuyi A1 - Melcon,Gisela A1 - Schiltz,Louis A1 - Xuan,Jianhua A1 - Zhao,Po A1 - Sartorelli,Vittorio A1 - Seo,Jinwook A1 - Pegoraro,Elena A1 - Angelini,Corrado A1 - Shneiderman, Ben A1 - Escolar,Diana A1 - Chen,Yi-Wen A1 - Winokur,Sara T A1 - Pachman,Lauren M A1 - Fan,Chenguang A1 - Mandler,Raul A1 - Nevo,Yoram A1 - Gordon,Erynn A1 - Zhu,Yitan A1 - Dong,Yibin A1 - Wang,Yue A1 - Hoffman,Eric P KW - EDMD = Emery–Dreifuss muscular dystrophy KW - emerin KW - Emery-Dreifuss muscular dystrophy KW - FSHD = fascioscapulohumeral muscular dystrophy KW - IDG = individual discriminatory genes KW - JDG = jointly discriminatory genes KW - lamin A/C KW - LGMD = limb-girdle muscular dystrophy KW - LOO = leave-one-out KW - RT–PCR = reverse transcription–polymerase chain reaction; VISDA = Visual and Statistical Data Analyzer KW - Skeletal muscle KW - wFC = weighted Fisher criterion AB - Mutations of lamin A/C (LMNA) cause a wide range of human disorders, including progeria, lipodystrophy, neuropathies and autosomal dominant Emery–Dreifuss muscular dystrophy (EDMD). EDMD is also caused by X-linked recessive loss-of-function mutations of emerin, another component of the inner nuclear lamina that directly interacts with LMNA. One model for disease pathogenesis of LMNA and emerin mutations is cell-specific perturbations of the mRNA transcriptome in terminally differentiated cells. To test this model, we studied 125 human muscle biopsies from 13 diagnostic groups (125 U133A, 125 U133B microarrays), including EDMD patients with LMNA and emerin mutations. A Visual and Statistical Data Analyzer (VISDA) algorithm was used to statistically model cluster hierarchy, resulting in a tree of phenotypic classifications. Validations of the diagnostic tree included permutations of U133A and U133B arrays, and use of two probe set algorithms (MAS5.0 and MBEI). This showed that the two nuclear envelope defects (EDMD LMNA, EDMD emerin) were highly related disorders and were also related to fascioscapulohumeral muscular dystrophy (FSHD). FSHD has recently been hypothesized to involve abnormal interactions of chromatin with the nuclear envelope. To identify disease-specific transcripts for EDMD, we applied a leave-one-out (LOO) cross-validation approach using LMNA patient muscle as a test data set, with reverse transcription–polymerase chain reaction (RT–PCR) validations in both LMNA and emerin patient muscle. A high proportion of top-ranked and validated transcripts were components of the same transcriptional regulatory pathway involving Rb1 and MyoD during muscle regeneration (CRI-1, CREBBP, Nap1L1, ECREBBP/p300), where each was specifically upregulated in EDMD. Using a muscle regeneration time series (27 time points) we develop a transcriptional model for downstream consequences of LMNA and emerin mutations. We propose that key interactions between the nuclear envelope and Rb and MyoD fail in EDMD at the point of myoblast exit from the cell cycle, leading to poorly coordinated phosphorylation and acetylation steps. Our data is consistent with mutations of nuclear lamina components leading to destabilization of the transcriptome in differentiated cells. VL - 129 SN - 0006-8950, 1460-2156 UR - http://brain.oxfordjournals.org/content/129/4/996 CP - 4 M3 - 10.1093/brain/awl023 ER - TY - JOUR T1 - Observations about software development for high end computing JF - CTWatch Quarterly Y1 - 2006 A1 - Carver, J. C A1 - Hochstein, L. M A1 - Kendall,R. P A1 - Nakamura, T. A1 - Zelkowitz, Marvin V A1 - Basili, Victor R. A1 - Post,D. E AB - In this paper, we have summarized our findings from a series of case studies conducted with ten ASC and MP Codes as a series of observations. Due to different environments in which each code is developed, some of the observations are consistent across code teams while others vary across code teams. Overall, we found high consistency among the ASC Codes and the MP Codes. Due to the different environments and foci of these projects, this result is both surprising and positive. In addition, despite the fact that a large majority of the developers on these teams have little or no formal training in software engineering, they have been able to make use of some basic software engineering principles. Further education and motivation could increase the use of these principles and further increase the quality of scientific and engineering software that has already demonstrated its value.Based on the positive results thus far, we have plans to conduct additional case studies to gather more data in support of or in contradiction to the observations presented in this paper. In future case studies, we will strive to investigate codes from additional domains, thereby allowing broader, more inclusive conclusions to be drawn. VL - 2 CP - 4A ER - TY - BOOK T1 - Oceans And Health: Pathogens In The Marine Environment Y1 - 2006 A1 - Belkin,Shimshon A1 - Rita R Colwell KW - Electronic books KW - Marine microbiology KW - Medical / Epidemiology KW - Medical / Microbiology KW - Nature / Animals / Marine Life KW - Pathogenic microorganisms KW - Science / Environmental Science KW - Science / Life Sciences / Biology KW - Science / Life Sciences / Marine Biology KW - Science / Life Sciences / Microbiology KW - Seawater/ microbiology AB - The release of non-disinfected wastewaters into the marine environment is a common worldwide practice, in under-developed as well as in highly developed countries. Consequently, the seas are constantly infused with wastewater bacteria, among them highly pathogenic ones. In view of the public health significance of this phenomenon, it is surprising how little is actually known concerning the fate of such bacteria once they enter the sea. While numerous studies have addressed the effects of various environmental parameters on colony formation, many of them actually ignore the fact that bacteria can retain viability and infectivity while losing colony-forming ability. Only in recent years have efforts also been directed at unraveling the mechanisms determining bacterial sensitivity or survival under these conditions. This, therefore, is one subject of Oceans and Health: Pathogens in the Marine Environment: the survival, infectivity, pathogenicity and viability of enteric bacteria in the sea. Chapters also detail the public health aspects of wastewater release, civil engineering and economic considerations, other sources of pathogens, and much more. PB - Springer SN - 9780387237084 ER - TY - JOUR T1 - OMNI: An efficient overlay multicast infrastructure for real-time applications JF - Computer Networks Y1 - 2006 A1 - Banerjee,Suman A1 - Kommareddy,Christopher A1 - Kar,Koushik A1 - Bhattacharjee, Bobby A1 - Khuller, Samir KW - Application-layer multicast KW - Minimum latency problem KW - overlay multicast AB - We consider an overlay architecture (called OMNI) where service providers deploy a set of service nodes (called MSNs) in the network to efficiently implement media-streaming applications. These MSNs are organized into an overlay and act as application-layer multicast forwarding entities for a set of clients.We present a decentralized scheme that organizes the MSNs into an appropriate overlay structure that is particularly beneficial for real-time applications. We formulate our optimization criterion as a “degree-constrained minimum average-latency problem” which is known to be NP-Hard. A key feature of this formulation is that it gives a dynamic priority to different MSNs based on the size of its service set. Our proposed approach iteratively modifies the overlay tree using localized transformations to adapt with changing distribution of MSNs and clients, as well as network conditions. We show that a centralized greedy approach to this problem does not perform quite as well, while our distributed iterative scheme efficiently converges to near-optimal solutions. VL - 50 SN - 1389-1286 UR - http://www.sciencedirect.com/science/article/pii/S1389128605002434 CP - 6 M3 - 10.1016/j.comnet.2005.07.023 ER - TY - CONF T1 - Optimization of signal processing software for control system implementation T2 - Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control, 2006 IEEE Y1 - 2006 A1 - Bhattacharyya, Shuvra S. A1 - Levine,William S. AB - Signal processing plays a fundamental role in the design of control systems #x2014; the portion of a digitally-implemented control system between the sensor outputs and the actuator inputs is precisely a digital signal processor (DSP). Consequently, effective techniques for design and optimization of signal processing software are important in achieving efficient controller implementations. Motivated by these relationships, this paper reviews techniques for modeling signal processing functionality in a manner that exposes aspects of application structure that are useful for mapping the functionality into efficient implementations. The paper then introduces some representative techniques that operate on such models to systematically derive optimized implementations from them. JA - Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control, 2006 IEEE M3 - 10.1109/CACSD-CCA-ISIC.2006.4776874 ER - TY - JOUR T1 - Optimization of structured programs JF - Software: Practice and Experience Y1 - 2006 A1 - Zelkowitz, Marvin V A1 - Bail,William G KW - compiler KW - Nested control structures KW - Optimizer KW - structured programming AB - The class of programs which do not contain goto statements has a structure which lends itself to optimization by an optimizer that is fast, efficient and relatively easy to program. The design of such an optimizer is described, along with some of the results obtained using this optimizer—one such result being that very little code optimization is achieved. The conjecture is made that this is true because gotoless programming languages lend themselves to more compact and concise object code at the source language level. VL - 4 SN - 1097-024X UR - http://onlinelibrary.wiley.com/doi/10.1002/spe.4380040106/abstract CP - 1 M3 - 10.1002/spe.4380040106 ER - TY - JOUR T1 - An optimized system for expression and purification of secreted bacterial proteins JF - Protein Expression and Purification Y1 - 2006 A1 - Geisbrecht,Brian V. A1 - Bouyain,Samuel A1 - Pop, Mihai KW - Pathogens KW - Secreted proteins KW - Toxins KW - Virulence factors AB - In this report, we describe an optimized system for the efficient overexpression, purification, and refolding of secreted bacterial proteins. Candidate secreted proteins were produced recombinantly in Escherichia coli as Tobacco Etch Virus protease-cleavable hexahistidine-c-myc eptiope fusion proteins. Without regard to their initial solubility, recombinant fusion proteins were extracted from whole cells with guanidium chloride, purified under denaturing conditions by immobilized metal affinity chromatography, and refolded by rapid dilution into a solution containing only Tris buffer and sodium chloride. Following concentration on the same resin under native conditions, each protein was eluted for further purification and/or characterization. Preliminary studies on a test set of 12 secreted proteins ranging in size from 13 to 130 kDa yielded between 10 and 50 mg of fusion protein per liter of induced culture at greater than 90% purity, as judged by Coomassie-stained SDS–PAGE. Of the nine proteins further purified, analytical gel filtration chromatography indicated that each was a monomer in solution and circular dichroism spectroscopy revealed that each had adopted a well-defined secondary structure. While there are many potential applications for this system, the results presented here suggest that it will be particularly useful for investigators employing structural approaches to understand protein function, as attested to by the crystal structures of three proteins purified using this methodology (B.V. Geisbrecht, B.Y. Hamaoka, B. Perman, A. Zemla, D.J. Leahy, J. Biol. Chem. 280 (2005) 17243–17250). VL - 46 SN - 1046-5928 UR - http://www.sciencedirect.com/science/article/pii/S1046592805003128 CP - 1 M3 - 10.1016/j.pep.2005.09.003 ER - TY - JOUR T1 - Parallelism for quantum computation with qudits JF - Physical Review APhys. Rev. A Y1 - 2006 A1 - O’Leary,Dianne P. A1 - Brennen,Gavin K. A1 - Bullock,Stephen S. AB - Robust quantum computation with d-level quantum systems (qudits) poses two requirements: fast, parallel quantum gates and high-fidelity two-qudit gates. We first describe how to implement parallel single-qudit operations. It is by now well known that any single-qudit unitary can be decomposed into a sequence of Givens rotations on two-dimensional subspaces of the qudit state space. Using a coupling graph to represent physically allowed couplings between pairs of qudit states, we then show that the logical depth (time) of the parallel gate sequence is equal to the height of an associated tree. The implementation of a given unitary can then optimize the tradeoff between gate time and resources used. These ideas are illustrated for qudits encoded in the ground hyperfine states of the alkali-metal atoms 87Rb and 133Cs. Second, we provide a protocol for implementing parallelized nonlocal two-qudit gates using the assistance of entangled qubit pairs. Using known protocols for qubit entanglement purification, this offers the possibility of high-fidelity two-qudit gates. VL - 74 UR - http://link.aps.org/doi/10.1103/PhysRevA.74.032334 CP - 3 M3 - 10.1103/PhysRevA.74.032334 ER - TY - CONF T1 - Partially overlapped channels not considered harmful T2 - Proceedings of the joint international conference on Measurement and modeling of computer systems Y1 - 2006 A1 - Mishra,A. A1 - Shrivastava,V. A1 - Banerjee,S. A1 - Arbaugh, William A. JA - Proceedings of the joint international conference on Measurement and modeling of computer systems ER - TY - CONF T1 - Participatory design with proxies: developing a desktop-PDA system to support people with aphasia T2 - Proceedings of the SIGCHI conference on Human Factors in computing systems Y1 - 2006 A1 - Jordan Boyd-Graber A1 - Nikolova,Sonya S. A1 - Moffatt,Karyn A. A1 - Kin,Kenrick C. A1 - Lee,Joshua Y. A1 - Mackey,Lester W. A1 - Tremaine,Marilyn M. A1 - Klawe,Maria M. KW - aphasia KW - assistive technology KW - multi-modal interfaces KW - participatory design AB - In this paper, we describe the design and preliminary evaluation of a hybrid desktop-handheld system developed to support individuals with aphasia, a disorder which impairs the ability to speak, read, write, or understand language. The system allows its users to develop speech communication through images and sound on a desktop computer and download this speech to a mobile device that can then support communication outside the home. Using a desktop computer for input addresses some of this population's difficulties interacting with handheld devices, while the mobile device addresses stigma and portability issues. A modified participatory design approach was used in which proxies, that is, speech-language pathologists who work with aphasic individuals, assumed the role normally filled by users. This was done because of the difficulties in communicating with the target population and the high variability in aphasic disorders. In addition, the paper presents a case study of the proxy-use participatory design process that illustrates how different interview techniques resulted in different user feedback. JA - Proceedings of the SIGCHI conference on Human Factors in computing systems T3 - CHI '06 PB - ACM CY - New York, NY, USA SN - 1-59593-372-7 UR - http://doi.acm.org/10.1145/1124772.1124797 M3 - 10.1145/1124772.1124797 ER - TY - CONF T1 - Participatory, embodied, multi-agent simulation T2 - Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems Y1 - 2006 A1 - Blikstein,Paulo A1 - Rand, William A1 - Wilensky,Uri KW - embedded agents KW - multi-agent simulation KW - participatory simulation KW - ROBOTICS KW - Sensors AB - We will demonstrate the integration of a software-based multi-agent modeling platform with a participatory simulation environment and real-time control over a physical agent (robot). Both real and virtual participants will be able to act as agents in a simulation that will control a physical agent. The backbone of this demonstration is a widely used, freely available, mature modeling platform known as NetLogo. JA - Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems T3 - AAMAS '06 PB - ACM CY - New York, NY, USA SN - 1-59593-303-4 UR - http://doi.acm.org/10.1145/1160633.1160913 M3 - 10.1145/1160633.1160913 ER - TY - JOUR T1 - The past, present, and future of experimental software engineering JF - Journal of the Brazilian Computer Society Y1 - 2006 A1 - Basili, Victor R. AB - This paper gives a 40 year overview of the evolution of experimental software engineering, from the past to the future, from a personal perspective. My hypothesis is that my work followed the evolution of the field. I use my own experiences and thoughts as a barometer of how the field has changed and present some opinions about where we need to go. VL - 12 SN - 0104-6500 UR - http://www.scielo.br/scielo.php?pid=S0104-65002006000400002&script=sci_arttext CP - 3 M3 - 10.1007/BF03194492 ER - TY - JOUR T1 - Patterns of sequence conservation in presynaptic neural genes JF - Genome Biology Y1 - 2006 A1 - Hadley,Dexter A1 - Murphy,Tara A1 - Valladares,Otto A1 - Hannenhalli, Sridhar A1 - Ungar,Lyle A1 - Kim,Junhyong A1 - Bućan,Maja AB - The neuronal synapse is a fundamental functional unit in the central nervous system of animals. Because synaptic function is evolutionarily conserved, we reasoned that functional sequences of genes and related genomic elements known to play important roles in neurotransmitter release would also be conserved. VL - 7 SN - 1465-6906 UR - http://genomebiology.com/2006/7/11/R105 CP - 11 M3 - 10.1186/gb-2006-7-11-r105 ER - TY - RPRT T1 - Physics-Based Detectors Applied to Long-Wave Infrared Hyperspectral Data Y1 - 2006 A1 - Broadwater,Joshua A1 - Chellapa, Rama KW - *HYPERSPECTRAL IMAGERY KW - algorithms KW - AUTOMATIC KW - DETECTION KW - FAR INFRARED RADIATION KW - LOW STRENGTH KW - Matched filters KW - MILITARY OPERATIONS KW - NIGHT KW - OPTICS KW - SIGNATURES KW - SOILS KW - SPECTROMETERS KW - TARGET DETECTION AB - Long-wave infrared (LWIR) hyperspectral image (HSI) data presents an interesting challenge for automatic target detection algorithms. LWIR HSI data is useful for both day and night operations, but weak signatures like disturbed soil can be problematic for standard matched-filter techniques. In this paper, we augment the standard matched-filter techniques with physics-based information particular to HSI data. Our results show that these physics-based detectors provide improved detection performance with quick processing times. PB - CENTER FOR AUTOMATION RESEARCH, UNIVERSITY OF MARYLAND COLLEGE PARK UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA481339 ER - TY - JOUR T1 - Postmodern internetwork architecture JF - ITTC-FY2006-TR-45030-01, Information and Telecommunication Center, The University of Kansas Y1 - 2006 A1 - Bhattacharjee, Bobby A1 - Calvert,K. A1 - Griffioen,J. A1 - Spring, Neil A1 - Sterbenz,J. P.G AB - Network-layer innovation has proven surprisingly difficult, in part because internetworking protocols ignore com-peting economic interests and because a few protocols dominate, enabling layer violations that entrench technologies. Many shortcomings of today’s internetwork layer result from its inflexibility with respect to the policies of the stake- holders: users and service providers. The consequences of these failings are well-known: various hacks, layering violations, and overloadings are introduced to enforce policies and attempt to get the upper hand in various “tus- sles”. The result is a network that is increasingly brittle, hostile to innovation, vulnerable to attack, and insensitive to concerns about accountability and privacy. Our project aims to design, implement, and evaluate through daily use a minimalist internetwork layer and aux- iliary functionality that anticipates tussles and allows them to be played out in policy space, as opposed to in the packet-forwarding path. We call our approach postmodern internetwork architecture, because it is a reaction against many established network layer design concepts. The overall goal of the project is to make a larger portion of the network design space accessible without sacrificing the economy of scale offered by the unified Internet. We will use the postmodern architecture to explore basic architectural questions. These include: • What mechanisms should be supported by the network such that any foreseeable policy requirement can be explicitly addressed? • To what extent can routing and forwarding be isolated from each other while maintaining an efficient and usable network? • What forms of identity should be visible within the network, and what forms of accountability do different identities enable? • What mechanisms are needed to enable efficient access to cross-layer information and mechanisms such that lower layers can express their characteristics and upper layers can exert control downward? We plan to build and evaluate a complete end-to-end networking layer to help us understand feasible solutions to these questions. The Internet has fulfilled the potential of a complete generation of networking research by producing a global platform for innovation, commerce, and democracy. Unfortunately, the Internet also amply demonstrates the com- plexity and architectural ugliness that ensue when competing interests vie for benefits beyond those envisioned in the original design. This project is about redesigning the waist of the architectural hourglass to foster innovation, enhance security and accountability, and accomodate competing interests. ER - TY - JOUR T1 - Programmer's Manual for XMTC Language, XMTC Compiler and XMT Simulator JF - Technical Reports from UMIACS, UMIACS-TR-2005-45 Y1 - 2006 A1 - Balkan,Aydin O. A1 - Vishkin, Uzi KW - Technical Report AB - Explicit Multi-Threading (XMT) is a computing framework developed at the University of Maryland as part of a PRAM-on-chip vision (http://www.umiacs.umd.edu/users/vishkin/XMT). Much in the same way that performance programming of standard computers relies on C language, XMT performance programming is done using an extension of C called XMTC. This manual presents the second generation of XMTCprogramming paradigm. It is intended to be used by an application programmer, who is new to XMTC. In the first part of this technical report (UMIACS-TR 2005-45 Part 1 of 2), we define and describe key concepts, list the limitations and restrictions, and give examples. The second part (UMIACS-TR 2005-45 Part 2 of 2) is a brief tutorial, and it demonstrates the basic programming concepts of XMTC language with examples and exercises. UR - http://drum.lib.umd.edu/handle/1903/3673 ER - TY - JOUR T1 - Query planning in the presence of overlapping sources JF - Advances in Database Technology-EDBT 2006 Y1 - 2006 A1 - Bleiholder,J. A1 - Khuller, Samir A1 - Naumann,F. A1 - Raschid, Louiqa A1 - Wu,Y. ER - TY - JOUR T1 - Query planning in the presence of overlapping sources JF - Advances in Database Technology-EDBT 2006 Y1 - 2006 A1 - Bleiholder,J. A1 - Khuller, Samir A1 - Naumann,F. A1 - Raschid, Louiqa A1 - Wu,Y. AB - Navigational queries on Web-accessible life science sources pose unique query optimization challenges. The objects in these sources are interconnected to objects in other sources, forming a large and complex graph, and there is an overlap of objects in the sources. Answering a query requires the traversal of multiple alternate paths through these sources. Each path can be associated with the benefit or the cardinality of the target object set (TOS) of objects reached in the result. There is also an evaluation cost of reaching the TOS.We present dual problems in selecting the best set of paths. The first problem is to select a set of paths that satisfy a constraint on the evaluation cost while maximizing the benefit (number of distinct objects in the TOS). The dual problem is to select a set of paths that satisfies a threshold of the TOS benefit with minimal evaluation cost. The two problems can be mapped to the budgeted maximum coverage problem and the maximal set cover with a threshold. To solve these problems, we explore several solutions including greedy heuristics, a randomized search, and a traditional IP/LP formulation with bounds. We perform experiments on a real-world graph of life sciences objects from NCBI and report on the computational overhead of our solutions and their performance compared to the optimal solution. M3 - 10.1007/11687238_48 ER - TY - CONF T1 - Query-time entity resolution T2 - International conference on knowledge discovery and data mining Y1 - 2006 A1 - BHATTACHARVA,I. A1 - Getoor, Lise A1 - Licamele,L. AB - The goal of entity resolution is to reconcile database references corresponding to the same real-world entities. Given the abundance of publicly available databases where entities are not resolved, we motivate the problem of quickly processing queries that require resolved entities from such 'unclean' databases. We propose a two-stage collective resolution strategy for processing queries. We then show how it can be performed on-the-fly by adaptively extracting and resolving those database references that are the most helpful for resolving the query. We validate our approach on two large real-world publication databases where we show the usefulness of collective resolution and at the same time demonstrate the need for adaptive strategies for query processing. We then show how the same queries can be answered in real time using our adaptive approach while preserving the gains of collective resolution. JA - International conference on knowledge discovery and data mining ER - TY - JOUR T1 - Ranking search results in P2P systems JF - Technical Report, CR-TR-4779, Department of Computer Science, University of Maryland Y1 - 2006 A1 - Gopalakrishnan,V. A1 - Morselli,R. A1 - Bhattacharjee, Bobby A1 - Keleher,P. A1 - Srinivasan, Aravind AB - P2P deployments are a natural infrastructure for buildingdistributed search networks. Proposed systems support locating and retrieving all results, but lack the information necessary to rank them. Users, however, are primarily interested in the most relevant, and not all possible results. Using random sampling, we extend a class of well- known information retrieval ranking algorithms such that they can be applied in this distributed setting. We analyze the overhead of our approach, and quantify exactly how our system scales with increasing number of documents, system size, document to node mapping (uniform versus non-uniform), and types of queries (rare versus popular terms). Our analysis and simulations show that a) these extensions are efficient, and can scale with little overhead to large systems, and b) the accuracy of the results ob- tained using distributed ranking is comparable to a cen- tralized implementation. ER - TY - JOUR T1 - Ranking search results in peer-to-peer systems JF - Technical Reports from UMIACS Y1 - 2006 A1 - Gopalakrishnan,V. A1 - Morselli,R. A1 - Bhattacharjee, Bobby A1 - Keleher,P. A1 - Srinivasan, Aravind AB - P2P deployments are a natural infrastructure for building distributed search networks. Proposed systems support locating and retrieving all results, but lack the information necessary to rank them. Users, however, are primarily interested in the most relevant, and not all possible results. Using random sampling, we extend a class of well-known information retrieval ranking algorithms such that they can be applied in this distributed setting. We analyze the overhead of our approach, and quantify exactly how our system scales with increasing number of documents, system size, document to node mapping (uniform versus non-uniform), and types of queries (rare versus popular terms). Our analysis and simulations show that a) these extensions are efficient, and can scale with little overhead to large systems, and b) the accuracy of the results obtained using distributed ranking is comparable to a centralized implementation. ER - TY - BOOK T1 - Real-Time Distributed Algorithms for Visual and Battlefield Reasoning Y1 - 2006 A1 - Davis, Larry S. A1 - Basili, Victor R. A1 - V.S. Subrahmanian A1 - Reggia, James A. A1 - Aloimonos, J. AB - Information is key to the success of the next generation battlefield. There is a critical need to determine, in real-time, what the enemy is doing, and to interpret that information in the context of past related events. In this project we examined two aspects of this issue: development of a high-level task definition language for tasking a network of sensors to carry out given objectives, and interpreting recounted events so that past related scenarios could be automatically identified from a case database. PB - MARYLAND UNIV COLLEGE PARK OFFICE OF RESEARCH ADMINISTRATION AND ADVANCEMENT ER - TY - CONF T1 - Reconfigurable image registration on FPGA platforms T2 - Biomedical Circuits and Systems Conference, 2006. BioCAS 2006. IEEE Y1 - 2006 A1 - Sen,M. A1 - Hemaraj,Y. A1 - Bhattacharyya, Shuvra S. A1 - Shekhar,R. JA - Biomedical Circuits and Systems Conference, 2006. BioCAS 2006. IEEE ER - TY - CONF T1 - Reflecting on Health: A System for Students to Monitor Diet and Exercise T2 - SIGCHI EA '06 Y1 - 2006 A1 - Brown, Brandon A1 - Marshini Chetty A1 - Grimes, Andrea A1 - Harmon, Ellie KW - diet KW - exercise KW - journaling KW - mobile phone KW - Visualization AB - Using an iterative design process, we designed and evaluated a system for college students to encourage the development and maintenance of healthy diet and exercise habits. The system has three components: a camera phone application to support photographic diet and exercise journaling, an automatic workout tracking application for exercise machines in the gym, and a visualization application to support users as they reflect on their diet and exercise activities. JA - SIGCHI EA '06 T3 - CHI EA '06 PB - ACM SN - 1-59593-298-4 UR - http://doi.acm.org/10.1145/1125451.1125794 ER - TY - CONF T1 - Register File Partitioning with Constraint Programming T2 - System-on-Chip, 2006. International Symposium on Y1 - 2006 A1 - Salmela,P. A1 - Shen,C. C A1 - Bhattacharyya, Shuvra S. A1 - Takala,J. JA - System-on-Chip, 2006. International Symposium on ER - TY - JOUR T1 - Relational clustering for entity resolution queries JF - ICML 2006 Workshop on Statistical Relational Learning (SRL) Y1 - 2006 A1 - Bhattacharya,I. A1 - Licamele,L. A1 - Getoor, Lise AB - The goal of entity resolution is to recon-cile database references corresponding to the same real-world entities. Given the abun- dance of publicly available databases where entities are not resolved, we motivate the problem of quickly processing queries that require resolved entities from such ‘unclean’ databases. We first propose a cut-based rela- tional clustering formulation for collective en- tity resolution. We then show how it can be performed on-the-fly by adaptively extract- ing and resolving those database references that are the most helpful for resolving the query. We validate our approach on two large real-world publication databases, where we show the usefulness of collective resolution and at the same time demonstrate the need for adaptive strategies for query processing. We then show how the same queries can be answered in real time using our adaptive ap- proach while preserving the gains of collective resolution. ER - TY - CONF T1 - Reliable broadcast in radio networks: the bounded collision case T2 - Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing Y1 - 2006 A1 - Koo,Chiu-Yuen A1 - Bhandari,Vartika A1 - Katz, Jonathan A1 - Vaidya,Nitin H. KW - broadcast KW - byzantine failure KW - Fault tolerance KW - radio networks AB - We study the problem of achieving global broadcast in a radio network where a node can multicast messages to all of its neighbors (that is, nodes within some given distance r), and up to t nodes in any single neighborhood may be corrupted. Previous work assumes that corrupted nodes can neither cause collisions nor spoof addresses of honest nodes. In this work, we eliminate these assumptions and allow each faulty node to cause a (known) bounded number of collisions and spoof the addresses of arbitrary other nodes. We show that the maximum tolerable t in this case is identical to the maximum tolerable t when collisions and address spoofing are not allowed. Thus, by causing collisions and spoofing addresses an adversary may be able to degrade the efficiency of achieving broadcast, but it cannot affect the feasibility of this task. JA - Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing T3 - PODC '06 PB - ACM CY - New York, NY, USA SN - 1-59593-384-0 UR - http://doi.acm.org/10.1145/1146381.1146420 M3 - 10.1145/1146381.1146420 ER - TY - JOUR T1 - Resilient multicast using overlays JF - IEEE/ACM Transactions on Networking Y1 - 2006 A1 - Banerjee,S. A1 - Lee,Seungjoon A1 - Bhattacharjee, Bobby A1 - Srinivasan, Aravind KW - application-layer multicast protocols KW - Computer science KW - Data communication KW - Delay KW - Internet KW - Internet-like topologies KW - IP networks KW - loss recovery technique KW - Multicast KW - multicast data recovery scheme KW - Multicast protocols KW - Network topology KW - NETWORKS KW - overlays KW - Performance loss KW - probabilistic forwarding KW - probabilistic resilient multicast KW - Protocols KW - Resilience KW - Streaming media KW - telecommunication network topology KW - Terminology AB - We introduce Probabilistic Resilient Multicast (PRM): a multicast data recovery scheme that improves data delivery ratios while maintaining low end-to-end latencies. PRM has both a proactive and a reactive components; in this paper we describe how PRM can be used to improve the performance of application-layer multicast protocols especially when there are high packet losses and host failures. Through detailed analysis in this paper, we show that this loss recovery technique has efficient scaling properties-the overheads at each overlay node asymptotically decrease to zero with increasing group sizes. As a detailed case study, we show how PRM can be applied to the NICE application-layer multicast protocol. We present detailed simulations of the PRM-enhanced NICE protocol for 10 000 node Internet-like topologies. Simulations show that PRM achieves a high delivery ratio (>97%) with a low latency bound (600 ms) for environments with high end-to-end network losses (1%-5%) and high topology change rates (5 changes per second) while incurring very low overheads (<5%). VL - 14 SN - 1063-6692 CP - 2 M3 - 10.1109/TNET.2006.872579 ER - TY - CONF T1 - Resource Discovery Techniques in Distributed Desktop Grid Environments T2 - Proceedings of the 7th IEEE/ACM International Conference on Grid Computing Y1 - 2006 A1 - Kim,Jik-Soo A1 - Nam,Beomseok A1 - Keleher,Peter A1 - Marsh,Michael A1 - Bhattacharjee, Bobby A1 - Sussman, Alan AB - Desktop grids use opportunistic sharing to exploit large collections of personal computers and workstations across the Internet, achieving tremendous computing power at low cost. Traditional desktop grid systems are typically based on a client-server architecture, which has inherent shortcomings with respect to robustness, reliability and scalability. In this paper, we propose a decentralized, robust, highly available, and scalable infrastructure to match incoming jobs to available resources. Through a comparative analysis on the experimental results obtained via simulation of three different types of matchmaking algorithms under different workload scenarios, we show the trade-offs between effcient matchmaking and good load balancing in a fully decentralized, heterogeneous computational environment. JA - Proceedings of the 7th IEEE/ACM International Conference on Grid Computing T3 - GRID '06 PB - IEEE Computer Society CY - Washington, DC, USA SN - 1-4244-0343-X UR - http://dx.doi.org/10.1109/ICGRID.2006.310992 M3 - 10.1109/ICGRID.2006.310992 ER - TY - JOUR T1 - Retroviral DNA Integration: Viral and Cellular Determinants of Target-Site Selection JF - PLoS PathogPLoS Pathog Y1 - 2006 A1 - Lewinski,Mary K A1 - Yamashita,Masahiro A1 - Emerman,Michael A1 - Ciuffi,Angela A1 - Marshall,Heather A1 - Crawford,Gregory A1 - Collins,Francis A1 - Shinn,Paul A1 - Leipzig,Jeremy A1 - Hannenhalli, Sridhar A1 - Berry,Charles C A1 - Ecker,Joseph R A1 - Bushman,Frederic D. AB - Retroviruses differ in their preferences for sites for viral DNA integration in the chromosomes of infected cells. Human immunodeficiency virus (HIV) integrates preferentially within active transcription units, whereas murine leukemia virus (MLV) integrates preferentially near transcription start sites and CpG islands. We investigated the viral determinants of integration-site selection using HIV chimeras with MLV genes substituted for their HIV counterparts. We found that transferring the MLV integrase (IN) coding region into HIV (to make HIVmIN) caused the hybrid to integrate with a specificity close to that of MLV. Addition of MLV gag (to make HIVmGagmIN) further increased the similarity of target-site selection to that of MLV. A chimeric virus with MLV Gag only (HIVmGag) displayed targeting preferences different from that of both HIV and MLV, further implicating Gag proteins in targeting as well as IN. We also report a genome-wide analysis indicating that MLV, but not HIV, favors integration near DNase I–hypersensitive sites (i.e., +/− 1 kb), and that HIVmIN and HIVmGagmIN also favored integration near these features. These findings reveal that IN is the principal viral determinant of integration specificity; they also reveal a new role for Gag-derived proteins, and strengthen models for integration targeting based on tethering of viral IN proteins to host proteins. VL - 2 UR - UR - http://dx.plos.org/10.1371/journal.ppat.0020060,http://dx.plos.org/10.1371/journal.ppat.0020060 CP - 6 M3 - 10.1371/journal.ppat.0020060 ER - TY - RPRT T1 - Revisiting Internet addressing: Back to the future Y1 - 2006 A1 - Vutukuru,M. A1 - Feamster, Nick A1 - Walfish,M. A1 - Balakrishnan,H. A1 - Shenker,S. AB - IP prefixes undermine three goals of Internet routing:accurate reflection of network-layer reachability, secure routing messages, and effective traffic control. This pa- per presents Atomic IP (AIP), a simple change to Inter- net addressing (which in fact reverts to how addressing once worked), that allows Internet routing to achieve these goals. PB - Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory VL - MIT-CSAIL-TR-2006-025 ER - TY - JOUR T1 - Ring signatures: Stronger definitions, and constructions without random oracles JF - Theory of Cryptography Y1 - 2006 A1 - Bender,A. A1 - Katz, Jonathan A1 - Morselli,R. AB - Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so that a ring of possible signers (of which the user is a member) is identified, without revealing exactly which member of that ring actually generated the signature. In contrast to group signatures, ring signatures are completely “ad-hoc” and do not require any central authority or coordination among the various users (indeed, users do not even need to be aware of each other); furthermore, ring signature schemes grant users fine-grained control over the level of anonymity associated with any particular signature.This paper has two main areas of focus. First, we examine previous definitions of security for ring signature schemes and suggest that most of these prior definitions are too weak, in the sense that they do not take into account certain realistic attacks. We propose new definitions of anonymity and unforgeability which address these threats, and then give separation results proving that our new notions are strictly stronger than previous ones. Next, we show two constructions of ring signature schemes in the standard model: one based on generic assumptions which satisfies our strongest definitions of security, and a second, more efficient scheme achieving weaker security guarantees and more limited functionality. These are the first constructions of ring signature schemes that do not rely on random oracles or ideal ciphers. M3 - 10.1007/11681878_4 ER - TY - CONF T1 - A scalable key management and clustering scheme for ad hoc networks T2 - Proceedings of the 1st international conference on Scalable information systems Y1 - 2006 A1 - Li,Jason H. A1 - Levy,Renato A1 - Yu,Miao A1 - Bhattacharjee, Bobby AB - This paper describes a scalable key management and clustering scheme for secure group communications in ad hoc and sensor networks. The scalability problem is solved by partitioning the communicating devices into subgroups, with a leader in each subgroup, and further organizing the subgroups into hierarchies. Each level of the hierarchy is called a tier or layer. Key generation, distribution, and actual data transmissions follow the hierarchy. The Distributed, Efficient Clustering Approach (DECA) provides robust clustering to form subgroups, and analytical and simulation results demonstrate that DECA is energy-efficient and resilient against node mobility. Comparing with most other schemes, our approach is extremely scalable and efficient, provides more security guarantees, and is selective, adaptive and robust. JA - Proceedings of the 1st international conference on Scalable information systems T3 - InfoScale '06 PB - ACM CY - New York, NY, USA SN - 1-59593-428-6 UR - http://doi.acm.org/10.1145/1146847.1146875 M3 - 10.1145/1146847.1146875 ER - TY - JOUR T1 - Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily JF - Gene Y1 - 2006 A1 - Wu,Wenjie A1 - Niles,Edward G. A1 - El‐Sayed, Najib M. A1 - Berriman,Matthew A1 - LoVerde,Philip T. KW - Nuclear receptors KW - Schistosoma mansoni AB - Nuclear receptors (NRs) are important transcriptional modulators in metazoans. Sixteen new NRs were identified in the Platyhelminth trematode, Schistosoma mansoni. Three were found to possess novel tandem DNA-binding domains that identify a new subfamily of NR. Two NRs are homologues of the thyroid hormone receptor that previously were thought to be restricted to chordates. This study brings the total number of identified NR in S. mansoni to 21. Phylogenetic and comparative genomic analyses demonstrate that S. mansoni NRs share an evolutionary lineage with that of arthropods and vertebrates. Phylogenic analysis shows that more than half of the S. mansoni nuclear receptors evolved from a second gene duplication. As the second gene duplication of NRs was thought to be specific to vertebrates, our data challenge the current theory of NR evolution. VL - 366 SN - 0378-1119 UR - http://www.sciencedirect.com/science/article/pii/S0378111905005871 CP - 2 M3 - 16/j.gene.2005.09.013 ER - TY - BOOK T1 - The Science of Hysteresis: Mathematical modeling and applications Y1 - 2006 A1 - Bertotti,Giorgio A1 - Mayergoyz, Issak D KW - Business & Economics / Economics / Microeconomics KW - Hysteresis KW - Magnetism KW - Science / Physics / Magnetism PB - Academic Press SN - 9780123694317 ER - TY - JOUR T1 - Seasonal Cholera Caused by Vibrio Cholerae Serogroups O1 and O139 in the Coastal Aquatic Environment of Bangladesh JF - Applied and Environmental MicrobiologyAppl. Environ. Microbiol. Y1 - 2006 A1 - Alam,Munirul A1 - Hasan,Nur A. A1 - Sadique,Abdus A1 - Bhuiyan,N. A. A1 - Ahmed,Kabir U. A1 - Nusrin,Suraia A1 - Nair,G. Balakrish A1 - Siddique,A. K. A1 - Sack,R. Bradley A1 - Sack,David A. A1 - Huq,Anwar A1 - Rita R Colwell AB - Since Vibrio cholerae O139 first appeared in 1992, both O1 El Tor and O139 have been recognized as the epidemic serogroups, although their geographic distribution, endemicity, and reservoir are not fully understood. To address this lack of information, a study of the epidemiology and ecology of V. cholerae O1 and O139 was carried out in two coastal areas, Bakerganj and Mathbaria, Bangladesh, where cholera occurs seasonally. The results of a biweekly clinical study (January 2004 to May 2005), employing culture methods, and of an ecological study (monthly in Bakerganj and biweekly in Mathbaria from March 2004 to May 2005), employing direct and enrichment culture, colony blot hybridization, and direct fluorescent-antibody methods, showed that cholera is endemic in both Bakerganj and Mathbaria and that V. cholerae O1, O139, and non-O1/non-O139 are autochthonous to the aquatic environment. Although V. cholerae O1 and O139 were isolated from both areas, most noteworthy was the isolation of V. cholerae O139 in March, July, and September 2004 in Mathbaria, where seasonal cholera was clinically linked only to V. cholerae O1. In Mathbaria, V. cholerae O139 emerged as the sole cause of a significant outbreak of cholera in March 2005. V. cholerae O1 reemerged clinically in April 2005 and established dominance over V. cholerae O139, continuing to cause cholera in Mathbaria. In conclusion, the epidemic potential and coastal aquatic reservoir for V. cholerae O139 have been demonstrated. Based on the results of this study, the coastal ecosystem of the Bay of Bengal is concluded to be a significant reservoir for the epidemic serogroups of V. cholerae. VL - 72 SN - 0099-2240, 1098-5336 UR - http://aem.asm.org/content/72/6/4096 CP - 6 M3 - 10.1128/AEM.00066-06 ER - TY - JOUR T1 - Selection of Target Sites for Mobile DNA Integration in the Human Genome JF - PLoS Comput BiolPLoS Comput Biol Y1 - 2006 A1 - Berry,Charles A1 - Hannenhalli, Sridhar A1 - Leipzig,Jeremy A1 - Bushman,Frederic D. AB - DNA sequences from retroviruses, retrotransposons, DNA transposons, and parvoviruses can all become integrated into the human genome. Accumulation of such sequences accounts for at least 40% of our genome today. These integrating elements are also of interest as gene-delivery vectors for human gene therapy. Here we present a comprehensive bioinformatic analysis of integration targeting by HIV, MLV, ASLV, SFV, L1, SB, and AAV. We used a mathematical method which allowed annotation of each base pair in the human genome for its likelihood of hosting an integration event by each type of element, taking advantage of more than 200 types of genomic annotation. This bioinformatic resource documents a wealth of new associations between genomic features and integration targeting. The study also revealed that the length of genomic intervals analyzed strongly affected the conclusions drawn—thus, answering the question “What genomic features affect integration?” requires carefully specifying the length scale of interest. VL - 2 UR - UR - http://dx.plos.org/10.1371/journal.pcbi.0020157,http://dx.plos.org/10.1371/journal.pcbi.0020157 CP - 11 M3 - 10.1371/journal.pcbi.0020157 ER - TY - JOUR T1 - Shared family calendars: Promoting symmetry and accessibility JF - ACM Trans. Comput.-Hum. Interact. Y1 - 2006 A1 - Plaisant, Catherine A1 - Clamage,Aaron A1 - Hutchinson,Hilary Browne A1 - Bederson, Benjamin B. A1 - Druin, Allison KW - calendar KW - digital paper KW - elderly KW - family technology KW - Home KW - layered interface KW - privacy KW - universal usability AB - We describe the design and use of a system facilitating the sharing of calendar information between remotely located, multi-generational family members. Most previous work in this area involves software enabling younger family members to monitor their parents. We have found, however, that older adults are equally if not more interested in the activities of younger family members. The major obstacle preventing them from participating in information sharing is the technology itself. Therefore, we developed a multi-layered interface approach that offers simple interaction to older users. In our system, users can choose to enter information into a computerized calendar or write it by hand on digital paper calendars. All of the information is automatically shared among everyone in the distributed family. By making the interface more accessible to older users, we promote symmetrical sharing of information among both older and younger family members. We present our participatory design process, describe the user interface, and report on an exploratory field study in three households of an extended family. VL - 13 SN - 1073-0516 UR - http://doi.acm.org/10.1145/1183456.1183458 CP - 3 M3 - 10.1145/1183456.1183458 ER - TY - CONF T1 - A Statistical Analysis of Attack Data to Separate Attacks Y1 - 2006 A1 - Michel Cukier A1 - Berthier,R. A1 - Panjwani,S. A1 - Tan,S. KW - attack data statistical analysis KW - attack separation KW - computer crime KW - Data analysis KW - data mining KW - ICMP scans KW - K-Means algorithm KW - pattern clustering KW - port scans KW - statistical analysis KW - vulnerability scans AB - This paper analyzes malicious activity collected from a test-bed, consisting of two target computers dedicated solely to the purpose of being attacked, over a 109 day time period. We separated port scans, ICMP scans, and vulnerability scans from the malicious activity. In the remaining attack data, over 78% (i.e., 3,677 attacks) targeted port 445, which was then statistically analyzed. The goal was to find the characteristics that most efficiently separate the attacks. First, we separated the attacks by analyzing their messages. Then we separated the attacks by clustering characteristics using the K-Means algorithm. The comparison between the analysis of the messages and the outcome of the K-Means algorithm showed that 1) the mean of the distributions of packets, bytes and message lengths over time are poor characteristics to separate attacks and 2) the number of bytes, the mean of the distribution of bytes and message lengths as a function of the number packets are the best characteristics for separating attacks M3 - 10.1109/DSN.2006.9 ER - TY - CHAP T1 - A Step Towards Automated Design of Side Actions in Injection Molding of Complex Parts T2 - Geometric Modeling and Processing - GMP 2006 Y1 - 2006 A1 - Banerjee,Ashis A1 - Gupta, Satyandra K. ED - Kim,Myung-Soo ED - Shimada,Kenji KW - Computer science AB - Side actions contribute to mold cost by resulting in an additional manufacturing and assembly cost as well as by increasing the molding cycle time. Therefore, generating shapes of side actions requires solving a complex geometric optimization problem. Different objective functions may be needed depending upon different molding scenarios (e.g., prototyping versus large production runs). Manually designing side actions is a challenging task and requires considerable expertise. Automated design of side actions will significantly reduce mold design lead times. This paper describes algorithms for generating shapes of side actions to minimize a customizable molding cost function. JA - Geometric Modeling and Processing - GMP 2006 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 4077 SN - 978-3-540-36711-6 UR - http://www.springerlink.com/content/w7q3212607500635/abstract/ ER - TY - BOOK T1 - System synthesis for optically-connected, multiprocessors on-chip Y1 - 2006 A1 - Bambha,N. K A1 - Bhattacharyya, Shuvra S. A1 - STUDIES,MARYLAND UNIV COLLEGE PARK INST FOR ADVANCED COMPUTER PB - Citeseer ER - TY - CONF T1 - Target size study for one-handed thumb use on small touchscreen devices T2 - Proceedings of the 8th conference on Human-computer interaction with mobile devices and services Y1 - 2006 A1 - Parhi,P. A1 - Karlson,A.K. A1 - Bederson, Benjamin B. JA - Proceedings of the 8th conference on Human-computer interaction with mobile devices and services ER - TY - JOUR T1 - Toward an enriched (and revitalized) sense of help: Summary of an ASIS&T 2005 panel session JF - Bulletin of the American Society for Information Science and Technology Y1 - 2006 A1 - Haas,Stephanie W A1 - Denn,Sheila A1 - Locke,David A1 - Shneiderman, Ben A1 - Brown,Laurie VL - 32 SN - 1550-8366 UR - http://onlinelibrary.wiley.com/doi/10.1002/bult.2006.1720320509/abstract CP - 5 M3 - 10.1002/bult.2006.1720320509 ER - TY - JOUR T1 - TreePlus: Interactive Exploration of Networks with Enhanced Tree Layouts JF - Visualization and Computer Graphics, IEEE Transactions on Y1 - 2006 A1 - Lee,B. A1 - Parr,C.S. A1 - Plaisant, Catherine A1 - Bederson, Benjamin B. A1 - Veksler,V.D. A1 - Gray,W.D. A1 - Kotfila,C. KW - Automated;Software;User-Computer Interface; KW - Biological;Pattern Recognition KW - data visualization;graph structure;graphical user interface;interactive visual analytics;occlusion;tree-style layout;data visualisation;graphical user interfaces;hidden feature removal;interactive systems;trees (mathematics);Algorithms;Computer Graphics;C AB - Despite extensive research, it is still difficult to produce effective interactive layouts for large graphs. Dense layout and occlusion make food Webs, ontologies and social networks difficult to understand and interact with. We propose a new interactive visual analytics component called TreePlus that is based on a tree-style layout. TreePlus reveals the missing graph structure with visualization and interaction while maintaining good readability. To support exploration of the local structure of the graph and gathering of information from the extensive reading of labels, we use a guiding metaphor of "plant a seed and watch it grow." It allows users to start with a node and expand the graph as needed, which complements the classic overview techniques that can be effective at (but often limited to) revealing clusters. We describe our design goals, describe the interface and report on a controlled user study with 28 participants comparing TreePlus with a traditional graph interface for six tasks. In general, the advantage of TreePlus over the traditional interface increased as the density of the displayed data increased. Participants also reported higher levels of confidence in their answers with TreePlus and most of them preferred TreePlus VL - 12 SN - 1077-2626 CP - 6 M3 - 10.1109/TVCG.2006.106 ER - TY - JOUR T1 - The Trypanosoma cruzi L1Tc and NARTc non-LTR retrotransposons show relative site specificity for insertion JF - Molecular biology and evolution Y1 - 2006 A1 - Bringaud,F. A1 - Bartholomeu,D. C A1 - Blandin,G. A1 - Delcher,A. A1 - Baltz,T. A1 - El‐Sayed, Najib M. A1 - Ghedin,E. VL - 23 CP - 2 ER - TY - JOUR T1 - Using PlanetLab for network research JF - ACM SIGOPS Operating Systems Review Y1 - 2006 A1 - Spring, Neil A1 - Peterson,Larry A1 - Bavier,Andy A1 - Pait,Vivek VL - 40 SN - 01635980 UR - http://dl.acm.org/citation.cfm?id=1113368 M3 - 10.1145/1113361.1113368 ER - TY - CHAP T1 - Video Mensuration Using a Stationary Camera T2 - Computer Vision – ECCV 2006Computer Vision – ECCV 2006 Y1 - 2006 A1 - Guo,Feng A1 - Chellapa, Rama ED - Leonardis,Aleš ED - Bischof,Horst ED - Pinz,Axel AB - This paper presents a method for video mensuration using a single stationary camera. The problem we address is simple, i.e., the mensuration of any arbitrary line segment on the reference plane using multiple frames with minimal calibration. Unlike previous solutions that are based on planar rectification, our approach is based on fitting the image of multiple concentric circles on the plane. Further, the proposed method aims to minimize the error in mensuration. Hence we can calculate the mensuration of the line segments not lying on the reference plane. Using an algorithm for detecting and tracking wheels of an automobile, we have implemented a fully automatic system for wheel base mensuration. The mensuration results are accurate enough that they can be used to determine the vehicle classes. Furthermore, we measure the line segment between any two points on the vehicle and plot them in top and side views. JA - Computer Vision – ECCV 2006Computer Vision – ECCV 2006 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 3953 SN - 978-3-540-33836-9 UR - http://dx.doi.org/10.1007/11744078_13 ER - TY - JOUR T1 - View-invariant estimation of height and stride for gait recognition JF - Biometric Authentication Y1 - 2006 A1 - BenAbdelkader,C. A1 - Cutler, R. A1 - Davis, Larry S. AB - We present a parametric method to automatically identify people in monocular low-resolution video by estimating the height and stride parameters of their walking gait. Stride parameters (stride length and cadence) are functions of body height, weight, and gender. Previous work has demonstrated effective use of these biometrics for identification and verification of people. In this paper, we show that performance is significantly improved by using height as an additional discriminant feature. Height is estimated by robustly segmenting the person from the background and fitting their apparent height to a time-dependent model. This method is correspondence-free and works with low-resolution images of people. It is also view-invariant, albeit performance is optimal in near fronto-parallel configurations. Identification accuracy is estimated at 47% for fronto-parallel sequences of 41 people, and 65% for non-fronto-parallel sequences of 17 people, compared with 18% and 51%, respectively, when only stride and cadence are used. ER - TY - CONF T1 - Visualization Support for Fusing Relational, Spatio-Temporal Data: Building Career Histories T2 - Information Fusion, 2006 9th International Conference on Y1 - 2006 A1 - Blythe,Jim A1 - Patwardhan,Mithila A1 - Oates,Tim A1 - desJardins, Marie A1 - Rheingans,Penny AB - Many real-world domains resist analysis because they are best characterized by a variety of data types, including relational, spatial, and temporal components. Examples of such domains include disease outbreaks, criminal networks, and the World-Wide Web. We present two types of visualizations based on physical metaphors that facilitate fusion, analysis, and deep understanding of relational, spatio-temporal data. The first visualization is based on the metaphor of fluid flow through elastic pipes, and the second on wave propagation. We discuss both types of visualizations in the context of fusing information about the activities of scientists over time with the goal of constructing career histories JA - Information Fusion, 2006 9th International Conference on PB - IEEE SN - 1-4244-0953-5, 0-9721844-6-5 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4086058 M3 - 10.1109/ICIF.2006.301772 ER - TY - CHAP T1 - Visualizing Graphs as Trees: Plant a Seed and Watch it Grow T2 - Graph DrawingGraph Drawing Y1 - 2006 A1 - Lee,Bongshin A1 - Parr,Cynthia A1 - Plaisant, Catherine A1 - Bederson, Benjamin B. ED - Healy,Patrick ED - Nikolov,Nikola AB - TreePlus is a graph browsing technique based on a tree-style layout. It shows the missing graph structure using interaction techniques and enables users to start with a specific node and incrementally explore the local structure of graphs. We believe that it supports particularly well tasks that require rapid reading of labels. JA - Graph DrawingGraph Drawing T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 3843 SN - 978-3-540-31425-7 UR - http://dx.doi.org/10.1007/11618058_50 ER - TY - JOUR T1 - VoIP deregulation in South Africa: Implications for underserviced areas JF - Telecommunications Policy Y1 - 2006 A1 - Marshini Chetty A1 - Blake, Edwin A1 - McPhie, Ewan KW - South Africa KW - VoIP KW - WiFi AB - Several statutory restrictions have recently been lifted on the use of Voice over Internet Protocol (VoIP) in South Africa. Previously, VoIP could only be utilised by the incumbent telecommunications operator, Telkom, the Second National Operator (SNO) and under serviced area licensees (USALs). This means new opportunities and cost savings for both network service providers and consumers. However, in rural and remote regions, further liberalisation is required so that service providers can take advantage of wireless technologies to provide connectivity in these areas. This paper discusses the legislative environment in South Africa and around the world with respect to VoIP and Wireless Fidelity (WiFi). In addition, examples are provided of how these technologies have been combined to provide last mile solutions around the world and particularly in South Africa. The paper concludes that further liberalisation in the telecommunications environment in South Africa is required if the goal of providing affordable access in rural areas is to be attained. Specifically, it is recommended that wireless technologies be deregulated since the combination of VoIP and WiFi may benefit rural areas. Also, the paper finds that USALs may not be the right model for underserviced areas in South Africa. Lastly, it is apparent that applications drive development and dictate which technologies are relevant for rural areas. VL - 30 SN - 0308-5961 UR - http://www.sciencedirect.com/science/article/pii/S0308596106000231 CP - 5–6 J1 - Telecommunications Policy ER - TY - CHAP T1 - Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm T2 - Computer Vision – ECCV 2006Computer Vision – ECCV 2006 Y1 - 2006 A1 - Hui Ji A1 - Fermüller, Cornelia ED - Leonardis,Aleš ED - Bischof,Horst ED - Pinz,Axel AB - We present a theoretical analysis and a new algorithm for the problem of super-resolution imaging: the reconstruction of HR (high-resolution) images from a sequence of LR (low-resolution) images. Super-resolution imaging entails solutions to two problems. One is the alignment of image frames. The other is the reconstruction of a HR image from multiple aligned LR images. Our analysis of the latter problem reveals insights into the theoretical limits of super-resolution reconstruction. We find that at best we can reconstruct a HR image blurred by a specific low-pass filter. Based on the analysis we present a new wavelet-based iterative reconstruction algorithm which is very robust to noise. Furthermore, it has a computationally efficient built-in denoising scheme with a nearly optimal risk bound. Roughly speaking, our method could be described as a better-conditioned iterative back-projection scheme with a fast and optimal regularization criteria in each iteration step. Experiments with both simulated and real data demonstrate that our approach has significantly better performance than existing super-resolution methods. It has the ability to remove even large amounts of mixed noise without creating smoothing artifacts. JA - Computer Vision – ECCV 2006Computer Vision – ECCV 2006 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 3954 SN - 978-3-540-33838-3 UR - http://dx.doi.org/10.1007/11744085_23 ER - TY - CHAP T1 - What Is the Range of Surface Reconstructions from a Gradient Field? T2 - Computer Vision – ECCV 2006Computer Vision – ECCV 2006 Y1 - 2006 A1 - Agrawal,Amit A1 - Raskar,Ramesh A1 - Chellapa, Rama ED - Leonardis,Aleš ED - Bischof,Horst ED - Pinz,Axel AB - We propose a generalized equation to represent a continuum of surface reconstruction solutions of a given non-integrable gradient field. We show that common approaches such as Poisson solver and Frankot-Chellappa algorithm are special cases of this generalized equation. For a N × N pixel grid, the subspace of all integrable gradient fields is of dimension N 2 – 1. Our framework can be applied to derive a range of meaningful surface reconstructions from this high dimensional space. The key observation is that the range of solutions is related to the degree of anisotropy in applying weights to the gradients in the integration process. While common approaches use isotropic weights, we show that by using a progression of spatially varying anisotropic weights, we can achieve significant improvement in reconstructions. We propose (a) α-surfaces using binary weights, where the parameter α allows trade off between smoothness and robustness, (b) M-estimators and edge preserving regularization using continuous weights and (c) Diffusion using affine transformation of gradients. We provide results on photometric stereo, compare with previous approaches and show that anisotropic treatment discounts noise while recovering salient features in reconstructions. JA - Computer Vision – ECCV 2006Computer Vision – ECCV 2006 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 3951 SN - 978-3-540-33832-1 UR - http://dx.doi.org/10.1007/11744023_45 ER - TY - JOUR T1 - Widgets, Planets, and Demons: the Case for the Integration of Human, Embedded, and Virtual Agents via Mediation JF - Proceedings of Swarmfest Y1 - 2006 A1 - Rand, William A1 - Blikstein,P. A1 - Wilensky,U. ER - TY - CHAP T1 - 3D Facial Pose Tracking in Uncalibrated Videos T2 - Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence Y1 - 2005 A1 - Aggarwal,Gaurav A1 - Veeraraghavan,Ashok A1 - Chellapa, Rama ED - Pal,Sankar ED - Bandyopadhyay,Sanghamitra ED - Biswas,Sambhunath AB - This paper presents a method to recover the 3D configuration of a face in each frame of a video. The 3D configuration consists of the 3 translational parameters and the 3 orientation parameters which correspond to the yaw, pitch and roll of the face, which is important for applications like face modeling, recognition, expression analysis, etc. The approach combines the structural advantages of geometric modeling with the statistical advantages of a particle-filter based inference. The face is modeled as the curved surface of a cylinder which is free to translate and rotate arbitrarily. The geometric modeling takes care of pose and self-occlusion while the statistical modeling handles moderate occlusion and illumination variations. Experimental results on multiple datasets are provided to show the efficacy of the approach. The insensitivity of our approach to calibration parameters (focal length) is also shown. JA - Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 3776 SN - 978-3-540-30506-4 UR - http://dx.doi.org/10.1007/11590316_81 ER - TY - JOUR T1 - Algorithm 844: Computing sparse reduced-rank approximations to sparse matrices JF - ACM Transactions on Mathematical Software-TOMS Y1 - 2005 A1 - Berry,M. W A1 - Pulatova,S. A A1 - Stewart, G.W. VL - 31 CP - 2 ER - TY - CONF T1 - An architectural level design methodology for embedded face detection T2 - Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis Y1 - 2005 A1 - Kianzad,V. A1 - Saha,S. A1 - Schlessman,J. A1 - Aggarwal,G. A1 - Bhattacharyya, Shuvra S. A1 - Wolf,W. A1 - Chellapa, Rama KW - design space exploration KW - Face detection KW - platforms KW - reconfigurable KW - system-level models AB - Face detection and recognition research has attracted great attention in recent years. Automatic face detection has great potential in a large array of application areas, including banking and security system access control, video surveillance, and multimedia information retrieval. In this paper, we discuss an architectural level design methodology for implementation of an embedded face detection system on a reconfigurable system on chip. We present models for performance estimation and validate these models with experimental values obtained from implementing our system on an FPGA platform. This modeling approach is shown to be efficient, accurate, and intuitive for designers to work with. Using this approach, we present several design options that trade-off various architectural features. JA - Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis T3 - CODES+ISSS '05 PB - ACM CY - New York, NY, USA SN - 1-59593-161-9 UR - http://doi.acm.org/10.1145/1084834.1084872 M3 - 10.1145/1084834.1084872 ER - TY - JOUR T1 - Asymptotically Optimal Quantum Circuits for d-Level Systems JF - Physical Review LettersPhys. Rev. Lett. Y1 - 2005 A1 - Bullock,Stephen S. A1 - O’Leary,Dianne P. A1 - Brennen,Gavin K. AB - Scalability of a quantum computation requires that the information be processed on multiple subsystems. However, it is unclear how the complexity of a quantum algorithm, quantified by the number of entangling gates, depends on the subsystem size. We examine the quantum circuit complexity for exactly universal computation on many d-level systems (qudits). Both a lower bound and a constructive upper bound on the number of two-qudit gates result, proving a sharp asymptotic of Θ(d2n) gates. This closes the complexity question for all d-level systems (d finite). The optimal asymptotic applies to systems with locality constraints, e.g., nearest neighbor interactions. VL - 94 UR - http://link.aps.org/doi/10.1103/PhysRevLett.94.230502 CP - 23 M3 - 10.1103/PhysRevLett.94.230502 ER - TY - CONF T1 - Average relative radiance transform for subpixel detection T2 - Geoscience and Remote Sensing Symposium, 2005. IGARSS '05. Proceedings. 2005 IEEE International Y1 - 2005 A1 - Broadwater, J. A1 - Meth, R. A1 - Chellapa, Rama JA - Geoscience and Remote Sensing Symposium, 2005. IGARSS '05. Proceedings. 2005 IEEE International VL - 5 M3 - 10.1109/IGARSS.2005.1526617 ER - TY - JOUR T1 - Building a Coherent Data Pipeline in Microarray Data Analyses: Optimization of Signal/Noise Ratios Using an Interactive Visualization Tool and a Novel Noise Filtering Method (2003) JF - Institute for Systems Research Technical Reports Y1 - 2005 A1 - Seo,Jinwook A1 - Bakay,Marina A1 - Chen,Yi-Wen A1 - Hilmer,Sara A1 - Shneiderman, Ben A1 - Hoffman,Eric P KW - Technical Report AB - Motivation: Sources of uncontrolled noise strongly influence data analysis in microarray studies, yet signal/noise ratios are rarely considered in microarray data analyses. We hypothesized that different research projects would have different sources and levels of confounding noise, and built an interactive visual analysis tool to test and define parameters in Affymetrix analyses that optimize the ratio of signal (desired biological variable) versus noise (confounding uncontrolled variables). Results: Five probe set algorithms were studied with and without statistical weighting of probe sets using Microarray Suite (MAS) 5.0 probe set detection p values. The signal/noise optimization method was tested in two large novel microarray datasets with different levels of confounding noise; a 105 sample U133A human muscle biopsy data set (11 groups) (extensive noise), and a 40 sample U74A inbred mouse lung data set (8 groups) (little noise). Success was measured using F-measure value of success of unsupervised clustering into appropriate biological groups (signal). We show that both probe set signal algorithm and probe set detection p-value weighting have a strong effect on signal/noise ratios, and that the different methods performed quite differently in the two data sets. Among the signal algorithms tested, dChip difference model with p-value weighting was the most consistent at maximizing the effect of the target biological variables on data interpretation of the two data sets. Availability: The Hierarchical Clustering Explorer 2.0 is [url=http://www.cs.umd.edu/hcil/hce/]available[/url] online and the improved version of the Hierarchical Clustering Explorer 2.0 with p-value weighting and Fmeasure is available upon request to the first author. Murine arrays (40 samples) are publicly available at the [url=http://microarray.cnmcresearch.org/pgadatatable.asp]PEPR resource.[/url] (Chen et al., 2004). UR - http://drum.lib.umd.edu/handle/1903/6511 ER - TY - CONF T1 - Capital and benefit in social networks T2 - Proceedings of the 3rd international workshop on Link discovery Y1 - 2005 A1 - Licamele,Louis A1 - Bilgic,Mustafa A1 - Getoor, Lise A1 - Roussopoulos, Nick AB - Recently there has been a surge of interest in social networks. Email traffic, disease transmission, and criminal activity can all be modeled as social networks. In this paper, we introduce a particular form of social network which we call a friendship-event network. A friendship-event network describes two inter-related networks. One is a friendship network among a set of actors. The other is an event network that describes events, event organizers and event participants. Within these types of networks, we formulate the notion of capital based on the actor-organizer friendship relationship and the notion of benefit, based on event participation. We ground these definitions in a real-world example of academic collaboration networks, where the actors are researchers, the friendships are collaborations, the events are conferences, the organizers are program committee members and the participants are conference authors. We incorporate a temporal component by considering the notion of an event series. We explore the use of these measures on a data set describing three computer science conferences over the past ten years. JA - Proceedings of the 3rd international workshop on Link discovery T3 - LinkKDD '05 PB - ACM CY - New York, NY, USA SN - 1-59593-215-1 UR - http://doi.acm.org/10.1145/1134271.1134278 M3 - 10.1145/1134271.1134278 ER - TY - CONF T1 - CASPER: an integrated energy-driven approach for task graph scheduling on distributed embedded systems T2 - Application-Specific Systems, Architecture Processors, 2005. ASAP 2005. 16th IEEE International Conference on Y1 - 2005 A1 - Kianzad,V. A1 - Bhattacharyya, Shuvra S. A1 - Gang Qu KW - CASPER KW - combined-assignment-scheduling-and-power-management KW - computational complexity KW - distributed system KW - dynamic voltage scaling KW - embedded systems KW - energy reduction KW - genetic algorithm KW - Genetic algorithms KW - graph theory KW - homogeneous multiprocessor system KW - maximal energy saving KW - Multiprocessing systems KW - multiprocessor embedded system KW - optimization loop KW - power management KW - power variation KW - Processor scheduling KW - slack distribution algorithm KW - task assignment KW - task graph scheduling AB - For multiprocessor embedded systems, the dynamic voltage scaling (DVS) technique can be applied to scheduled applications for energy reduction. DVS utilizes slack in the schedule to slow down processes and save energy. Therefore, it is generally believed that the maximal energy saving is achieved on a schedule with the minimum makespan (maximal slack). Most current approaches treat task assignment, scheduling, and DVS separately. In this paper, we present a framework called CASPER (combined assignment, scheduling, and power-management) that challenges this common belief by integrating task scheduling and DVS under a single iterative optimization loop via genetic algorithm. We have conducted extensive experiments to validate the energy efficiency of CASPER. For homogeneous multiprocessor systems (in which all processors are of the same type), we consider a recently proposed slack distribution algorithm (PDP-SPM) by S. Hua and G. Qu (2005): applying PDP-SPM on the schedule with the minimal makespan gives an average of 53.8% energy saving; CASPER finds schedules with slightly larger makespan but a 57.3% energy saving, a 7.8% improvement. For heterogeneous systems, we consider the power variation DVS (PV-DVS) algorithm by Schmitz et al. (2004), CASPER improves its energy efficiency by 8.2%. Finally, our results also show that the proposed single loop CASPER framework saves 23.3% more energy over GMA+EE-GLSA by Schmitz et al. (2002), the only other known integrated approach with a nested loop that combines scheduling and power management in the inner loop but leaves assignment in the outer loop. JA - Application-Specific Systems, Architecture Processors, 2005. ASAP 2005. 16th IEEE International Conference on M3 - 10.1109/ASAP.2005.23 ER - TY - CONF T1 - Combining self-reported and automatic data to improve programming effort measurement T2 - Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering Y1 - 2005 A1 - Hochstein, Lorin A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V A1 - Hollingsworth, Jeffrey K A1 - Carver, Jeff KW - effort KW - experimentation KW - human factors KW - manual approaches KW - measurement KW - process metrics KW - verification AB - Measuring effort accurately and consistently across subjects in a programming experiment can be a surprisingly difficult task. In particular, measures based on self-reported data may differ significantly from measures based on data which is recorded automatically from a subject's computing environment. Since self-reports can be unreliable, and not all activities can be captured automatically, a complete measure of programming effort should incorporate both classes of data. In this paper, we show how self-reported and automatic effort can be combined to perform validation and to measure total programming effort. JA - Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering T3 - ESEC/FSE-13 PB - ACM CY - Lisbon, Portugal SN - 1-59593-014-0 M3 - 10.1145/1081706.1081762 ER - TY - JOUR T1 - Comparative Genomics of Trypanosomatid Parasitic Protozoa JF - Science Y1 - 2005 A1 - El‐Sayed, Najib M. A1 - Myler,Peter J. A1 - Blandin,Gaëlle A1 - Berriman,Matthew A1 - Crabtree,Jonathan A1 - Aggarwal,Gautam A1 - Caler,Elisabet A1 - Renauld,Hubert A1 - Worthey,Elizabeth A. A1 - Hertz-Fowler,Christiane A1 - Ghedin,Elodie A1 - Peacock,Christopher A1 - Bartholomeu,Daniella C. A1 - Haas,Brian J. A1 - Tran,Anh-Nhi A1 - Wortman,Jennifer R. A1 - Alsmark,U. Cecilia M. A1 - Angiuoli,Samuel A1 - Anupama,Atashi A1 - Badger,Jonathan A1 - Bringaud,Frederic A1 - Cadag,Eithon A1 - Carlton,Jane M. A1 - Cerqueira,Gustavo C. A1 - Creasy,Todd A1 - Delcher,Arthur L. A1 - Djikeng,Appolinaire A1 - Embley,T. Martin A1 - Hauser,Christopher A1 - Ivens,Alasdair C. A1 - Kummerfeld,Sarah K. A1 - Pereira-Leal,Jose B. A1 - Nilsson,Daniel A1 - Peterson,Jeremy A1 - Salzberg,Steven L. A1 - Shallom,Joshua A1 - Silva,Joana C. A1 - Sundaram,Jaideep A1 - Westenberger,Scott A1 - White,Owen A1 - Melville,Sara E. A1 - Donelson,John E. A1 - Andersson,Björn A1 - Stuart,Kenneth D. A1 - Hall,Neil AB - A comparison of gene content and genome architecture of Trypanosoma brucei, Trypanosoma cruzi, and Leishmania major, three related pathogens with different life cycles and disease pathology, revealed a conserved core proteome of about 6200 genes in large syntenic polycistronic gene clusters. Many species-specific genes, especially large surface antigen families, occur at nonsyntenic chromosome-internal and subtelomeric regions. Retroelements, structural RNAs, and gene family expansion are often associated with syntenic discontinuities that—along with gene divergence, acquisition and loss, and rearrangement within the syntenic regions—have shaped the genomes of each parasite. Contrary to recent reports, our analyses reveal no evidence that these species are descended from an ancestor that contained a photosynthetic endosymbiont. VL - 309 UR - http://www.sciencemag.org/content/309/5733/404.abstract CP - 5733 M3 - 10.1126/science.1112181 ER - TY - CONF T1 - Computer vision on FPGAs: Design methodology and its application to gesture recognition T2 - Computer Vision and Pattern Recognition-Workshops, 2005. CVPR Workshops. IEEE Computer Society Conference on Y1 - 2005 A1 - Sen,M. A1 - Corretjer,I. A1 - Haim,F. A1 - Saha,S. A1 - Bhattacharyya, Shuvra S. A1 - Schlessman,J. A1 - Wolf,W. JA - Computer Vision and Pattern Recognition-Workshops, 2005. CVPR Workshops. IEEE Computer Society Conference on ER - TY - JOUR T1 - Content Index to Volume 18 JF - INTERNATIONAL JOURNAL OF HUMAN–COMPUTER INTERACTION Y1 - 2005 A1 - Kuniavsky,M. A1 - Vaughan,M. A1 - Bederson, Benjamin B. A1 - Shneiderman, Ben A1 - Rau,P.L.P. A1 - from Menus,T. A1 - Lane,D.M. A1 - Napier,H.A. A1 - Peres,S.C. A1 - Sándor,A. VL - 18 CP - 3 ER - TY - CONF T1 - Correctness properties for Internet routing T2 - Allerton Conference on Communication, Control, and Computing Y1 - 2005 A1 - Feamster, Nick A1 - Balakrishnan,H. AB - This paper motivates and presents a correctness specifi-cation for Internet routing. This specification is based on three properties—route validity, path visibility, and safety. This specification may be of use to people de- veloping tools to check routing configurations, to people designing solutions to specific problems in the current sys- tem, and to designers of new protocols and routing archi- tectures, all of whom can benefit from knowing what it means for Internet routing to be “correct”. JA - Allerton Conference on Communication, Control, and Computing ER - TY - JOUR T1 - Criteria for exact qudit universality JF - Physical Review APhys. Rev. A Y1 - 2005 A1 - Brennen,Gavin K. A1 - O’Leary,Dianne P. A1 - Bullock,Stephen S. AB - We describe criteria for implementation of quantum computation in qudits. A qudit is a d-dimensional system whose Hilbert space is spanned by states ∣0⟩, ∣1⟩, …, ∣d−1⟩. An important earlier work [ A. Muthukrishnan and C.R. Stroud, Jr. Phys. Rev. A 62 052309 (2000)] describes how to exactly simulate an arbitrary unitary on multiple qudits using a 2d−1 parameter family of single qudit and two qudit gates. That technique is based on the spectral decomposition of unitaries. Here we generalize this argument to show that exact universality follows given a discrete set of single qudit Hamiltonians and one two-qudit Hamiltonian. The technique is related to the QR-matrix decomposition of numerical linear algebra. We consider a generic physical system in which the single qudit Hamiltonians are a small collection of Hjkx=ℏΩ(∣k⟩⟨j∣+∣j⟩⟨k∣) and Hjky=ℏΩ(i∣k⟩⟨j∣−i∣j⟩⟨k∣). A coupling graph results taking nodes 0, …, d−1 and edges j↔k iff Hjkx,y are allowed Hamiltonians. One qudit exact universality follows iff this graph is connected, and complete universality results if the two-qudit Hamiltonian H=ℏΩ∣d−1,d−1⟩⟨d−1,d−1∣ is also allowed. We discuss implementation in the eight dimensional ground electronic states of 87Rb and construct an optimal gate sequence using Raman laser pulses. VL - 71 UR - http://link.aps.org/doi/10.1103/PhysRevA.71.052318 CP - 5 M3 - 10.1103/PhysRevA.71.052318 ER - TY - CONF T1 - Data Redistribution and Remote Method Invocation in Parallel Component Architectures T2 - Parallel and Distributed Processing Symposium, International Y1 - 2005 A1 - Bertrand,Felipe A1 - Bramley,Randall A1 - Sussman, Alan A1 - Bernholdt,David E. A1 - Kohl,James A. A1 - Larson,Jay W. A1 - Damevski,Kostadin B. AB - With the increasing availability of high-performance massively parallel computer systems, the prevalence of sophisticated scientific simulation has grown rapidly. The complexity of the scientific models being simulated has also evolved, leading to a variety of coupled multi-physics simulation codes. Such cooperating parallel programs require fundamentally new interaction capabilities, to efficiently exchange parallel data structures and collectively invoke methods across programs. So-called "M?N" research, as part of the Common Component Architecture (CCA) effort, addresses these special and challenging needs, to provide generalized interfaces and tools that support flexible parallel data redistribution and parallel remote method invocation. Using this technology, distinct simulation codes with disparate distributed data decompositions can work together to achieve greater scientific discoveries. JA - Parallel and Distributed Processing Symposium, International PB - IEEE Computer Society CY - Los Alamitos, CA, USA VL - 1 M3 - http://doi.ieeecomputersociety.org/10.1109/IPDPS.2005.159 ER - TY - CONF T1 - Detecting BGP configuration faults with static analysis T2 - Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2 Y1 - 2005 A1 - Feamster, Nick A1 - Balakrishnan,Hari AB - The Internet is composed of many independent autonomous systems (ASes) that exchange reachability information to destinations using the Border Gateway Protocol (BGP). Network operators in each AS configure BGP routers to control the routes that are learned, selected, and announced to other routers. Faults in BGP configuration can cause forwarding loops, packet loss, and unintended paths between hosts, each of which constitutes a failure of the Internet routing infrastructure. This paper describes the design and implementation of rcc, the router configuration checker, a tool that finds faults in BGP configurations using static analysis. rcc detects faults by checking constraints that are based on a high-level correctness specification. rcc detects two broad classes of faults: route validity faults, where routers may learn routes that do not correspond to usable paths, and path visibility faults, where routers may fail to learn routes for paths that exist in the network. rcc enables network operators to test and debug configurations before deploying them in an operational network, improving on the status quo where most faults are detected only during operation. rcc has been downloaded by more than sixty-five network operators to date, some of whom have shared their configurations with us. We analyze network-wide configurations from 17 different ASes to detect a wide variety of faults and use these findings to motivate improvements to the Internet routing infrastructure. JA - Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2 T3 - NSDI'05 PB - USENIX Association CY - Berkeley, CA, USA UR - http://dl.acm.org/citation.cfm?id=1251203.1251207 ER - TY - RPRT T1 - Determining Causes and Severity of End-User Frustration (2002) Y1 - 2005 A1 - Ceaparu,Irina A1 - Lazar,Jonathan A1 - Bessiere,Katie A1 - Robinson,John A1 - Shneiderman, Ben KW - Technical Report AB - While computers are beneficial to individuals and society, frequently, users encounter frustrating experiences when using computers. This study attempts to measure, through 111 participants, the frequency, cause, and the level of severity of frustrating experiences. The data showed that frustrating experiences happen on a frequent basis. The applications in which the frustrating experiences happened most frequently were web browsing, e-mail, and word processing. The most-cited causes of frustrating experiences were error messages, dropped network connections, long download times, and hard-to-find features. The time lost due to frustrating experiences ranged from 47-53% of time spent on a computer depending on the location and study method. After discarding extreme cases the time lost was still above 38%. These disturbing results should be a basis for future study. JA - Institute for Systems Research Technical Reports UR - http://drum.lib.umd.edu/handle/1903/6493 ER - TY - CONF T1 - Differentiated traffic engineering for QoS provisioning T2 - INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE Y1 - 2005 A1 - Tabatabaee,V. A1 - Bhattacharjee, Bobby A1 - La,R.J. A1 - Shayman,M.A. KW - based KW - Computer KW - differentiated KW - DiffServ KW - DTE; KW - engineering; KW - evaluation; KW - link; KW - links; KW - management; KW - multipath KW - network KW - networks; KW - nonconvex KW - of KW - optimisation; KW - OPTIMIZATION KW - packet KW - performance KW - problem; KW - provisioning; KW - QoS KW - QUALITY KW - routing; KW - service; KW - simulation-based KW - source KW - Telecommunication KW - traffic KW - traffic; AB - We introduce a new approach for QoS provisioning in packet networks based on the notion of differentiated traffic engineering (DTE). We consider a single AS network capable of source based multi-path routing. We do not require sophisticated queuing or per-class scheduling at individual routers; instead, if a link is used to forward QoS sensitive packets, we maintain its utilization below a threshold. As a consequence, DTE eliminates the need for per-flow (IntServ) or per-class (DiffServ) packet processing tasks such as traffic classification, queueing, shaping, policing and scheduling in the core and hence poses a lower burden on the network management unit. Conversely, DTE utilizes network bandwidth much more efficiently than simple over-provisioning. In this paper, we propose a complete architecture and an algorithmic structure for DTE. We show that our scheme can be formulated as a non-convex optimization problem, and we present an optimal solution framework based on simulated annealing. We present a simulation-based performance evaluation of DTE, and compare our scheme to existing (gradient projection) methods. JA - INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE VL - 4 M3 - 10.1109/INFCOM.2005.1498521 ER - TY - CONF T1 - DSP address optimization using evolutionary algorithms T2 - Proceedings of the 2005 workshop on Software and compilers for embedded systems Y1 - 2005 A1 - Leventhal,S. A1 - Yuan,L. A1 - Bambha,N. K A1 - Bhattacharyya, Shuvra S. A1 - Qu,G. JA - Proceedings of the 2005 workshop on Software and compilers for embedded systems ER - TY - CONF T1 - Dynamic configuration of dataflow graph topology for DSP system design T2 - Proc. of the Int. Conf. on Acoustics, Speech, and Signal Processing Y1 - 2005 A1 - Ko,D. I A1 - Bhattacharyya, Shuvra S. JA - Proc. of the Int. Conf. on Acoustics, Speech, and Signal Processing ER - TY - RPRT T1 - Dynamic Querying for Pattern Identification in Microarray and Genomic Data (2003) Y1 - 2005 A1 - Hochheiser,Harry A1 - Baehrecke,Eric H A1 - Mount, Stephen M. A1 - Shneiderman, Ben KW - Technical Report AB - Data sets involving linear ordered sequences are a recurring theme in bioinformatics. Dynamic query tools that support exploration of these data sets can be useful for identifying patterns of interest. This paper describes the use of one such tool TimeSearcher - to interactively explore linear sequence data sets taken from two bioinformatics problems. Microarray time course data sets involve expression levels for large numbers of genes over multiple time points. TimeSearcher can be used to interactively search these data sets for genes with expression profiles of interest. The occurrence frequencies of short sequences of DNA in aligned exons can be used to identify sequences that play a role in the pre-mRNA splicing. TimeSearcher can be used to search these data sets for candidate splicing signals. JA - Institute for Systems Research Technical Reports UR - http://drum.lib.umd.edu/handle/1903/6503 ER - TY - CONF T1 - Efficient geographic routing in multihop wireless networks T2 - Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing Y1 - 2005 A1 - Lee,Seungjoon A1 - Bhattacharjee, Bobby A1 - Banerjee,Suman KW - Geographic routing KW - Link cost estimation KW - Routing metric KW - Wireless multihop networks AB - We propose a new link metric called normalized advance (NADV) for geographic routing in multihop wireless networks. NADV selects neighbors with the optimal trade-off between proximity and link cost. Coupled with the local next hop decision in geographic routing, NADV enables an adaptive and efficient cost-aware routing strategy. Depending on the objective or message priority, applications can use the NADV framework to minimize various types of link cost.We present efficient methods for link cost estimation and perform detailed simulations in diverse scenarios. Our results show that NADV outperforms current schemes in many aspects: for example, in high noise environments with frequent packet losses, the use of NADV leads to 81% higher delivery ratio. When compared to centralized routing under certain settings, geographic routing using NADV finds paths whose cost is close to the optimum. JA - Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing T3 - MobiHoc '05 PB - ACM CY - New York, NY, USA SN - 1-59593-004-3 UR - http://doi.acm.org/10.1145/1062689.1062720 M3 - 10.1145/1062689.1062720 ER - TY - CONF T1 - Efficient lookup on unstructured topologies T2 - Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing Y1 - 2005 A1 - Morselli,Ruggero A1 - Bhattacharjee, Bobby A1 - Srinivasan, Aravind A1 - Marsh,Michael A KW - distributed algorithms KW - lookup protocols KW - peer-to-peer networks KW - random walks AB - We present LMS, a protocol for efficient lookup on unstructured networks. Our protocol uses a virtual namespace without imposing specific topologies. It is more efficient than existing lookup protocols for unstructured networks, and thus is an attractive alternative for applications in which the topology cannot be structured as a Distributed Hash Table (DHT).We present analytic bounds for the worst-case performance of our protocol. Through detailed simulations (with up to 100,000 nodes), we show that the actual performance on realistic topologies is significantly better. We also show in both simulations and a complete implementation (which includes over five hundred nodes) that our protocol is inherently robust against multiple node failures and can adapt its replication strategy to optimize searches according to a specific heuristic. Moreover, the simulation demonstrates the resilience of LMS to high node turnover rates, and that it can easily adapt to orders of magnitude changes in network size. The overhead incurred by LMS is small, and its performance approaches that of DHTs on networks of similar size. JA - Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing T3 - PODC '05 PB - ACM CY - New York, NY, USA SN - 1-58113-994-2 UR - http://doi.acm.org/10.1145/1073814.1073828 M3 - 10.1145/1073814.1073828 ER - TY - JOUR T1 - Efficient strategies for channel management in wireless lans JF - UMD, CS Tech. Rep. CS-TR Y1 - 2005 A1 - Mishra,A. A1 - Brik,V. A1 - Banerjee,S. A1 - Srinivasan, Aravind A1 - Arbaugh, William A. AB - We define efficient algorithms for channel management (channelassignment and load balancing among APs) in 802.11-based WLANs that lead to better usage of the wireless spectrum. These algorithms (called CFAssign) are based on a “conflict-free set coloring” for- mulation that jointly perform load balancing along with channel assignment. Such a formulation has a number of advantages. First, it explicitly captures interference effects at clients. Next, it intrinsi- cally exposes opportunities for better channel re-use. Finally, algo- rithms based on this formulation do not depend on specific physical RF models and hence can be applied efficiently to a wide-range of in-building as well as outdoor scenarios. We have performed extensive packet-level simulations and mea- surements on a deployed wireless testbed of 70 APs to validate the performance of our proposed algorithms. We show that in ad- dition to single network scenarios, CFAssign algorithms are well suited for channel assignment in scenarios where multiple wireless networks share the same physical space and contend for the same frequency spectrum. Our results over a wide range of scenarios indicate that CFAssign reduces the interference at clients by about 50-70% in comparison to current best-known techniques. VL - 4729 ER - TY - JOUR T1 - An empirical study of "bogon" route advertisements JF - SIGCOMM Comput. Commun. Rev. Y1 - 2005 A1 - Feamster, Nick A1 - Jung,Jaeyeon A1 - Balakrishnan,Hari KW - anomalies KW - BGP KW - bogon prefixes AB - An important factor in the robustness of the interdomain routing system is whether the routers in autonomous systems (ASes) filter routes for "bogon" address space---i.e., private address space and address space that has not been allocated by the Internet Assigned Numbers Authority (IANA). This paper presents an empirical study of bogon route announcements, as observed at eight vantage points on the Internet. On average, we observe several bogon routes leaked every few days; a small number of ASes also temporarily leak hundreds of bogon routes. About 40% of these bogon routes are not withdrawn for at least a day. We observed 110 different ASes originating routes for bogon prefixes and a few ASes that were responsible for advertising a disproportionate number of these routes. We also find that some ASes that do filter unallocated prefixes continue to filter them for as long as five months after they have been allocated, mistakenly filtering valid routes. Both of these types of delinquencies have serious implications: the failure to filter valid prefixes can could make nefarious activities such as denial of service attacks difficult to trace; failure to update filters when new prefixes are allocated prevents legitimate routes from being globally visible. VL - 35 SN - 0146-4833 UR - http://doi.acm.org/10.1145/1052812.1052826 CP - 1 M3 - 10.1145/1052812.1052826 ER - TY - RPRT T1 - Entity resolution in graph data Y1 - 2005 A1 - Bhattacharya,I. A1 - Getoor, Lise AB - The goal of entity resolution is to reconcile data references corresponding to the same realworld entity. Here we introduce the problem of entity resolution in graphs, where the nodes are the references in the data and the hyper-edges represent the relations that are observed to hold between the references. The goal then is to reconstruct a 'cleaned' entity graph that captures the relations among the true underlying entities from the reference graph. This is an important first step in any graph mining process; mining an unresolved graph will be inefficient and result in inaccurate conclusions. We also motivate collective entity resolution in graphs where references sharing hyper-edges are resolved jointly, as opposed to independent pair-wise resolution of the references. We illustrate the problem of graph-based entity resolution in bibliographic datasets. We discuss several interesting issues such as mul- tiple entity types, local and global resolution and different kinds of graph-based evidence. We formulate the graph-based entity resolution problem as an unsupervised clustering task, where each cluster represents references that map to the same entity, and the similarity measure between two clusters incorporates the similarity of the references attributes and, more interestingly, the similarity between their relations. We explore two different measures of relational similarity. One approach, which we call 'edge detail similarity', explicitly com- pares the individual edges that each cluster participates in, but is expensive to compute. A less computationally intensive alternative is measuring 'neighborhood similarity', which only compares the multi-set of neighboring clusters for each cluster. We perform an extensive empirical evaluation of the two relational similarity measures for author resolution using co- author relations in two real bibliographic datasets. We show that both similarity measures improve performance over unsupervised algorithms that consider only reference attributes. We also describe an efficient implementation and show that these algorithms scale gracefully with increasing size of the data. PB - Technical report, University of Maryland, College Park ER - TY - JOUR T1 - Envisioning help resources for the future information ecology: Toward an enriched sense of help JF - Proceedings of the American Society for Information Science and Technology Y1 - 2005 A1 - Haas,Stephanie W A1 - Brown,Laurie A1 - Denn,Sheila A1 - Locke,David A1 - Shneiderman, Ben VL - 42 SN - 1550-8390 UR - http://onlinelibrary.wiley.com/doi/10.1002/meet.14504201123/abstract CP - 1 M3 - 10.1002/meet.14504201123 ER - TY - JOUR T1 - An evolutionary testbed for software technology evaluation JF - Innovations in Systems and Software Engineering Y1 - 2005 A1 - Lindvall,M. A1 - Rus,I. A1 - Shull, F. A1 - Zelkowitz, Marvin V A1 - Donzelli,P. A1 - Memon, Atif M. A1 - Basili, Victor R. A1 - Costa,P. A1 - Tvedt,R. A1 - Hochstein, L. AB - Empirical evidence and technology evaluation are needed to close the gap between the state of the art and the state of the practice in software engineering. However, there are difficulties associated with evaluating technologies based on empirical evidence: insufficient specification of context variables, cost of experimentation, and risks associated with trying out new technologies. In this paper, we propose the idea of an evolutionary testbed for addressing these problems. We demonstrate the utility of the testbed in empirical studies involving two different research technologies applied to the testbed, as well as the results of these studies. The work is part of NASArsquos High Dependability Computing Project (HDCP), in which we are evaluating a wide range of new technologies for improving the dependability of NASA mission-critical systems. VL - 1 CP - 1 M3 - 10.1007/s11334-005-0007-z ER - TY - CHAP T1 - Evolving and packaging reading technologies T2 - Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili Y1 - 2005 A1 - Basili, Victor R. JA - Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili PB - Springer VL - 1 SN - 9783540245476 ER - TY - JOUR T1 - EvoSTOC Contributions JF - Applications of evolutionary computing: EvoWorkshops 2005, EvoBIO, EvoCOMNET, EvoHOT, EvoIASP, EvoMUSART, and EvoSTOC Y1 - 2005 A1 - Merkle,D. A1 - Middendorf,M. A1 - Scheidler,A. A1 - Avigad,G. A1 - Moshaiov,A. A1 - Brauner,N. A1 - Parsopoulos,K.E. A1 - Vrahatis,M.N. A1 - Rand, William A1 - Riolo,R ER - TY - CONF T1 - Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage T2 - Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement Y1 - 2005 A1 - Mishra,A. A1 - Rozner,E. A1 - Banerjee,S. A1 - Arbaugh, William A. JA - Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement ER - TY - CHAP T1 - Fusing Depth and Video Using Rao-Blackwellized Particle Filter T2 - Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence Y1 - 2005 A1 - Agrawal,Amit A1 - Chellapa, Rama ED - Pal,Sankar ED - Bandyopadhyay,Sanghamitra ED - Biswas,Sambhunath AB - We address the problem of fusing sparse and noisy depth data obtained from a range finder with features obtained from intensity images to estimate ego-motion and refine 3D structure of a scene using a Rao-Blackwellized particle filter. For scenes with low depth variability, the algorithm shows an alternate way of performing Structure from Motion (SfM) starting with a flat depth map. Instead of using 3D depths, we formulate the problem using 2D image domain parallax and show that conditioned on non-linear motion parameters, the parallax magnitude with respect to the projection of the vanishing point forms a linear subsystem independent of camera motion and their distributions can be analytically integrated. Thus, the structure is obtained by estimating parallax with respect to the given depths using a Kalman filter and only the ego-motion is estimated using a particle filter. Hence, the required number of particles becomes independent of the number of feature points which is an improvement over previous algorithms. Experimental results on both synthetic and real data show the effectiveness of our approach. JA - Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 3776 SN - 978-3-540-30506-4 UR - http://dx.doi.org/10.1007/11590316_82 ER - TY - CONF T1 - Generating testable hypotheses from tacit knowledge for high productivity computing T2 - Proceedings of the second international workshop on Software engineering for high performance computing system applications Y1 - 2005 A1 - Asgari, Sima A1 - Hochstein, Lorin A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V A1 - Hollingsworth, Jeffrey K A1 - Carver, Jeff A1 - Shull, Forrest KW - folklore elicitation KW - high productivity development time experimental studies KW - hypothesis generation KW - tacit knowledge solicitation KW - testable hypotheses AB - In this research, we are developing our understanding of how the high performance computing community develops effective parallel implementations of programs by collecting the folklore within the community. We use this folklore as the basis for a series of experiments, which we expect, will validate or negate these assumptions. JA - Proceedings of the second international workshop on Software engineering for high performance computing system applications T3 - SE-HPCS '05 PB - ACM CY - New York, NY, USA SN - 1-59593-117-1 UR - http://doi.acm.org/10.1145/1145319.1145325 M3 - 10.1145/1145319.1145325 ER - TY - JOUR T1 - The genetic map and comparative analysis with the physical map of Trypanosoma brucei JF - Nucleic acids research Y1 - 2005 A1 - MacLeod,A. A1 - Tweedie,A. A1 - McLellan,S. A1 - Taylor,S. A1 - Hall,N. A1 - Berriman,M. A1 - El‐Sayed, Najib M. A1 - Hope,M. A1 - Turner,C. M.R A1 - Tait,A. VL - 33 CP - 21 ER - TY - JOUR T1 - The genome of the African trypanosome Trypanosoma brucei JF - Science Y1 - 2005 A1 - Berriman,M. A1 - Ghedin,E. A1 - Hertz-Fowler,C. A1 - Blandin,G. A1 - Renauld,H. A1 - Bartholomeu,D. C A1 - Lennard,N. J A1 - Caler,E. A1 - Hamlin,N. E A1 - Haas,B. A1 - others VL - 309 CP - 5733 ER - TY - JOUR T1 - The genome of the protist parasite Entamoeba histolytica JF - Nature Y1 - 2005 A1 - Loftus,B. A1 - Anderson,I. A1 - Davies,R. A1 - Alsmark,U. C.M A1 - Samuelson,J. A1 - Amedeo,P. A1 - Roncaglia,P. A1 - Berriman,M. A1 - Hirt,R. P A1 - Mann,B. J A1 - others VL - 433 CP - 7028 ER - TY - JOUR T1 - The Genome Sequence of Trypanosoma cruzi, Etiologic Agent of Chagas Disease JF - Science Y1 - 2005 A1 - El‐Sayed, Najib M. A1 - Myler,Peter J. A1 - Bartholomeu,Daniella C. A1 - Nilsson,Daniel A1 - Aggarwal,Gautam A1 - Tran,Anh-Nhi A1 - Ghedin,Elodie A1 - Worthey,Elizabeth A. A1 - Delcher,Arthur L. A1 - Blandin,Gaëlle A1 - Westenberger,Scott J. A1 - Caler,Elisabet A1 - Cerqueira,Gustavo C. A1 - Branche,Carole A1 - Haas,Brian A1 - Anupama,Atashi A1 - Arner,Erik A1 - Åslund,Lena A1 - Attipoe,Philip A1 - Bontempi,Esteban A1 - Bringaud,Frédéric A1 - Burton,Peter A1 - Cadag,Eithon A1 - Campbell,David A. A1 - Carrington,Mark A1 - Crabtree,Jonathan A1 - Darban,Hamid A1 - da Silveira,Jose Franco A1 - de Jong,Pieter A1 - Edwards,Kimberly A1 - Englund,Paul T. A1 - Fazelina,Gholam A1 - Feldblyum,Tamara A1 - Ferella,Marcela A1 - Frasch,Alberto Carlos A1 - Gull,Keith A1 - Horn,David A1 - Hou,Lihua A1 - Huang,Yiting A1 - Kindlund,Ellen A1 - Klingbeil,Michele A1 - Kluge,Sindy A1 - Koo,Hean A1 - Lacerda,Daniela A1 - Levin,Mariano J. A1 - Lorenzi,Hernan A1 - Louie,Tin A1 - Machado,Carlos Renato A1 - McCulloch,Richard A1 - McKenna,Alan A1 - Mizuno,Yumi A1 - Mottram,Jeremy C. A1 - Nelson,Siri A1 - Ochaya,Stephen A1 - Osoegawa,Kazutoyo A1 - Pai,Grace A1 - Parsons,Marilyn A1 - Pentony,Martin A1 - Pettersson,Ulf A1 - Pop, Mihai A1 - Ramirez,Jose Luis A1 - Rinta,Joel A1 - Robertson,Laura A1 - Salzberg,Steven L. A1 - Sanchez,Daniel O. A1 - Seyler,Amber A1 - Sharma,Reuben A1 - Shetty,Jyoti A1 - Simpson,Anjana J. A1 - Sisk,Ellen A1 - Tammi,Martti T. A1 - Tarleton,Rick A1 - Teixeira,Santuza A1 - Van Aken,Susan A1 - Vogt,Christy A1 - Ward,Pauline N. A1 - Wickstead,Bill A1 - Wortman,Jennifer A1 - White,Owen A1 - Fraser,Claire M. A1 - Stuart,Kenneth D. A1 - Andersson,Björn AB - Whole-genome sequencing of the protozoan pathogen Trypanosoma cruzi revealed that the diploid genome contains a predicted 22,570 proteins encoded by genes, of which 12,570 represent allelic pairs. Over 50% of the genome consists of repeated sequences, such as retrotransposons and genes for large families of surface molecules, which include trans-sialidases, mucins, gp63s, and a large novel family (>1300 copies) of mucin-associated surface protein (MASP) genes. Analyses of the T. cruzi, T. brucei, and Leishmania major (Tritryp) genomes imply differences from other eukaryotes in DNA repair and initiation of replication and reflect their unusual mitochondrial DNA. Although the Tritryp lack several classes of signaling molecules, their kinomes contain a large and diverse set of protein kinases and phosphatases; their size and diversity imply previously unknown interactions and regulatory processes, which may be targets for intervention. VL - 309 UR - http://www.sciencemag.org/content/309/5733/409.abstract CP - 5733 M3 - 10.1126/science.1112631 ER - TY - JOUR T1 - The Genome Sequence of Trypanosoma Cruzi, Etiologic Agent of Chagas Disease JF - ScienceScience Y1 - 2005 A1 - El‐Sayed, Najib M. A1 - Myler,Peter J. A1 - Bartholomeu,Daniella C. A1 - Nilsson,Daniel A1 - Aggarwal,Gautam A1 - Tran,Anh-Nhi A1 - Ghedin,Elodie A1 - Worthey,Elizabeth A. A1 - Delcher,Arthur L. A1 - Blandin,Gaëlle A1 - Westenberger,Scott J. A1 - Caler,Elisabet A1 - Cerqueira,Gustavo C. A1 - Branche,Carole A1 - Haas,Brian A1 - Anupama,Atashi A1 - Arner,Erik A1 - Åslund,Lena A1 - Attipoe,Philip A1 - Bontempi,Esteban A1 - Bringaud,Frédéric A1 - Burton,Peter A1 - Cadag,Eithon A1 - Campbell,David A. A1 - Carrington,Mark A1 - Crabtree,Jonathan A1 - Darban,Hamid A1 - da Silveira,Jose Franco A1 - de Jong,Pieter A1 - Edwards,Kimberly A1 - Englund,Paul T. A1 - Fazelina,Gholam A1 - Feldblyum,Tamara A1 - Ferella,Marcela A1 - Frasch,Alberto Carlos A1 - Gull,Keith A1 - Horn,David A1 - Hou,Lihua A1 - Huang,Yiting A1 - Kindlund,Ellen A1 - Klingbeil,Michele A1 - Kluge,Sindy A1 - Koo,Hean A1 - Lacerda,Daniela A1 - Levin,Mariano J. A1 - Lorenzi,Hernan A1 - Louie,Tin A1 - Machado,Carlos Renato A1 - McCulloch,Richard A1 - McKenna,Alan A1 - Mizuno,Yumi A1 - Mottram,Jeremy C. A1 - Nelson,Siri A1 - Ochaya,Stephen A1 - Osoegawa,Kazutoyo A1 - Pai,Grace A1 - Parsons,Marilyn A1 - Pentony,Martin A1 - Pettersson,Ulf A1 - Pop, Mihai A1 - Ramirez,Jose Luis A1 - Rinta,Joel A1 - Robertson,Laura A1 - Salzberg,Steven L. A1 - Sanchez,Daniel O. A1 - Seyler,Amber A1 - Sharma,Reuben A1 - Shetty,Jyoti A1 - Simpson,Anjana J. A1 - Sisk,Ellen A1 - Tammi,Martti T. A1 - Tarleton,Rick A1 - Teixeira,Santuza A1 - Van Aken,Susan A1 - Vogt,Christy A1 - Ward,Pauline N. A1 - Wickstead,Bill A1 - Wortman,Jennifer A1 - White,Owen A1 - Fraser,Claire M. A1 - Stuart,Kenneth D. A1 - Andersson,Björn AB - Whole-genome sequencing of the protozoan pathogen Trypanosoma cruzi revealed that the diploid genome contains a predicted 22,570 proteins encoded by genes, of which 12,570 represent allelic pairs. Over 50% of the genome consists of repeated sequences, such as retrotransposons and genes for large families of surface molecules, which include trans-sialidases, mucins, gp63s, and a large novel family (>1300 copies) of mucin-associated surface protein (MASP) genes. Analyses of the T. cruzi, T. brucei, and Leishmania major (Tritryp) genomes imply differences from other eukaryotes in DNA repair and initiation of replication and reflect their unusual mitochondrial DNA. Although the Tritryp lack several classes of signaling molecules, their kinomes contain a large and diverse set of protein kinases and phosphatases; their size and diversity imply previously unknown interactions and regulatory processes, which may be targets for intervention. VL - 309 SN - 0036-8075, 1095-9203 UR - http://www.sciencemag.org/content/309/5733/409 CP - 5733 M3 - 10.1126/science.1112631 ER - TY - JOUR T1 - The genome sequence of Trypanosoma cruzi, etiologic agent of Chagas disease JF - Science Y1 - 2005 A1 - El-Sayed, N.M. A1 - Myler,P. J A1 - Bartholomeu,D. C A1 - Nilsson,D. A1 - Aggarwal,G. A1 - Tran,A. N A1 - Ghedin,E. A1 - Worthey,E. A A1 - Delcher,A. L A1 - Blandin,G. A1 - others VL - 309 CP - 5733 ER - TY - JOUR T1 - Genome-Wide Analysis of Chromosomal Features Repressing Human Immunodeficiency Virus Transcription JF - Journal of VirologyJ. Virol. Y1 - 2005 A1 - Lewinski,M. K A1 - Bisgrove,D. A1 - Shinn,P. A1 - Chen,H. A1 - Hoffmann,C. A1 - Hannenhalli, Sridhar A1 - Verdin,E. A1 - Berry,C. C A1 - Ecker,J. R A1 - Bushman,F. D AB - We have investigated regulatory sequences in noncoding human DNA that are associated with repression of an integrated human immunodeficiency virus type 1 (HIV-1) promoter. HIV-1 integration results in the formation of precise and homogeneous junctions between viral and host DNA, but integration takes place at many locations. Thus, the variation in HIV-1 gene expression at different integration sites reports the activity of regulatory sequences at nearby chromosomal positions. Negative regulation of HIV transcription is of particular interest because of its association with maintaining HIV in a latent state in cells from infected patients. To identify chromosomal regulators of HIV transcription, we infected Jurkat T cells with an HIV-based vector transducing green fluorescent protein (GFP) and separated cells into populations containing well-expressed (GFP-positive) or poorly expressed (GFP-negative) proviruses. We then determined the chromosomal locations of the two classes by sequencing 971 junctions between viral and cellular DNA. Possible effects of endogenous cellular transcription were characterized by transcriptional profiling. Low-level GFP expression correlated with integration in (i) gene deserts, (ii) centromeric heterochromatin, and (iii) very highly expressed cellular genes. These data provide a genome-wide picture of chromosomal features that repress transcription and suggest models for transcriptional latency in cells from HIV-infected patients. VL - 79 SN - 0022-538X, 1098-5514 UR - http://jvi.asm.org/content/79/11/6610 CP - 11 M3 - 10.1128/JVI.79.11.6610-6619.2005 ER - TY - JOUR T1 - Genome-wide analysis of retroviral DNA integration JF - Nat Rev MicroNat Rev Micro Y1 - 2005 A1 - Bushman,Frederic A1 - Lewinski,Mary A1 - Ciuffi,Angela A1 - Barr,Stephen A1 - Leipzig,Jeremy A1 - Hannenhalli, Sridhar A1 - Hoffmann,Christian VL - 3 SN - 1740-1526 UR - http://dx.doi.org/10.1038/nrmicro1263 CP - 11 M3 - 10.1038/nrmicro1263 ER - TY - CONF T1 - Geographic locality of IP prefixes T2 - Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement Y1 - 2005 A1 - Freedman,Michael J. A1 - Vutukuru,Mythili A1 - Feamster, Nick A1 - Balakrishnan,Hari AB - Information about the geographic locality of IP prefixes can be useful for understanding the issues related to IP address allocation, aggregation, and BGP routing table growth. In this paper, we use traceroute data and geographic mappings of IP addresses to study the geographic properties of IP prefixes and their implications on Internet routing. We find that (1) IP prefixes may be too coarse-grained for expressing routing policies, (2) address allocation policies and the granularity of routing contribute significantly to routing table size, and (3) not considering the geographic diversity of contiguous prefixes may result in overestimating the opportunities for aggregation in the BGP routing table. JA - Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement T3 - IMC '05 PB - USENIX Association CY - Berkeley, CA, USA UR - http://dl.acm.org/citation.cfm?id=1251086.1251099 ER - TY - JOUR T1 - Help! I'm Lost: User Frustration in Web Navigation (2003) JF - Institute for Systems Research Technical Reports Y1 - 2005 A1 - Lazar,Jonathan A1 - Bessiere,Katie A1 - Ceaparu,Irina A1 - Robinson,John A1 - Shneiderman, Ben KW - Technical Report AB - Computers can be valuable tools, and networked resources via the Internet can be beneficial to many different populations and communities. Unfortunately, when people are unable to reach their task goals due to frustrating experiences, this can hinder the effectiveness of technology. This research summary provides information about the user frustration research that has been performed at the University of Maryland and Towson University. Causes of user frustration are discussed in this research summary, along with the surprising finding that nearly one-third to one-half of the time spent in front of the computer is wasted due to frustrating experiences. Furthermore, when interfaces are planned to be deceptive and confusing, this UR - http://drum.lib.umd.edu/handle/1903/6508 ER - TY - JOUR T1 - How do I find blue books about dogs? The errors and frustrations of young digital library users JF - Proceedings of HCII 2005 Y1 - 2005 A1 - Hutchinson,H. A1 - Druin, Allison A1 - Bederson, Benjamin B. A1 - Reuter,K. A1 - Rose,A. A1 - Weeks,A. C ER - TY - CONF T1 - Identifying and segmenting human-motion for mobile robot navigation using alignment errors T2 - 12th International Conference on Advanced Robotics, 2005. ICAR '05. Proceedings Y1 - 2005 A1 - Abd-Almageed, Wael A1 - Burns,B. J A1 - Davis, Larry S. KW - Computer errors KW - Educational institutions KW - Frequency estimation KW - human-motion identification KW - human-motion segmentation KW - HUMANS KW - Image motion analysis KW - Image segmentation KW - mobile robot navigation KW - Mobile robots KW - Motion estimation KW - Navigation KW - Object detection KW - robot vision KW - SHAPE AB - This paper presents a new human-motion identification and segmentation algorithm, for mobile robot platforms. The algorithm is based on computing the alignment error between pairs of object images acquired from a moving platform. Pairs of images generating relatively small alignment errors are used to estimate the fundamental frequency of the object's motion. A decision criterion is then used to test the significance of the estimated frequency and to classify the object's motion. To verify the validity of the proposed approach, experimental results are shown on different classes of objects JA - 12th International Conference on Advanced Robotics, 2005. ICAR '05. Proceedings PB - IEEE SN - 0-7803-9178-0 M3 - 10.1109/ICAR.2005.1507441 ER - TY - CHAP T1 - Image Sequence Stabilization, Mosaicking, and Superresolution T2 - Handbook of Image and Video Processing (Second Edition)Handbook of Image and Video Processing (Second Edition) Y1 - 2005 A1 - Chellapa, Rama A1 - Srinivasan, S. A1 - Aggarwal,G. A1 - Veeraraghavan,A. ED - Al Bovik AB - A sequence of temporal images gathered from a single sensor adds a whole new dimension to two-dimensional (2D) image data. Availability of an image sequence permits the measurement of quantities such as subpixel intensities, camera motion and depth, and detection and tracking of moving objects. In turn, the processing of image sequences necessitates the development of sophisticated techniques to extract this information. With the recent availability of powerful yet inexpensive computers, data storage systems, and image acquisition devices, image sequence analysis has transitioned from an esoteric research domain to a practical area with significant commercial interest. JA - Handbook of Image and Video Processing (Second Edition)Handbook of Image and Video Processing (Second Edition) PB - Academic Press CY - Burlington SN - 978-0-12-119792-6 UR - http://www.sciencedirect.com/science/article/pii/B9780121197926500826 ER - TY - CONF T1 - Implications of autonomy for the expressiveness of policy routing T2 - Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications Y1 - 2005 A1 - Feamster, Nick A1 - Johari,Ramesh A1 - Balakrishnan,Hari KW - autonomy KW - BGP KW - Internet KW - policy KW - protocol KW - Routing KW - Safety KW - stability AB - Thousands of competing autonomous systems must cooperate with each other to provide global Internet connectivity. Each autonomous system (AS) encodes various economic, business, and performance decisions in its routing policy. The current interdomain routing system enables each AS to express policy using rankings that determine how each router inthe AS chooses among different routes to a destination, and filters that determine which routes are hidden from each neighboring AS. Because the Internet is composed of many independent, competing networks, the interdomain routing system should provide autonomy, allowing network operators to set their rankings independently, and to have no constraints on allowed filters. This paper studies routing protocol stability under these conditions. We first demonstrate that certain rankings that are commonly used in practice may not ensure routing stability. We then prove that, when providers can set rankings and filters autonomously, guaranteeing that the routing system will converge to a stable path assignment essentially requires ASes to rank routes based on AS-path lengths. We discuss the implications of these results for the future of interdomain routing. JA - Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications T3 - SIGCOMM '05 PB - ACM CY - New York, NY, USA SN - 1-59593-009-4 UR - http://doi.acm.org/10.1145/1080091.1080096 M3 - 10.1145/1080091.1080096 ER - TY - JOUR T1 - Improved efficiency for CCA-secure cryptosystems built using identity-based encryption JF - Topics in Cryptology–CT-RSA 2005 Y1 - 2005 A1 - Boneh,D. A1 - Katz, Jonathan AB - Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption schemes from identity-based encryption schemes in the standard model. We improve the efficiency of their construction, and show two specific instantiations of our resulting scheme which offer the most efficient encryption (and, in one case, key generation) of any CCA-secure encryption scheme to date. M3 - 10.1007/978-3-540-30574-3_8 ER - TY - JOUR T1 - Interactive Color Mosaic and Dendogram Displays for Signal/Noise Optimization in Microarray Data Analysis (2003) JF - Institute for Systems Research Technical Reports Y1 - 2005 A1 - Seo,Jinwook A1 - Bakay,Marina A1 - Zhao,Po A1 - Chen,Yi-Wen A1 - Clarkson,Priscilla A1 - Shneiderman, Ben A1 - Hoffman,Eric P KW - Technical Report AB - Data analysis and visualization is strongly influenced by noise and noise filters. There are multiple sources of oisein microarray data analysis, but signal/noise ratios are rarely optimized, or even considered. Here, we report a noise analysis of a novel 13 million oligonucleotide dataset - 25 human U133A (~500,000 features) profiles of patient muscle biposies. We use our recently described interactive visualization tool, the Hierarchical Clustering Explorer (HCE) to systemically address the effect of different noise filters on resolution of arrays into orrectbiological groups (unsupervised clustering into three patient groups of known diagnosis). We varied probe set interpretation methods (MAS 5.0, RMA), resent callfilters, and clustering linkage methods, and investigated the results in HCE. HCE interactive features enabled us to quickly see the impact of these three variables. Dendrogram displays showed the clustering results systematically, and color mosaic displays provided a visual support for the results. We show that each of these three variables has a strong effect on unsupervised clustering. For this dataset, the strength of the biological variable was maximized, and noise minimized, using MAS 5.0, 10% present call filter, and Average Group Linkage. We propose a general method of using interactive tools to identify the optimal signal/noise balance or the optimal combination of these three variables to maximize the effect of the desired biological variable on data interpretation. UR - http://drum.lib.umd.edu/handle/1903/6506 ER - TY - JOUR T1 - Interactive pattern search in time series JF - Proceedings of SPIE Y1 - 2005 A1 - Buono,Paolo A1 - Aris,Aleks A1 - Plaisant, Catherine A1 - Khella,Amir A1 - Shneiderman, Ben AB - The need for pattern discovery in long time series data led researchers to develop algorithms for similarity search. Most of the literature about time series focuses on algorithms that index time series and bring the data into the main storage, thus providing fast information retrieval on large time series. This paper reviews the state of the art in visualizing time series, and focuses on techniques that enable users to visually and interactively query time series. Then, it presents TimeSearcher 2, a tool that enables users to explore multidimensional data using synchronized tables and graphs with overview+detail, filter the time series data to reduce the scope of the search, select an existing pattern to find similar occurrences, and interactively adjust similarity parameters to narrow the result set. This tool is an extension of previous work, TimeSearcher 1, which uses graphical timeboxes to interactively query time series data. VL - 5669 SN - 0277786X UR - http://spiedigitallibrary.org/proceedings/resource/2/psisdg/5669/1/175_1?isAuthorized=no CP - 1 M3 - doi:10.1117/12.587537 ER - TY - RPRT T1 - Interactive Pattern Search in Time Series (2004) Y1 - 2005 A1 - Buono,Paolo A1 - Aris,Aleks A1 - Plaisant, Catherine A1 - Khella,Amir A1 - Shneiderman, Ben KW - Technical Report AB - The need for pattern discovery in long time series data led researchers to develop algorithms for similarity search. Most of the literature about time series focuses on algorithms that index time series and bring the data into the main storage, thus providing fast information retrieval on large time series. This paper reviews the state of the art in visualizing time series, and focuses on techniques that enable users to interactively query time series. Then it presents TimeSearcher 2, a tool that enables users to explore multidimensional data using coordinated tables and graphs with overview+detail, filter the time series data to reduce the scope of the search, select an existing pattern to find similar occurrences, and interactively adjust similarity parameters to narrow the result set. This tool is an extension of previous work, TimeSearcher 1, which uses graphical timeboxes to interactively query time series data. JA - Institute for Systems Research Technical Reports UR - http://drum.lib.umd.edu/handle/1903/6519 ER - TY - CONF T1 - The International Children’s Digital Library: A Case Study in Designing for a MultiLingual T2 - Multi-Cultural, Multi-Generational Audience. Information Technology and Libraries Y1 - 2005 A1 - Hutchinson,H.B. A1 - Rose,A. A1 - Bederson, Benjamin B. A1 - Weeks,A. C A1 - Druin, Allison JA - Multi-Cultural, Multi-Generational Audience. Information Technology and Libraries ER - TY - CHAP T1 - Iterative enhancement: a practical technique for software development T2 - Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili Y1 - 2005 A1 - Basili, Victor R. A1 - Turner,A. J JA - Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili VL - 1 SN - 9783540245476 ER - TY - JOUR T1 - Joint application mapping/interconnect synthesis techniques for embedded chip-scale multiprocessors JF - Parallel and Distributed Systems, IEEE Transactions on Y1 - 2005 A1 - Bambha,N. K A1 - Bhattacharyya, Shuvra S. VL - 16 CP - 2 ER - TY - PAT T1 - Lambertian reflectance and linear subspaces Y1 - 2005 A1 - Jacobs, David W. A1 - Basri,Ronen ED - NEC Laboratories America, Inc. AB - A method for choosing an image from a plurality of three-dimensional models which is most similar to an input image is provided. The method includes the steps of: (a) providing a database of the plurality of three-dimensional models; (b) providing an input image; (c) positioning each three-dimensional model relative to the input image; (d) for each three-dimensional model, determining a rendered image that is most similar to the input image by: (d)(i) computing a linear subspace that describes an approximation to the set of all possible rendered images that each three-dimensional model can produce under all possible lighting conditions where each point in the linear subspace represents a possible image; and one of (d)(ii) finding the point on the linear subspace that is closest to the input image or finding a rendered image in a subset of the linear subspace obtained by projecting the set of images that are generated by positive lights onto the linear subspace; (e) computing a... VL - : 09/705,507 UR - http://www.google.com/patents?id=6hEWAAAAEBAJ CP - 6853745 ER - TY - CONF T1 - A learning automata based power management for ad-hoc networks T2 - 2005 IEEE International Conference on Systems, Man and Cybernetics Y1 - 2005 A1 - El-Osery,A. I A1 - Baird,D. A1 - Abd-Almageed, Wael KW - ad hoc networks KW - ad-hoc networks KW - Computer network management KW - Computer networks KW - Energy management KW - Engineering management KW - learning automata KW - network metrics KW - network simulator KW - packet retransmissions KW - power control KW - power system management KW - power transmission control KW - stochastic learning automata KW - stochastic learning automta KW - Stochastic processes KW - system bandwidth KW - Technology management KW - Throughput KW - transmission power control KW - transmission power level KW - transmission power management AB - Power management is a very important aspect of ad-hoc networks. It directly impacts the network throughput among other network metrics. On the other hand, transmission power management may result in disconnected networks and increased level of collisions. In this paper, we introduce a transmission power control based on stochastic learning automata (SLA) to modify the transmission power. Based on the level of successful transmissions and the level of packet retransmissions, the SLA will modify the transmission power level either by increasing it or decreasing it. The probabilistic nature of SLA makes it a useful choice for ad-hoc networks. Using the network simulator NS, we show that using SLA for transmission power will result in an increased system bandwidth and a decrease in the collision levels. JA - 2005 IEEE International Conference on Systems, Man and Cybernetics PB - IEEE VL - 4 SN - 0-7803-9298-1 M3 - 10.1109/ICSMC.2005.1571701 ER - TY - CONF T1 - Maintaining concentration to achieve task completion T2 - Proceedings of the 2005 conference on Designing for User eXperience Y1 - 2005 A1 - Shneiderman, Ben A1 - Bederson, Benjamin B. JA - Proceedings of the 2005 conference on Designing for User eXperience ER - TY - CONF T1 - Maintaining concentration to achieve task completion T2 - Proceedings of the 2005 conference on Designing for User eXperience Y1 - 2005 A1 - Shneiderman, Ben A1 - Bederson, Benjamin B. KW - avoid interruption KW - calm KW - flow KW - focus KW - goal attainment KW - interface design KW - maintain concentration KW - situation awareness KW - task completion AB - When faced with a challenging goal, knowledge workers need to concentrate on their tasks so that they move forward toward completion. Since frustrations, distractions, and interruptions can interfere with their smooth progress, design strategies should enable users to maintain concentration. This paper promotes awareness of this issue, reviews related work, and suggests three initial strategies: Reduce short-term and working memory load, provide information abundant interfaces, and increase automaticity. JA - Proceedings of the 2005 conference on Designing for User eXperience T3 - DUX '05 PB - AIGA: American Institute of Graphic Arts CY - New York, NY, USA SN - 1-59593-250-X UR - http://dl.acm.org/citation.cfm?id=1138235.1138246 ER - TY - JOUR T1 - MCMC-based particle filtering for tracking a variable number of interacting targets JF - IEEE Transactions on Pattern Analysis and Machine Intelligence Y1 - 2005 A1 - Zia Khan A1 - Balch, T. A1 - Dellaert, F. KW - algorithms KW - Animals KW - Artificial intelligence KW - Computer simulation KW - Computer vision KW - Filtering KW - filtering theory KW - HUMANS KW - Image Enhancement KW - Image Interpretation, Computer-Assisted KW - Index Terms- Particle filters KW - Information Storage and Retrieval KW - Insects KW - interacting targets KW - Markov chain Monte Carlo sampling step KW - Markov chain Monte Carlo. KW - Markov chains KW - Markov processes KW - Markov random field motion KW - Markov random fields KW - Models, Biological KW - Models, Statistical KW - Monte Carlo Method KW - Monte Carlo methods KW - MOTION KW - Movement KW - multitarget filter KW - multitarget tracking KW - particle filtering KW - Particle filters KW - Particle tracking KW - Pattern Recognition, Automated KW - Sampling methods KW - Subtraction Technique KW - target tracking KW - Video Recording AB - We describe a particle filter that effectively deals with interacting targets, targets that are influenced by the proximity and/or behavior of other targets. The particle filter includes a Markov random field (MRF) motion prior that helps maintain the identity of targets throughout an interaction, significantly reducing tracker failures. We show that this MRF prior can be easily implemented by including an additional interaction factor in the importance weights of the particle filter. However, the computational requirements of the resulting multitarget filter render it unusable for large numbers of targets. Consequently, we replace the traditional importance sampling step in the particle filter with a novel Markov chain Monte Carlo (MCMC) sampling step to obtain a more efficient MCMC-based multitarget filter. We also show how to extend this MCMC-based filter to address a variable number of interacting targets. Finally, we present both qualitative and quantitative experimental results, demonstrating that the resulting particle filters deal efficiently and effectively with complicated target interactions. VL - 27 SN - 0162-8828 CP - 11 ER - TY - CONF T1 - Measurement-based multipath multicast T2 - INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE Y1 - 2005 A1 - Guven,T. A1 - La,R.J. A1 - Shayman,M.A. A1 - Bhattacharjee, Bobby KW - algorithm; KW - allocation; KW - application-layer KW - approximation KW - approximation; KW - balance KW - communication; KW - Convergence KW - convergence; KW - intradomain KW - load KW - measurement-based KW - methods; KW - Multicast KW - multipath KW - network KW - numerical KW - of KW - overlaying; KW - perturbation KW - processes; KW - resource KW - Routing KW - routing; KW - source; KW - Stochastic KW - techniques; KW - Telecommunication KW - theory; KW - traffic; AB - We propose a measurement-based routing algorithm to load balance intradomain traffic along multiple paths for multiple multicast sources. Multiple paths are established using application-layer overlaying. The proposed algorithm is able to converge under different network models, where each model reflects a different set of assumptions about the multicasting capabilities of the network. The algorithm is derived from simultaneous perturbation stochastic approximation and relies only on noisy estimates from measurements. Simulation results are presented to demonstrate the additional benefits obtained by incrementally increasing the multicasting capabilities. JA - INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE VL - 4 M3 - 10.1109/INFCOM.2005.1498566 ER - TY - CONF T1 - Measuring productivity on high performance computers T2 - 11th IEEE International Symposium on Software Metric Y1 - 2005 A1 - Zelkowitz, Marvin V A1 - Basili, Victor R. A1 - Asgari, S. A1 - Hochstein, L. A1 - Hollingsworth, Jeffrey K A1 - Nakamura, T. AB - In the high performance computing domain, the speed ofexecution of a program has typically been the primary performance metric. But productivity is also of concern to high performance computing developers. In this paper we will discuss the problems of defining and measuring productivity for these machines and we develop a model of productivity that includes both a performance component and a component that measures the development time of the program. We ran several experiments using students in high performance courses at several universities, and we report on those results with respect to our model of productivity. JA - 11th IEEE International Symposium on Software Metric ER - TY - CONF T1 - A metric space for productivity measurement in software development T2 - Proceedings of the second international workshop on Software engineering for high performance computing system applications Y1 - 2005 A1 - Numrich,Robert W. A1 - Hochstein, Lorin A1 - Basili, Victor R. AB - We define a metric space to measure the contributions of individual programmers to a software development project. It allows us to measure the distance between the contributions of two different programmers as well as the absolute contribution of each individual programmer. Our metric is based on an action function that provides a picture of how one programmer's approach differs from another at each instance of time during the project. We apply our metric to data we collected from students taking a course in parallel programming. We display the pictures for two students who showed approximately equal contributions but who followed very different paths through the course. JA - Proceedings of the second international workshop on Software engineering for high performance computing system applications T3 - SE-HPCS '05 PB - ACM CY - New York, NY, USA SN - 1-59593-117-1 UR - http://doi.acm.org/10.1145/1145319.1145324 M3 - 10.1145/1145319.1145324 ER - TY - JOUR T1 - Metrics of software architecture changes based on structural distance JF - IEEE METRICS Y1 - 2005 A1 - Nakamura, T. A1 - Basili, Victor R. AB - Software architecture is an important form of abstrac-tion, representing the overall system structure and the re- lationship among components. When software is modified from one version to another, its architecture may change. Software modification involving architectural change is of- ten difficult when the change goes beyond the original ar- chitectural design, involving changes to the connectivity of multiple components. Existing research has looked at ar- chitectural change at the level of architecture metrics such as size, complexity, coupling and cohesion, which abstract a particular version of the software in isolation. In this pa- per, we argue that this level of abstraction is often too high to characterize some interesting aspects of the architectural change process, and propose an approach that takes into account the change in connectivity from version to version of individual components. In this approach, two endpoints of a major change are taken as reference points, and inter- mediate connectivity changes are examined relative to the endpoints. We define a distance measure between software structures using a graph kernel function, which is quite powerful as it is applicable to any software structure repre- sentable as a graph. Using this distance measure, we define a metric which models the architecture change as a transi- tion between two endpoints. In addition to theoretical anal- ysis of the approach, we present empirical results obtained by applying the approach to open-source software projects to evaluate its validity and usefulness. ER - TY - CONF T1 - Misbehaving TCP receivers can cause internet-wide congestion collapse T2 - Proceedings of the 12th ACM conference on Computer and communications security Y1 - 2005 A1 - Sherwood,Rob A1 - Bhattacharjee, Bobby A1 - Braud,Ryan KW - Congestion control KW - distributed denial of service AB - An optimistic acknowledgment (opt-ack) is an acknowledgment sent by a misbehaving client for a data segment that it has not received. Whereas previous work has focused on opt-ack as a means to greedily improve end-to-end performance, we study opt-ack exclusively as a denial of service attack. Specifically, an attacker sends optimistic acknowledgments to many victims in parallel, thereby amplifying its effective bandwidth by a factor of 30 million (worst case). Thus, even a relatively modest attacker can totally saturate the paths from many victims back to the attacker. Worse, a distributed network of compromised machines ("zombies") attacking in parallel can exploit over-provisioning in the Internet to bring about wide-spread, sustained congestion collapse.We implement this attack both in simulation and in a wide-area network, and show it severity both in terms of number of packets and total traffic generated. We engineer and implement a novel solution that does not require client or network modifications allowing for practical deployment. Additionally, we demonstrate the solution's efficiency on a real network. JA - Proceedings of the 12th ACM conference on Computer and communications security T3 - CCS '05 PB - ACM CY - New York, NY, USA SN - 1-59593-226-7 UR - http://doi.acm.org/10.1145/1102120.1102170 M3 - 10.1145/1102120.1102170 ER - TY - CONF T1 - Modeling image processing systems with homogeneous parameterized dataflow graphs T2 - Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on Y1 - 2005 A1 - Sen,Mainak A1 - Bhattacharyya, Shuvra S. A1 - Lv,Tiehan A1 - Wolf,W. KW - data consumption KW - data flow graphs KW - data production KW - dynamic dataflow graph KW - graph edges KW - homogeneous parameterized dataflow graphs KW - IMAGE PROCESSING KW - image processing system modeling KW - iteration KW - iterative methods AB - We describe a new dataflow model called homogeneous parameterized dataflow (HPDF). This form of dynamic dataflow graph takes advantage of the fact that in a large number of image processing applications, data production and consumption rates, though dynamic, are equal across graph edges for any particular iteration, which leads to a homogeneous rate of actor execution, even though data production and consumption values are dynamic and vary across graph edges. We discuss existing dataflow models and formulate in detail the HPDF model. We develop examples of applications that are described naturally in terms of HPDF semantics and present experimental results that demonstrate the efficacy of the HPDF approach. JA - Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on VL - 5 M3 - 10.1109/ICASSP.2005.1416258 ER - TY - JOUR T1 - Modeling of block-based DSP systems JF - The Journal of VLSI Signal Processing Y1 - 2005 A1 - Ko,D. I A1 - Bhattacharyya, Shuvra S. VL - 40 CP - 3 ER - TY - CHAP T1 - Moving Object Detection and Compression in IR Sequences T2 - Computer Vision Beyond the Visible SpectrumComputer Vision Beyond the Visible Spectrum Y1 - 2005 A1 - Vaswani,Namrata A1 - Agrawal,Amit A1 - Qinfen Zheng A1 - Chellapa, Rama ED - Bhanu,Bir ED - Pavlidis,Ioannis AB - We consider the problem of remote surveillance using infrared (IR) sensors. The aim is to use IR image sequences to detect moving objects (humans or vehicles), and to transmit a few “best-view images” of every new object that is detected. Since the available bandwidth is usually low, if the object chip is big, it needs to be compressed before being transmitted. Due to low computational power of computing devices attached to the sensor, the algorithms should be computationally simple. We present two approaches for object detection — one which specifically solves the more difficult long-range object detection problem, and the other for objects at short range. For objects at short range, we also present techniques for selecting a single best-view object chip and computationally simple techniques for compressing it to very low bit rates due to the channel bandwidth constraint. A fast image chip compression scheme implemented in the wavelet domain by combining a non-iterative zerotree coding method with 2D-DPCM for both low-and high-frequency subbands is presented. Comparisons with some existing schemes are also included. The object detection and compression algorithms have been implemented in C/C++ and their performance has been evaluated using the Hitachi’s SH4 platform with software simulation. JA - Computer Vision Beyond the Visible SpectrumComputer Vision Beyond the Visible Spectrum T3 - Advances in Pattern Recognition PB - Springer London SN - 978-1-84628-065-8 UR - http://dx.doi.org/10.1007/1-84628-065-6_5 ER - TY - CONF T1 - Multitarget tracking with split and merged measurements T2 - IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005. CVPR 2005 Y1 - 2005 A1 - Zia Khan A1 - Balch, T. A1 - Dellaert, F. KW - Application software KW - Computer vision KW - Detection algorithms KW - Detectors KW - filtering theory KW - Markov chain Monte Carlo based auxiliary variable particle filter KW - Markov processes KW - merged measurements KW - Monte Carlo methods KW - multiple hypothesis tracker KW - multitarget tracking KW - parameter estimation KW - Particle filters KW - Particle tracking KW - Rao-Blackwellized filter KW - split measurements KW - target tracking KW - Trajectory AB - In many multitarget tracking applications in computer vision, a detection algorithm provides locations of potential targets. Subsequently, the measurements are associated with previously estimated target trajectories in a data association step. The output of the detector is often imperfect and the detection data may include multiple, split measurements from a single target or a single merged measurement from several targets. To address this problem, we introduce a multiple hypothesis tracker for interacting targets that generate split and merged measurements. The tracker is based on an efficient Markov chain Monte Carlo (MCMC) based auxiliary variable particle filter. The particle filter is Rao-Blackwellized such that the continuous target state parameters are estimated analytically, and an MCMC sampler generates samples from the large discrete space of data associations. In addition, we include experimental results in a scenario where we track several interacting targets that generate these split and merged measurements. JA - IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005. CVPR 2005 VL - 1 ER - TY - CONF T1 - Mutatis mutandis: safe and predictable dynamic software updating T2 - Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages Y1 - 2005 A1 - Stoyle,Gareth A1 - Hicks, Michael W. A1 - Bierman,Gavin A1 - Sewell,Peter A1 - Neamtiu,Iulian KW - capability KW - dynamic software updating KW - proteus KW - Type inference KW - updateability analysis AB - Dynamic software updates can be used to fix bugs or add features to a running program without downtime. Essential for some applications and convenient for others, low-level dynamic updating has been used for many years. Perhaps surprisingly, there is little high-level understanding or language support to help programmers write dynamic updates effectively.To bridge this gap, we present Proteus, a core calculus for dynamic software updating in C-like languages that is flexible, safe, and predictable. Proteus supports dynamic updates to functions (even active ones), to named types and to data, allowing on-line evolution to match source-code evolution as we have observed it in practice. We ensure updates are type-safe by checking for a property we call "con-freeness" for updated types t at the point of update. This means that non-updated code will not use t concretely beyond that point (concrete usages are via explicit coercions) and thus t's representation can safely change. We show how con-freeness can be enforced dynamically for a particular program state. We additionally define a novel and efficient static updateability analysis to establish con-freeness statically, and can thus automatically infer program points at which all future (well-formed) updates will be type-safe. We have implemented our analysis for C and tested it on several well-known programs. JA - Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages T3 - POPL '05 PB - ACM CY - New York, NY, USA SN - 1-58113-830-X UR - http://doi.acm.org/10.1145/1040305.1040321 M3 - 10.1145/1040305.1040321 ER - TY - JOUR T1 - New experimental data of STBLI at DNS/LES accessible Reynolds numbers JF - AIAA paper Y1 - 2005 A1 - Bookey,P. A1 - Wyckham,C. A1 - Smits,A. J. A1 - Martin, M.P VL - 309 ER - TY - RPRT T1 - Ordered and Quantum Treemaps: Making Effective Use of 2D Space to Display Hierarchies (2001) Y1 - 2005 A1 - Bederson, Benjamin B. A1 - Shneiderman, Ben A1 - Wattenberg,Martin KW - Technical Report AB - Treemaps, a space- filling method of visualizing large hierarchical data sets, are receiving increasing attention. Several algorithms have been proposed to create more useful displays by controlling the aspect ratios of the rectangles that make up a treemap. While these algorithms do improve visibility of small items in a single layout, they introduce instability over time in the display of dynamically changing data, fail to preserve order of the underlying data, and create layouts that are difficult to visually search. In addition, continuous treemap algorithms are not suitable for displaying quantum-sized objects within them, such as images. This paper introduces several new treemap algorithms, which address these shortcomings. In addition, we show a new application of these treemaps, using them to present groups of images. The ordered treemap algorithms ensure that items near each other in the given order will be near each other in the treemap layout. Using experimental evidence from Monte Carlo trials, we show that compared to other layout algorithms ordered treemaps are more stable while maintaining relatively favorable aspect ratios of the constituent rectangles. A second test set uses stock market data. The quantum treemap algorithms modify the layout of the continuous treemap algorithms to generate rectangles that are integral multiples of an input object size. The quantum treemap algorithm has been applied to PhotoMesa, an application that supports browsing of large numbers of images. JA - Institute for Systems Research Technical Reports UR - http://drum.lib.umd.edu/handle/1903/6486 ER - TY - JOUR T1 - An outdoor 3-D visual tracking system for the study of spatial navigation and memory in rhesus monkeys JF - Behavior Research Methods Y1 - 2005 A1 - Zia Khan A1 - Herman, Rebecca A. A1 - Wallen, Kim A1 - Balch, Tucker KW - cognitive psychology AB - Previous studies of the navigational abilities of nonhuman primates have largely been limited to what could be described by a human observer with a pen and paper. Consequently, we have developed a system that uses a pair of cameras to automatically obtain the three-dimensional trajectory of rhesus monkeys performing an outdoor spatial navigation and memory task. The system provides trajectories, path length, speed, and other variables that would be impossible for an unaided observer to note. From trajectory data, we computed and validated a path-length measurement. We use this measurement to compare the navigation abilities of several animals. In addition, we provide quantitative data on the accuracy of a method for automatic behavior detection. Currently, the system is being used to examine the sex differences in spatial navigation of rhesus monkeys. We expect that measures derived from the trajectory data will reveal strategies used by animals to solve spatial problems. VL - 37 SN - 1554-351X, 1554-3528 UR - http://link.springer.com/article/10.3758/BF03192714 CP - 3 J1 - Behavior Research Methods ER - TY - JOUR T1 - Path dependence and the validation of agent‐based spatial models of land use JF - International Journal of Geographical Information Science Y1 - 2005 A1 - Brown,Daniel G. A1 - Page,Scott A1 - Riolo,Rick A1 - Zellner,Moira A1 - Rand, William AB - In this paper, we identify two distinct notions of accuracy of land?use models and highlight a tension between them. A model can have predictive accuracy: its predicted land?use pattern can be highly correlated with the actual land?use pattern. A model can also have process accuracy: the process by which locations or land?use patterns are determined can be consistent with real world processes. To balance these two potentially conflicting motivations, we introduce the concept of the invariant region, i.e., the area where land?use type is almost certain, and thus path independent; and the variant region, i.e., the area where land use depends on a particular series of events, and is thus path dependent. We demonstrate our methods using an agent?based land?use model and using multi?temporal land?use data collected for Washtenaw County, Michigan, USA. The results indicate that, using the methods we describe, researchers can improve their ability to communicate how well their model performs, the situations or instances in which it does not perform well, and the cases in which it is relatively unlikely to predict well because of either path dependence or stochastic uncertainty. VL - 19 SN - 1365-8816 UR - http://www.tandfonline.com/doi/abs/10.1080/13658810410001713399 CP - 2 M3 - 10.1080/13658810410001713399 ER - TY - CHAP T1 - Pattern Recognition in Video T2 - Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence Y1 - 2005 A1 - Chellapa, Rama A1 - Veeraraghavan,Ashok A1 - Aggarwal,Gaurav ED - Pal,Sankar ED - Bandyopadhyay,Sanghamitra ED - Biswas,Sambhunath AB - Images constitute data that live in a very high dimensional space, typically of the order of hundred thousand dimensions. Drawing inferences from correlated data of such high dimensions often becomes intractable. Therefore traditionally several of these problems like face recognition, object recognition, scene understanding etc. have been approached using techniques in pattern recognition. Such methods in conjunction with methods for dimensionality reduction have been highly popular and successful in tackling several image processing tasks. Of late, the advent of cheap, high quality video cameras has generated new interests in extending still image-based recognition methodologies to video sequences. The added temporal dimension in these videos makes problems like face and gait-based human recognition, event detection, activity recognition addressable. Our research has focussed on solving several of these problems through a pattern recognition approach. Of course, in video streams patterns refer to both patterns in the spatial structure of image intensities around interest points and temporal patterns that arise either due to camera motion or object motion. In this paper, we discuss the applications of pattern recognition in video to problems like face and gait-based human recognition, behavior classification, activity recognition and activity based person identification. JA - Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 3776 SN - 978-3-540-30506-4 UR - http://dx.doi.org/10.1007/11590316_2 ER - TY - CONF T1 - Porting DSP applications across design tools using the dataflow interchange format T2 - Rapid System Prototyping, 2005. (RSP 2005). The 16th IEEE International Workshop on Y1 - 2005 A1 - Hsu,C.-J. A1 - Bhattacharyya, Shuvra S. KW - actor interchange format KW - coarse-grain dataflow graph KW - data flow analysis KW - data flow graphs KW - dataflow interchange format KW - dataflow model KW - dataflow semantic KW - DSP application KW - DSP design tool KW - DSP library component KW - electronic data interchange KW - formal specification KW - rapid prototyping tool KW - Signal processing KW - software prototyping KW - Specification languages KW - vendor-independent language AB - Modeling DSP applications through coarse-grain dataflow graphs is popular in the DSP design community, and a growing set of rapid prototyping tools support such dataflow semantics. Since different tools may be suitable for different phases or generations of a design, it is often desirable to migrate a dataflow-based application model from one prototyping tool to another. Two critical problems in transferring dataflow-based designs across different prototyping tools are the lack of a vendor-independent language for DSP-oriented dataflow graphs, and the lack of an efficient porting methodology. In our previous work, the dataflow interchange format (DIF) (C. Hsu et al., 2004) has been developed as a standard language to specify mixed-grain dataflow models for DSP systems. This paper presents the augmentation of the DIF infrastructure with a systematic porting approach that integrates DIF tightly with the specific exporting and importing mechanisms that interface DIF to specific DSP design tools. In conjunction with this porting mechanism, this paper also introduces a novel language, called the actor interchange format (AIF), for transferring relevant information pertaining to DSP library components across different tools. Through a case study of a synthetic aperture radar application, we demonstrate the high degree of automation offered by our DIF-based porting approach. JA - Rapid System Prototyping, 2005. (RSP 2005). The 16th IEEE International Workshop on M3 - 10.1109/RSP.2005.39 ER - TY - JOUR T1 - QR Factorizations Using a Restricted Set of Rotations JF - Electronic Transactions on Numerical Analysis Y1 - 2005 A1 - O'Leary, Dianne P. A1 - Bullock,Stephen S. VL - 21 UR - http://etna.mcs.kent.edu/vol.21.2005/pp20-27.dir/pp20-27.pdfhttp://etna.mcs.kent.edu/vol.21.2005/pp20-27.dir/pp20-27.pdf ER - TY - CONF T1 - Relational clustering for multi-type entity resolution T2 - Proceedings of the 4th international workshop on Multi-relational mining Y1 - 2005 A1 - Bhattacharya,Indrajit A1 - Getoor, Lise AB - In many applications, there are a variety of ways of referring to the same underlying entity. Given a collection of references to entities, we would like to determine the set of true underlying entities and map the references to these entities. The references may be to entities of different types and more than one type of entity may need to be resolved at the same time. We propose similarity measures for clustering references taking into account the different relations that are observed among the typed references. We pose typed entity resolution in relational data as a clustering problem and present experimental results on real data showing improvements over attribute-based models when relations are leveraged. JA - Proceedings of the 4th international workshop on Multi-relational mining T3 - MRDM '05 PB - ACM CY - New York, NY, USA SN - 1-59593-212-7 UR - http://doi.acm.org/10.1145/1090193.1090195 M3 - 10.1145/1090193.1090195 ER - TY - JOUR T1 - Secure remote authentication using biometric data JF - Advances in Cryptology–EUROCRYPT 2005 Y1 - 2005 A1 - Boyen,X. A1 - Dodis,Y. A1 - Katz, Jonathan A1 - Ostrovsky,R. A1 - Smith,A. AB - Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are not uniformly distributed; and (2) they are not exactly reproducible. Recent work, most notably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcome by allowing some auxiliary public information to be reliably sent from a server to the human user. Subsequent work of Boyen has shown how to extend these techniques, in the random oracle model, to enable unidirectional authentication from the user to the server without the assumption of a reliable communication channel.We show two efficient techniques enabling the use of biometric data to achieve mutual authentication or authenticated key exchange over a completely insecure (i.e., adversarially controlled) channel. In addition to achieving stronger security guarantees than the work of Boyen, we improve upon his solution in a number of other respects: we tolerate a broader class of errors and, in one case, improve upon the parameters of his solution and give a proof of security in the standard model. M3 - 10.1007/11426639_9 ER - TY - JOUR T1 - Social and Psychological Influences on Computer User Frustration (Newhagen book chapter, 2002) JF - Institute for Systems Research Technical Reports Y1 - 2005 A1 - Bessiere,Katie A1 - Ceaparu,Irina A1 - Lazar,Jonathan A1 - Robinson,John A1 - Shneiderman, Ben KW - Technical Report AB - As computer usage has proliferated, so has user frustration. Even devoted and knowledgeable users encounter annoying delays, incomprehensible messages, incompatible files, and indecipherable menus. The frustration generated by these problems can be personally disturbing and socially disruptive. Psychological and social perspectives on frustration may clarify the relationships among variables such as personality types, cultural factors, goal attainment, workplace anger, and computer anxiety. These perspectives may also help designers, managers, and users understand the range of responses to frustration, which could lead to effective interventions such as redesign of software, improved training, better online help, user discipline, and even resetting of national research priorities. UR - http://drum.lib.umd.edu/handle/1903/6497 ER - TY - CHAP T1 - Software defect reduction top 10 list T2 - Foundations of empirical software engineering: the legacy of Victor R. Basili Y1 - 2005 A1 - Boehm,B. A1 - Basili, Victor R. JA - Foundations of empirical software engineering: the legacy of Victor R. Basili SN - 9783540245476 ER - TY - CONF T1 - Software synthesis from the dataflow interchange format T2 - Proceedings of the 2005 workshop on Software and compilers for embedded systems Y1 - 2005 A1 - Hsu,C. J A1 - Ko,M. Y A1 - Bhattacharyya, Shuvra S. JA - Proceedings of the 2005 workshop on Software and compilers for embedded systems ER - TY - JOUR T1 - Spatial process and data models: Toward integration of agent-based models and GIS JF - Journal of Geographical Systems Y1 - 2005 A1 - Brown,D.G. A1 - Riolo,R A1 - Robinson,D.T. A1 - North,M. A1 - Rand, William AB - The use of object-orientation for both spatial data and spatial process models facilitates their integration, which can allow exploration and explanation of spatial-temporal phenomena. In order to better understand how tight coupling might proceed and to evaluate the possible functional and efficiency gains from such a tight coupling, we identify four key relationships affecting how geographic data (fields and objects) and agent-based process models can interact: identity, causal, temporal and topological. We discuss approaches to implementing tight integration, focusing on a middleware approach that links existing GIS and ABM development platforms, and illustrate the need and approaches with example agent-based models. VL - 7 CP - 1 M3 - 10.1007/s10109-005-0148-5 ER - TY - RPRT T1 - Stable Policy Routing with Provider Independence Y1 - 2005 A1 - Feamster, Nick A1 - Johari,Ramesh A1 - Balakrishnan,Hari AB - Thousands of competing autonomous systems (ASes) mustcooperate with each other to provide global Internet connectivity.These ASes encode various economic, business,and performance decisions in their routing policies. The currentinterdomain routing system enables ASes to express policyusing rankings that determine how each router in an ASorders the different routes to a destination, and filters thatdetermine which routes are hidden from each neighboringAS. Since the Internet is composed of many independent,competing networks, the interdomain routing system shouldallow providers to set their rankings independently, and tohave no constraints on allowed filters. This paper studiesrouting protocol stability under these constraints. We firstdemonstrate that certain rankings that are commonly usedin practice may not ensure routing stability. We then provethat, with ranking independence and unrestricted filtering,guaranteeing that the routing system will converge to a stablepath assignment essentially requires ASes to rank routesbased on AS-path lengths. Finally, we discuss the implicationsof these results for the future of interdomain routing. PB - Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory VL - MIT-CSAIL-TR-2005-009 UR - http://dspace.mit.edu/handle/1721.1/30522 ER - TY - RPRT T1 - Stub Domain DDoS Detection Y1 - 2005 A1 - Kommareddy,C. A1 - Levin,D. A1 - Bhattacharjee, Bobby A1 - La,R.J. A1 - Shayman,M. PB - Technical Report of the Department of Computer Science, University of Maryland, College Park ER - TY - JOUR T1 - Time reversal and n-qubit canonical decompositions JF - Journal of Mathematical Physics Y1 - 2005 A1 - Bullock,Stephen S. A1 - Brennen,Gavin K. A1 - O’Leary,Dianne P. AB - On pure states of n quantum bits, the concurrence entanglement monotone returns the norm of the inner product of a pure state with its spin-flip. The monotone vanishes for n odd, but for n even there is an explicit formula for its value on mixed states, i.e., a closed-form expression computes the minimum over all ensemble decompositions of a given density. For n even a matrix decomposition ν = k1ak2 of the unitary group is explicitly computable and allows for study of the monotone’s dynamics. The side factors k1 and k2 of this concurrence canonical decomposition (CCD) are concurrence symmetries, so the dynamics reduce to consideration of the a factor. This unitary a phases a basis of entangled states, and the concurrence dynamics of u are determined by these relative phases. In this work, we provide an explicit numerical algorithm computing ν = k1ak2 for n odd. Further, in the odd case we lift the monotone to a two-argument function. The concurrence capacity of ν according to the double argument lift may be nontrivial for n odd and reduces to the usual concurrence capacity in the literature for n even. The generalization may also be studied using the CCD, leading again to maximal capacity for most unitaries. The capacity of ν⊗I2 is at least that of ν, so odd-qubit capacities have implications for even-qubit entanglement. The generalizations require considering the spin-flip as a time reversal symmetry operator in Wigner’s axiomatization, and the original Lie algebra homomorphism defining the CCD may be restated entirely in terms of this time reversal. The polar decomposition related to the CCD then writes any unitary evolution as the product of a time-symmetric and time-antisymmetric evolution with respect to the spin-flip. En route we observe a Kramers’ nondegeneracy: the existence of a nondegenerate eigenstate of any time reversal symmetric n-qubit Hamiltonian demands (i) n even and (ii) maximal concurrence of said eigenstate. We provide examples of how to apply this work to study the kinematics and dynamics of entanglement in spin chain Hamiltonians. VL - 46 SN - 00222488 UR - http://jmp.aip.org/resource/1/jmapaq/v46/i6/p062104_s1 CP - 6 M3 - doi:10.1063/1.1900293 ER - TY - JOUR T1 - Toward a graphical ABM toolkit with GIS integration JF - Proceedings of Agent2005 Y1 - 2005 A1 - Rand, William A1 - Brown,D A1 - Riolo,R A1 - Robinson,D AB - Agent-based modeling (ABM) has proved useful in a number of fields. Many of theearly successes of ABM were due to its ability to represent the processes of a phenomenon. However, less emphasis has been placed in ABM on developing its ability to replicate spatial patterns of phenomena. In order to do that, more powerful spatial modeling techniques, like those within geographical information systems (GIS), are necessary. The integration of these two tool sets into a cohesive package would allow for elegant modeling of both process and pattern. One problem with an integrated toolkit is that most GIS users are not programmers, but most GIS users are familiar with the use of detailed graphical user interfaces (GUIs) in order to create complex visualizations of data. Thus providing a detailed GUI to access an integrated ABM-GIS toolkit would vastly expand the number of users for such a toolkit. This paper is a first step toward that goal. We first outline several design principles for an ABM-GIS toolkit and then describe a survey of extant toolkits (RepastPy, NetLogo, and MobiDyc) that were selected based on the design principles. The toolkits were surveyed to see how well they fulfill some of the design principles. This survey is not meant to be a comparative review of these toolkits but rather it was conducted to determine what useful design principles can be gathered from them that might inform a new “ideal” ABM-GIS toolkit. Finally, the paper concludes with some design recommendations for such a toolkit. ER - TY - JOUR T1 - Transcriptional profiling of the hyperthermophilic methanarchaeon Methanococcus jannaschii in response to lethal heat and non‐lethal cold shock JF - Environmental Microbiology Y1 - 2005 A1 - Boonyaratanakornkit,Boonchai B A1 - Simpson,Anjana J. A1 - Whitehead,Timothy A A1 - Fraser,Claire M. A1 - El‐Sayed, Najib M. A1 - Clark,Douglas S AB - Temperature shock of the hyperthermophilic methanarchaeon Methanococcus jannaschii from its optimal growth temperature of 85°C to 65°C and 95°C resulted in different transcriptional responses characteristic of both the direction of shock (heat or cold shock) and whether the shock was lethal. Specific outcomes of lethal heat shock to 95°C included upregulation of genes encoding chaperones, and downregulation of genes encoding subunits of the H+ transporting ATP synthase. A gene encoding an α subunit of a putative prefoldin was also upregulated, which may comprise a novel element in the protein processing pathway in M. jannaschii. Very different responses were observed upon cold shock to 65°C. These included upregulation of a gene encoding an RNA helicase and other genes involved in transcription and translation, and upregulation of genes coding for proteases and transport proteins. Also upregulated was a gene that codes for an 18 kDa FKBP-type PPIase, which may facilitate protein folding at low temperatures. Transcriptional profiling also revealed several hypothetical proteins that respond to temperature stress conditions. VL - 7 SN - 1462-2920 UR - http://onlinelibrary.wiley.com/doi/10.1111/j.1462-2920.2005.00751.x/abstract CP - 6 M3 - 10.1111/j.1462-2920.2005.00751.x ER - TY - CONF T1 - Turning information visualization innovations into commercial products: lessons to guide the next success T2 - IEEE Symposium on Information Visualization, 2005. INFOVIS 2005 Y1 - 2005 A1 - Shneiderman, Ben A1 - Rao,R. A1 - Andrews,K. A1 - Ahlberg,C. A1 - Brodbeck,D. A1 - Jewitt,T. A1 - Mackinlay,J. KW - Books KW - commercial development KW - commercial product KW - Computer interfaces KW - Computer science KW - data visualisation KW - Data visualization KW - Educational institutions KW - exploratory data analysis KW - information visualization innovation KW - information visualization tool KW - innovation management KW - Laboratories KW - Management training KW - new technology emergence KW - Technological innovation KW - technology transfer KW - Turning KW - User interfaces AB - As information visualization matures as an academic research field, commercial spinoffs are proliferating, but success stories are harder to find. This is the normal process of emergence for new technologies, but the panel organizers believe that there are certain strategies that facilitate success. To teach these lessons, we have invited several key figures who are seeking to commercialize information visualization tools. The panelists make short presentations, engage in a moderated discussion, and respond to audience questions. JA - IEEE Symposium on Information Visualization, 2005. INFOVIS 2005 PB - IEEE SN - 0-7803-9464-X M3 - 10.1109/INFVIS.2005.1532153 ER - TY - CONF T1 - UMD Experiments with FRGC Data T2 - Computer Vision and Pattern Recognition - Workshops, 2005. CVPR Workshops. IEEE Computer Society Conference on Y1 - 2005 A1 - Aggarwal,G. A1 - Biswas,S. A1 - Chellapa, Rama AB - Although significant work has been done in the field of face recognition, the performance of state-of-the art face recognition algorithms is not good enough to be effective in operational systems. Though most algorithms work well for controlled images, they are quite susceptible to changes in illumination and pose. Face Recognition Grand Challenge (FRGC) is an effort to examine such issues to suitably guide future research in the area. This paper describes the efforts made at UMD in this direction. We present our results on several experiments suggested in FRGC. We believe that though pattern classification techniques play an extremely significant role in automatic face recognition under controlled conditions, physical modeling is required to generalize across varying situations. Accordingly, we describe a generative approach to recognize faces across varying illumination. Unlike most current methods, our method does not ignore shadows. Instead we use them to our benefit by modeling attached shadows in our formulation. JA - Computer Vision and Pattern Recognition - Workshops, 2005. CVPR Workshops. IEEE Computer Society Conference on M3 - 10.1109/CVPR.2005.586 ER - TY - JOUR T1 - Unsupervised learning applied to progressive compression of time-dependent geometry JF - Computers & Graphics Y1 - 2005 A1 - Baby,Thomas A1 - Kim,Youngmin A1 - Varshney, Amitabh KW - Clustering algorithms KW - Distributed/network graphics KW - pattern recognition AB - We propose a new approach to progressively compress time-dependent geometry. Our approach exploits correlations in motion vectors to achieve better compression. We use unsupervised learning techniques to detect good clusters of motion vectors. For each detected cluster, we build a hierarchy of motion vectors using pairwise agglomerative clustering, and succinctly encode the hierarchy using entropy encoding. We demonstrate our approach on a client–server system that we have built for downloading time-dependent geometry. VL - 29 SN - 0097-8493 UR - http://www.sciencedirect.com/science/article/pii/S009784930500052X CP - 3 M3 - 10.1016/j.cag.2005.03.021 ER - TY - JOUR T1 - User Frustration with Technology in the Workplace (2004) JF - Institute for Systems Research Technical Reports Y1 - 2005 A1 - Lazar,Jonathan A1 - Jones,Adam A1 - Bessiere,Katie A1 - Ceaparu,Irina A1 - Shneiderman, Ben KW - Technical Report AB - When hard to use computers cause users to become frustrated, it can affect workplace productivity, user mood, and interactions with other co-workers. Previous research has examined the frustration that graduate students and their families face in using computers. To learn more about the causes and effects of user frustration with computers in the workplace, we collected modified time diaries from 50 workplace users, who spent an average of 5.1 hours on the computer. In this experiment, users reported wasting on average, 42-43% of their time on the computer due to frustrating experiences. The causes of the frustrating experiences, the time lost due to the frustrating experiences, and the effects of the frustrating experiences on the mood of the users are discussed in this paper. Implications for designers, managers, users, information technology staff, and policymakers are discussed. UR - http://drum.lib.umd.edu/handle/1903/6515 ER - TY - CONF T1 - Using measurement to build core competencies in software T2 - Seminar sponsored by Data and Analysis Center for Software Y1 - 2005 A1 - Basili, Victor R. JA - Seminar sponsored by Data and Analysis Center for Software ER - TY - CHAP T1 - Web Service Composition with Volatile Information T2 - The Semantic Web – ISWC 2005 Y1 - 2005 A1 - Au,Tsz-Chiu A1 - Kuter,Ugur A1 - Nau, Dana S. ED - Gil,Yolanda ED - Motta,Enrico ED - Benjamins,V. ED - Musen,Mark KW - Computer science AB - In many Web service composition problems, information may be needed from Web services during the composition process. Existing research on Web service composition (WSC) procedures has generally assumed that this information will not change. We describe two ways to take such WSC procedures and systematically modify them to deal with volatile information. The black-box approach requires no knowledge of the WSC procedure’s internals: it places a wrapper around the WSC procedure to deal with volatile information. The gray-box approach requires partial information of those internals, in order to insert coding to perform certain bookkeeping operations. We show theoretically that both approaches work correctly. We present experimental results showing that the WSC procedures produced by the gray-box approach can run much faster than the ones produced by the black-box approach. JA - The Semantic Web – ISWC 2005 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 3729 SN - 978-3-540-29754-3 UR - http://www.springerlink.com/content/y105x8464k54l760/abstract/ ER - TY - JOUR T1 - Weighted coloring based channel assignment for WLANs JF - ACM SIGMOBILE Mobile Computing and Communications Review Y1 - 2005 A1 - Mishra,A. A1 - Banerjee,S. A1 - Arbaugh, William A. VL - 9 CP - 3 ER - TY - CONF T1 - What Are the Ants Doing? Vision-Based Tracking and Reconstruction of Control Programs T2 - Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005. ICRA 2005 Y1 - 2005 A1 - Egerstedt, M. A1 - Balch, T. A1 - Dellaert, F. A1 - Delmotte, F. A1 - Zia Khan KW - Animals KW - Automatic generation control KW - Biological information theory KW - Computer vision KW - Control systems KW - Mobile robots KW - Probability distribution KW - Robot control KW - target tracking KW - Trajectory AB - In this paper, we study the problem of going from a real-world, multi-agent system to the generation of control programs in an automatic fashion. In particular, a computer vision system is presented, capable of simultaneously tracking multiple agents, such as social insects. Moreover, the data obtained from this system is fed into a mode-reconstruction module that generates low-complexity control programs, i.e. strings of symbolic descriptions of control-interrupt pairs, consistent with the empirical data. The result is a mechanism for going from the real system to an executable implementation that can be used for controlling multiple mobile robots. JA - Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005. ICRA 2005 ER - TY - CONF T1 - Adaptive replication in peer-to-peer systems T2 - Distributed Computing Systems, 2004. Proceedings. 24th International Conference on Y1 - 2004 A1 - Gopalakrishnan,V. A1 - Silaghi,B. A1 - Bhattacharjee, Bobby A1 - Keleher,P. KW - adaptive KW - allocation; KW - data KW - databases; KW - decentralized KW - delivery KW - distributed KW - LAR KW - low-latency KW - peer-to-peer KW - processing; KW - protocol; KW - replicated KW - replication KW - resource KW - strategies; KW - structured KW - system-neutral KW - system; KW - systems; AB - Peer-to-peer systems can be used to form a low-latency decentralized data delivery system. Structured peer-to-peer systems provide both low latency and excellent load balance with uniform query and data distributions. Under the more common skewed access distributions, however, individual nodes are easily overloaded, resulting in poor global performance and lost messages. This paper describes a lightweight, adaptive, and system-neutral replication protocol, called LAR, that maintains low access latencies and good load balance even under highly skewed demand. We apply LAR to Chord and show that it has lower overhead and better performance than existing replication strategies. JA - Distributed Computing Systems, 2004. Proceedings. 24th International Conference on M3 - 10.1109/ICDCS.2004.1281601 ER - TY - JOUR T1 - Advances in schistosome genomics JF - Trends in Parasitology Y1 - 2004 A1 - El‐Sayed, Najib M. A1 - Bartholomeu,Daniella A1 - Ivens,Alasdair A1 - Johnston,David A. A1 - LoVerde,Philip T. AB - In Spring 2004, the first draft of the 270 Mb genome of Schistosoma mansoni will be released. This sequence is based on the assembly and annotation of a >7.5-fold coverage, shotgun sequencing project. The key stages involved in the international collaborative efforts that have led to the generation of these sequencing data for the parasite S. mansoni are discussed here. VL - 20 SN - 1471-4922 UR - http://www.sciencedirect.com/science/article/pii/S1471492204000480 CP - 4 M3 - 16/j.pt.2004.02.002 ER - TY - JOUR T1 - Agent-based and analytical modeling to evaluate the effectiveness of greenbelts JF - Environmental Modelling & Software Y1 - 2004 A1 - Brown,Daniel G. A1 - Page,Scott E. A1 - Riolo,Rick A1 - Rand, William KW - Agent-based modeling KW - Land-use change KW - Landscape ecology KW - Urban sprawl AB - We present several models of residential development at the rural–urban fringe to evaluate the effectiveness of a greenbelt located beside a developed area, for delaying development outside the greenbelt. First, we develop a mathematical model, under two assumptions about the distributions of service centers, that represents the trade-off between greenbelt placement and width, their effects on the rate of development beyond the greenbelt, and how these interact with spatial patterns of aesthetic quality and the locations of services. Next, we present three agent-based models (ABMs) that include agents with the potential for heterogeneous preferences and a landscape with the potential for heterogeneous attributes. Results from experiments run with a one-dimensional ABM agree with the starkest of the results from the mathematical model, strengthening the support for both models. Further, we present two different two-dimensional ABMs and conduct a series of experiments to supplement our mathematical analysis. These include examining the effects of heterogeneous agent preferences, multiple landscape patterns, incomplete or imperfect information available to agents, and a positive aesthetic quality impact of the greenbelt on neighboring locations. These results suggest how width and location of the greenbelt could help determine the effectiveness of greenbelts for slowing sprawl, but that these relationships are sensitive to the patterns of landscape aesthetic quality and assumptions about service center locations. VL - 19 SN - 1364-8152 UR - http://www.sciencedirect.com/science/article/pii/S1364815203002664 CP - 12 M3 - 10.1016/j.envsoft.2003.11.012 ER - TY - JOUR T1 - Analysis of dataflow programs with interval-limited data-rates JF - Computer Systems: Architectures, Modeling, and Simulation Y1 - 2004 A1 - Teich,J. A1 - Bhattacharyya, Shuvra S. ER - TY - JOUR T1 - An Appearance-based Approach for Consistent Labeling of Humans and Objects in Video JF - Pattern Analysis and Applications Y1 - 2004 A1 - Balcells-Capellades,M. A1 - DeMenthon,D. A1 - David Doermann AB - We present an approach for consistently labeling people and for detecting human-object interactions using mono-camera surveillance video. The approach is based on a robust appearance based correlogram model which is combined with histogram information to model color distributions of people and objects in the scene. The models are dynamically built from non-stationary objects which are the outputs of background subtraction, and are used to identify objects on a frame-by-frame basis. We are able to detect when people merge into groups and to segment them even during partial occlusion. We can also detect when a person deposits or removes an object. The models persist when a person or object leaves the scene and are used to identify them when they reappear. Experiments show that the models are able to accommodate perspective foreshortening that occurs with overhead camera angles, as well as partial occlusion. The results show that this is an effective approach able to provide important information to algorithms performing higher-level analysis such as activity recognition, where human-object interactions play an important role. ER - TY - CONF T1 - Arbitrate-and-move primitives for high throughput on-chip interconnection networks T2 - Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on Y1 - 2004 A1 - Balkan,A.O. A1 - Gang Qu A1 - Vishkin, Uzi KW - 8 KW - arbiter KW - arbitrate-and-move KW - architecture; KW - asynchronous KW - balanced KW - binary KW - circuit KW - circuit; KW - circuits; KW - consumption; KW - data KW - explicit KW - interconnection KW - interconnections; KW - leaf KW - mesh-of-trees KW - multi-threading; KW - Multithreading KW - n-leaf KW - network; KW - pipeline KW - pipelined KW - power KW - primitive KW - processing; KW - reduced KW - simulation; KW - structures; KW - synchronous KW - synchrony KW - system-on-chip; KW - tree KW - tree; AB - An n-leaf pipelined balanced binary tree is used for arbitration of order and movement of data from n input ports to one output port. A novel arbitrate-and-move primitive circuit for every node of the tree, which is based on a concept of reduced synchrony that benefits from attractive features of both asynchronous and synchronous designs, is presented. The design objective of the pipelined binary tree is to provide a key building block in a high-throughput mesh-of-trees interconnection network for Explicit Multi Threading (XMT) architecture, a recently introduced parallel computation framework. The proposed reduced synchrony circuit was compared with asynchronous and synchronous designs of arbitrate-and-move primitives. Simulations with 0.18 mu;m technology show that compared to an asynchronous design, the proposed reduced synchrony implementation achieves a higher throughput, up to 2 Giga-Requests per second on an 8-leaf binary tree. Our circuit also consumes less power than the synchronous design, and requires less silicon area than both the synchronous and asynchronous designs. JA - Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on VL - 2 M3 - 10.1109/ISCAS.2004.1329303 ER - TY - JOUR T1 - The Argus eye: a new imaging system designed to facilitate robotic tasks of motion JF - IEEE Robotics & Automation Magazine Y1 - 2004 A1 - Baker, P. A1 - Ogale, A. S A1 - Fermüller, Cornelia KW - Argus eye KW - Calibration KW - CAMERAS KW - computational geometry KW - Design automation KW - Eyes KW - image formation KW - imaging system KW - Information geometry KW - Layout KW - Motion estimation KW - multiple stereo configurations KW - panoramic robots KW - robot vision KW - Robot vision systems KW - robotic motion tasks KW - Robotics and automation KW - SHAPE KW - shape model estimation KW - system calibration AB - This article describes an imaging system that has been designed to facilitate robotic tasks of motion. The system consists of a number of cameras in a network, arranged so that they sample different parts of the visual sphere. This geometric configuration has provable advantages compared to small field of view cameras for the estimation of the system's own motion and, consequently, the estimation of shape models from the individual cameras. The reason is, inherent ambiguities of confusion between translation and rotation disappear. Pairs of cameras may also be arranged in multiple stereo configurations, which provide additional advantages for segmentation. Algorithms for the calibration of the system and the three-dimensional (3-D) motion estimation are provided. VL - 11 SN - 1070-9932 CP - 4 M3 - 10.1109/MRA.2004.1371606 ER - TY - JOUR T1 - The Argus eye, a new tool for robotics JF - IEEE Robotics and Automation Magazine Y1 - 2004 A1 - Baker, P. A1 - Ogale, A. S A1 - Fermüller, Cornelia A1 - Aloimonos, J. VL - 11 CP - 4 ER - TY - JOUR T1 - Automatic recognition of spontaneous speech for access to multilingual oral history archives JF - IEEE Transactions on Speech and Audio Processing, Special Issue on Spontaneous Speech Processing Y1 - 2004 A1 - Byrne,W. A1 - David Doermann A1 - Franz,M. A1 - Gustman,S. A1 - Hajic,J. A1 - Oard, Douglas A1 - Picheny,M. A1 - Psutka,J. A1 - Ramabhadran,B. AB - The MALACH project has the goal of developing the technologies needed to facilitate access to large collections of spontaneous speech. Its aim is to dramatically improve the state of the art in key Automatic Speech Recognition (ASR), Natural Language Processing (NLP) technologies for use in large-scale retrieval systems. The project leverages a unique collection of oral history interviews with survivors of the Holocaust that has been assembled and extensively annotated by the Survivors of the Shoah Visual History Foundation. This paper describes the collection, 116,000 hours of interviews in 32 languages, and the way in which system requirements have been discerned through user studies. It discusses ASR methods for very difficult speech (heavily accented, emotional, and elderly spontaneous speech), including transcription to create training data and methods for language modeling and speaker adaptation. Results are presented for for English and Czech. NLP results are presented for named entity tagging, topic segmentation, and supervised topic classification, and the architecture of an integrated search system that uses these results is described. VL - 12 CP - 4 ER - TY - JOUR T1 - Buffer merging—a powerful technique for reducing memory requirements of synchronous dataflow specifications JF - ACM Transactions on Design Automation of Electronic Systems (TODAES) Y1 - 2004 A1 - Murthy,P. K A1 - Bhattacharyya, Shuvra S. VL - 9 CP - 2 ER - TY - JOUR T1 - Building KidPad: an application for children's collaborative storytelling JF - Software: Practice and Experience Y1 - 2004 A1 - Hourcade,J. P A1 - Bederson, Benjamin B. A1 - Druin, Allison VL - 34 CP - 9 ER - TY - CONF T1 - The case for a multi-hop wireless local area network T2 - INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies Y1 - 2004 A1 - Lee,Seungjoon A1 - Banerjee,S. A1 - Bhattacharjee, Bobby KW - access KW - access; KW - area KW - benefits; KW - client-server KW - clients; KW - interoperation; KW - LAN; KW - local KW - multihop KW - network; KW - networks; KW - performance KW - radio KW - systems; KW - wireless AB - We propose a multi-hop wireless LAN architecture and demonstrate its benefits to wireless clients. For this architecture, we define implementation paths that allow interoperation with existing wireless LANs which can lead to an incremental deployment of this system. We quantify the performance benefits of the proposed schemes through measurements in realistic wireless LAN environments. We also examine the performance of such multi-hop wireless LANs through detailed simulation studies. Our results show that these multi-hop extensions can significantly improve the wireless access experience (in terms of data throughput, latency, etc.) for clients who enable such mechanisms. More interestingly, when multi-hop extensions are enabled by some of the clients, it also positively impacts the performance at other clients that are completely unaware of these extensions. JA - INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies VL - 2 M3 - 10.1109/INFCOM.2004.1356977 ER - TY - CONF T1 - The case for separating routing from routers T2 - Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture Y1 - 2004 A1 - Feamster, Nick A1 - Balakrishnan,Hari A1 - Rexford,Jennifer A1 - Shaikh,Aman A1 - van der Merwe,Jacobus KW - BGP KW - interdomain routing KW - routing architecture AB - Over the past decade, the complexity of the Internet's routing infrastructure has increased dramatically. This complexity and the problems it causes stem not just from various new demands made of the routing infrastructure, but also from fundamental limitations in the ability of today's distributed infrastructure to scalably cope with new requirements.The limitations in today's routing system arise in large part from the fully distributed path-selection computation that the IP routers in an autonomous system (AS) must perform. To overcome this weakness, interdomain routing should be separated from today's IP routers, which should simply forward packets (for the most part). Instead, a separate Routing Control Platform (RCP) should select routes on behalf of the IP routers in each AS and exchange reachability information with other domains.Our position is that an approach like RCP is a good way of coping with complexity while being responsive to new demands and can lead to a routing system that is substantially easier to manage than today. We present a design overview of RCP based on three architectural principles path computation based on a consistent view of network state, controlled interactions between routing protocol layers, and expressive specification of routing policies and discuss the architectural strengths and weaknesses of our proposal. JA - Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture T3 - FDNA '04 PB - ACM CY - New York, NY, USA SN - 1-58113-942-X UR - http://doi.acm.org/10.1145/1016707.1016709 M3 - 10.1145/1016707.1016709 ER - TY - JOUR T1 - The CBP Parameter: A Module Characterization Approach for DSP Software Optimization JF - The Journal of VLSI Signal Processing Y1 - 2004 A1 - Bhattacharyya, Shuvra S. A1 - Murthy,P. K VL - 38 CP - 2 ER - TY - CONF T1 - Challenges in Measuring HPCS Learner Productivity in an Age of Ubiquitous Computing: The HPCS Program T2 - In Proceedings of ICSE Workshop on High Productivity Computing. May 2004 Y1 - 2004 A1 - Asgari, S. A1 - Basili, Victor R. A1 - Carver, J. A1 - Hochstein, L. A1 - Hollingsworth, Jeffrey K A1 - Zelkowitz, Marvin V JA - In Proceedings of ICSE Workshop on High Productivity Computing. May 2004 ER - TY - CHAP T1 - Characterization of the Overall Rotational Diffusion of a Protein From 15N Relaxation Measurements and Hydrodynamic Calculations T2 - Protein NMR Techniques Y1 - 2004 A1 - Blake-Hall,Jennifer A1 - Walker,Olivier A1 - Fushman, David ED - Downing,A. Kristina ED - Walker,John M. KW - Biomedical and Life Sciences AB - In this chapter, we discuss experimental and theoretical methods for characterizing the overall rotational diffusion of molecules in solution. The methods are illustrated for the B3 domain of protein G, a small protein with rotational anisotropy of D par / D perp = 1.4. The rotational diffusion tensor of the protein is determined directly from 15 N relaxation measurements. The experimental data are treated assuming various possible models for the overall tumbling: isotropic, axially symmetric, and fully anisotropic, and the results of these analyses are compared to determine an adequate diffusion model for the protein. These experimentally derived characteristics of the protein are compared with the results of theoretical calculations of the diffusion tensor using various hydrodynamic models, to find optimal models and parameter sets for theoretical predictions. We also derive model-free characteristics of internal backbone motions in the protein, to show that different models for the overall motion can result in significantly different pictures of motion. This emphasizes the necessity of accurately characterizing the overall tumbling of a molecule to determine its local dynamics. JA - Protein NMR Techniques T3 - Methods in Molecular Biology PB - Humana Press VL - 278 SN - 978-1-59259-809-0 UR - http://www.springerlink.com/content/h6w35487x3q1g6x7/abstract/ ER - TY - CONF T1 - CHARMED: A multi-objective co-synthesis framework for multi-mode embedded systems T2 - Application-Specific Systems, Architectures and Processors, 2004. Proceedings. 15th IEEE International Conference on Y1 - 2004 A1 - Kianzad,V. A1 - Bhattacharyya, Shuvra S. JA - Application-Specific Systems, Architectures and Processors, 2004. Proceedings. 15th IEEE International Conference on ER - TY - CONF T1 - Compact procedural implementation in DSP software synthesis through recursive graph decomposition T2 - Software and compilers for embedded systems: 8th international workshop, SCOPES 2004, Amsterdam, The Netherlands, September 2-3, 2004: proceedings Y1 - 2004 A1 - Ko,M. Y A1 - Murthy,P. K A1 - Bhattacharyya, Shuvra S. JA - Software and compilers for embedded systems: 8th international workshop, SCOPES 2004, Amsterdam, The Netherlands, September 2-3, 2004: proceedings VL - 3199 ER - TY - CONF T1 - Compound eye sensor for 3D ego motion estimation T2 - 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2004. (IROS 2004). Proceedings Y1 - 2004 A1 - Neumann, J. A1 - Fermüller, Cornelia A1 - Aloimonos, J. A1 - Brajovic,V. KW - 3D camera motion estimation KW - CAMERAS KW - compound eye vision sensor KW - Computer vision KW - Equations KW - Eyes KW - Geometry KW - Image sensors KW - Insects KW - linear equations KW - Motion estimation KW - robot vision KW - Robustness KW - sampling geometry KW - Sampling methods KW - Sensor phenomena and characterization AB - We describe a compound eye vision sensor for 3D ego motion computation. Inspired by eyes of insects, we show that the compound eye sampling geometry is optimal for 3D camera motion estimation. This optimality allows us to estimate the 3D camera motion in a scene-independent and robust manner by utilizing linear equations. The mathematical model of the new sensor can be implemented in analog networks resulting in a compact computational sensor for instantaneous 3D ego motion measurements in full six degrees of freedom. JA - 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2004. (IROS 2004). Proceedings PB - IEEE VL - 4 SN - 0-7803-8463-6 M3 - 10.1109/IROS.2004.1389992 ER - TY - CONF T1 - A cooperative bulk transfer protocol T2 - IEEE Infocom Y1 - 2004 A1 - Sherwood,R. A1 - Braud,R. A1 - Bhattacharjee, Bobby JA - IEEE Infocom ER - TY - CONF T1 - Data Centric Cache Measurement on the Intel ltanium 2 Processor T2 - Proceedings of the 2004 ACM/IEEE conference on Supercomputing Y1 - 2004 A1 - Buck, Bryan R A1 - Hollingsworth, Jeffrey K AB - Processor speed continues to increase faster than the speed of access to main memory, making effective use of memory caches more important. Information about an applicationýs interaction with the cache is therefore critical to performance tuning. To be most useful, tools that measure this information should relate it to the source code level data structures in an application. We describe how to gather such information by using hardware performance counters to sample cache miss addresses, and present a new tool named Cache Scope that does this using the Intel Itanium 2 performance monitors. We present experimental results concerning Cache Scopeýs accuracy and perturbation of cache behavior. We also describe a case study of using Cache Scope to tune two applications, achieving 24% and 19% reductions in running time. JA - Proceedings of the 2004 ACM/IEEE conference on Supercomputing T3 - SC '04 PB - IEEE Computer Society SN - 0-7695-2153-3 UR - http://dx.doi.org/10.1109/SC.2004.21 M3 - http://dx.doi.org/10.1109/SC.2004.21 ER - TY - JOUR T1 - Data sciences technology for homeland security information management and knowledge discovery JF - Report of the DHS Workshop Data Sciences, Jointly Released by Sandia National Laboratories and Lawrence Livermore National Laboratory, Alexandria, Va Y1 - 2004 A1 - Kolda,T. A1 - Brown,D A1 - Corones,J. A1 - Critchlow,T. A1 - Eliassi-Rad,T. A1 - Getoor, Lise A1 - Hendrickson,B. A1 - Kumar, V. A1 - Lambert,D. A1 - Matarazzo,C. ER - TY - JOUR T1 - DateLens: A fisheye calendar interface for PDAs JF - ACM Transactions on Computer-Human Interaction (TOCHI) Y1 - 2004 A1 - Bederson, Benjamin B. A1 - Clamage,A. A1 - Czerwinski,M.P. A1 - Robertson,G.G. VL - 11 CP - 1 ER - TY - JOUR T1 - Deduplication and group detection using links JF - KDD workshop on link analysis and group detection Y1 - 2004 A1 - Bhattacharya,I. A1 - Getoor, Lise AB - Clustering is a fundamental problem in data mining. Tradi-tionally, clustering is done based on the similarity of the at- tribute values of the entities to be clustered. More recently, there has been greater interest in clustering relational and structured data. Often times this data is best described as a graph, in which there are both entities, described by a collec- tion of attributes, and links between entities, representing the relations between them. Clustering in these scenarios becomes more complex, as we should also take into account the similarity of the entity links when we are clustering. We propose novel distance measures for clustering linked data, and show how they can be used to solve two important data mining tasks, entity deduplication and group discovery. ER - TY - JOUR T1 - Determining Causes and Severity of End-User Frustration JF - International Journal of Human-Computer Interaction Y1 - 2004 A1 - Ceaparu,Irina A1 - Lazar,Jonathan A1 - Bessiere,Katie A1 - Robinson,John A1 - Shneiderman, Ben AB - Although computers are beneficial to individuals and society, frequently users encounter frustrating experiences when using computers. This study represents an attempt to measure, in 111 participants, the frequency, the cause, and the level of severity of frustrating experiences. The data show that frustrating experiences happen on a frequent basis. The applications in which the frustrating experiences happened most frequently were Web browsing, e-mail, and word processing. The most-cited causes of frustrating experiences were error messages, dropped network connections, long download times, and hard-to-find features. The time lost due to frustrating experiences ranged from 47% to 53% of time spent on a computer, depending on the location and study method. After extreme cases were discarded, the time lost was still above 38%. These disturbing results should be a basis for future study.Although computers are beneficial to individuals and society, frequently users encounter frustrating experiences when using computers. This study represents an attempt to measure, in 111 participants, the frequency, the cause, and the level of severity of frustrating experiences. The data show that frustrating experiences happen on a frequent basis. The applications in which the frustrating experiences happened most frequently were Web browsing, e-mail, and word processing. The most-cited causes of frustrating experiences were error messages, dropped network connections, long download times, and hard-to-find features. The time lost due to frustrating experiences ranged from 47% to 53% of time spent on a computer, depending on the location and study method. After extreme cases were discarded, the time lost was still above 38%. These disturbing results should be a basis for future study. VL - 17 SN - 1044-7318 UR - http://www.tandfonline.com/doi/abs/10.1207/s15327590ijhc1703_3 CP - 3 M3 - 10.1207/s15327590ijhc1703_3 ER - TY - CONF T1 - Developing Locally Relevant Software Applications for Rural Areas: A South African Example T2 - SAICSIT '04 Y1 - 2004 A1 - Marshini Chetty A1 - Tucker, William A1 - Blake, Edwin KW - action research KW - design KW - human factors KW - participatory design KW - telemedicine AB - The digital divide between rural and urban areas within developing countries is vast. We investigate how to address this divide by introducing Information and Communication Technologies (ICTs) into remote rural areas. Our aim is to discover how to create locally relevant software applications with appropriate content for these areas. We use a user centred design approach and a modified software development lifecyle that is participatory, iterative and cyclical. This process is based on principles from Participatory Design and Action Research. This paper presents our initial experience of developing a telemedicine application for a rural village in the Eastern Cape Province of South Africa using this process. We present an overview of the methodology, describe the software application we have developed and cite several challenges we have faced. Finally we conclude that an inter-organisational and inter-disciplinary approach is needed to develop software for remote areas. JA - SAICSIT '04 T3 - SAICSIT '04 PB - South African Institute for Computer Scientists and Information Technologists UR - http://dl.acm.org/citation.cfm?id=1035053.1035083 ER - TY - JOUR T1 - DIF: An interchange format for dataflow-based design tools JF - Computer Systems: Architectures, Modeling, and Simulation Y1 - 2004 A1 - Hsu,C. J A1 - Keceli,F. A1 - Ko,M. Y A1 - Shahparnia,S. A1 - Bhattacharyya, Shuvra S. ER - TY - RPRT T1 - Dimensionality Estimation in Hyperspectral Imagery Using Minimum Description Length Y1 - 2004 A1 - Broadwater,Joshua B A1 - Meth,Reuven A1 - Chellapa, Rama KW - *ALGORITHMS KW - *HYPERSPECTRAL IMAGERY KW - *TARGET DETECTION KW - *TARGET RECOGNITION KW - AUTOMATIC KW - BURIED OBJECTS KW - COMPONENT REPORTS KW - MINE DETECTION KW - NUMERICAL MATHEMATICS KW - SURFACE TARGETS. KW - SYMPOSIA KW - TARGET DIRECTION, RANGE AND POSITION FINDING AB - Numerous algorithms have been developed for hyperspectral automatic target recognition (ATR) applications. Many of these algorithms require estimation of a background subspace. The estimation of the background subspace has been addressed using multiple methods. but most of these methods assume a-priori knowledge of the background dimensionality. In order to automate the estimation of the background subspace. we present an algorithm based on minimum description length (MDL) that can identify the background dimension. Results show that the MDL criterion estimates the proper dimension of the background for ATR applications. PB - MARYLAND UNIV COLLEGE PARK CENTER FOR AUTOMATION RESEARCH UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA431643 ER - TY - JOUR T1 - Efficient peer location on the Internet JF - Computer Networks Y1 - 2004 A1 - Banerjee,Suman A1 - Kommareddy,Chris A1 - Bhattacharjee, Bobby KW - Group communication KW - hierarchy KW - overlays KW - Peer location KW - triangle inequality AB - We consider the problem of locating nearby application peers over the Internet. We define a new peer-location scheme (called Tiers), that scales to large application peer groups. Tiers creates a hierarchy of peers, and provides an efficient and scalable solution to the peer-location problem. Tiers can be implemented entirely in the application-layer and does not require the deployment of either any additional measurement services, or well-known reference points in the network.We have evaluated the performance of Tiers through detailed experiments. Our results show that Tiers is able to locate the nearest peers quickly (≪1 s) and accurately on wide-area Internet-like topologies. We have also compared the performance of Tiers with two other schemes, Beaconing and Distributed Binning, both of which are known to have good performance. Both these techniques are reference-points based schemes and are efficient for overlays with a small number of peers (e.g. ⩽32). Our results show that Tiers significantly outperforms both these schemes. Tiers is particularly efficient for large overlay networks, has an order of magnitude lower control overhead for overlays with 512 peers and still achieves greater accuracy in locating the nearest peers. VL - 45 SN - 1389-1286 UR - http://www.sciencedirect.com/science/article/pii/S1389128604000271 CP - 1 M3 - 10.1016/j.comnet.2004.02.005 ER - TY - JOUR T1 - Efficient peer-to-peer namespace searches JF - University of Maryland, College Park, MD, Tech. Rep. CSTR-4568 Y1 - 2004 A1 - Gopalakrishnan,V. A1 - Bhattacharjee, Bobby A1 - Chawathe,S. A1 - Keleher,P. AB - In this paper we describe new methods for efficient and exact search (keyword and full-text) in distributed namespaces. Our methods can be used in conjunction with existing distributed lookup schemes, such as Distributed Hash Tables, and distributed directories. We describe how indexes for implementing distributed searches can be efficiently created, located, and stored. We describe techniques for creating approximate indexes that can be used to bound the space requirement at individual hosts; such techniques are particularly useful for full-text searches that may require a very large number of individual indexes to be created and maintained. Our methods use a new distributed data structure called the view tree. View trees can be used to efficiently cache and locate results from prior queries. We describe how view trees are created, and maintained. We present experimental results, using large namespaces and realistic data, showing that the techniques introduced in this paper can reduce search overheads (both network and processing costs) by more than an order of magnitude. ER - TY - CONF T1 - Empirical-based estimation of the effect on software dependability of a technique for architecture conformance verification T2 - Proceedings of the ICSE 2004 Workshop on Architecting Dependable Systems, Edinburgh, UK Y1 - 2004 A1 - Asgari, S. A1 - Basili, Victor R. A1 - Costa,P. A1 - Donzelli,P. A1 - Hochstein, L. A1 - Lindvall,M. A1 - Rus,I. A1 - Shull, F. A1 - Tvedt,R. A1 - Zelkowitz, Marvin V AB - The High Dependability Computing Program (HDCP)project is a NASA initiative for increasing dependability of software-based systems. It researches achieving high dependability by introducing new technologies. We focus on the evaluation of the effectiveness of technologies with respect to dependability. We employ empirical evaluation methods along with evaluation testbeds. In this paper, our technology evaluation approach is described. A testbed representative of air traffic control applications is used. An experiment to evaluate a technology to for identification of architectural violations is presented. JA - Proceedings of the ICSE 2004 Workshop on Architecting Dependable Systems, Edinburgh, UK ER - TY - CONF T1 - Enhancement of mechanical engineering curriculum to introduce manufacturing techniques and principles for bio-inspired product development Y1 - 2004 A1 - Bruck,H. A. A1 - Gershon,A. L. A1 - Gupta,S.K. UR - ftp://ftp.eng.umd.edu/:/home/glue/s/k/skgupta/backup/pub/Publication/IMECE04_Bruck.pdf ER - TY - JOUR T1 - Finite-element computation of nonlinear magnetic diffusion and its effects when coupled to electrical, mechanical, and hydraulic systems JF - Magnetics, IEEE Transactions on Y1 - 2004 A1 - Brauer,J.R. A1 - Mayergoyz, Issak D KW - actuator; KW - actuators; KW - analysis; KW - axisymmetric KW - B-H KW - coupled KW - currents; KW - curves; KW - cylinders; KW - diffusion KW - diffusion; KW - eddy KW - electrical KW - electrohydraulic KW - electrohydraulics; KW - electromagnetic KW - element KW - equivalent KW - finite KW - finite-element KW - flux; KW - hydraulic KW - magnetic KW - mechanical KW - methods; KW - nonlinear KW - resistor; KW - responses; KW - steel KW - system; KW - systems; KW - times; KW - transducers; AB - Finite elements are used to compute eddy currents and magnetic diffusion times in steel cylinders with nonlinear B–H curves. Computations are made of diffusion times versus current in a typical axisymmetric magnetic actuator, showing good agreement with recently published approximate analytical formulas. The computed nonlinear diffusion times are then used to derive an equivalent resistor that is used in a model of an electrohydraulic system. The diffusion time causes delays in the coupled mechanical and hydraulic responses. VL - 40 SN - 0018-9464 CP - 2 M3 - 10.1109/TMAG.2004.824591 ER - TY - JOUR T1 - Gait recognition using image self-similarity JF - EURASIP J. Appl. Signal Process. Y1 - 2004 A1 - BenAbdelkader,Chiraz A1 - Cutler,Ross G. A1 - Davis, Larry S. KW - behavioral biometrics KW - gait recognition KW - human identification at a distance KW - human movement analysis KW - pattern recognition AB - Gait is one of the few biometrics that can be measured at a distance, and is hence useful for passive surveillance as well as biometric applications. Gait recognition research is still at its infancy, however, and we have yet to solve the fundamental issue of finding gait features which at once have suffcient discrimination power and can be extracted robustly and accurately from low-resolution video. This paper describes a novel gait recognition technique based on the image self-similarity of a walking person. We contend that the similarity plot encodes a projection of gait dynamics. It is also correspondence-free, robust to segmentation noise, and works well with low-resolution video. The method is tested on multiple data sets of varying sizes and degrees of diffculty. Performance is best for fronto-parallel viewpoints, whereby a recognition rate of 98% is achieved for a data set of 6 people, and 70% for a data set of 54 people. VL - 2004 SN - 1110-8657 UR - http://dx.doi.org/10.1155/S1110865704309236 M3 - 10.1155/S1110865704309236 ER - TY - CONF T1 - A game-theoretic framework for analyzing trust-inference protocols T2 - Workshop on Economics of Peer-to-Peer Systems Y1 - 2004 A1 - Morselli,R. A1 - Katz, Jonathan A1 - Bhattacharjee, Bobby AB - We propose a novel game-theoretic framework foranalyzing the robustness of trust-inference protocols in the presence of adversarial (but rational) users. To the best of our knowledge, this is the first such framework which simultaneously (1) admits a rigor- ous and precise definition, thereby enabling formal proofs of security (in various adversarial settings) for specific trust-inference protocols; (2) is flexible enough to accommodate a full range of (realistic) ad- versarial behavior and network models; and (3) is ap- propriate for decentralized networks, and in particu- lar does not posit a trusted, centralized party with complete knowledge of the system history. We also show some preliminary results regarding the design of trust-inference protocols which can be rigorously proven secure within our model. In addition to establishing a solid foundation for future work, our framework also enables a rigorous and objective comparison among existing trust inference protocols. JA - Workshop on Economics of Peer-to-Peer Systems ER - TY - CONF T1 - Hierarchical routing with soft-state replicas in TerraDir T2 - Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International Y1 - 2004 A1 - Silaghi,B. A1 - Gopalakrishnan,Vijay A1 - Bhattacharjee, Bobby A1 - Kelcher,P. KW - ad-hoc KW - adaptive KW - allocation; KW - asymmetrical KW - balancing; KW - bottlenecks; KW - consistency KW - constraints; KW - delivering; KW - demand KW - distribution; KW - guarantees; KW - hierarchical KW - latency KW - load KW - low KW - namespaces; KW - peer-to-peer KW - protocol; KW - protocols; KW - replica KW - replicas; KW - replication KW - resource KW - routing; KW - soft-state KW - systems; KW - TerraDir; KW - topological AB - Summary form only given. Recent work on peer-to-peer systems has demonstrated the ability to deliver low latencies and good load balance when demand for data is relatively uniform. We describe an adaptive replication protocol that delivers low latencies, good load balance even when demand is heavily skewed. The protocol can withstand arbitrary and instantaneous changes in demand distribution. Our approach also addresses classical concerns related to topological constraints of asymmetrical namespaces, such as hierarchical bottlenecks in the context of hierarchical namespaces. The protocol replicates routing state in an ad-hoc manner based on profiled information, is lightweight, scalable, and requires no replica consistency guarantees. JA - Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International M3 - 10.1109/IPDPS.2004.1302967 ER - TY - CONF T1 - A hybrid algorithm for subpixel detection in hyperspectral imagery T2 - Geoscience and Remote Sensing Symposium, 2004. IGARSS '04. Proceedings. 2004 IEEE International Y1 - 2004 A1 - Broadwater, J. A1 - Meth, R. A1 - Chellapa, Rama KW - alarm KW - algorithm;abundance KW - algorithm;Fully KW - algorithm;hybrid KW - algorithm;statistical KW - AMSD;Adaptive KW - analysis;structured KW - approximations;maximum KW - backgrounds;subpixel KW - constrained KW - detection;alarm KW - detection;target KW - Detector;FCLS KW - detector;hyperspectral KW - estimation; KW - estimation;emittance KW - identification;adaptive KW - imagery;reflectance KW - least KW - likelihood KW - Matched KW - matching;least KW - processing;geophysical KW - rate;generalized KW - ratio KW - signal KW - signatures;spectral KW - spectra;false KW - spectra;spectral KW - squares KW - subspace KW - systems;geophysical KW - techniques;image KW - tests;hybrid KW - unmixing AB - Numerous subpixel detection algorithms utilizing structured backgrounds have been developed over the past few years. These range from detection schemes based on spectral unmixing to generalized likelihood ratio tests. Spectral unmixing algorithms such as the Fully Constrained Least Squares (FCLS) algorithm have the advantage of physically modeling the interactions of spectral signatures based on reflectance/emittance spectroscopy. Generalized likelihood ratio tests like the Adaptive Matched Subspace Detector (AMSD) have the advantage of identifying targets that are statistically different from the background. Therefore, a hybrid detector based on both AMSD and FCLS was developed to take advantage of each detector's strengths. Results demonstrate that the hybrid detector achieved the lowest false alarm rates while also producing meaningful abundance estimates JA - Geoscience and Remote Sensing Symposium, 2004. IGARSS '04. Proceedings. 2004 IEEE International VL - 3 M3 - 10.1109/IGARSS.2004.1370633 ER - TY - CHAP T1 - iCLEF 2003 at Maryland: Translation Selection and Document Selection T2 - Comparative Evaluation of Multilingual Information Access SystemsComparative Evaluation of Multilingual Information Access Systems Y1 - 2004 A1 - Dorr, Bonnie J A1 - He,Daqing A1 - Luo,Jun A1 - Oard, Douglas A1 - Schwartz,Richard A1 - Wang,Jianqiang A1 - Zajic, David ED - Peters,Carol ED - Gonzalo,Julio ED - Braschler,Martin ED - Kluck,Michael AB - Maryland performed two sets of experiments for the 2003 Cross-Language Evaluation Forum’s interactive track, one focused on interactive selection of appropriate translations for query terms, the second focused on interactive selection of relevant documents. Translation selection was supported using possible synonyms discovered through back translation and two techniques for generating KeyWord In Context (KWIC) examples of usage. The results indicate that searchers typically achieved a similar search effectiveness using fewer query iterations when interactive translation selection was available. For document selection, a complete extract of the first 40 words of each news story was compared to a compressed extract generated using an automated parse-and-trim approach that approximates one way in which people can produce headlines. The results indicate that compressed “headlines” result in faster assessment, but with a 20% relative reduction in the F α = 0.8 search effectiveness measure. JA - Comparative Evaluation of Multilingual Information Access SystemsComparative Evaluation of Multilingual Information Access Systems T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 3237 SN - 978-3-540-24017-4 UR - http://dx.doi.org/10.1007/978-3-540-30222-3_42 ER - TY - CONF T1 - Implementing stable semantics by linear programming T2 - Logic Programming and Non-Monotonic Reasoning, Proceedings of the Second International Workshop Y1 - 2004 A1 - Bell,C. A1 - Nerode,A. A1 - Ng,R. T A1 - V.S. Subrahmanian JA - Logic Programming and Non-Monotonic Reasoning, Proceedings of the Second International Workshop VL - 7 ER - TY - CONF T1 - Importing abstract spatial data into the SAND database system T2 - Proceedings of the 2004 annual national conference on Digital government research Y1 - 2004 A1 - Samet, Hanan A1 - Brabec,Frantisek A1 - Sankaranarayanan,Jagan AB - The World Wide Web has opened ways to operate large applications by users with simple client platforms located half way around the world by connecting servers around the world together. We present a system that makes a centrally stored spatial database available to off-site users. Regardless of the specific platform available to a user, all they need to do is simply establish a link between their client and the server. Unlike well-known web-based services such as MapQuest [2] that rely on computational power of the server, our system distributes the workload among the client and the server in such a manner that the user will observe the system as being interactive, with minimal delay between the user action and appropriate response for most types of operations. JA - Proceedings of the 2004 annual national conference on Digital government research T3 - dg.o '04 PB - Digital Government Society of North America UR - http://dl.acm.org/citation.cfm?id=1124191.1124253 ER - TY - JOUR T1 - Improved Multiuser Detectors Employing Genetic Algorithms in a Space-Time Block Coded System, Yinggang Du and Kam Tai Chan JF - Signal Y1 - 2004 A1 - Self-Similarity,G.R.U.I. A1 - BenAbdelkader,C. A1 - Cutler,R.G. A1 - Davis, Larry S. A1 - Local,F.R.U. A1 - Global Features,J.H. A1 - Yuen, P.C. A1 - Lai,JH A1 - Li,C. VL - 2004 CP - 5 ER - TY - JOUR T1 - The ingi and RIME non-LTR retrotransposons are not randomly distributed in the genome of Trypanosoma brucei JF - Molecular biology and evolution Y1 - 2004 A1 - Bringaud,F. A1 - Biteau,N. A1 - Zuiderwijk,E. A1 - Berriman,M. A1 - El‐Sayed, Najib M. A1 - Ghedin,E. A1 - Melville,S. E. A1 - Hall,N. A1 - Baltz,T. VL - 21 CP - 3 ER - TY - JOUR T1 - Interactively Optimizing Signal-to-Noise Ratios in Expression Profiling: Project-Specific Algorithm Selection and Detection P-Value Weighting in Affymetrix Microarrays JF - BioinformaticsBioinformatics Y1 - 2004 A1 - Seo,Jinwook A1 - Bakay,Marina A1 - Chen,Yi-Wen A1 - Hilmer,Sara A1 - Shneiderman, Ben A1 - Hoffman,Eric P AB - Motivation: The most commonly utilized microarrays for mRNA profiling (Affymetrix) include ‘probe sets’ of a series of perfect match and mismatch probes (typically 22 oligonucleotides per probe set). There are an increasing number of reported ‘probe set algorithms’ that differ in their interpretation of a probe set to derive a single normalized ‘signal’ representative of expression of each mRNA. These algorithms are known to differ in accuracy and sensitivity, and optimization has been done using a small set of standardized control microarray data. We hypothesized that different mRNA profiling projects have varying sources and degrees of confounding noise, and that these should alter the choice of a specific probe set algorithm. Also, we hypothesized that use of the Microarray Suite (MAS) 5.0 probe set detection p-value as a weighting function would improve the performance of all probe set algorithms.Results: We built an interactive visual analysis software tool (HCE2W) to test and define parameters in Affymetrix analyses that optimize the ratio of signal (desired biological variable) versus noise (confounding uncontrolled variables). Five probe set algorithms were studied with and without statistical weighting of probe sets using the MAS 5.0 probe set detection p-values. The signal-to-noise ratio optimization method was tested in two large novel microarray datasets with different levels of confounding noise, a 105 sample U133A human muscle biopsy dataset (11 groups: mutation-defined, extensive noise), and a 40 sample U74A inbred mouse lung dataset (8 groups: little noise). Performance was measured by the ability of the specific probe set algorithm, with and without detection p-value weighting, to cluster samples into the appropriate biological groups (unsupervised agglomerative clustering with F-measure values). Of the total random sampling analyses, 50% showed a highly statistically significant difference between probe set algorithms by ANOVA [F(4,10) > 14, p < 0.0001], with weighting by MAS 5.0 detection p-value showing significance in the mouse data by ANOVA [F(1,10) > 9, p < 0.013] and paired t-test [t(9) = −3.675, p = 0.005]. Probe set detection p-value weighting had the greatest positive effect on performance of dChip difference model, ProbeProfiler and RMA algorithms. Importantly, probe set algorithms did indeed perform differently depending on the specific project, most probably due to the degree of confounding noise. Our data indicate that significantly improved data analysis of mRNA profile projects can be achieved by optimizing the choice of probe set algorithm with the noise levels intrinsic to a project, with dChip difference model with MAS 5.0 detection p-value continuous weighting showing the best overall performance in both projects. Furthermore, both existing and newly developed probe set algorithms should incorporate a detection p-value weighting to improve performance. Availability: The Hierarchical Clustering Explorer 2.0 is available at http://www.cs.umd.edu/hcil/hce/. Murine arrays (40 samples) are publicly available at the PEPR resource (http://microarray.cnmcresearch.org/pgadatatable.asp; http://pepr.cnmcresearch.org; Chen et al., 2004). VL - 20 SN - 1367-4803, 1460-2059 UR - http://bioinformatics.oxfordjournals.org/content/20/16/2534 CP - 16 M3 - 10.1093/bioinformatics/bth280 ER - TY - BOOK T1 - Interconnect Synthesis for Systems on Chip Y1 - 2004 A1 - Bhattacharyya, Shuvra S. A1 - Bambha,N. K PB - MARYLAND UNIV COLLEGE PARK DEPT OF ELECTRICAL AND COMPUTER ENGINEERING ER - TY - CONF T1 - Iterative record linkage for cleaning and integration T2 - Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery Y1 - 2004 A1 - Bhattacharya,Indrajit A1 - Getoor, Lise KW - clustering KW - deduplication KW - distance measure KW - record linkage AB - Record linkage, the problem of determining when two records refer to the same entity, has applications for both data cleaning (deduplication) and for integrating data from multiple sources. Traditional approaches use a similarity measure that compares tuples' attribute values; tuples with similarity scores above a certain threshold are declared to be matches. While this method can perform quite well in many domains, particularly domains where there is not a large amount of noise in the data, in some domains looking only at tuple values is not enough. By also examining the context of the tuple, i.e. the other tuples to which it is linked, we can come up with a more accurate linkage decision. But this additional accuracy comes at a price. In order to correctly find all duplicates, we may need to make multiple passes over the data; as linkages are discovered, they may in turn allow us to discover additional linkages. We present results that illustrate the power and feasibility of making use of join information when comparing records. JA - Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery T3 - DMKD '04 PB - ACM CY - New York, NY, USA SN - 1-58113-908-X UR - http://doi.acm.org/10.1145/1008694.1008697 M3 - 10.1145/1008694.1008697 ER - TY - CONF T1 - Java-through-c compilation: An enabling technology for java in embedded systems T2 - Proceedings of the conference on Design, automation and test in Europe-Volume 3 Y1 - 2004 A1 - Varma,A. A1 - Bhattacharyya, Shuvra S. JA - Proceedings of the conference on Design, automation and test in Europe-Volume 3 ER - TY - CONF T1 - Low-dimensional embedding with extra information T2 - Proceedings of the twentieth annual symposium on Computational geometry Y1 - 2004 A1 - Bǎdoiu,M. A1 - Demaine,E. D A1 - Hajiaghayi, Mohammad T. A1 - Indyk,P. JA - Proceedings of the twentieth annual symposium on Computational geometry ER - TY - RPRT T1 - Managing the 802.11 energy/performance tradeoff with machine learning Y1 - 2004 A1 - Monteleoni,C. A1 - Balakrishnan,H. A1 - Feamster, Nick A1 - Jaakkola,T. AB - This paper addresses the problem of managing the tradeoff betweenenergy consumption and performance in wireless devices implementingthe IEEE 802.11 standard. To save energy, the 802.11 specificationproposes a power-saving mode (PSM), where a device can sleep to saveenergy, periodically waking up to receive packets from a neighbor(e.g., an access point) that may have buffered packets for thesleeping device. Previous work has shown that a fixed polling time forwaking up degrades the performance of Web transfers, because networkactivity is bursty and time-varying. We apply a new online machinelearning algorithm to this problem and show, using ns simulation andtrace analysis, that it is able to adapt well to network activity. Thelearning process makes no assumptions about the underlying networkactivity being stationary or even Markov. Our learning power-savingalgorithm, LPSM, guides the learning using a "loss function" thatcombines the increased latency from potentially sleeping too long andthe wasted use of energy in waking up too soon. In our nssimulations, LPSM saved 7%-20% more energy than 802.11 in power-savingmode, with an associated increase in average latency by a factor of1.02, and not more than 1.2. LPSM is straightforward to implementwithin the 802.11 PSM framework. PB - Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory VL - MIT-CSAIL-TR-2004-068 UR - http://hdl.handle.net/1721.1/30499 ER - TY - CHAP T1 - An MCMC-Based Particle Filter for Tracking Multiple Interacting Targets T2 - Computer Vision - ECCV 2004 Y1 - 2004 A1 - Zia Khan A1 - Balch, Tucker A1 - Dellaert, Frank ED - Pajdla, Tomás ED - Matas, Jiří KW - Artificial Intelligence (incl. Robotics) KW - Computer Graphics KW - Image Processing and Computer Vision KW - pattern recognition AB - We describe a Markov chain Monte Carlo based particle filter that effectively deals with interacting targets, i.e., targets that are influenced by the proximity and/or behavior of other targets. Such interactions cause problems for traditional approaches to the data association problem. In response, we developed a joint tracker that includes a more sophisticated motion model to maintain the identity of targets throughout an interaction, drastically reducing tracker failures. The paper presents two main contributions: (1) we show how a Markov random field (MRF) motion prior, built on the fly at each time step, can substantially improve tracking when targets interact, and (2) we show how this can be done efficiently using Markov chain Monte Carlo (MCMC) sampling. We prove that incorporating an MRF to model interactions is equivalent to adding an additional interaction factor to the importance weights in a joint particle filter. Since a joint particle filter suffers from exponential complexity in the number of tracked targets, we replace the traditional importance sampling step in the particle filter with an MCMC sampling step. The resulting filter deals efficiently and effectively with complicated interactions when targets approach each other. We present both qualitative and quantitative results to substantiate the claims made in the paper, including a large scale experiment on a video-sequence of over 10,000 frames in length. JA - Computer Vision - ECCV 2004 T3 - Lecture Notes in Computer Science PB - Springer Berlin Heidelberg SN - 978-3-540-21981-1, 978-3-540-24673-2 UR - http://link.springer.com/chapter/10.1007/978-3-540-24673-2_23 ER - TY - CONF T1 - Measurement based optimal multi-path routing T2 - INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies Y1 - 2004 A1 - Guven,T. A1 - Kommareddy,C. A1 - La,R.J. A1 - Shayman,M.A. A1 - Bhattacharjee, Bobby KW - algorithm;network KW - approximation;routing KW - IP KW - measurement;network KW - monitoring;optimization;perturbation KW - multipath KW - network;measurement-based KW - networks;Internet;optimisation;routing KW - processes; KW - protocol;IP KW - protocols;stochastic KW - Routing KW - Stochastic AB - We propose a new architecture for efficient network monitoring and measurements in a traditional IP network. This new architecture enables establishment of multiple paths (tunnels) between source-destination pairs without having to modify the underlying routing protocol(s). Based on the proposed architecture we propose a measurement-based multipath routing algorithm derived from simultaneous perturbation stochastic approximation. The proposed algorithm does not assume that the gradient of analytical cost function is known to the algorithm, but rather relies on noisy estimates from measurements. Using the analytical model presented in the paper we prove the convergence of the algorithm to the optimal solution. Simulation results are presented to demonstrate the advantages of the proposed algorithm under a variety of network scenarios. A comparative study with an existing optimal routing algorithm, MATE, is also provided JA - INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies VL - 1 M3 - 10.1109/INFCOM.2004.1354493 ER - TY - CONF T1 - Multi-dimensional quorum sets for read-few write-many replica control protocols T2 - Cluster Computing and the Grid, 2004. CCGrid 2004. IEEE International Symposium on Y1 - 2004 A1 - Silaghi,B. A1 - Keleher,P. A1 - Bhattacharjee, Bobby KW - accesses; KW - availability; KW - cache KW - caching; KW - Communication KW - complexity; KW - CONTROL KW - d-spaces; KW - distributed KW - efficiency; KW - lightweight KW - logical KW - multi-dimensional KW - processing; KW - protocols; KW - quorum KW - read KW - read-few KW - reconfiguration; KW - replica KW - sets; KW - storage; KW - structures; KW - update KW - write-many AB - We describe d-spaces, a replica control protocol defined in terms of quorum sets on multi-dimensional logical structures. Our work is motivated by asymmetrical access patterns, where the number of read accesses to data are dominant relative to update accesses, i.e. where the protocols should be read-few write-many. D-spaces are optimal with respect to quorum group sizes. The quality of the tradeoff between read efficiency and update availability is not matched by existing quorum protocols. We also propose a novel scheme for implementing d-spaces that combines caching and local information to provide a best-effort form of global views. This allows quorum reconfiguration to be lightweight without impacting access latencies, even when the rate of membership changes is very high. JA - Cluster Computing and the Grid, 2004. CCGrid 2004. IEEE International Symposium on M3 - 10.1109/CCGrid.2004.1336588 ER - TY - JOUR T1 - Multiscale advanced raster map analysis system: definition, design and development JF - Environmental and Ecological Statistics Y1 - 2004 A1 - Patil,G. P. A1 - Balbus,J. A1 - Biging,G. A1 - JaJa, Joseph F. A1 - Myers,W. L. A1 - Taillie,C. AB - This paper brings together a multidisciplinary initiative to develop advanced statistical and computational techniques for analyzing, assessing, and extracting information from raster maps. This information will provide a rigorous foundation to address a wide range of applications including disease mapping, emerging infectious diseases, landscape ecological assessment, land cover trends and change detection, watershed assessment, and map accuracy assessment. It will develop an advanced map analysis system that integrates these techniques with an advanced visualization toolbox, and use the system to conduct large case studies using rich sets of raster data, primarily from remotely sensed imagery. As a result, it will be possible to study and evaluate raster maps of societal, ecological, and environmental variables to facilitate quantitative characterization and comparative analysis of geospatial trends, patterns, and phenomena. In addition to environmental and ecological studies, these techniques and tools can be used for policy decisions at national, state, and local levels, crisis management, and protection of infrastructure. Geospatial data form the foundation of an information-based society. Remote sensing has been a vastly under-utilized resource involving a multi-million dollar investment at the national levels. Even when utilized, the credibility has been at stake, largely because of lack of tools that can assess, visualize, and communicate accuracy and reliability in timely manner and at desired confidence levels. Consider an imminent 21st century scenario: What message does a multi-categorical map have about the large landscape it represents? And at what scale, and at what level of detail? Does the spatial pattern of the map reveal any societal, ecological, environmental condition of the landscape? And therefore can it be an indicator of change? How do you automate the assessment of the spatial structure and behavior of change to discover critical areas, hot spots, and their corridors? Is the map accurate? How accurate is it? How do you assess the accuracy of the map? How do we evaluate a temporal change map for change detection? What are the implications of the kind and amount of change and accuracy on what matters, whether climate change, carbon emission, water resources, urban sprawl, biodiversity, indicator species, human health, or early warning? And with what confidence? The proposed research initiative is expected to find answers to these questions and a few more that involve multi-categorical raster maps based on remote sensing and other geospatial data. It includes the development of techniques for map modeling and analysis using Markov Random Fields, geospatial statistics, accuracy assessment and change detection, upper echelons of surfaces, advanced computational techniques for geospatial data mining, and advanced visualization techniques. VL - 11 CP - 2 M3 - 10.1023/B:EEST.0000027205.77490.8c ER - TY - JOUR T1 - New year’s resolutions for software quality JF - IEEE Software Y1 - 2004 A1 - Basili, Victor R. A1 - Boehm,B. A1 - Davis,A. A1 - Humphrey,W. S A1 - Leveson,N. A1 - Mead,N. R A1 - Musa,J. D A1 - Parnas,D. L A1 - Pfleeger,S. L A1 - Weyuker,E. AB - In the spirit of making resolutions for betterment in the New Year, ten distinguished individuals in the software quality field offer their recommendations on how organizations can improve software quality In the spirit of making resolutions for betterment in the New Year, ten distinguished individuals in the software quality field offer their recommendations on how organizations can improve software quality. VL - 21 CP - 1 ER - TY - JOUR T1 - A Note on Efficient Computation of Haplotypes via Perfect Phylogeny JF - Journal of Computational Biology Y1 - 2004 A1 - Bafna,Vineet A1 - Gusfield,Dan A1 - Hannenhalli, Sridhar A1 - Yooseph,Shibu AB - The problem of inferring haplotype phase from a population of genotypes has received a lot of attention recently. This is partly due to the observation that there are many regions on human genomic DNA where genetic recombination is rare (Helmuth, 2001; Daly et al., 2001; Stephens et al., 2001; Friss et al., 2001). A Haplotype Map project has been announced by NIH to identify and characterize populations in terms of these haplotypes. Recently, Gusfield introduced the perfect phylogeny haplotyping problem, as an algorithmic implication of the no-recombination in long blocks observation, together with the standard population-genetic assumption of infinite sites. Gusfield's solution based on matroid theory was followed by direct θ(nm2 ) solutions that use simpler techniques (Bafna et al., 2003; Eskin et al., 2003), and also bound the number of solutions to the PPH problem. In this short note, we address two questions that were left open. First, can the algorithms of Bafna et al. (2003) and Eskin et al. (2003) be sped-up to O(nm + m2 ) time, which would imply an O(nm) time-bound for the PPH problem? Second, if there are multiple solutions, can we find one that is most parsimonious in terms of the number of distinct haplotypes.We give reductions that suggests that the answer to both questions is "no." For the first problem, we show that computing the output of the first step (in either method) is equivalent to Boolean matrix multiplication. Therefore, the best bound we can presently achieve is O(nmω–1), where ω ≤ 2.52 is the exponent of matrix multiplication. Thus, any linear time solution to the PPH problem likely requires a different approach. For the second problem of computing a PPH solution that minimizes the number of distinct haplotypes, we show that the problem is NP-hard using a reduction from Vertex Cover (Garey and Johnson, 1979). VL - 11 SN - 1066-5277, 1557-8666 UR - http://www.liebertonline.com/doi/abs/10.1089/cmb.2004.11.858 CP - 5 M3 - 10.1089/cmb.2004.11.858 ER - TY - JOUR T1 - Only in Europe?: The Economic and Military Foundations of European World Empires JF - Typescript. Princeton University Y1 - 2004 A1 - Jordan Boyd-Graber ER - TY - JOUR T1 - Pandemic strains of O3:K6 Vibrio parahaemolyticus in the aquatic environment of Bangladesh JF - Canadian Journal of Microbiology Y1 - 2004 A1 - Islam,M. S. A1 - Tasmin,Rizwana A1 - Khan,Sirajul I. s l a m A1 - Bakht,Habibul B. M. A1 - Mahmood,Zahid H. a y a t A1 - Rahman,M. Z. i a u r A1 - Bhuiyan,Nurul A. m i n A1 - Nishibuchi,Mitsuaki A1 - Nair,G. B. a l a k r i s h A1 - Sack,R. B. r a d l e y A1 - Huq,Anwar A1 - Rita R Colwell A1 - Sack,David A. AB - A total of 1500 environmental strains of Vibrio parahaemolyticus, isolated from the aquatic environment of Bangladesh, were screened for the presence of a major V. parahaemolyticus virulence factor, the thermostable direct haemolysin (tdh) gene, by the colony blot hybridization method using a digoxigenin-labeled tdh gene probe. Of 1500 strains, 5 carried the tdh sequence, which was further confirmed by PCR using primers specific for the tdh gene. Examination by PCR confirmed that the 5 strains were V. parahamolyticus and lacked the thermostable direct haemolysin-related haemolysin (trh) gene, the alternative major virulence gene known to be absent in pandemic strains. All 5 strains gave positive Kanagawa phenomenon reaction with characteristic beta-haemolysis on Wagatsuma agar medium. Southern blot analysis of the HindIII-digested chromosomal DNA demonstrated, in all 5 strains, the presence of 2 tdh genes common to strains positive for Kanagawa phenomenon. However, the 5 strains were found to belong to 3 different serotypes (O3:K29, O4:K37, and O3:K6). The 2 with pandemic serotype O3:K6 gave positive results in group-specific PCR and ORF8 PCR assays, characteristics unique to the pandemic clone. Clonal variations among the 5 isolates were analyzed by comparing RAPD and ribotyping patterns. Results showed different patterns for the 3 serotypes, but the pattern was identical among the O3:K6 strains. This is the first report on the isolation of pandemic O3:K6 strains of V. parahaemolyticus from the aquatic environment of Bangladesh. VL - 50 UR - http://umd.library.ingentaconnect.com/content/nrc/cjm/2004/00000050/00000010/art00007 CP - 10 ER - TY - CONF T1 - Pocket PhotoMesa: a Zoomable image browser for PDAs T2 - Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia Y1 - 2004 A1 - Khella,A. A1 - Bederson, Benjamin B. JA - Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia ER - TY - CONF T1 - Preschool children's use of mouse buttons T2 - CHI'04 extended abstracts on Human factors in computing systems Y1 - 2004 A1 - Hourcade,J. P A1 - Bederson, Benjamin B. A1 - Druin, Allison JA - CHI'04 extended abstracts on Human factors in computing systems ER - TY - CONF T1 - Querying Web-Accessible Life Science Sources: Which paths to choose? T2 - Proceedings of VLDB Workshop on Information Integration on the Web (IIWeb-2004) Y1 - 2004 A1 - Bleiholder,J. A1 - Naumann,F. A1 - Raschid, Louiqa A1 - Vidal,M. E JA - Proceedings of VLDB Workshop on Information Integration on the Web (IIWeb-2004) ER - TY - CONF T1 - A Rao-Blackwellized particle filter for EigenTracking T2 - Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004 Y1 - 2004 A1 - Zia Khan A1 - Balch, T. A1 - Dellaert, F. KW - analytically tractable integrals KW - Computer vision KW - EigenTracking KW - Filters KW - Gaussian processes KW - modal analysis KW - multi-modal distributions KW - NOISE KW - noisy targets KW - optimisation KW - optimization-based algorithms KW - Particle filters KW - Particle measurements KW - Particle tracking KW - Principal component analysis KW - probabilistic principal component analysis KW - Rao-Blackwellized particle filter KW - Robustness KW - SHAPE KW - State estimation KW - state vector KW - subspace coefficients KW - Subspace representations KW - target tracking KW - vectors AB - Subspace representations have been a popular way to model appearance in computer vision. In Jepson and Black's influential paper on EigenTracking, they were successfully applied in tracking. For noisy targets, optimization-based algorithms (including EigenTracking) often fail catastrophically after losing track. Particle filters have recently emerged as a robust method for tracking in the presence of multi-modal distributions. To use subspace representations in a particle filter, the number of samples increases exponentially as the state vector includes the subspace coefficients. We introduce an efficient method for using subspace representations in a particle filter by applying Rao-Blackwellization to integrate out the subspace coefficients in the state vector. Fewer samples are needed since part of the posterior over the state vector is analytically calculated. We use probabilistic principal component analysis to obtain analytically tractable integrals. We show experimental results in a scenario in which we track a target in clutter. JA - Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004 VL - 2 ER - TY - JOUR T1 - Robotics & Automation Magazine Vol. 11 JF - IEEE Robotics & Automation Magazine Y1 - 2004 A1 - Aliaga, D.G. A1 - Allen,PK A1 - Archibald,JK A1 - Argyros,AA A1 - Arkin,RC A1 - Baker,C. A1 - Baker, P. A1 - Beard,RW A1 - Bicchi,A. A1 - Birgmajer,B. A1 - others ER - TY - CONF T1 - Running on the bare metal with GeekOS T2 - Proceedings of the 35th SIGCSE technical symposium on Computer science education Y1 - 2004 A1 - Hovemeyer, David A1 - Hollingsworth, Jeffrey K A1 - Bhattacharjee, Bobby KW - education KW - emulation KW - Hardware KW - Operating systems AB - Undergraduate operating systems courses are generally taught using one of two approaches: abstract or concrete. In the abstract approach, students learn the concepts underlying operating systems theory, and perhaps apply them using user-level threads in a host operating system. In the concrete approach, students apply concepts by working on a real operating system kernel. In the purest manifestation of the concrete approach, students implement operating system projects that run on real hardware.GeekOS is an instructional operating system kernel which runs on real hardware. It provides the minimum functionality needed to schedule threads and control essential devices on an x86 PC. On this foundation, we have developed projects in which students build processes, semaphores, a multilevel feedback scheduler, paged virtual memory, a filesystem, and inter-process communication. We use the Bochs emulator for ease of development and debugging. While this approach (tiny kernel run on an emulator) is not new, we believe GeekOS goes further towards the goal of combining realism and simplicity than previous systems have. JA - Proceedings of the 35th SIGCSE technical symposium on Computer science education T3 - SIGCSE '04 PB - ACM CY - New York, NY, USA SN - 1-58113-798-2 UR - http://doi.acm.org/10.1145/971300.971411 M3 - 10.1145/971300.971411 ER - TY - CONF T1 - Scalable resilient media streaming T2 - Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video Y1 - 2004 A1 - Banerjee,Suman A1 - Lee,Seungjoon A1 - Braud,Ryan A1 - Bhattacharjee, Bobby A1 - Srinivasan, Aravind KW - media streaming KW - Multicast KW - overlay network KW - Resilience AB - We present a low-overhead media streaming system, called SRMS (Scalable Resilient Media Streaming) that can be used to scalably deliver streaming data to a large group of receivers. SRMS uses overlay multicast for data distribution. to a large group of users. SRMS leverages a probabilistic loss recovery technique to provide high data delivery guarantees even under large network losses and overlay node failures. The clients in the SRMS system are able to interoperate with existing media streaming servers that use RTP for data transport. One of the interesting features of SRMS is that it can simultaneously support clients with disparate access bandwidths. It enables the necessary bandwidth adaptations using standard Real-time Transport Protocol (RTP) mechanisms, e.g. RTP translators. We have implemented and evaluated the SRMS system in detail on an emulated network as well as on a wide-area testbed with up to 128 clients. Our results show that clients using SRMS achieve high (97%) data delivery ratios with low overheads (<5%) even for a very dynamic network (up to five membership changes per minute). JA - Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video T3 - NOSSDAV '04 PB - ACM CY - New York, NY, USA SN - 1-58113-801-6 UR - http://doi.acm.org/10.1145/1005847.1005851 M3 - 10.1145/1005847.1005851 ER - TY - JOUR T1 - Self-Calibration from Image Derivatives JF - International Journal of Computer Vision Y1 - 2004 A1 - Brodskỳ, T. A1 - Fermüller, Cornelia VL - 48 CP - 2 ER - TY - JOUR T1 - Sequencing Strategies for Parasite Genomes JF - METHODS IN MOLECULAR BIOLOGY-CLIFTON THEN TOTOWA- Y1 - 2004 A1 - Bartholomeu,D. A1 - El‐Sayed, Najib M. A1 - Melville,S. E. VL - 270 ER - TY - JOUR T1 - SESSION 2: STREAMING JF - Proceedings of the 14th International Workshop on Network and Operating Systems Support for Digital Audio and Video: NOSSDAV 2003: June 16-18, 2004, Cork, Ireland Y1 - 2004 A1 - Banerjee,S. A1 - Lee,S. A1 - Braud,R. A1 - Bhattacharjee, Bobby A1 - Srinivasan, Aravind A1 - Chu,Y. A1 - Zhang,H. A1 - Sinha,R. A1 - Papadopoulos,C. A1 - Boustead,P. A1 - others ER - TY - JOUR T1 - SlideBar: Analysis of a linear input device JF - Behaviour & Information Technology Y1 - 2004 A1 - Chipman,L.E. A1 - Bederson, Benjamin B. A1 - Golbeck,J. VL - 23 CP - 1 ER - TY - CONF T1 - Slurpie: a cooperative bulk data transfer protocol T2 - INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies Y1 - 2004 A1 - Sherwood,R. A1 - Braud,R. A1 - Bhattacharjee, Bobby KW - adaptive KW - bulk KW - client-server KW - clients; KW - computing; KW - cooperative KW - data KW - data; KW - downloading KW - network; KW - peer-to-peer KW - protocol; KW - protocols; KW - Slurpie KW - strategy; KW - systems; KW - transfer KW - transport AB - We present Slurpie: a peer-to-peer protocol for bulk data transfer. Slurpie is specifically designed to reduce client download times for large, popular files, and to reduce load on servers that serve these files. Slurpie employs a novel adaptive downloading strategy to increase client performance, and employs a randomized backoff strategy to precisely control load on the server. We describe a full implementation of the Slurpie protocol, and present results from both controlled local-area and wide-area testbeds. Our results show that Slurpie clients improve performance as the size of the network increases, and the server is completely insulated from large flash crowds entering the Slurpie network. JA - INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies VL - 2 M3 - 10.1109/INFCOM.2004.1356981 ER - TY - CHAP T1 - Social and psychological influences on computer user frustration T2 - Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use Y1 - 2004 A1 - Bessiere,K. A1 - Ceaparu,I. A1 - Lazar,J. A1 - Robinson,J. A1 - Shneiderman, Ben JA - Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use ER - TY - JOUR T1 - Some foundational problems in interdomain routing JF - Proceedings of Third Workshop on Hot Topics in Networks (HotNets-III) Y1 - 2004 A1 - Feamster, Nick A1 - Balakrishnan,H. A1 - Rexford,J. AB - The substantial complexity of interdomain routing in theInternet comes from the need to support flexible poli- cies while scaling to a large number of Autonomous Systems. Despite impressive progress in characterizing the various ills of the Border Gateway Protocol (BGP), many problems remain unsolved, and the behavior of the routing system is still poorly understood. This paper argues that we must understand interdomain routing in terms of: (1) intrinsic properties and design tradeoffs of policy-based routing, independent of the specific routing protocol and (2) properties that relate to artifacts in to- day’s protocol. We pose open questions for the research community that, if answered, should help us understand why BGP’s many problems are so difficult to fix. Un- derstanding the fundamental properties of interdomain routing will help us decide how to make progress, be it making backward-compatible modifications to BGP or designing a radically different protocol. ER - TY - JOUR T1 - Spiral acquisition of software-intensive systems of systems JF - CrossTalk Y1 - 2004 A1 - Boehm,B. A1 - Brown,A. W A1 - Basili, Victor R. A1 - Turner,R. ER - TY - JOUR T1 - Structure from motion of parallel lines JF - Computer Vision-ECCV 2004 Y1 - 2004 A1 - Baker, P. A1 - Aloimonos, J. ER - TY - CONF T1 - Studying code development for high performance computing: the HPCS program T2 - First International Workshop On Software Engineering for High Performance Computing System Applications Y1 - 2004 A1 - Carver, J. A1 - Asgari, S. A1 - Basili, Victor R. A1 - Hochstein, L. A1 - Hollingsworth, Jeffrey K A1 - Shull, F. A1 - Zelkowitz, Marvin V JA - First International Workshop On Software Engineering for High Performance Computing System Applications ER - TY - CONF T1 - Systematic exploitation of data parallelism in hardware synthesis of DSP applications T2 - Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on Y1 - 2004 A1 - Sen,M. A1 - Bhattacharyya, Shuvra S. KW - area-performance trade-off curve KW - automatic Verilog code generation KW - circuit optimisation KW - data flow graphs KW - data parallelism KW - dedicated hardware implementation synthesis KW - design tool KW - Digital signal processing KW - DSP applications KW - embedded systems KW - hardware description languages KW - hardware synthesis KW - high level synthesis KW - high level synthesis algorithm KW - IMAGE PROCESSING KW - PARALLEL PROCESSING KW - power consumption KW - Signal processing KW - synchronous dataflow graph KW - video processing AB - We describe an approach that we have explored for low-power synthesis and optimization of image, video, and digital signal processing (DSP) applications. In particular, we consider the systematic exploitation of data parallelism across the operations of an application dataflow graph when synthesizing a dedicated hardware implementation. Data parallelism occurs commonly in DSP applications, and provides flexible opportunities to increase throughput or lower power consumption. Exploiting this parallelism in a dedicated hardware implementation comes at the expense of increased resource requirements, which must be balanced carefully when applying the technique in a design tool. We propose a high level synthesis algorithm to determine the data parallelism factor for each computation, and, based on the area and performance trade-off curve, design an efficient hardware representation of the dataflow graph. For performance estimation, our approach uses a cyclostatic dataflow intermediate representation of the hardware structure under synthesis. We then apply an automatic hardware generation framework to build the actual circuit. JA - Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on VL - 5 M3 - 10.1109/ICASSP.2004.1327089 ER - TY - CONF T1 - Systematic Integration of Parameterized Local Search Techniques in Evolutionary Algorithms T2 - Genetic and Evolutionary Computation–GECCO 2004 Y1 - 2004 A1 - Bambha,N. K A1 - Bhattacharyya, Shuvra S. A1 - Teich,J. A1 - Zitzler,E. JA - Genetic and Evolutionary Computation–GECCO 2004 ER - TY - JOUR T1 - Toolkit design for interactive structured graphics JF - Software Engineering, IEEE Transactions on Y1 - 2004 A1 - Bederson, Benjamin B. A1 - Grosjean,J. A1 - Meyer,J. VL - 30 CP - 8 ER - TY - CONF T1 - Trust-preserving set operations T2 - INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies Y1 - 2004 A1 - Morselli,R. A1 - Bhattacharjee, Bobby A1 - Katz, Jonathan A1 - Keleher,P. KW - accumulator; KW - Bloom KW - computing; KW - filter; KW - mechanism; KW - network; KW - operation; KW - peer-to-peer KW - RSA KW - Security KW - security; KW - set KW - system-wide KW - Telecommunication KW - theory; KW - trust-preserving AB - We describe a method for performing trust-preserving set operations by untrusted parties. Our motivation for this is the problem of securely reusing content-based search results in peer-to-peer networks. We model search results and indexes as data sets. Such sets have value for answering a new query only if they are trusted. In the absence of any system-wide security mechanism, a data set is trusted by a node a only if it was generated by some node which is trusted by a. Our main contributions are a formal definition of the problem as well as an efficient scheme that solves this problem by allowing untrusted peers to perform set operations on trusted data sets while also producing unforgeable proofs of correctness. This is accomplished by requiring trusted nodes to sign appropriately-defined digests of generated sets; each such digest consists of an RSA accumulator and a Bloom filter. The scheme is general, and has other applications as well. We give an analysis demonstrating the low overhead of the scheme, and we include experimental data which confirm the analysis. JA - INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies VL - 4 M3 - 10.1109/INFCOM.2004.1354646 ER - TY - CONF T1 - Unsupervised sense disambiguation using bilingual probabilistic models T2 - Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics Y1 - 2004 A1 - Bhattacharya,Indrajit A1 - Getoor, Lise A1 - Bengio,Yoshua AB - We describe two probabilistic models for unsupervised word-sense disambiguation using parallel corpora. The first model, which we call the Sense model, builds on the work of Diab and Resnik (2002) that uses both parallel text and a sense inventory for the target language, and recasts their approach in a probabilistic framework. The second model, which we call the Concept model, is a hierarchical model that uses a concept latent variable to relate different language specific sense labels. We show that both models improve performance on the word sense disambiguation task over previous unsupervised approaches, with the Concept model showing the largest improvement. Furthermore, in learning the Concept model, as a by-product, we learn a sense inventory for the parallel language. JA - Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics T3 - ACL '04 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dx.doi.org/10.3115/1218955.1218992 M3 - 10.3115/1218955.1218992 ER - TY - CHAP T1 - Using Trust in Recommender Systems: An Experimental Analysis T2 - Trust ManagementTrust Management Y1 - 2004 A1 - Massa,Paolo A1 - Bhattacharjee, Bobby ED - Jensen,Christian ED - Poslad,Stefan ED - Dimitrakos,Theo KW - Computer KW - Science AB - Recommender systems (RS) have been used for suggesting items (movies, books, songs, etc.) that users might like. RSs compute a user similarity between users and use it as a weight for the users’ ratings. However they have many weaknesses, such as sparseness, cold start and vulnerability to attacks. We assert that these weaknesses can be alleviated using a Trust-aware system that takes into account the “web of trust” provided by every user. Specifically, we analyze data from the popular Internet web site epinions.com . The dataset consists of 49290 users who expressed reviews (with rating) on items and explicitly specified their web of trust, i.e. users whose reviews they have consistently found to be valuable. We show that any two users have usually few items rated in common. For this reason, the classic RS technique is often ineffective and is not able to compute a user similarity weight for many of the users. Instead exploiting the webs of trust, it is possible to propagate trust and infer an additional weight for other users. We show how this quantity can be computed against a larger number of users. JA - Trust ManagementTrust Management T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 2995 SN - 978-3-540-21312-3 UR - http://dx.doi.org/10.1007/978-3-540-24747-0_17 ER - TY - RPRT T1 - Verifying the Correctness of Wide-Area Internet Routing Y1 - 2004 A1 - Feamster, Nick A1 - Balakrishnan,Hari AB - Several studies have shown that wide-area Internet routing is fragile, with failures occurring for a variety of reasons. Routing fragility is largely due to the flexible and powerful ways in which BGP can be configured to perform various tasks, which range from implementing the policies of commercial relationships to configuring backup paths. Configuring routers in an AS is like writing a distributed program, and BGP's flexible configuration and today's relatively low-level configuration languages make the process error-prone. The primary method used by operators to determine whether their complex configurations are correct is to try them out in operation.We believe that there is a need for a systematic approach to verifying router configurations before they are deployed. This paper develops a static analysis framework for configuration checking, and uses it in the design of rcc, a ``router configuration checker''. rcc takes as input a set of router configurations and flags anomalies and errors, based on a set of well-defined correctness conditions. We have used rcc to check BGP configurations from 9 operational networks, testing nearly 700 real-world router configurations in the process. Every network we analyzed had configuration errors, some of which were potentially serious and had previously gone unnoticed. Our analysis framework and results also suggest ways in which BGP and configuration languages should be improved. rcc has also been downloaded by 30 network operators to date. PB - Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory VL - MIT-CSAIL-TR-2004-031 UR - http://dspace.mit.edu/handle/1721.1/30471 ER - TY - JOUR T1 - Viable but Nonculturable Vibrio Cholerae O1 in the Aquatic Environment of Argentina JF - Applied and Environmental MicrobiologyAppl. Environ. Microbiol. Y1 - 2004 A1 - Binsztein,Norma A1 - Costagliola,Marcela C. A1 - Pichel,Mariana A1 - Jurquiza,Verónica A1 - Ramírez,Fernando C. A1 - Akselman,Rut A1 - Vacchino,Marta A1 - Huq,Anwarul A1 - Rita R Colwell AB - In Argentina, as in other countries of Latin America, cholera has occurred in an epidemic pattern. Vibrio cholerae O1 is native to the aquatic environment, and it occurs in both culturable and viable but nonculturable (VNC) forms, the latter during interepidemic periods. This is the first report of the presence of VNC V. cholerae O1 in the estuarine and marine waters of the Río de la Plata and the Argentine shelf of the Atlantic Ocean, respectively. Employing immunofluorescence and PCR methods, we were able to detect reservoirs of V. cholerae O1 carrying the virulence-associated genes ctxA and tcpA. The VNC forms of V. cholerae O1 were identified in samples of water, phytoplankton, and zooplankton; the latter organisms were mainly the copepods Acartia tonsa, Diaptomus sp., Paracalanus crassirostris, and Paracalanus parvus. We found that under favorable conditions, the VNC form of V. cholerae can revert to the pathogenic, transmissible state. We concluded that V. cholerae O1 is a resident of Argentinean waters, as has been shown to be the case in other geographic regions of the world. VL - 70 SN - 0099-2240, 1098-5336 UR - http://aem.asm.org/content/70/12/7481 CP - 12 M3 - 10.1128/AEM.70.12.7481-7486.2004 ER - TY - JOUR T1 - Visualization and analysis of microarray and gene ontology data with treemaps JF - BMC Bioinformatics Y1 - 2004 A1 - Baehrecke,Eric H A1 - Dang,Niem A1 - Babaria,Ketan A1 - Shneiderman, Ben AB - The increasing complexity of genomic data presents several challenges for biologists. Limited computer monitor views of data complexity and the dynamic nature of data in the midst of discovery increase the challenge of integrating experimental results with information resources. The use of Gene Ontology enables researchers to summarize results of quantitative analyses in this framework, but the limitations of typical browser presentation restrict data access. VL - 5 SN - 1471-2105 UR - http://www.biomedcentral.com/1471-2105/5/84 CP - 1 M3 - 10.1186/1471-2105-5-84 ER - TY - JOUR T1 - Visualizations for taxonomic and phylogenetic trees JF - Bioinformatics Y1 - 2004 A1 - Parr,C.S. A1 - Lee,B. A1 - Campbell,D. A1 - Bederson, Benjamin B. VL - 20 CP - 17 ER - TY - CONF T1 - Web search intent induction via automatic query reformulation T2 - Proceedings of HLT-NAACL 2004: Short Papers on XX Y1 - 2004 A1 - Daumé, Hal A1 - Brill,E. JA - Proceedings of HLT-NAACL 2004: Short Papers on XX ER - TY - CONF T1 - What works better for question answering: Stemming or morphological query expansion T2 - Proceedings of the Information Retrieval for Question Answering (IR4QA) Workshop at SIGIR 2004 Y1 - 2004 A1 - Bilotti,M. W A1 - Katz,B. A1 - Jimmy Lin AB - How do different information retrieval techniques affect theperformance of document retrieval in the context of question answering? An exploration of this question is our overall re- search goal. In this paper, we specifically examine strategies for coping with morphological variation. This work quanti- tatively compares two different approaches to handling term variation: applying a stemming algorithm at indexing time, and performing morphological query expansion at retrieval time. We discovered that, compared to the no-stemming baseline, stemming results in lower recall, and morphologi- cal expansion yields higher recall. By separately weighting different term variants, we were able to achieve even higher recall, which opens the door to interesting question analy- sis algorithms for sophisticated query generation. Another significant contribution of our work is the development of a reusable question answering test collection to support our experiments. JA - Proceedings of the Information Retrieval for Question Answering (IR4QA) Workshop at SIGIR 2004 ER - TY - CONF T1 - Accessing diverse geo-referenced data sources with the SAND spatial DBMS T2 - Proceedings of the 2003 annual national conference on Digital government research Y1 - 2003 A1 - Sankaranarayanan,Jagan A1 - Tanin,Egemen A1 - Samet, Hanan A1 - Brabec,Frantisek AB - The Internet has become the most frequently accessed medium for obtaining various types of data. In particular, government agencies, academic institutions, and private enterprises have published gigabytes of geo-referenced data on the Web. However, to obtain geo-referenced data from the Web successfully, systems must be designed to be capable of understanding the data sets published in different data formats. Also, even if the data sets are available in a simple known format, they often have poorly defined structures. With these issues in mind, we have developed an Internet-enabled data collection and conversion utility that interfaces with our prototype spatial database system, SAND. Using this utility, data can be retrieved from many different sources on the Web and converted into a format understandable by the SAND spatial database management system. Our collection and conversion utility is able to import the most popular data formats; namely, ESRI Shapefiles, Microsoft Excel files, HTML files, and GML files. Data in unstructured formats are verified for correct selection of the data types and handling of missing tuples before the insertion operation into the database. Moreover, our utility makes it possible to download any nonspatial data set and combine it internally with a relevant spatial data set. These features are accessible through a spreadsheet-like interface for online editing and structuring of data. JA - Proceedings of the 2003 annual national conference on Digital government research T3 - dg.o '03 PB - Digital Government Society of North America UR - http://dl.acm.org/citation.cfm?id=1123196.1123206 ER - TY - JOUR T1 - Accuracy, Target Reentry and Fitts’ Law Performance of Preschool Children Using Mice JF - University of Maryland Technical Report, HCIL-2003 Y1 - 2003 A1 - Hourcade,J. P A1 - Bederson, Benjamin B. A1 - Druin, Allison A1 - Guimbretiere,F. VL - 16 ER - TY - JOUR T1 - AQuA: an adaptive architecture that provides dependable distributed objects JF - Computers, IEEE Transactions on Y1 - 2003 A1 - Ren,Yansong A1 - Bakken,D. E. A1 - Courtney,T. A1 - Michel Cukier A1 - Karr,D. A. A1 - Rubel,P. A1 - Sabnis,C. A1 - Sanders,W. H. A1 - Schantz,R.E. A1 - Seri,M. KW - active replication pass-first scheme KW - adaptive architecture KW - adaptive fault tolerance KW - AQuA KW - CORBA KW - data consistency KW - data integrity KW - dependable distributed objects KW - distributed object management KW - performance measurements KW - quality of service KW - replicated dependability manager KW - replication schemes KW - software fault tolerance KW - system resources AB - Building dependable distributed systems from commercial off-the-shelf components is of growing practical importance. For both cost and production reasons, there is interest in approaches and architectures that facilitate building such systems. The AQuA architecture is one such approach; its goal is to provide adaptive fault tolerance to CORBA applications by replicating objects. The AQuA architecture allows application programmers to request desired levels of dependability during applications' runtimes. It provides fault tolerance mechanisms to ensure that a CORBA client can always obtain reliable services, even if the CORBA server object that provides the desired services suffers from crash failures and value faults. AQuA includes a replicated dependability manager that provides dependability management by configuring the system in response to applications' requests and changes in system resources due to faults. It uses Maestro/Ensemble to provide group communication services. It contains a gateway to intercept standard CORBA IIOP messages to allow any standard CORBA application to use AQuA. It provides different types of replication schemes to forward messages reliably to the remote replicated objects. All of the replication schemes ensure strong, data consistency among replicas. This paper describes the AQuA architecture and presents, in detail, the active replication pass-first scheme. In addition, the interface to the dependability manager and the design of the dependability manager replication are also described. Finally, we describe performance measurements that were conducted for the active replication pass-first scheme, and we present results from our study of fault detection, recovery, and blocking times. VL - 52 SN - 0018-9340 CP - 1 M3 - 10.1109/TC.2003.1159752 ER - TY - JOUR T1 - Automatic classification of multi-word expressions in print dictionaries JF - Lingvisticae Investigationes Y1 - 2003 A1 - Geyken,Alexander A1 - Jordan Boyd-Graber AB - SummaryThis work demonstrates the assignment of multi-word expressions in print dictionaries to POS classes with minimal linguistic resources. In this application, 32,000 entries from the Wörterbuch der deutschen Idiomatik (H. Schemann 1993) were classified using an inductive description of POS sequences in conjunction with a Brill Tagger trained on manually tagged idiomatic entries. This process assigned categories to 86% of entries with 88% accuracy. This classification supplies a meaningful preprocessing step for further applications: the resulting POS-sequences for all idiomatic entries might be used for the automatic recognition of multi-word lexemes in unrestricted text. VL - 26 SN - 03784169 UR - http://umd.library.ingentaconnect.com/content/jbp/li/2003/00000026/00000002/art00002 CP - 2 M3 - 10.1075/li.26.2.03gey ER - TY - CONF T1 - Automatic thumbnail cropping and its effectiveness T2 - Proceedings of the 16th annual ACM symposium on User interface software and technology Y1 - 2003 A1 - Suh,Bongwon A1 - Ling,Haibin A1 - Bederson, Benjamin B. A1 - Jacobs, David W. KW - Face detection KW - image cropping KW - saliency map KW - thumbnail KW - usability study KW - visual search KW - zoomable user interfaces AB - Thumbnail images provide users of image retrieval and browsing systems with a method for quickly scanning large numbers of images. Recognizing the objects in an image is important in many retrieval tasks, but thumbnails generated by shrinking the original image often render objects illegible. We study the ability of computer vision systems to detect key components of images so that automated cropping, prior to shrinking, can render objects more recognizable. We evaluate automatic cropping techniques 1) based on a general method that detects salient portions of images, and 2) based on automatic face detection. Our user study shows that these methods result in small thumbnails that are substantially more recognizable and easier to find in the context of visual search. JA - Proceedings of the 16th annual ACM symposium on User interface software and technology T3 - UIST '03 PB - ACM CY - New York, NY, USA SN - 1-58113-636-6 UR - http://doi.acm.org/10.1145/964696.964707 M3 - 10.1145/964696.964707 ER - TY - CONF T1 - Automatic thumbnail cropping and its effectiveness T2 - Proceedings of the 16th annual ACM symposium on User interface software and technology Y1 - 2003 A1 - Suh,B. A1 - Ling,H. A1 - Bederson, Benjamin B. A1 - Jacobs, David W. JA - Proceedings of the 16th annual ACM symposium on User interface software and technology ER - TY - CONF T1 - Bootstrapping security associations for routing in mobile ad-hoc networks T2 - IEEE Global Telecommunications Conference, 2003. GLOBECOM '03 Y1 - 2003 A1 - Bobba,R. B A1 - Eschenauer,L. A1 - Gligor,V. A1 - Arbaugh, William A. KW - ad hoc networks KW - bootstrapping security association KW - Cryptographic protocols KW - dynamic source routing protocol KW - Fabrics KW - Intelligent networks KW - IP address KW - IP key KW - IP networks KW - Message authentication KW - mobile ad-hoc network KW - mobile radio KW - Protection KW - Public key KW - public key cryptography KW - routing layer security reliability KW - routing protocols KW - secure routing KW - Security KW - security service KW - statistically unique cryptographically verification KW - telecommunication security AB - To date, most solutions proposed for secure routing in mobile ad-hoc networks (MANETs), assume that secure associations between pairs of nodes can be established on-line; e.g., by a trusted third party, by distributed trust establishment. However, establishing such security associations, with or without trusted third parties, requires reliance on routing layer security. In this paper, we eliminate this apparent cyclic dependency between security services and secure routing in MANETs and show how to bootstrap security for the routing layer. We use the notion of statistically unique and cryptographically verifiable (SUCV) identifiers to implement a secure binding between IP addresses and keys that is independent of any trusted security service. We illustrate our solution with the dynamic source routing (DSR) protocol and compare it with other solutions for secure routing. JA - IEEE Global Telecommunications Conference, 2003. GLOBECOM '03 PB - IEEE VL - 3 SN - 0-7803-7974-8 M3 - 10.1109/GLOCOM.2003.1258490 ER - TY - JOUR T1 - Bringing Treasures to the Surface: Previews and Overviews in a Prototype for the Library of Congress National Digital Library JF - The craft of information visualization: readings and reflections Y1 - 2003 A1 - Marchionini,A.S. A1 - Nation,D. A1 - Karasik,S. A1 - Cronnell,T. A1 - Shneiderman, Ben A1 - Spotfire,V.D.M.U. A1 - Bederson, Benjamin B. A1 - Data,T.S. A1 - Hochheiser,H. A1 - Shneiderman, Ben A1 - others ER - TY - CHAP T1 - Broadening Access to Large Online Databases by Generalizing Query Previews T2 - The Craft of Information VisualizationThe Craft of Information Visualization Y1 - 2003 A1 - Tanin,Egemen A1 - Plaisant, Catherine A1 - Shneiderman, Ben ED - Bederson, Benjamin B. ED - Shneiderman, Ben AB - Companies, government agencies, and other types of organizations are making their large databases available to the world over the Internet. Current database front-ends do not give users information about the distribution of data. This leads many users to waste time and network resources posing queries that have either zero-hit or mega-hit result sets. Query previews form a novel visual approach for browsing large databases. Query previews supply data distribution information about the database that is being searched and give continuous feedback about the size of the result set for the query as it is being formed. On the other hand, query previews use only a few pre-selected attributes of the database. The distribution information is displayed only on these attributes. Unfortunately, many databases are formed of numerous relations and attributes. This paper introduces a generalization of query previews. We allow users to browse all of the relations and attributes of a database using a hierarchical browser. Any of the attributes can be used to display the distribution information, making query previews applicable to many public online databases. JA - The Craft of Information VisualizationThe Craft of Information Visualization PB - Morgan Kaufmann CY - San Francisco SN - 978-1-55860-915-0 UR - http://www.sciencedirect.com/science/article/pii/B978155860915050007X ER - TY - JOUR T1 - A collaborative digital library for children JF - Journal of Computer Assisted Learning Y1 - 2003 A1 - Druin, Allison A1 - Revelle,G. A1 - Bederson, Benjamin B. A1 - Hourcade,J. P A1 - Farber,A. A1 - Lee,J. A1 - Campbell,D. VL - 19 CP - 2 ER - TY - CONF T1 - Construction of an efficient overlay multicast infrastructure for real-time applications T2 - INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies Y1 - 2003 A1 - Banerjee,S. A1 - Kommareddy,C. A1 - Kar,K. A1 - Bhattacharjee, Bobby A1 - Khuller, Samir KW - application-layer; KW - applications; KW - communication; KW - criterion; KW - decentralized KW - distributed KW - entities; KW - forwarding KW - infrastructure; KW - Internet; KW - iterative KW - media-streaming KW - methods; KW - MSN; KW - Multicast KW - nodes; KW - NP-hard; KW - OPTIMIZATION KW - overlay KW - real KW - real-time KW - scheme; KW - service KW - systems; KW - TIME AB - This paper presents an overlay architecture where service providers deploy a set of service nodes (called MSNs) in the network to efficiently implement media-streaming applications. These MSNs are organized into an overlay and act as application-layer multicast forwarding entities for a set of clients. We present a decentralized scheme that organizes the MSNs into an appropriate overlay structure that is particularly beneficial for real-time applications. We formulate our optimization criterion as a "degree-constrained minimum average-latency problem" which is known to be NP-hard. A key feature of this formulation is that it gives a dynamic priority to different MSNs based on the size of its service set. Our proposed approach iteratively modifies the overlay tree using localized transformations to adapt with changing distribution of MSNs, clients, as well as network conditions. We show that a centralized greedy approach to this problem does not perform quite as well, while our distributed iterative scheme efficiently converges to near-optimal solutions. JA - INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies VL - 2 M3 - 10.1109/INFCOM.2003.1208987 ER - TY - CONF T1 - Cooperative peer groups in NICE T2 - INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies Y1 - 2003 A1 - Lee,S. A1 - Sherwood,R. A1 - Bhattacharjee, Bobby KW - algorithm; KW - cooperative KW - decentralized KW - distributed KW - identification; KW - individual KW - inference KW - inference; KW - information KW - Internet; KW - malicious KW - manner; KW - mechanisms; KW - networks; KW - NICE KW - node; KW - noncooperative KW - peer-to-peer KW - platform; KW - reputation KW - retrieval; KW - storage; KW - system; KW - trust KW - users KW - users; AB - A distributed scheme for trust inference in peer-to-peer networks is presented. Our work is in context of the NICE system, which is a platform for implementing cooperative applications over the Internet. We describe a technique for efficiently storing user reputation information in a completely decentralized manner, and show how this information can be used to efficiently identify noncooperative users in NICE. We present a simulation based study of our algorithms, in which we show our scheme scales to thousands of users using modest amounts of storage, processing, and bandwidth at any individual node. Lastly, we show that our scheme is robust and can form cooperative groups in systems where the vast majority of users are malicious. JA - INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies VL - 2 M3 - 10.1109/INFCOM.2003.1208963 ER - TY - BOOK T1 - The craft of information visualization: readings and reflections Y1 - 2003 A1 - Bederson, Benjamin B. A1 - Shneiderman, Ben KW - Computers / Computer Graphics KW - Computers / Computer Science KW - Computers / Digital Media / Desktop Publishing KW - Computers / General KW - Computers / Social Aspects / Human-Computer Interaction KW - Computers / User Interfaces KW - Human-computer interaction KW - Information Visualization KW - Science / General KW - User-centered system design AB - Since the beginning of the computer age, researchers from many disciplines have sought to facilitate people's use of computers and to provide ways for scientists to make sense of the immense quantities of data coming out of them. One gainful result of these efforts has been the field of information visualization, whose technology is increasingly applied in scientific research, digital libraries, data mining, financial data analysis, market studies, manufacturing production control, and data discovery.This book collects 38 of the key papers on information visualization from a leading and prominent research lab, the University of Maryland's Human-Computer Interaction Lab (HCIL). Celebrating HCIL's 20th anniversary, this book presents a coherent body of work from a respected community that has had many success stories with its research and commercial spin-offs. Each chapter contains an introduction specifically written for this volume by two leading HCI researchers, to describe the connections among those papers and reveal HCIL's individual approach to developing innovations.*Presents key ideas, novel interfaces, and major applications of information visualization tools, embedded in inspirational prototypes.*Techniques can be widely applied in scientific research, digital libraries, data mining, financial data analysis, business market studies, manufacturing production control, drug discovery, and genomic studies.*Provides an "insider" view to the scientific process and evolution of innovation, as told by the researchers themselves.*This work comes from the prominent and high profile University of Maryland's Human Computer Interaction Lab PB - Morgan Kaufmann SN - 9781558609150 ER - TY - JOUR T1 - Critical fields and pulse durations for precessional switching of thin magnetic films JF - Magnetics, IEEE Transactions on Y1 - 2003 A1 - Bertotti,G. A1 - Mayergoyz, Issak D A1 - Serpico,C. KW - anisotropy; KW - axis; KW - critical KW - durations; KW - field; KW - fields; KW - film; KW - films; KW - hard KW - in-plane KW - integrals; KW - magnetic KW - magnetisation KW - magnetization KW - magnetization; KW - magnetized KW - motion; KW - precessional KW - pulse KW - pulsed KW - rectangular KW - reversal; KW - switching; KW - thin KW - uniformly AB - The precessional switching process of a uniformly magnetized thin film with in-plane anisotropy subject to pulsed magnetic fields applied in the film plane is analyzed. Critical fields required to achieve switching are studied for the case when the applied field is constant during the pulse duration and forms arbitrary angles with the hard axis. By using two integrals of magnetization motion, the explicit expressions for the critical field are derived. The formulas for durations of rectangular magnetic field pulses that guarantee the precessional switching of magnetization are presented as well. VL - 39 SN - 0018-9464 CP - 5 M3 - 10.1109/TMAG.2003.816454 ER - TY - CONF T1 - DART: a framework for regression testing "nightly/daily builds" of GUI applications T2 - Software Maintenance, 2003. ICSM 2003. Proceedings. International Conference on Y1 - 2003 A1 - Memon, Atif M. A1 - Banerjee,I. A1 - Hashmi,N. A1 - Nagarajan,A. KW - automated retesting KW - automatic test software KW - coverage evaluation KW - daily automated regression tester KW - DART KW - frequent retesting KW - graphical user interface KW - Graphical user interfaces KW - GUI software KW - instrumentation coding KW - program testing KW - regression testing KW - Software development management KW - Software development process KW - Software maintenance KW - Software quality KW - structural GUI analysis KW - Test Case Generation KW - test cases regeneration KW - Test execution KW - test oracle creation AB - "Nightly/daily building and smoke testing" have become widespread since they often reveal bugs early in the software development process. During these builds, software is compiled, linked, and (re)tested with the goal of validating its basic functionality. Although successful for conventional software, smoke tests are difficult to develop and automatically rerun for software that has a graphical user interface (GUI). In this paper, we describe a framework called DART (daily automated regression tester) that addresses the needs of frequent and automated re-testing of GUI software. The key to our success is automation: DART automates everything from structural GUI analysis; test case generation; test oracle creation; to code instrumentation; test execution; coverage evaluation; regeneration of test cases; and their re-execution. Together with the operating system's task scheduler, DART can execute frequently with little input from the developer/tester to retest the GUI software. We provide results of experiments showing the time taken and memory required for GUI analysis, test case and test oracle generation, and test execution. We also empirically compare the relative costs of employing different levels of detail in the GUI test cases. JA - Software Maintenance, 2003. ICSM 2003. Proceedings. International Conference on M3 - 10.1109/ICSM.2003.1235451 ER - TY - JOUR T1 - Data partitioning for DSP software synthesis JF - Lecture Notes in Computer Science Y1 - 2003 A1 - Ko,M. Y A1 - Bhattacharyya, Shuvra S. ER - TY - JOUR T1 - Data Structures, Optimal Choice of Parameters, and Complexity Results for Generalized Multilevel Fast Multipole Methods in $d$ Dimensions JF - Technical Reports from UMIACS UMIACS-TR-2003-28 Y1 - 2003 A1 - Gumerov, Nail A. A1 - Duraiswami, Ramani A1 - Borovikov,Eugene A. KW - Technical Report AB - We present an overview of the Fast Multipole Method, explain the use ofoptimal data structures and present complexity results for the algorithm. We explain how octree structures and bit interleaving can be simply used to create efficient versions of the multipole algorithm in $d$ dimensions. We then present simulations that demonstrate various aspects of the algorithm, including optimal selection of the clustering parameter, the influence of the error bound on the complexity, and others. The use of these optimal parameters results in a many-fold speed-up of the FMM, and prove very useful in practice. UMIACS-TR-2003-28 UR - http://drum.lib.umd.edu/handle/1903/1270 ER - TY - JOUR T1 - A Deductive Database Approach to AI Planning JF - Journal of Intelligent Information Systems Y1 - 2003 A1 - Brogi,A. A1 - V.S. Subrahmanian A1 - Zaniolo,C. AB - In this paper, we show that the classical A.I. planning problem can be modelled using simple database constructs with logic-based semantics. The approach is similar to that used to model updates and nondeterminism in active database rules. We begin by showing that planning problems can be automatically converted to Datalog1S programs with nondeterministic choice constructs, for which we provide a formal semantics using the concept of stable models. The resulting programs are characterized by a syntactic structure (XY-stratification) that makes them amenable to efficient implementation using compilation and fixpoint computation techniques developed for deductive database systems. We first develop the approach for sequential plans, and then we illustrate its flexibility and expressiveness by formalizing a model for parallel plans, where several actions can be executed simultaneously. The characterization of parallel plans as partially ordered plans allows us to develop (parallel) versions of partially ordered plans that can often be executed faster than the original partially ordered plans. VL - 20 CP - 3 M3 - 10.1023/A:1022808724136 ER - TY - JOUR T1 - Defeating Web censorship with untrusted messenger discovery JF - Workshop on Privacy Enhancing Technologies Y1 - 2003 A1 - Feamster, Nick A1 - Balazinska,M. A1 - Wang,W. A1 - Balakrishnan,H. A1 - Karger,D. ER - TY - JOUR T1 - Deno: a decentralized, peer-to-peer object-replication system for weakly connected environments JF - Computers, IEEE Transactions on Y1 - 2003 A1 - Cetintemel,U. A1 - Keleher,P. J A1 - Bhattacharjee, Bobby A1 - Franklin,M.J. KW - actions; KW - connected KW - consistency KW - data KW - data; KW - databases; KW - decentralized KW - Deno; KW - distributed KW - environments; KW - epidemic KW - group KW - levels; KW - Linux; KW - malicious KW - management; KW - membership; KW - network KW - object KW - object-replication KW - of KW - operating KW - peer-to-peer KW - protocols; KW - replicated KW - replication; KW - Security KW - security; KW - synchronisation; KW - system; KW - systems; KW - topology; KW - Unix; KW - voting; KW - weakly KW - weighted KW - Win32; AB - This paper presents the design, implementation, and evaluation of the replication framework of Deno, a decentralized, peer-to-peer object-replication system targeted for weakly connected environments. Deno uses weighted voting for availability and pair-wise, epidemic information flow for flexibility. This combination allows the protocols to operate with less than full connectivity, to easily adapt to changes in group membership, and to make few assumptions about the underlying network topology. We present two versions of Deno's protocol that differ in the consistency levels they support. We also propose security extensions to handle a class of malicious actions that involve misrepresentation of protocol information. Deno has been implemented and runs on top of Linux and Win32 platforms. We use the Deno prototype to characterize the performance of the Deno protocols and extensions. Our study reveals several interesting results that provide fundamental insight into the benefits of decentralization and the mechanics of epidemic protocols. VL - 52 SN - 0018-9340 CP - 7 M3 - 10.1109/TC.2003.1214342 ER - TY - BOOK T1 - Design Considerations for Optically Connected Systems on Chip Y1 - 2003 A1 - Bhattacharyya, Shuvra S. A1 - Bambha,N. K A1 - Euliss,G. PB - MARYLAND UNIV COLLEGE PARK DEPT OF ELECTRICAL AND COMPUTER ENGINEERING ER - TY - JOUR T1 - Designing a digital library for young children: An intergenerational partnership JF - The craft of information visualization: readings and reflections Y1 - 2003 A1 - Druin, Allison A1 - Bederson, Benjamin B. A1 - Hourcade,J. P A1 - Sherman,L. A1 - Revelle,G. A1 - Platner,M. A1 - Weng,S. VL - 178 ER - TY - JOUR T1 - Desparately seeking cebuano JF - Third Conference on Human Language Technologies Y1 - 2003 A1 - Oard, Douglas A1 - David Doermann A1 - Dorr, Bonnie J A1 - He,D. A1 - Resnik, Philip A1 - Weinberg, Amy A1 - Byrne,W. A1 - Khudanpur,S. A1 - Yarowsky,D. A1 - Leuski,A. A1 - others AB - This paper describes an effort to rapidly de-velop language resources and component tech- nology to support searching Cebuano news sto- ries using English queries. Results from the first 60 hours of the exercise are presented. ER - TY - JOUR T1 - Digital government JF - Communications of the ACM Y1 - 2003 A1 - Marchionini,G. A1 - Samet, Hanan A1 - Brandt,L. AB - Information technologies are being applied vigorously by governmental units at national,regional, and local levels around the world. The application of IT to government service is often termed “e-government” and the larger concept of government that depends upon IT to achieve basic missions is termed “digital government.” This distinction is, of course, lexically arbitrary, but serves to distinguish R&D specifically aimed at creating techniques for applying IT to government operations. Such R&D efforts also consider the long-term impact of these applications on citizens and government itself. VL - 46 CP - 1 ER - TY - JOUR T1 - The dog genome: survey sequencing and comparative analysis JF - Science Y1 - 2003 A1 - Kirkness,E. F A1 - Bafna,V. A1 - Halpern,A. L A1 - Levy,S. A1 - Remington,K. A1 - Rusch,D. B A1 - Delcher,A. L A1 - Pop, Mihai A1 - Wang,W. A1 - Fraser,C. M A1 - others VL - 301 CP - 5641 ER - TY - JOUR T1 - The Dog Genome: Survey Sequencing and Comparative Analysis JF - ScienceScience Y1 - 2003 A1 - Kirkness,Ewen F. A1 - Bafna,Vineet A1 - Halpern,Aaron L. A1 - Levy,Samuel A1 - Remington,Karin A1 - Rusch,Douglas B A1 - Delcher,Arthur L. A1 - Pop, Mihai A1 - Wang,Wei A1 - Fraser,Claire M. A1 - Venter,J. Craig AB - A survey of the dog genome sequence (6.22 million sequence reads; 1.5× coverage) demonstrates the power of sample sequencing for comparative analysis of mammalian genomes and the generation of species-specific resources. More than 650 million base pairs (>25%) of dog sequence align uniquely to the human genome, including fragments of putative orthologs for 18,473 of 24,567 annotated human genes. Mutation rates, conserved synteny, repeat content, and phylogeny can be compared among human, mouse, and dog. A variety of polymorphic elements are identified that will be valuable for mapping the genetic basis of diseases and traits in the dog. VL - 301 SN - 0036-8075, 1095-9203 UR - http://www.sciencemag.org/content/301/5641/1898 CP - 5641 M3 - 10.1126/science.1086432 ER - TY - JOUR T1 - Driving scientific applications by data in distributed environments JF - Computational Science—ICCS 2003 Y1 - 2003 A1 - Saltz, J. A1 - Catalyurek,U. A1 - Kurc, T. A1 - Gray,M. A1 - Hastings,S. A1 - Langella,S. A1 - Narayanan,S. A1 - Martino,R. A1 - Bryant,S. A1 - Peszynska,M. A1 - others ER - TY - CONF T1 - Dynamic querying for pattern identification in microarray and genomic data T2 - 2003 International Conference on Multimedia and Expo, 2003. ICME '03. Proceedings Y1 - 2003 A1 - Hochheiser,H. A1 - Baehrecke,E. H A1 - Mount, Stephen M. A1 - Shneiderman, Ben KW - Bioinformatics KW - data sets KW - Displays KW - dynamic querying KW - expression profiles KW - Frequency KW - Gene expression KW - genes KW - Genetics KW - genomic data KW - Genomics KW - linear ordered sequences KW - macromolecules KW - medical signal processing KW - Mice KW - Microarray KW - pattern identification KW - pattern recognition KW - premRNA splicing KW - Query processing KW - sequences KW - Signal processing KW - splicing KW - TimeSearcher AB - Data sets involving linear ordered sequences are a recurring theme in bioinformatics. Dynamic query tools that support exploration of these data sets can be useful for identifying patterns of interest. This paper describes the use of one such tool - timesearcher - to interactively explore linear sequence data sets taken from two bioinformatics problems. Microarray time course data sets involve expression levels for large numbers of genes over multiple time points. Timesearcher can be used to interactively search these data sets for genes with expression profiles of interest. The occurrence frequencies of short sequences of DNA in aligned exons can be used to identify sequences that play a role in the pre-mRNA splicing. Timesearcher can be used to search these data sets for candidate splicing signals. JA - 2003 International Conference on Multimedia and Expo, 2003. ICME '03. Proceedings PB - IEEE VL - 3 SN - 0-7803-7965-9 M3 - 10.1109/ICME.2003.1221346 ER - TY - CONF T1 - Dynamic rebinding for marshalling and update, with destruct-time ? T2 - Proceedings of the eighth ACM SIGPLAN international conference on Functional programming Y1 - 2003 A1 - Bierman,Gavin A1 - Hicks, Michael W. A1 - Sewell,Peter A1 - Stoyle,Gareth A1 - Wansbrough,Keith KW - distributed programming KW - dynamic binding KW - dynamic update KW - lambda calculus KW - marshalling KW - programming languages KW - serialisation AB - Most programming languages adopt static binding, but for distributed programming an exclusive reliance on static binding is too restrictive: dynamic binding is required in various guises, for example when a marshalled value is received from the network, containing identifiers that must be rebound to local resources. Typically it is provided only by ad-hoc mechanisms that lack clean semantics.In this paper we adopt a foundational approach, developing core dynamic rebinding mechanisms as extensions to simply-typed call-by-value ? -calculus. To do so we must first explore refinements of the call-by-value reduction strategy that delay instantiation, to ensure computations make use of the most recent versions of rebound definitions. We introduce redex-time and destruct-time strategies. The latter forms the basis for a ?marsh calculus that supports dynamic rebinding of marshalled values, while remaining as far as possible statically-typed. We sketch an extension of ? marsh with concurrency and communication, giving examples showing how wrappers for encapsulating untrusted code can be expressed. Finally, we show that a high-level semantics for dynamic updating can also be based on the destruct-time strategy, defining a ?marsh calculus with simple primitives to provide type-safe updating of running code. We thereby establish primitives and a common semantic foundation for a variety of real-world dynamic rebinding requirements. JA - Proceedings of the eighth ACM SIGPLAN international conference on Functional programming T3 - ICFP '03 PB - ACM CY - New York, NY, USA SN - 1-58113-756-7 UR - http://doi.acm.org/10.1145/944705.944715 M3 - 10.1145/944705.944715 ER - TY - CONF T1 - Efficient particle filter-based tracking of multiple interacting targets using an MRF-based motion model T2 - 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings Y1 - 2003 A1 - Zia Khan A1 - Balch, T. A1 - Dellaert, F. KW - collision avoidance KW - computational cost KW - Computational efficiency KW - Educational institutions KW - exponential complexity KW - Filtering KW - filtering theory KW - Insects KW - joint particle tracker KW - Markov processes KW - Markov random field motion KW - Markov random fields KW - multiple interacting targets KW - particle filter-based tracking KW - Particle filters KW - Particle tracking KW - Radar tracking KW - social insect tracking application KW - target tracking KW - Trajectory AB - We describe a multiple hypothesis particle filter for tracking targets that are influenced by the proximity and/or behavior of other targets. Our contribution is to show how a Markov random field motion prior, built on the fly at each time step, can model these interactions to enable more accurate tracking. We present results for a social insect tracking application, where we model the domain knowledge that two targets cannot occupy the same space, and targets actively avoid collisions. We show that using this model improves track quality and efficiency. Unfortunately, the joint particle tracker we propose suffers from exponential complexity in the number of tracked targets. An approximation to the joint filter, however, consisting of multiple nearly independent particle filters can provide similar track quality at substantially lower computational cost. JA - 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings VL - 1 ER - TY - JOUR T1 - Efficient peer-to-peer searches using result-caching JF - Peer-to-Peer Systems II Y1 - 2003 A1 - Bhattacharjee, Bobby A1 - Chawathe,S. A1 - Gopalakrishnan,V. A1 - Keleher,P. A1 - Silaghi,B. AB - Existing peer-to-peer systems implement a single function well: data lookup. There is now a wealth of research describing how to reliably disseminate, and to later retrieve, data in a scalable and load-balanced manner. ER - TY - JOUR T1 - Eight lessons learned during COTS-based systems maintenance JF - Software, IEEE Y1 - 2003 A1 - Reifer,D.J. A1 - Basili, Victor R. A1 - Boehm,B.W. A1 - Clark,B. KW - COTS KW - COTS-based KW - cycle KW - life KW - lifecycle KW - Maintenance KW - maintenance; KW - object-oriented KW - packages; KW - phase; KW - processes; KW - programming; KW - reusability; KW - software KW - systems AB - To make better decisions relative to CBSs, we need empirical knowledge. To gain this knowledge, we must more fully understand the lifecycle processes people use when harnessing COTS packages. The initial findings reported here are but the first step in our attempts to capture this empirical knowledge. We plan to continue collecting data and investigating the phenomenology of COTS-based systems. VL - 20 SN - 0740-7459 CP - 5 M3 - 10.1109/MS.2003.1231161 ER - TY - CONF T1 - Electronic voting system usability issues T2 - Proceedings of the SIGCHI conference on Human factors in computing systems Y1 - 2003 A1 - Bederson, Benjamin B. A1 - Lee,B. A1 - Sherman,R.M. A1 - Herrnson,P.S. A1 - Niemi,R.G. JA - Proceedings of the SIGCHI conference on Human factors in computing systems ER - TY - CONF T1 - Energy reduction techniques for multimedia applications with tolerance to deadline misses T2 - Proceedings of the 40th annual Design Automation Conference Y1 - 2003 A1 - Hua,S. A1 - Qu,G. A1 - Bhattacharyya, Shuvra S. JA - Proceedings of the 40th annual Design Automation Conference ER - TY - CONF T1 - Energy-efficient broadcast and multicast trees for reliable wireless communication T2 - Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE Y1 - 2003 A1 - Banerjee,S. A1 - Misra,A. A1 - Yeo,Jihwang A1 - Agrawala, Ashok K. KW - broadcast KW - channels;multicast KW - communication;broadcast KW - communication;network KW - data KW - delivery KW - energy-efficient KW - layer;multicast KW - network KW - networks;network KW - networks;telecommunication KW - paths;multicast KW - rates;link KW - reliability; KW - topologies;wireless KW - topology;radio KW - trees;error KW - trees;multihop KW - wireless AB - We define energy-efficient broadband and multicast schemes for reliable communication in multi-hop wireless networks. Unlike previous techniques, the choice of neighbors in the broadband and multicast trees in these schemes, are based not only on the link distance, but also on the error rates associated with the link. Our schemes can be implemented using both positive and negative acknowledgement based reliable broadcast techniques in the link layer. Through simulations, we show that our scheme achieves up to 45% improvement over previous schemes on realistic 100-node network topologies. A positive acknowledgment based implementation is preferred. Our simulations show that the additional benefits of a positive acknowledgement based implementation is marginal (1-2%). Therefore a negative acknowledgement based implementation of our schemes is equally applicable in constructing energy-efficient reliable and multicast data delivery paths. JA - Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE VL - 1 M3 - 10.1109/WCNC.2003.1200429 ER - TY - JOUR T1 - Experimental validation of new software technology JF - SERIES ON SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING Y1 - 2003 A1 - Zelkowitz, Marvin V A1 - Wallace,D. R A1 - Binkley,D. W AB - When to apply a new technology in an organization is acritical decision for every software development organization. Earlier work defines a set of methods that the research community uses when a new technology is developed. This chapter presents a discussion of the set of methods that industrial organizations use before adopting a new technology. First there is a brief definition of the earlier research methods and then a definition of the set of industrial methods. A comparison of the two sets leads into the perspectives of these methods of experts in the research and industrial community via surveys made to those communities. VL - 12 ER - TY - CONF T1 - Exploring the probabilistic design space of multimedia systems T2 - 14th IEEE International Workshop on Rapid Systems Prototyping, 2003. Proceedings Y1 - 2003 A1 - Shaoxiong Hua A1 - Gang Qu A1 - Bhattacharyya, Shuvra S. KW - economic system prototyping KW - embedded software implementation KW - Embedded system KW - Energy consumption KW - execution time uncertainties KW - Hardware KW - multimedia embedded systems KW - multimedia system prototyping KW - multimedia systems KW - performance requirements KW - probabilistic design space KW - rapid system prototyping KW - Real time systems KW - real-time analysis KW - reasonable execution failure tolerance KW - Resource management KW - software prototyping KW - Space exploration KW - Streaming media KW - systems analysis KW - Timing KW - Uncertainty AB - In this paper, we propose the novel concept of probabilistic design for multimedia systems and a methodology to quickly explore such design space at an early design stage. The probabilistic design is motivated by the challenge of how to design, but not over-design, multimedia embedded systems while systematically incorporating such application's performance requirements, uncertainties in execution time, and tolerance for reasonable execution failures. Our goal is to bridge the gap between real-time analysis and embedded software implementation for rapid and economic (multimedia) system prototyping. Our method takes advantage of multimedia system's unique features mentioned above to relax the rigid hardware requirements for software implementation and eventually avoid over-designing the system. JA - 14th IEEE International Workshop on Rapid Systems Prototyping, 2003. Proceedings PB - IEEE SN - 0-7695-1943-1 M3 - 10.1109/IWRSP.2003.1207053 ER - TY - JOUR T1 - Family Calendar Survey JF - Technical Reports from UMIACS Y1 - 2003 A1 - Hutchinson,Hilary A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine A1 - Druin, Allison KW - Technical Report AB - Beginning in late July 2002, we conducted a survey about people's personal andfamily calendaring habits. By the end of September, we had over 400 responses, which are summarized below. The survey was conducted to help inform our work in designing new technologies for families, motivated in part by our work on the interLiving project. InterLiving is a 3 year, European Union-funded project where we work with distributed, multi-generational families as design partners to create new technologies (see http://www.cs.umd.edu/hcil/interliving for details). The survey was administered from a web page (https://www.cs.umd.edu/users/hilary/survey/survey.htm), and participants were solicited via a "chain-mail" email approach. We began by sending a request to fill out a survey to our friends, families, and colleagues. We asked that they forward the request on to their friends, family and colleagues as well. While we realize that this was an imperfect approach, we believed that the respondents would be representative of the users we are initially targeting in our research on family calendaring and coordination - individuals who are already making relatively heavy use of computers at home and/or work. The results seem to validate this assumption. Many of our respondents likely come from the HCI community as the mailing went to our large lab mailing list. We may have some pollution in the data as a result of people in the same household (e.g. husband and wife) both filling out the survey. Despite these issues, the results we got were helpful in eliciting a number of important findings, namely that people rely on multiple calendars, many of which are still paper. (UMIACS-TR-2002-92) (HCIL-TR-2002-21) UR - http://drum.lib.umd.edu/handle/1903/1236 ER - TY - JOUR T1 - Formalizing dynamic software updating JF - Proceedings of the Second International Workshop on Unanticipated Software Evolution (USE) Y1 - 2003 A1 - Bierman,G. A1 - Hicks, Michael W. A1 - Sewell,P. A1 - Stoyle,G. AB - Dynamic software updating (DSU) enables running programs to beupdated with new code and data without interrupting their execution. A number of DSU systems have been designed, but there is still little rig- orous understanding of how to use DSU technology so that updates are safe. As a first step in this direction, we introduce a small update calculus with a precise mathematical semantics. The calculus is formulated as an extension of a typed lambda calculus, and supports updating technology similar to that of the programming language Erlang [2]. Our goal is to provide a simple yet expressive foundation for reasoning about dynam- ically updateable software. In this paper, we present the details of the calculus, give some examples of its expressive power, and discuss how it might be used or extended to guarantee safety properties. ER - TY - CONF T1 - A generative probabilistic OCR model for NLP applications T2 - Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology-Volume 1 Y1 - 2003 A1 - Kolak,O. A1 - Byrne,W. A1 - Resnik, Philip JA - Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology-Volume 1 ER - TY - JOUR T1 - The genome sequence of Bacillus anthracis Ames and comparison to closely related bacteria JF - Nature Y1 - 2003 A1 - Read,Timothy D. A1 - Peterson,Scott N. A1 - Tourasse,Nicolas A1 - Baillie,Les W. A1 - Paulsen,Ian T. A1 - Nelson,Karen E. A1 - Tettelin,Herv|[eacute]| A1 - Fouts,Derrick E. A1 - Eisen,Jonathan A. A1 - Gill,Steven R. A1 - Holtzapple,Erik K. A1 - |[Oslash]|kstad,Ole Andreas A1 - Helgason,Erlendur A1 - Rilstone,Jennifer A1 - Wu,Martin A1 - Kolonay,James F. A1 - Beanan,Maureen J. A1 - Dodson,Robert J. A1 - Brinkac,Lauren M. A1 - Gwinn,Michelle A1 - DeBoy,Robert T. A1 - Madpu,Ramana A1 - Daugherty,Sean C. A1 - Durkin,A. Scott A1 - Haft,Daniel H. A1 - Nelson,William C. A1 - Peterson,Jeremy D. A1 - Pop, Mihai A1 - Khouri,Hoda M. A1 - Radune,Diana A1 - Benton,Jonathan L. A1 - Mahamoud,Yasmin A1 - Jiang,Lingxia A1 - Hance,Ioana R. A1 - Weidman,Janice F. A1 - Berry,Kristi J. A1 - Plaut,Roger D. A1 - Wolf,Alex M. A1 - Watkins,Kisha L. A1 - Nierman,William C. A1 - Hazen,Alyson A1 - Cline,Robin A1 - Redmond,Caroline A1 - Thwaite,Joanne E. A1 - White,Owen A1 - Salzberg,Steven L. A1 - Thomason,Brendan A1 - Friedlander,Arthur M. A1 - Koehler,Theresa M. A1 - Hanna,Philip C. A1 - Kolst|[oslash]|,Anne-Brit A1 - Fraser,Claire M. AB - Bacillus anthracis is an endospore-forming bacterium that causes inhalational anthrax1. Key virulence genes are found on plasmids (extra-chromosomal, circular, double-stranded DNA molecules) pXO1 (ref. 2) and pXO2 (ref. 3). To identify additional genes that might contribute to virulence, we analysed the complete sequence of the chromosome of B. anthracis Ames (about 5.23 megabases). We found several chromosomally encoded proteins that may contribute to pathogenicity—including haemolysins, phospholipases and iron acquisition functions—and identified numerous surface proteins that might be important targets for vaccines and drugs. Almost all these putative chromosomal virulence and surface proteins have homologues in Bacillus cereus, highlighting the similarity of B. anthracis to near-neighbours that are not associated with anthrax4. By performing a comparative genome hybridization of 19 B. cereus and Bacillus thuringiensis strains against a B. anthracis DNA microarray, we confirmed the general similarity of chromosomal genes among this group of close relatives. However, we found that the gene sequences of pXO1 and pXO2 were more variable between strains, suggesting plasmid mobility in the group. The complete sequence of B. anthracis is a step towards a better understanding of anthrax pathogenesis. VL - 423 SN - 0028-0836 UR - http://www.nature.com/nature/journal/v423/n6935/full/nature01586.html CP - 6935 M3 - 10.1038/nature01586 ER - TY - JOUR T1 - Geometrical analysis of precessional switching and relaxation in uniformly magnetized bodies JF - Magnetics, IEEE Transactions on Y1 - 2003 A1 - Bertotti,G. A1 - Mayergoyz, Issak D A1 - Serpico,C. A1 - d'Aquino,M. KW - analysis; KW - attraction; KW - basins KW - bodies; KW - dynamical KW - dynamics; KW - entanglement; KW - equation; KW - film; KW - films; KW - geometrical KW - integrals KW - Landau-Lifshitz-Gilbert KW - magnetic KW - magnetisation KW - magnetization KW - magnetized KW - motion; KW - of KW - particle; KW - particles; KW - phase KW - portrait; KW - precessional KW - relaxation; KW - reversal; KW - riddled KW - separatrices; KW - single-domain KW - spin KW - switching; KW - system; KW - thin KW - uniformly AB - Precessional switching and relaxation in a single-domain particle or film is studied by using the Landau-Lifshitz-Gilbert equation. The analysis of the switching process is based on the explicit knowledge of two integrals of motion for the magnetization dynamics in the conservative case. The knowledge of these integrals of motions enables one to carry out the geometrical analysis of the system and give the complete phase portrait. The relaxation process which occurs after the magnetization is reversed is analyzed by using geometrical methods and it is showed that the dynamical system exhibits entanglement of separatrices and riddled basins of attraction. VL - 39 SN - 0018-9464 CP - 5 M3 - 10.1109/TMAG.2003.816453 ER - TY - JOUR T1 - Goal-Driven Reconfiguration of Polymorphous Architectures JF - Domain-specific processors: systems, architectures, modeling, and simulation Y1 - 2003 A1 - Lohani,S. A1 - Bhattacharyya, Shuvra S. VL - 20 ER - TY - JOUR T1 - GUI ripping: Reverse engineering of graphical user interfaces for testing JF - Proceedings of the 10th working conference on reverse engineering (WCRE’03) Y1 - 2003 A1 - Memon, Atif M. A1 - Banerjee,I. A1 - Nagarajan,A. AB - Graphical user interfaces (GUIs) are important parts oftoday’s software and their correct execution is required to ensure the correctness of the overall software. A popular technique to detect defects in GUIs is to test them by exe- cuting test cases and checking the execution results. Test cases may either be created manually or generated auto- matically from a model of the GUI. While manual testing is unacceptably slow for many applications, our experience with GUI testing has shown that creating a model that can be used for automated test case generation is difficult. We describe a new approach to reverse engineer a model represented as structures called a GUI forest, event-flow graphs and an integration tree directly from the executable GUI. We describe “GUI Ripping”, a dynamic process in which the software’s GUI is automatically “traversed” by opening all its windows and extracting all their widgets (GUI objects), properties, and values. The extracted infor- mation is then verified by the test designer and used to auto- matically generate test cases. We present algorithms for the ripping process and describe their implementation in a tool suite that operates on Java and Microsoft Windows’ GUIs. We present results of case studies which show that our approach requires very little human intervention and is es- pecially useful for regression testing of software that is mod- ified frequently. We have successfully used the “GUI Rip- per” in several large experiments and have made it avail- able as a downloadable tool. VL - 1095 CP - 1350/03 ER - TY - JOUR T1 - Guidelines for interdomain traffic engineering JF - SIGCOMM Comput. Commun. Rev. Y1 - 2003 A1 - Feamster, Nick A1 - Borkenhagen,Jay A1 - Rexford,Jennifer AB - Network operators must have control over the flow of traffic into, out of, and across their networks. However, the Border Gateway Protocol (BGP) does not facilitate common traffic engineering tasks, such as balancing load across multiple links to a neighboring AS or directing traffic to a different neighbor. Solving these problems is difficult because the number of possible changes to routing policies is too large to exhaustively test all possibilities, some changes in routing policy can have an unpredictable effect on the flow of traffic, and the BGP decision process implemented by router vendors limits an operator's control over path selection.We propose fundamental objectives for interdomain traffic engineering and specific guidelines for achieving these objectives within the context of BGP. Using routing and traffic data from the AT&T backbone we show how certain BGP policy changes can move traffic in a predictable fashion, despite limited knowledge about the routing policies in neighboring AS's. Then, we show how operators can gain greater flexibility by relaxing some steps in the BGP decision process and ensuring that neighboring AS's send consistent advertisements at each peering location. Finally, we show that an operator can manipulate traffic efficiently by changing the routes for a small number of prefixes (or groups of related prefixes) that consistently receive a large amount of traffic. VL - 33 SN - 0146-4833 UR - http://doi.acm.org/10.1145/963985.963988 CP - 5 M3 - 10.1145/963985.963988 ER - TY - JOUR T1 - Help! I’m lost: User frustration in web navigation JF - IT & Society Y1 - 2003 A1 - Lazar,J. A1 - Bessiere,K. A1 - Ceaparu,I. A1 - Robinson,J. A1 - Shneiderman, Ben AB - Computers can be valuable tools, and networked resources via the Internet can be beneficial to many different populations and communities. Unfortunately, when people are unable to reach their task goals due to frustrating experiences, this can hinder the effectiveness of technology. This research summary provides information about the user frustration research that has been performed at the University of Maryland and Towson University. Causes of user frustration are discussed in this research summary, along with the surprising finding that nearly one-third to one-half of the time spent in front of the computer is wasted due to frustrating experiences. Furthermore, when interfaces are planned to be deceptive and confusing, this can lead to increased frustration. Implications for designers and users are discussed. VL - 1 CP - 3 ER - TY - CONF T1 - A high performance multi-perspective vision studio T2 - Proceedings of the 17th annual international conference on Supercomputing Y1 - 2003 A1 - Borovikov,Eugene A1 - Sussman, Alan KW - database KW - distributed system KW - high-performance KW - IMAGE PROCESSING KW - multi-perspective KW - VISION KW - volumetric reconstruction AB - We describe a multi-perspective vision studio as a flexible high performance framework for solving complex image processing and machine vision problems on multi-view image sequences. The studio abstracts multi-view image data from image sequence acquisition facilities, stores and catalogs sequences in a high performance distributed database, allows customization of back-end processing services, and can serve custom client applications, thus helping make multi-view video sequence processing efficient and generic. To illustrate our approach, we describe two multi-perspective studio applications, and discuss performance and scalability results. JA - Proceedings of the 17th annual international conference on Supercomputing T3 - ICS '03 PB - ACM CY - New York, NY, USA SN - 1-58113-733-8 UR - http://doi.acm.org/10.1145/782814.782862 M3 - 10.1145/782814.782862 ER - TY - BOOK T1 - Identifying Relevant Information for Testing Technique Selection: An Instantiated Characterization Schema Y1 - 2003 A1 - Vegas,Sira A1 - Juristo,Natalia A1 - Basili, Victor R. KW - Business & Economics / Information Management KW - Computer software KW - Computer software - Testing KW - Computer software/ Testing KW - Computers / Information Technology KW - Computers / Internet / Application Development KW - Computers / Programming / General KW - Computers / Programming Languages / General KW - Computers / Software Development & Engineering / General KW - Computers / Software Development & Engineering / Quality Assurance & Testing KW - Technology & Engineering / Materials Science AB - The importance of properly selecting testing techniques is widely accepted in the software engineering community today. However, there are chiefly two reasons why the selections now made by software developers are difficult to evaluate as correct. First, there are several techniques with which the average developer is unfamiliar, often leaving testers with limited knowledge of all the techniques currently available. Second, the available information regarding the different testing techniques is primarily procedure (focused on how to use the technique), rather than pragmatic (focused on the effect and appropriateness of using the technique). The problem addressed in this book is aimed at improving software testing technique selection.Identifying Relevant Information for Testing Technique Selection: An Instantiated Characterization Schema will train its readers how to use the conceptual tool presented here in various ways. Developers will improve their testing technique selection process by systematically and objectively selecting the testing techniques for a software project. Developers will also build a repository containing their own experience with the application of various software testing techniques. Researchers will focus their research on the relevant aspects of testing technique when creating it, and when comparing different techniques.Identifying Relevant Information for Testing Technique Selection: An Instantiated Characterization Schema is designed to meet the needs of a professional audience in software engineering. This book is also suitable for graduate-level students in computer science and engineering. PB - Springer SN - 9781402074356 ER - TY - CHAP T1 - Innovating the Interaction T2 - The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections Y1 - 2003 A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine A1 - Mushlin,R. A1 - Snyder,A. A1 - Li,J. A1 - Heller,D. A1 - Shneiderman, Ben A1 - Hochheiser,H. A1 - Fekete,J. D A1 - Czenvinski,M. JA - The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections PB - Morgan Kaufmann CY - San Francisco SN - 978-1-55860-915-0 ER - TY - JOUR T1 - The interaction between zoning regulations and residential preferences as a driver of urban form JF - Proceedings of the 2003 UTEP Distinguished Faculty and Student Symposium Y1 - 2003 A1 - Zellner,M.L. A1 - Riolo,R A1 - Rand, William A1 - Page,S.E. A1 - Brown,D.G. A1 - Fernandez,L.E. ER - TY - CONF T1 - Interactive color mosaic and dendrogram displays for signal/noise optimization in microarray data analysis T2 - Multimedia and Expo, 2003. ICME'03. Proceedings. 2003 International Conference on Y1 - 2003 A1 - Seo,J. A1 - Bakay,M. A1 - Zhao,P. A1 - Chen,Y.W. A1 - Clarkson,P. A1 - Shneiderman, Ben A1 - Hoffman,E.P. AB - Data analysis and visualization is strongly influenced by noise and noise filters. There are multiple sources of oisein microarray data analysis, but signal/noise ratios are rarely optimized, or even considered. Here, we report a noise analysis of a novel 13 million oligonucleotide dataset - 25 human U133A (~500,000 features) profiles of patient muscle biposies. We use our recently described interactive visualization tool, the Hierarchical Clustering Explorer (HCE) to systemically address the effect of different noise filters on resolution of arrays into orrectbiological groups (unsupervised clustering into three patient groups of known diagnosis). We varied probe set interpretation methods (MAS 5.0, RMA), resent callfilters, and clustering linkage methods, and investigated the results in HCE. HCE interactive features enabled us to quickly see the impact of these three variables. Dendrogram displays showed the clustering results systematically, and color mosaic displays provided a visual support for the results. We show that each of these three variables has a strong effect on unsupervised clustering. For this dataset, the strength of the biological variable was maximized, and noise minimized, using MAS 5.0, 10% present call filter, and Average Group Linkage. We propose a general method of using interactive tools to identify the optimal signal/noise balance or the optimal combination of these three variables to maximize the effect of the desired biological variable on data interpretation. JA - Multimedia and Expo, 2003. ICME'03. Proceedings. 2003 International Conference on VL - 3 ER - TY - CONF T1 - Interactive subsurface scattering for translucent meshes T2 - Proceedings of the 2003 symposium on Interactive 3D graphics Y1 - 2003 A1 - Hao,Xuejun A1 - Baby,Thomas A1 - Varshney, Amitabh KW - BSSRDF KW - local illumination KW - reflection models KW - subsurface scattering AB - We propose a simple lighting model to incorporate subsurface scattering effects within the local illumination framework. Subsurface scattering is relatively local due to its exponential falloff and has little effect on the appearance of neighboring objects. These observations have motivated us to approximate the BSSRDF model and to model subsurface scattering effects by using only local illumination. Our model is able to capture the most important features of subsurface scattering: reflection and transmission due to multiple scattering.In our approach we build the neighborhood information as a preprocess and modify the traditional local illumination model into a run-time two-stage process. In the first stage we compute the reflection and transmission of light on the surface. The second stage involves bleeding the scattering effects from a vertex's neighborhood to produce the final result. We then show how to merge the run-time two-stage process into a run-time single-stage process using precomputed integral. The complexity of our run-time algorithm is O(N), where N is the number of vertices. Using this approach, we achieve interactive frame rates with about one to two orders of magnitude speedup compared with the state-of-the-art methods. JA - Proceedings of the 2003 symposium on Interactive 3D graphics T3 - I3D '03 PB - ACM CY - New York, NY, USA SN - 1-58113-645-5 UR - http://doi.acm.org/10.1145/641480.641497 M3 - 10.1145/641480.641497 ER - TY - JOUR T1 - The International Children's Digital Library JF - First Monday Y1 - 2003 A1 - Druin, Allison A1 - Bederson, Benjamin B. A1 - Weeks,A. A1 - Farber,A. A1 - Grosjean,J. A1 - Guha,M.L. A1 - Hourcade,J. P A1 - Lee,J. A1 - Liao,S. A1 - Reuter,K. A1 - others VL - 8 CP - 5-5 ER - TY - JOUR T1 - The International Children's Digital Library: Description and analysis of first use JF - First Monday Y1 - 2003 A1 - Druin, Allison A1 - Bederson, Benjamin B. A1 - Weeks,A. A1 - Farber,A. A1 - Grosjean,J. A1 - Guha,M.L. A1 - Hourcade,J. P A1 - Lee,J. A1 - Liao,S. A1 - Reuter,K. A1 - others VL - 8 CP - 5 ER - TY - JOUR T1 - The International Children's Digital Library: viewing digital books online JF - Interacting with Computers Y1 - 2003 A1 - Hourcade,J. P A1 - Bederson, Benjamin B. A1 - Druin, Allison A1 - Rose,A. A1 - Farber,A. A1 - Takayama,Y. VL - 15 CP - 2 ER - TY - JOUR T1 - Intradomain Overlays: Architecture and Applications JF - Technical Reports from UMIACS, UMIACS-TR-2003-70 Y1 - 2003 A1 - Kommareddy,Christopher A1 - Guven,Tuna A1 - Bhattacharjee, Bobby A1 - La,Richard A1 - Shayman,Mark KW - Technical Report AB - We introduce an architecture for ``Intradomain Overlays'', where a subset of routers within a domain is augmented with a dedicated host. These strategically placed hosts form an overlay network, and we describe a number of applications for such overlays. These applications include efficient network monitoring, policy- and load-based packet re-routing, and network resource accounting. In this paper, we elaborate on the network monitoring application and describe a distributed protocol for monitoring routers within an AS which has been augmented with a few overlay nodes. The routers and other infrastructure are unaware of the overlay nodes, and the monitoring of individual elements is conducted using plain SNMP. We describe techniques for efficiently synthesizing and transporting the monitored SNMP data, and present results using trace data collected from an AS with 400+ routers. Our results show that the overlay-based monitoring reduces overheads by 2--4 orders of magnitude, and thus enables much finer grained monitoring and traffic engineering than is otherwise possible. (UMIACS-TR-2003-70) UR - http://drum.lib.umd.edu/handle/1903/1295 ER - TY - JOUR T1 - Iterative and incremental developments. a brief history JF - Computer Y1 - 2003 A1 - Larman,C. A1 - Basili, Victor R. KW - agile KW - and KW - developments;iterative KW - engineering; KW - engineering;software KW - enhancement;software KW - incremental KW - methods;iterative KW - system;history;software AB - Although many view iterative and incremental development as a modern practice, its application dates as far back as the mid-1950s. Prominent software-engineering thought leaders from each succeeding decade supported IID practices, and many large projects used them successfully. These practices may have differed in their details, but all had a common theme-to avoid a single-pass sequential, document-driven, gated-step approach. VL - 36 SN - 0018-9162 CP - 6 M3 - 10.1109/MC.2003.1204375 ER - TY - JOUR T1 - Lambertian reflectance and linear subspaces JF - Pattern Analysis and Machine Intelligence, IEEE Transactions on Y1 - 2003 A1 - Basri,R. A1 - Jacobs, David W. KW - 2D KW - 4D KW - 9D KW - analog; KW - analytic KW - characterization; KW - convex KW - convolution KW - distant KW - functions; KW - harmonics; KW - image KW - image; KW - intensities; KW - Lambertian KW - light KW - lighting KW - linear KW - methods; KW - nonnegative KW - normals; KW - object KW - optimization; KW - programming; KW - query KW - recognition; KW - reflectance; KW - reflectivity; KW - set; KW - sources; KW - space; KW - spherical KW - subspace; KW - subspaces; KW - surface AB - We prove that the set of all Lambertian reflectance functions (the mapping from surface normals to intensities) obtained with arbitrary distant light sources lies close to a 9D linear subspace. This implies that, in general, the set of images of a convex Lambertian object obtained under a wide variety of lighting conditions can be approximated accurately by a low-dimensional linear subspace, explaining prior empirical results. We also provide a simple analytic characterization of this linear space. We obtain these results by representing lighting using spherical harmonics and describing the effects of Lambertian materials as the analog of a convolution. These results allow us to construct algorithms for object recognition based on linear methods as well as algorithms that use convex optimization to enforce nonnegative lighting functions. We also show a simple way to enforce nonnegative lighting when the images of an object lie near a 4D linear space. We apply these algorithms to perform face recognition by finding the 3D model that best matches a 2D query image. VL - 25 SN - 0162-8828 CP - 2 M3 - 10.1109/TPAMI.2003.1177153 ER - TY - CHAP T1 - LifeLines: Using Visualization to Enhance Navigation and Analysis of Patient Records T2 - The Craft of Information VisualizationThe Craft of Information Visualization Y1 - 2003 A1 - Plaisant, Catherine A1 - Mushlin,Richard A1 - Snyder,Aaron A1 - Li,Jia A1 - Heller,Dan A1 - Shneiderman, Ben ED - Bederson, Benjamin B. ED - Shneiderman, Ben JA - The Craft of Information VisualizationThe Craft of Information Visualization PB - Morgan Kaufmann CY - San Francisco SN - 978-1-55860-915-0 UR - http://www.sciencedirect.com/science/article/pii/B978155860915050038X ER - TY - JOUR T1 - Logic foundry: rapid prototyping for FPGA-based DSP systems JF - EURASIP J. Appl. Signal Process. Y1 - 2003 A1 - Spivey,Gary A1 - Bhattacharyya, Shuvra S. A1 - Nakajima,Kazuo KW - CAD tools KW - Design methodology KW - DSP KW - FPGA KW - integration KW - rapid prototyping AB - We introduce the Logic Foundry, a system for the rapid creation and integration of FPGA-based digital signal processing systems. Recognizing that some of the greatest challenges in creating FPGA-based systems occur in the integration of the various components, we have proposed a system that targets the following four areas of integration: design flow integration, component integration, platform integration, and software integration. Using the Logic Foundry, a system can be easily specified, and then automatically constructed and integrated with system level software. VL - 2003 SN - 1110-8657 UR - http://dx.doi.org/10.1155/S1110865703301039 M3 - 10.1155/S1110865703301039 ER - TY - CONF T1 - Matching Software Measurements to Business Goals T2 - Keynote Address at the 2003 Software Management Conference, San Jose, California Y1 - 2003 A1 - Basili, Victor R. JA - Keynote Address at the 2003 Software Management Conference, San Jose, California ER - TY - JOUR T1 - Measuring the effects of internet path faults on reactive routing JF - SIGMETRICS Perform. Eval. Rev. Y1 - 2003 A1 - Feamster, Nick A1 - Andersen,David G. A1 - Balakrishnan,Hari A1 - Kaashoek,M. Frans AB - Empirical evidence suggests that reactive routing systems improve resilience to Internet path failures. They detect and route around faulty paths based on measurements of path performance. This paper seeks to understand why and under what circumstances these techniques are effective.To do so, this paper correlates end-to-end active probing experiments, loss-triggered traceroutes of Internet paths, and BGP routing messages. These correlations shed light on three questions about Internet path failures: (1) Where do failures appear? (2) How long do they last? (3) How do they correlate with BGP routing instability?Data collected over 13 months from an Internet testbed of 31 topologically diverse hosts suggests that most path failures last less than fifteen minutes. Failures that appear in the network core correlate better with BGP instability than failures that appear close to end hosts. On average, most failures precede BGP messages by about four minutes, but there is often increased BGP traffic both before and after failures. Our findings suggest that reactive routing is most effective between hosts that have multiple connections to the Internet. The data set also suggests that passive observations of BGP routing messages could be used to predict about 20% of impending failures, allowing re-routing systems to react more quickly to failures. VL - 31 SN - 0163-5999 UR - http://doi.acm.org/10.1145/885651.781043 CP - 1 M3 - 10.1145/885651.781043 ER - TY - CONF T1 - Modelling pedestrian shapes for outlier detection: a neural net based approach T2 - Intelligent Vehicles Symposium, 2003. Proceedings. IEEE Y1 - 2003 A1 - Nanda,H. A1 - Benabdelkedar,C. A1 - Davis, Larry S. KW - (artificial KW - complex KW - Computer KW - computing; KW - custom KW - design; KW - detection; KW - engineering KW - intelligence); KW - layer KW - learning KW - method; KW - modelling; KW - net; KW - nets; KW - neural KW - object KW - outlier KW - pedestrian KW - pedestrians KW - rate; KW - recognition KW - recognition; KW - SHAPE KW - shapes; KW - traffic KW - two KW - vision; AB - In this paper we present an example-based approach to learn a given class of complex shapes, and recognize instances of that shape with outliers. The system consists of a two-layer custom-designed neural network. We apply this approach to the recognition of pedestrians carrying objects from a single camera. The system is able to capture and model an ample range of pedestrian shapes at varying poses and camera orientations, and achieves a 90% correct recognition rate. JA - Intelligent Vehicles Symposium, 2003. Proceedings. IEEE M3 - 10.1109/IVS.2003.1212949 ER - TY - CHAP T1 - Navigation Patterns and Usability of Zoomable User Interfaces With and Without an Overview T2 - The craft of information visualization: readings and reflections Y1 - 2003 A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine JA - The craft of information visualization: readings and reflections PB - Morgan Kaufmann Publishers Inc. SN - 978-1-55860-915-0 ER - TY - JOUR T1 - Navigation patterns & usability of zoomable user interfaces: with and without an overview JF - interactions Y1 - 2003 A1 - Hornbaek,Kasper A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine AB - The following abstracts are from recent issues and the forthcoming issue of ACM's Transactions of Computer Human Interaction (ToCHI). They are included here to alert interactions' readers to what research is being done in the field of Computer Human Interaction. The complete papers, when published, can be found in ACM's Digital Library at www.acm.org/pubs/contents/journals/tochi/ VL - 10 SN - 1072-5520 UR - http://doi.acm.org/10.1145/604575.604582 CP - 1 M3 - 10.1145/604575.604582 ER - TY - CONF T1 - New eyes for robotics T2 - 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings Y1 - 2003 A1 - Baker, P. A1 - Ogale, A. S A1 - Fermüller, Cornelia A1 - Aloimonos, J. KW - 3D motion estimation KW - Argus eye KW - array signal processing KW - Birds KW - Calibration KW - CAMERAS KW - Control systems KW - Eyes KW - geometric configuration KW - imaging KW - imaging system KW - Layout KW - Motion estimation KW - multiple stereo configurations KW - Robot kinematics KW - robot vision KW - Robot vision systems KW - ROBOTICS KW - Robotics and automation KW - SHAPE KW - shape models AB - This paper describes an imaging system that has been designed to facilitate robotic tasks of motion. The system consists of a number of cameras in a network arranged so that they sample different parts of the visual sphere. This geometric configuration has provable advantages compared to small field of view cameras for the estimation of the system's own motion and consequently the estimation of shape models from the individual cameras. The reason is that inherent ambiguities of confusion between translation and rotation disappear. Pairs of cameras may also be arranged in multiple stereo configurations which provide additional advantages for segmentation. Algorithms for the calibration of the system and the 3D motion estimation are provided. JA - 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings PB - IEEE VL - 1 SN - 0-7803-7860-1 M3 - 10.1109/IROS.2003.1250761 ER - TY - CHAP T1 - Preserving Context with Zoomable User Interfaces T2 - The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections Y1 - 2003 A1 - Hombsek,K. A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine JA - The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections PB - Morgan Kaufmann Publishers Inc. SN - 978-1-55860-915-0 ER - TY - RPRT T1 - Recovery of a Digital Image Collection Through the SDSC/UMD/NARA Prototype Persistent Archive Y1 - 2003 A1 - Smorul,Mike A1 - JaJa, Joseph F. A1 - McCall,Fritz A1 - Brown,Susan Fitch A1 - Moore,Reagan A1 - Marciano,Richard A1 - Chen,Sheau-Yen A1 - Lopez,Rick A1 - Chadduck,Robert KW - Technical Report AB - The San Diego Supercomputer Center (SDSC), the University of Maryland, and theNational Archives and Records Administration (NARA) are collaborating on building a pilot persistent archive using and extending data grid and digital library technologies. The current prototype consists of node servers at SDSC, University of Maryland, and NARA, connected through the Storage Request Broker (SRB) data grid middleware, and currently holds several terabytes of NARA selected collections. In particular, a historically important image collection that was on the verge of becoming inaccessible was fully restored and ingested into our pilot system. In this report, we describe the methodology behind our approach to fully restore this image collection and the process used to ingest it into the prototype persistent archive. (UMIACS-TR-2003-105) PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-2003-105 UR - http://drum.lib.umd.edu/handle/1903/1321 ER - TY - JOUR T1 - Replicated studies: building a body of knowledge about software reading techniques JF - SERIES ON SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING Y1 - 2003 A1 - Shull, F. A1 - Carver, J. A1 - Travassos,G.H. A1 - Maldonado,J.C. A1 - Conradi,R. A1 - Basili, Victor R. VL - 12 ER - TY - JOUR T1 - Resilient multicast using overlays JF - SIGMETRICS Perform. Eval. Rev. Y1 - 2003 A1 - Banerjee,Suman A1 - Lee,Seungjoon A1 - Bhattacharjee, Bobby A1 - Srinivasan, Aravind KW - overlay multicast KW - randomized forwarding KW - Resilience AB - We introduce PRM (Probabilistic Resilient Multicast): a multicast data recovery scheme that improves data delivery ratios while maintaining low end-to-end latencies. PRM has both a proactive and a reactive component; in this paper we describe how PRM can be used to improve the performance of application-layer multicast protocols, especially when there are high packet losses and host failures. Further, using analytic techniques, we show that PRM can guarantee arbitrarily high data delivery ratios and low latency bounds. As a detailed case study, we show how PRM can be applied to the NICE application-layer multicast protocol. We present detailed simulations of the PRM-enhanced NICE protocol for 10,000 node Internet-like topologies. Simulations show that PRM achieves a high delivery ratio (> 97%) with a low latency bound (600 ms) for environments with high end-to-end network losses (1-5%) and high topology change rates (5 changes per second) while incurring very low overheads (< 5%). VL - 31 SN - 0163-5999 UR - http://doi.acm.org/10.1145/885651.781041 CP - 1 M3 - 10.1145/885651.781041 ER - TY - JOUR T1 - Secure agents JF - Annals of Mathematics and Artificial Intelligence Y1 - 2003 A1 - Bonatti,P. A A1 - Kraus,S. A1 - V.S. Subrahmanian AB - With the rapid proliferation of software agents, there comes an increased need for agents to ensure that they do not provide data and/or services to unauthorized users. We first develop an abstract definition of what it means for an agent to preserve data/action security. Most often, this requires an agent to have knowledge that is impossible to acquire – hence, we then develop approximate security checks that take into account, the fact that an agent usually has incomplete/approximate beliefs about other agents. We develop two types of security checks – static ones that can be checked prior to deploying the agent, and dynamic ones that are executed at run time. We prove that a number of these problems are undecidable, but under certain conditions, they are decidable and (our definition of) security can be guaranteed. Finally, we propose a language within which the developer of an agent can specify her security needs, and present provably correct algorithms for static/dynamic security verification. VL - 37 CP - 1 M3 - 10.1023/A:1020233522878 ER - TY - CHAP T1 - Seeing the World Through Image Libraries T2 - The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections Y1 - 2003 A1 - North,C. A1 - Shneiderman, Ben A1 - Plaisant, Catherine A1 - Kang,H. A1 - Bederson, Benjamin B. JA - The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections PB - Morgan Kaufmann Publishers Inc. SN - 978-1-55860-915-0 ER - TY - JOUR T1 - The sequence and analysis of Trypanosoma brucei chromosome II JF - Nucleic acids research Y1 - 2003 A1 - El‐Sayed, Najib M. A1 - Ghedin,E. A1 - Song,J. A1 - MacLeod,A. A1 - Bringaud,F. A1 - Larkin,C. A1 - Wanless,D. A1 - Peterson,J. A1 - Hou,L. A1 - Taylor,S. A1 - others VL - 31 CP - 16 ER - TY - BOOK T1 - Special section on perceptual organization in computer vision Y1 - 2003 A1 - Jacobs, David W. A1 - Lindenbaum,M. A1 - August,J. A1 - Zucker,SW A1 - Ben-Shahar,O. A1 - Zucker,SW A1 - Tuytelaars,T. A1 - Turina,A. A1 - Van Gool,L. A1 - Mahamud,S. PB - IEEE Computer Society ER - TY - CONF T1 - Starting an intergenerational technology design team: a case study T2 - Proceedings of the 2003 conference on Interaction design and children Y1 - 2003 A1 - Knudtzon,Kendra A1 - Druin, Allison A1 - Kaplan,Nancy A1 - Summers,Kathryn A1 - Chisik,Yoram A1 - Kulkarni,Rahul A1 - Moulthrop,Stuart A1 - Weeks,Holly A1 - Bederson, Benjamin B. KW - children KW - cooperative inquiry KW - design methods KW - educational applications KW - intergenerational design teams KW - participatory design AB - This paper presents a case study of the first three months of a new intergenerational design team with children ages 10--13. It discusses the research and design methods used for working with children of this age group, the challenges and opportunities of starting a new team, and the lessons learned. JA - Proceedings of the 2003 conference on Interaction design and children T3 - IDC '03 PB - ACM CY - Preston, England SN - 1-58113-732-X M3 - 10.1145/953536.953545 ER - TY - JOUR T1 - Statistical physical model for foliage clutter in ultra-wideband synthetic aperture radar images JF - Journal of the Optical Society of America AThe Journal of the Optical Society of America A Y1 - 2003 A1 - Banerjee,Amit A1 - Chellapa, Rama KW - IMAGE PROCESSING KW - Remote sensing and sensors AB - Analyzing foliage-penetrating (FOPEN) ultra-wideband synthetic aperture radar (SAR) images is a challenging problem owing to the noisy and impulsive nature of foliage clutter. Indeed, many target-detection algorithms for FOPEN SAR data are characterized by high false-alarm rates. In this work, a statistical–physical model for foliage clutter is proposed that explains the presence of outliers in the data and suggests the use of symmetric alpha-stable (SαS) distributions for accurate clutter modeling. Furthermore, with the use of general assumptions of the noise sources and propagation conditions, the proposed model relates the parameters of the SαS model to physical parameters such as the attenuation coefficient and foliage density. VL - 20 UR - http://josaa.osa.org/abstract.cfm?URI=josaa-20-1-32 CP - 1 M3 - 10.1364/JOSAA.20.000032 ER - TY - JOUR T1 - Statistical validation of spatial patterns in agent-based models JF - Proceedings of Agent Based Simulation Y1 - 2003 A1 - Rand, William A1 - Brown,D.G. A1 - Page,S.E. A1 - Riolo,R A1 - Fernandez,L.E. A1 - Zellner,M AB - We present and evaluate an agent-based model(ABM) of land use change at the rural-urban fringe. This paper is part of a project that links the ABM to surveys of residential preferences and historical patterns of development. Validation is an important issue for such models and we discuss the use of distributional phenomena as a method of validation. We then highlight the ability of our ABM to gen- erate two phenomena evident in empirical analysis of urban development patterns: a power law rela- tionship between frequency and cluster size and a negative exponential relationship between density and distance from city center. We discuss these results in the light of validation of ABMs. VL - 4 ER - TY - JOUR T1 - Techniques for interdomain traffic engineering JF - Computer Communications Review Y1 - 2003 A1 - Feamster, Nick A1 - Borkenhagen,J. A1 - Rexford,J. AB - Network operators must have control over the flow of traffic into,out of, and across their networks. However, the Border Gateway Protocol (BGP) does not facilitate common traffic engineering tasks, such as balancing load across multiple links to a neighboring AS or directing traffic to a different neighbor. Solving these problems is difficult because the number of possible changes to routing policies is too large to exhaustively test all possibilities, some changes in routing policy can have an unpredictable effect on the flow of traf- fic, and the BGP decision process implemented by router vendors limits an operator’s control over path selection. We analyze routing and traffic data from the AT&T backbone to identify ways to use BGP policy for traffic engineering tasks. First, we show how cer- tain BGP policy changes can move traffic in a predictable fashion, despite limited knowledge about the routing policies in neighboring AS’s. Then, we show how operators can gain greater flexibility by relaxing some steps in the BGP decision process and ensuring that neighboring AS’s send consistent advertisements at each peering location. Finally, we show that an operator can manipulate traffic efficiently by changing the routes for a small number of prefixes (or groups of related prefixes) that consistently receive a large amount of traffic. These results can help operators accomplish common traffic engineering tasks using existing BGP features. VL - 33 CP - 5 ER - TY - CONF T1 - Technology probes: inspiring design for and with families T2 - Proceedings of the SIGCHI conference on Human factors in computing systems Y1 - 2003 A1 - Hutchinson,Hilary A1 - Mackay,Wendy A1 - Westerlund,Bo A1 - Bederson, Benjamin B. A1 - Druin, Allison A1 - Plaisant, Catherine A1 - Beaudouin-Lafon,Michel A1 - Conversy,Stéphane A1 - Evans,Helen A1 - Hansen,Heiko A1 - Roussel,Nicolas A1 - Eiderbäck,Björn KW - computer mediated communication KW - ethnography KW - Home KW - participatory design and cooperative design AB - We describe a new method for use in the process of co-designing technologies with users called technology probes. Technology probes are simple, flexible, adaptable technologies with three interdisciplinary goals: the social science goal of understanding the needs and desires of users in a real-world setting, the engineering goal of field-testing the technology, and the design goal of inspiring users and researchers to think about new technologies. We present the results of designing and deploying two technology probes, the messageProbe and the videoProbe, with diverse families in France, Sweden, and the U.S. We conclude with our plans for creating new technologies for and with families based on our experiences. JA - Proceedings of the SIGCHI conference on Human factors in computing systems T3 - CHI '03 PB - ACM CY - New York, NY, USA SN - 1-58113-630-7 UR - http://doi.acm.org/10.1145/642611.642616 M3 - 10.1145/642611.642616 ER - TY - JOUR T1 - Temporal probabilistic object bases JF - Knowledge and Data Engineering, IEEE Transactions on Y1 - 2003 A1 - Biazzo,V. A1 - Giugno,R. A1 - Lukasiewicz,T. A1 - V.S. Subrahmanian KW - algebra; KW - algebraic KW - bases; KW - constraints; KW - data KW - database KW - database; KW - databases; KW - distribution KW - explicit KW - functions; KW - handling; KW - implicit KW - instances; KW - integrity; KW - intervals; KW - management; KW - model; KW - models; KW - object KW - object-oriented KW - operations; KW - probabilistic KW - probability KW - probability; KW - relational KW - temporal KW - theory; KW - Uncertainty KW - uncertainty; AB - There are numerous applications where we have to deal with temporal uncertainty associated with objects. The ability to automatically store and manipulate time, probabilities, and objects is important. We propose a data model and algebra for temporal probabilistic object bases (TPOBs), which allows us to specify the probability with which an event occurs at a given time point. In explicit TPOB-instances, the sets of time points along with their probability intervals are explicitly enumerated. In implicit TPOB-instances, sets of time points are expressed by constraints and their probability intervals by probability distribution functions. Thus, implicit object base instances are succinct representations of explicit ones; they allow for an efficient implementation of algebraic operations, while their explicit counterparts make defining algebraic operations easy. We extend the relational algebra to both explicit and implicit instances and prove that the operations on implicit instances correctly implement their counterpart on explicit instances. VL - 15 SN - 1041-4347 CP - 4 M3 - 10.1109/TKDE.2003.1209009 ER - TY - CHAP T1 - Thwarting Web Censorship with Untrusted Messenger Discovery T2 - Privacy Enhancing TechnologiesPrivacy Enhancing Technologies Y1 - 2003 A1 - Feamster, Nick A1 - Balazinska,Magdalena A1 - Wang,Winston A1 - Balakrishnan,Hari A1 - Karger,David ED - Dingledine,Roger KW - Computer science AB - All existing anti-censorship systems for the Web rely on proxies to grant clients access to censored information. Therefore, they face the proxy discovery problem : how can clients discover the proxies without having the censor discover and block these proxies? To avoid widespread discovery and blocking, proxies must not be widely published and should be discovered in-band. In this paper, we present a proxy discovery mechanism called keyspace hopping that meets this goal. Similar in spirit to frequency hopping in wireless networks, keyspace hopping ensures that each client discovers only a small fraction of the total number of proxies. However, requiring clients to independently discover proxies from a large set makes it practically impossible to verify the trustworthiness of every proxy and creates the possibility of having untrusted proxies. To address this, we propose separating the proxy into two distinct components—the messenger , which the client discovers using keyspace hopping and which simply acts as a gateway to the Internet; and the portal , whose identity is widely-published and whose responsibility it is to interpret and serve the client’s requests for censored content. We show how this separation, as well as in-band proxy discovery, can be applied to a variety of anti-censorship systems. JA - Privacy Enhancing TechnologiesPrivacy Enhancing Technologies T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 2760 SN - 978-3-540-20610-1 UR - http://www.springerlink.com/content/1gg8p94deqek968t/abstract/ ER - TY - JOUR T1 - Towards a logic for wide-area Internet routing JF - SIGCOMM Comput. Commun. Rev. Y1 - 2003 A1 - Feamster, Nick A1 - Balakrishnan,Hari AB - Interdomain routing is a massive distributed computing task that propagates topological information for global reachability. Today's interdomain routing protocol, BGP4, is exceedingly complex because the wide variety of goals that it must meet---including fast convergence, failure resilience, scalability, policy expression, and global reachability---are accomplished by mechanisms that have complicated interactions and unintended side effects. The complexity of wide-area routing configuration and protocol dynamics requires mechanisms for expressing wide-area routing that adhere to a set of logical rules. We propose a set of rules, called the routing logic, which can be used to determine whether a routing protocol satisfies various properties. We demonstrate how this logic can aid in analyzing the behavior of BGP4 under various configurations. We also speculate on how the logic can be used to analyze existing configuration in real-world networks, synthesize network-wide router configuration from a high-level policy language, and assist protocol designers in reasoning about new routing protocols. VL - 33 SN - 0146-4833 UR - http://doi.acm.org/10.1145/972426.944767 CP - 4 M3 - 10.1145/972426.944767 ER - TY - JOUR T1 - Understanding Computer User Frustration: Measuring and Modeling the Disruption from Poor Designs JF - Technical Reports from UMIACS Y1 - 2003 A1 - Bessiere,Katie A1 - Ceaparu,Irina A1 - Lazar,Jonathan A1 - Robinson,John A1 - Shneiderman, Ben KW - Technical Report AB - User frustration in the use of information and computing technology is apervasive and persistent problem. When computers crash, network congestion causes delays, and poor user interfaces trigger confusion there are dramatic consequences for individuals, organizations, and society. These frustrations not only cause personal dissatisfaction and loss of self-efficacy, but may disrupt workplaces, slow learning, and reduce participation in local and national communities. We propose a Computing Frustration Model with incident specific and individual variables to guide research. Our study of 108 computer users shows high levels of frustration and loss of 1/3 to 1/2 of time spent. The importance of the users' goals and the severity of the disruption were correlated with frustration. Those who had strong self-efficacy, indicated by a willingness to stick to solving the problem, reported lower levels of frustration. Implications for users, software developers, managers, and policymakers are discussed. Keywords: user frustration, user interface design, training, helpdesk, computer experience, computer anxiety (UMIACS-TR-2002-89) (HCIL-TR-2002-18) UR - http://drum.lib.umd.edu/handle/1903/1233 ER - TY - CONF T1 - On the use of flow migration for handling short-term overloads T2 - Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE Y1 - 2003 A1 - Kuo,Kuo-Tung A1 - Phuvoravan,S. A1 - Bhattacharjee, Bobby A1 - Jun La,R. A1 - Shayman,M. A1 - Chang,Hyeong Soo KW - computing; KW - CONGESTION KW - congestion; KW - CONTROL KW - control; KW - dynamic KW - end-to-end KW - engineering KW - fast-timescale KW - flow KW - Internet KW - IP KW - label KW - long-term KW - mapping; KW - migration; KW - MPLS KW - multiprotocol KW - network KW - network; KW - networks; KW - of KW - optimal KW - overloads; KW - protocol; KW - QoS; KW - QUALITY KW - quality; KW - routers; KW - routing; KW - service; KW - set-up KW - short-term KW - software KW - software; KW - static KW - switching; KW - Telecommunication KW - telephony; KW - time; KW - transient KW - voice-over-IP; AB - In this work, we investigate flow migration as a mechanism to sustain QoS to network users during short-term overloads in the context of an MPLS IP network. We experiment with three different control techniques: static long-term optimal mapping of flows to LSPs; on-line locally optimal mapping of flows to LSPs at flow set-up time; and dynamic flow migration in response to transient congestion. These techniques are applicable over different timescales, have different run-time overheads, and require different levels of monitoring and control software inside the network. We present results both from detailed simulations and a complete implementation using software IP routers. We use voice-over-IP as our test application, and show that if end-to-end quality is to be maintained during short unpredictable bursts of high load, then a fast-timescale control such as migration is required. JA - Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE VL - 6 M3 - 10.1109/GLOCOM.2003.1258807 ER - TY - JOUR T1 - Use of the SAND spatial browser for digital government applications JF - Commun. ACM Y1 - 2003 A1 - Samet, Hanan A1 - Alborzi,Houman A1 - Brabec,František A1 - Esperança,Claudio A1 - Hjaltason,Gísli R. A1 - Morgan,Frank A1 - Tanin,Egemen KW - GIS AB - Numerous federal agencies produce official statistics made accessible to ordinary citizens for searching and data retrieval. This is frequently done via the Internet through a Web browser interface. If this data is presented in textual format, it can often be searched and retrieved by such attributes as topic, responsible agency, keywords, or press release. However, if the data is of spatial nature, for example, in the form of a map, then using text-based queries is often too cumbersome for the intended audience. We describe the use of the SAND Spatial Browser to provide more power to users of these databases by enabling them to define and explore the specific spatial region of interest graphically. The SAND Spatial Browser allows users to form either purely spatial or mixed spatial/nonspatial queries intuitively, which can present information to users that might have been missed if only a textual interface was available. VL - 46 SN - 0001-0782 UR - http://doi.acm.org/10.1145/602421.602453 CP - 1 M3 - 10.1145/602421.602453 ER - TY - JOUR T1 - User interface evaluation and empirically-based evolution of a prototype experience management tool JF - Software Engineering, IEEE Transactions on Y1 - 2003 A1 - Seaman,C.B A1 - Mendonca,M.G. A1 - Basili, Victor R. A1 - Kim,Y. M KW - data KW - development; KW - empirical KW - EMS; KW - engineering; KW - evaluation; KW - experience KW - experience; KW - Factory; KW - interface KW - interfaces; KW - knowledge KW - management KW - management; KW - model; KW - models; KW - organization KW - performance KW - prototype KW - Q-Labs KW - re-engineering; KW - reusability; KW - reuse; KW - software KW - system; KW - systems KW - tool; KW - user AB - Experience management refers to the capture, structuring, analysis, synthesis, and reuse of an organization's experience in the form of documents, plans, templates, processes, data, etc. The problem of managing experience effectively is not unique to software development, but the field of software engineering has had a high-level approach to this problem for some time. The Experience Factory is an organizational infrastructure whose goal is to produce, store, and reuse experiences gained in a software development organization. This paper describes The Q-Labs Experience Management System (Q-Labs EMS), which is based on the Experience Factory concept and was developed for use in a multinational software engineering consultancy. A critical aspect of the Q-Labs EMS project is its emphasis on empirical evaluation as a major driver of its development and evolution. The initial prototype requirements were grounded in the organizational needs and vision of Q-Labs, as were the goals and evaluation criteria later used to evaluate the prototype. However, the Q-Labs EMS architecture, data model, and user interface were designed to evolve, based on evolving user needs. This paper describes this approach, including the evaluation that was conducted of the initial prototype and its implications for the further development of systems to support software experience management. VL - 29 SN - 0098-5589 CP - 9 M3 - 10.1109/TSE.2003.1232288 ER - TY - CONF T1 - VASCO: visualizing and animating spatial constructs and operations T2 - Proceedings of the nineteenth annual symposium on Computational geometry Y1 - 2003 A1 - Brabec,Frantivsek A1 - Samet, Hanan A1 - Yilmaz,Cemal KW - k-d trees KW - Nearest neighbor algorithms KW - quadtrees KW - R-trees KW - Visualization AB - A video is used to demonstrate a set of spatial index JAVA applets that enable users on the worldwide web to experiment with a number of variants of the quadtree spatial data structure for different spatial data types, and, most importantly, enable them to see in an animated manner how a number of basic search operations are executed for them. The spatial data types are points, line segments, rectangles, and regions. The search operations are the window query (i.e., a spatial range query) and a nearest neighbor query that enables ranking spatial objects in the order of their distance from a given query object. The representations and algorithms are visualized and animated in a consistent manner using the same primitives and colors so that the differences between the effects of the representations can be easily understood. The video demonstrates the PR quadtree, PM1 quadtree, and R-tree. The applets can be found at: www.cs.umd.edu/~hjs/quadtree/. JA - Proceedings of the nineteenth annual symposium on Computational geometry T3 - SCG '03 PB - ACM CY - New York, NY, USA SN - 1-58113-663-3 UR - http://doi.acm.org/10.1145/777792.777849 M3 - 10.1145/777792.777849 ER - TY - JOUR T1 - The virtual microscope JF - IEEE Transactions on Information Technology in Biomedicine Y1 - 2003 A1 - Catalyurek,U. A1 - Beynon,M. D A1 - Chang,Chialin A1 - Kurc, T. A1 - Sussman, Alan A1 - Saltz, J. KW - biomedical optical imaging KW - client software KW - client/server architecture KW - Computer architecture KW - Computer Graphics KW - computer platforms KW - Computer simulation KW - Concurrent computing KW - configured data server KW - data server software KW - database management systems KW - database software KW - Database systems KW - digital slide images KW - digital telepathology KW - diseases KW - emulation KW - Environment KW - Equipment Design KW - Equipment Failure Analysis KW - high power light microscope KW - Image databases KW - Image Enhancement KW - Image Interpretation, Computer-Assisted KW - Image retrieval KW - Information retrieval KW - Information Storage and Retrieval KW - java KW - local disks KW - microscope image data KW - Microscopy KW - multiple clients KW - optical microscopy KW - PACS KW - software KW - Software design KW - software system KW - Software systems KW - Systems Integration KW - Telepathology KW - User-Computer Interface KW - virtual microscope design KW - Virtual reality KW - Workstations AB - We present the design and implementation of the virtual microscope, a software system employing a client/server architecture to provide a realistic emulation of a high power light microscope. The system provides a form of completely digital telepathology, allowing simultaneous access to archived digital slide images by multiple clients. The main problem the system targets is storing and processing the extremely large quantities of data required to represent a collection of slides. The virtual microscope client software runs on the end user's PC or workstation, while database software for storing, retrieving and processing the microscope image data runs on a parallel computer or on a set of workstations at one or more potentially remote sites. We have designed and implemented two versions of the data server software. One implementation is a customization of a database system framework that is optimized for a tightly coupled parallel machine with attached local disks. The second implementation is component-based, and has been designed to accommodate access to and processing of data in a distributed, heterogeneous environment. We also have developed caching client software, implemented in Java, to achieve good response time and portability across different computer platforms. The performance results presented show that the Virtual Microscope systems scales well, so that many clients can be adequately serviced by an appropriately configured data server. VL - 7 SN - 1089-7771 CP - 4 M3 - 10.1109/TITB.2004.823952 ER - TY - CHAP T1 - Visual Information Management for Network Configuration T2 - The Craft of Information VisualizationThe Craft of Information Visualization Y1 - 2003 A1 - Kumar,Harsha A1 - Plaisant, Catherine A1 - Teittinen,Marko A1 - Shneiderman, Ben ED - Bederson, Benjamin B. ED - Shneiderman, Ben AB - Current network management systems rely heavily on forms in their user interfaces. The interfaces reflect the intricacies of the network hardware components but provide little support for guiding users through tasks. There is a scarcity of useful graphical visualizations and decision-support tools. JA - The Craft of Information VisualizationThe Craft of Information Visualization PB - Morgan Kaufmann CY - San Francisco SN - 978-1-55860-915-0 UR - http://www.sciencedirect.com/science/article/pii/B9781558609150500329 ER - TY - CONF T1 - What makes a good answer? The role of context in question answering T2 - Human-Computer Interaction, Interact '03 Y1 - 2003 A1 - Jimmy Lin A1 - Quan,D. A1 - Sinha,V. A1 - Bakshi,K. A1 - Huynh,D. A1 - Katz,B. A1 - Karger,D. R JA - Human-Computer Interaction, Interact '03 ER - TY - CONF T1 - What test oracle should I use for effective GUI testing? T2 - Automated Software Engineering, 2003. Proceedings. 18th IEEE International Conference on Y1 - 2003 A1 - Memon, Atif M. A1 - Banerjee,I. A1 - Nagarajan,A. KW - empirical studies KW - graphical user interface KW - Graphical user interfaces KW - GUI testing KW - oracle information KW - oracle procedure KW - oracle space requirement KW - oracle time requirements KW - program testing KW - software engineering KW - Software testing KW - test cost KW - test effectiveness KW - test oracle AB - Test designers widely believe that the overall effectiveness and cost of software testing depends largely on the type and number of test cases executed on the software. In this paper we show that the test oracle used during testing also contributes significantly to test effectiveness and cost. A test oracle is a mechanism that determines whether software executed correctly for a test case. We define a test oracle to contain two essential parts: oracle information that represents expected output; and an oracle procedure that compares the oracle information with the actual output. By varying the level of detail of oracle information and changing the oracle procedure, a test designer can create different types of test oracles. We design 11 types of test oracles and empirically compare them on four software systems. We seed faults in software to create 100 faulty versions, execute 600 test cases on each version, for all 11 types of oracles. In all, we report results of 660,000 test runs on software. We show (1) the time and space requirements of the oracles, (2) that faults are detected early in the testing process when using detailed oracle information and complex oracle procedures, although at a higher cost per test case, and (3) that employing expensive oracles results in detecting a large number of faults using relatively smaller number of test cases. JA - Automated Software Engineering, 2003. Proceedings. 18th IEEE International Conference on M3 - 10.1109/ASE.2003.1240304 ER - TY - CHAP T1 - The World's Information in Digital Libraries T2 - The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections Y1 - 2003 A1 - Plaisant, Catherine A1 - Marchimini,G. A1 - Bruns,T. A1 - Komlodi,A. A1 - Campbell,L. A1 - Rose,A. A1 - Ding,G.M. A1 - Beale Jr,J. A1 - Nolet,V. A1 - Shneiderman, Ben A1 - others JA - The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections PB - Morgan Kaufmann Publishers Inc. SN - 978-1-55860-915-0 ER - TY - CHAP T1 - 1.375-Approximation Algorithm for Sorting by Reversals T2 - Algorithms — ESA 2002Algorithms — ESA 2002 Y1 - 2002 A1 - Berman,Piotr A1 - Hannenhalli, Sridhar A1 - Karpinski,Marek ED - Möhring,Rolf ED - Raman,Rajeev AB - Analysis of genomes evolving by inversions leads to a general combinatorial problem of Sorting by Reversals , MIN-SBR, the problem of sorting a permutation by a minimum number of reversals. Following a series of preliminary results, Hannenhalli and Pevzner developed the first exact polynomial time algorithm for the problem of sorting signed permutations by reversals, and a polynomial time algorithm for a special case of unsigned permutations. The best known approximation algorithm for MIN-SBR, due to Christie, gives a performance ratio of 1.5. In this paper, by exploiting the polynomial time algorithm for sorting signed permutations and by developing a new approximation algorithm for maximum cycle decomposition of breakpoint graphs, we design a new 1.375-algorithm for the MIN-SBR problem. JA - Algorithms — ESA 2002Algorithms — ESA 2002 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 2461 SN - 978-3-540-44180-9 UR - http://dx.doi.org/10.1007/3-540-45749-6_21 ER - TY - JOUR T1 - AAAI 2002 Workshops JF - AI Magazine Y1 - 2002 A1 - Blake,Brian A1 - Haigh,Karen A1 - Hexmoor,Henry A1 - Falcone,Rino A1 - Soh,Leen-Kiat A1 - Baral,Chitta A1 - McIlraith,Sheila A1 - Gmytrasiewicz,Piotr A1 - Parsons,Simon A1 - Malaka,Rainer A1 - Krueger,Antonio A1 - Bouquet,Paolo A1 - Smart,Bill A1 - Kurumantani,Koichi A1 - Pease,Adam A1 - Brenner,Michael A1 - desJardins, Marie A1 - Junker,Ulrich A1 - Delgrande,Jim A1 - Doyle,Jon A1 - Rossi,Francesca A1 - Schaub,Torsten A1 - Gomes,Carla A1 - Walsh,Toby A1 - Guo,Haipeng A1 - Horvitz,Eric J A1 - Ide,Nancy A1 - Welty,Chris A1 - Anger,Frank D A1 - Guegen,Hans W A1 - Ligozat,Gerald VL - 23 SN - 0738-4602 UR - http://www.aaai.org/ojs/index.php/aimagazine/article/viewArticle/1678 CP - 4 M3 - 10.1609/aimag.v23i4.1678 ER - TY - CONF T1 - ALLI: An Information Integration System Based on Active Logic Framework T2 - Proceedings of the Third International Conference on Management Information Systems, Greece Y1 - 2002 A1 - Barfourosh,A. A. A1 - Nezhad,H. R.M A1 - Anderson,M. A1 - Perlis, Don JA - Proceedings of the Third International Conference on Management Information Systems, Greece ER - TY - JOUR T1 - Analysis of the NICE Application Layer Multicast Protocol JF - Technical Reports from UMIACS, UMIACS-TR-2002-60 Y1 - 2002 A1 - Banerjee,Suman A1 - Bhattacharjee, Bobby KW - Technical Report AB - Application layer multicast protocols organize a set of hosts intoan overlay tree for data delivery. Each host on the overlay peers with a subset of other hosts. Since application layer multicast relies only on an underlying unicast architecture, multiple copies of the same packet can be carried by a single physical link or node on the overlay. The stress at a link or node is defined as the number of identical copies of a packet carried by that link or node. Stretch is another important metric in application layer multicast, which measures the relative increase in delay incurred by the overlay path between pairs of members with respect to the direct unicast path. In this paper we study the NICE application layer multicast protocol to quantify and study the tradeoff between these two important metrics --- stress and stretch in scalably building application layer multicast paths. Also UMIACS-TR-2002-60 UR - http://drum.lib.umd.edu/handle/1903/1212 ER - TY - JOUR T1 - Are virtualized overlay networks too much of a good thing? JF - Peer-to-Peer Systems Y1 - 2002 A1 - Keleher,P. A1 - Bhattacharjee, Bobby A1 - Silaghi,B. AB - The majority of recent high-profile work in peer-to-peer networks has approached the problem of location by abstracting over object lookup services. Namespace virtualization in the overlay layer provides load balance and provable bounds on latency at low costs.We contend that namespace virtualization comes at a significant cost for applications that naturally describe their data sets in a hierarchical manner. Opportunities for enhancing browsing, prefetching and efficient attribute-based searches are lost. A hierarchy exposes relationships between items near to each other in the topology; virtualization of the namespace discards this information even if present at client, higherlevel protocols. We advocate encoding application hierarchies directly into the structure of the overlay network, and revisit this argument through a newly proposed distributed directory service. ER - TY - CONF T1 - Automatic transcription of Czech language oral history in the MALACH project: resources and initial experiments T2 - Proceedings of the The 5th International Conference on Text, Speech and Dialogue Y1 - 2002 A1 - Oard, Douglas A1 - Demner-Fushman,D. A1 - Hajic,J. A1 - Ramabhadran,B. A1 - Gustman,S. A1 - Byrne,WJ A1 - Soergel,D. A1 - Dorr, Bonnie J A1 - Resnik, Philip A1 - Picheny,M. JA - Proceedings of the The 5th International Conference on Text, Speech and Dialogue ER - TY - CONF T1 - On cache replacement policies for servicing mixed data intensive query workloads T2 - Proceedings of the 2nd Workshop on Caching, Coherence, and Consistency, held in conjunction with the 16th ACM International Conference on Supercomputing Y1 - 2002 A1 - Andrade,H. A1 - Kurc, T. A1 - Sussman, Alan A1 - Borovikov,E. A1 - Saltz, J. AB - When data analysis applications are employed in a multi-client environment, a data server must service multiple si- multaneous queries, each of which may employ complex user-defined data structures and operations on the data. It is then necessary to harness inter- and intra-query com- monalities and system resources to improve the performance of the data server. We have developed a framework and customizable middleware to enable reuse of intermediate and final results among queries, through an in-memory ac- tive semantic cache and user-defined transformation func- tions. Since resources such as processing power and mem- ory space are limited on the machine hosting the server, ef- fective scheduling of incoming queries and efficient cache replacement policies are challenging issues that must be ad- dressed. We have worked on the scheduling problem in ear- lier work, and in this paper we describe and evaluate several cache replacement policies. We present experimental eval- uation of the policies on a shared-memory parallel system using two applications from different application domains. JA - Proceedings of the 2nd Workshop on Caching, Coherence, and Consistency, held in conjunction with the 16th ACM International Conference on Supercomputing ER - TY - CHAP T1 - Combinatorial Algorithms for Design of DNA Arrays T2 - Chip TechnologyChip Technology Y1 - 2002 A1 - Hannenhalli, Sridhar A1 - Hubbell,Earl A1 - Lipshutz,Robert A1 - Pevzner,Pavel ED - Hoheisel,Jörg ED - Brazma,A. ED - Büssow,K. ED - Cantor,C. ED - Christians,F. ED - Chui,G. ED - Diaz,R. ED - Drmanac,R. ED - Drmanac,S. ED - Eickhoff,H. ED - Fellenberg,K. ED - Hannenhalli, Sridhar ED - Hoheisel,J. ED - Hou,A. ED - Hubbell,E. ED - Jin,H. ED - Jin,P. ED - Jurinke,C. ED - Konthur,Z. ED - Köster,H. ED - Kwon,S. ED - Lacy,S. ED - Lehrach,H. ED - Lipshutz,R. ED - Little,D. ED - Lueking,A. ED - McGall,G. ED - Moeur,B. ED - Nordhoff,E. ED - Nyarsik,L. ED - Pevzner,P. ED - Robinson,A. ED - Sarkans,U. ED - Shafto,J. ED - Sohail,M. ED - Southern,E. ED - Swanson,D. ED - Ukrainczyk,T. ED - van den Boom,D. ED - Vilo,J. ED - Vingron,M. ED - Walter,G. ED - Xu,C. AB - Optimal design of DNA arrays requires the development of algorithms with two-fold goals: reducing the effects caused by unintended illumination ( border length minimization problem ) and reducing the complexity of masks ( mask decomposition problem ). We describe algorithms that reduce the number of rectangles in mask decomposition by 20–30% as compared to a standard array design under the assumption that the arrangement of oligonucleotides on the array is fixed. This algorithm produces provably optimal solution for all studied real instances of array design. We also address the difficult problem of finding an arrangement which minimizes the border length and come up with a new idea of threading that significantly reduces the border length as compared to standard designs. JA - Chip TechnologyChip Technology T3 - Advances in Biochemical Engineering/Biotechnology PB - Springer Berlin / Heidelberg VL - 77 SN - 978-3-540-43215-9 UR - http://dx.doi.org/10.1007/3-540-45713-5_1 ER - TY - JOUR T1 - Comparative Genome Sequencing for Discovery of Novel Polymorphisms in Bacillus Anthracis JF - Science Y1 - 2002 A1 - Read,Timothy D. A1 - Salzberg,Steven L. A1 - Pop, Mihai A1 - Shumway,Martin A1 - Umayam,Lowell A1 - Jiang,Lingxia A1 - Holtzapple,Erik A1 - Busch,Joseph D A1 - Smith,Kimothy L A1 - Schupp,James M A1 - Solomon,Daniel A1 - Keim,Paul A1 - Fraser,Claire M. AB - Comparison of the whole-genome sequence ofBacillus anthracis isolated from a victim of a recent bioterrorist anthrax attack with a reference reveals 60 new markers that include single nucleotide polymorphisms (SNPs), inserted or deleted sequences, and tandem repeats. Genome comparison detected four high-quality SNPs between the two sequenced B. anthracischromosomes and seven differences among different preparations of the reference genome. These markers have been tested on a collection of anthrax isolates and were found to divide these samples into distinct families. These results demonstrate that genome-based analysis of microbial pathogens will provide a powerful new tool for investigation of infectious disease outbreaks. VL - 296 SN - 0036-8075, 1095-9203 UR - http://www.sciencemag.org/content/296/5575/2028 CP - 5575 M3 - 10.1126/science.1071837 ER - TY - JOUR T1 - A comparative study of application layer multicast protocols JF - Network Y1 - 2002 A1 - Banerjee,S. A1 - Bhattacharjee, Bobby AB - Due to the sparse deployment of IP multicast inthe Internet today, some researchers have proposed applica- tion layer multicast as a new approach to implement wide- area multicast services. In this approach multicast func- tionality is implemented at the end-hosts instead of network routers. Unlike network-layer multicast, application layer multicast requires no infrastructure support and can be eas- ily deployed in the Internet. In this paper, we describe a set of application layer multicast protocols that have been pro- posed in recent literature, classify them based on some prop- erties and present a comparison of performance and appli- cability of these schemes. VL - 4 ER - TY - JOUR T1 - The complex interaction of agents and environments: An example in urban sprawl JF - Proceedings of Agent Based Simulation Y1 - 2002 A1 - Rand, William A1 - Zellner,M A1 - Page,S.E. A1 - Riolo,R A1 - Brown,D.G. A1 - Fernandez,L.E. AB - We present and evaluate a foundational agent-based model of land use change at therural-urban fringe within the context of a larger project that will link to surveys of the environmental and community preferences of residents with historical data on patterns of development. In this paper, we focus on the dynamics arising from a model of residential location resulting from preferences for services, density, and aesthetics focusing on the relationship between micro level preferences and policy relevant macro phenomena such as scattered development, largest city size, and the number of residential clusters. We consider two representations of agents’ utility functions – one additively separable and one multiplicative – to see if functional form has any impact on the dynamics of the system, and find that they produce similar results. Our analysis includes both representative agent runs, in which all agents have identical preferences, as well as runs in which the agents have diverse preferences. We find that diversity can increase sprawl through feedbacks associated with the spatial locations of services and agents. In addition, we examine cases in which the agents’ location decisions affect the aesthetic quality of neighboring sites and find that these feedbacks further exacerbate the sprawl effect. ER - TY - CONF T1 - A component architecture for FPGA-based, DSP system design T2 - Application-Specific Systems, Architectures and Processors, 2002. Proceedings. The IEEE International Conference on Y1 - 2002 A1 - Spivey,G. A1 - Bhattacharyya, Shuvra S. A1 - Nakajima,K. JA - Application-Specific Systems, Architectures and Processors, 2002. Proceedings. The IEEE International Conference on ER - TY - JOUR T1 - COTS-based software development: Processes and open issues JF - Journal of Systems and Software Y1 - 2002 A1 - Morisio,M A1 - Seaman,C.B A1 - Basili, Victor R. A1 - Parra,A.T A1 - Kraft,S.E A1 - Condon,S.E KW - Commercial off-the-shelf KW - Component-based KW - COTS KW - empirical study KW - Software development process AB - The work described in this paper is an investigation of the COTS-based software development within a particular NASA environment, with an emphasis on the processes used. Fifteen projects using a COTS-based approach were studied and their actual process was documented. This process is evaluated to identify essential differences in comparison to traditional software development. The main differences, and the activities for which projects require more guidance, are requirements definition and COTS selection, high level design, integration and testing. Starting from these empirical observations, a new process and set of guidelines for COTS-based development are developed and briefly presented. VL - 61 SN - 0164-1212 UR - http://www.sciencedirect.com/science/article/pii/S0164121201001479 CP - 3 M3 - 10.1016/S0164-1212(01)00147-9 ER - TY - JOUR T1 - Efficient Data Processing using Cross Layer Hints JF - Technical Reports from UMIACS, UMIACS-TR-2002-59 Y1 - 2002 A1 - Banerjee,Suman A1 - Agrawala, Ashok K. A1 - Kramer,Michael J KW - Technical Report AB - Conventional network stacks define a layered architecture, whereeach layer implements a set of services and exports a well-defined interface to be used by its immediate upper layer. A key design choice of the layered architecture has been to provide isolation between the functional modules of distinct layers. While such an architecture provides an useful abstraction for system development, the strict isolation of this layered architecture limits the flexibility of tailoring the behavior of the lower layers of the stack to the needs of the application. In this paper we define a new architecture, called X-Tags, which allows flexible interaction between layers for cooperative data processing without impacting the isolation property. In this architecture, applications use special tags to provide semantic hints for data processing to lower layers. We motivate the usefulness of this architecture by describing ts applicability to some emerging applications. UMIACS-TR-2002-59 UR - http://drum.lib.umd.edu/handle/1903/1211 ER - TY - CONF T1 - Efficient Manipulation of Large Datasets on Heterogeneous Storage Systems T2 - Parallel and Distributed Processing Symposium, International Y1 - 2002 A1 - Beynon,Michael D. A1 - Sussman, Alan A1 - Kurc,Tahsin A1 - Catalyurek,Umit A1 - Saltz,Joel KW - component-based frameworks KW - data-intensive computing KW - load balancing AB - In this paper we are concerned with the efficient use of a collection of disk-based storage systems and computing platforms in a heterogeneous setting for retrieving and processing large scientific datasets. We demonstrate, in the context of a data-intensive visualization application, how heterogeneity affects performance and show a set of optimization techniques that can be used to improve performance in a component-based framework. In particular, we examine the application of parallelism via transparent copies of application components in the pipelined processing of data. JA - Parallel and Distributed Processing Symposium, International PB - IEEE Computer Society CY - Los Alamitos, CA, USA VL - 2 SN - 0-7695-1573-8 M3 - http://doi.ieeecomputersociety.org/10.1109/IPDPS.2002.1015655 ER - TY - CONF T1 - Empirical evaluation of techniques and methods used for achieving and assessing software high dependability T2 - Proc. DSN Workshop on Dependability Benchmarking Y1 - 2002 A1 - Rus,I. A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V A1 - Boehm,B. JA - Proc. DSN Workshop on Dependability Benchmarking ER - TY - JOUR T1 - Empirical findings in agile methods JF - Extreme Programming and Agile Methods—XP/Agile Universe 2002 Y1 - 2002 A1 - Lindvall,M. A1 - Basili, Victor R. A1 - Boehm,B. A1 - Costa,P. A1 - Dangle,K. A1 - Shull, F. A1 - Tesoriero,R. A1 - Williams,L. A1 - Zelkowitz, Marvin V AB - In recent years, the use of, interest in, and controversy about Agile methodologies have realized dramatic growth. Anecdotal evidence is rising regarding the effectiveness of agile methodologies in certain environments and for specified projects. However, collection and analysis of empirical evidence of this effectiveness and classification of appropriate environments for Agile projects has not been conducted. Researchers from four institutions organized an eWorkshop to synchronously and virtually discuss and gather experiences and knowledge from eighteen Agile experts spread across the globe. These experts characterized Agile Methods and communicated experiences using these methods on small to very large teams. They discussed the importance of staffing Agile teams with highly skilled developers. They shared common success factors and identified warning signs of problems in Agile projects. These and other findings and heuristics gathered through this valuable exchange can be useful to researchers and to practitioners as they establish an experience base for better decision making. M3 - 10.1007/3-540-45672-4_19 ER - TY - CONF T1 - Executing Multiple Pipelined Data Analysis Operations in the Grid T2 - SC Conference Y1 - 2002 A1 - Spencer,Matthew A1 - Ferreira,Renato A1 - Beynon,Michael A1 - Kurc,Tahsin A1 - Catalyurek,Umit A1 - Sussman, Alan A1 - Saltz,Joel AB - Processing of data in many data analysis applications can be represented as an acyclic, coarse grain data flow, from data sources to the client. This paper is concerned with scheduling of multiple data analysis operations, each of which is represented as a pipelined chain of processing on data. We define the scheduling problem for effectively placing components onto Grid resources, and propose two scheduling algorithms. Experimental results are presented using a visualization application. JA - SC Conference PB - IEEE Computer Society CY - Los Alamitos, CA, USA M3 - http://doi.ieeecomputersociety.org/10.1109/SC.2002.10015 ER - TY - JOUR T1 - The Experience factory organization JF - IEEE Software Y1 - 2002 A1 - Basili, Victor R. A1 - Seaman,C. VL - 19 CP - 3 ER - TY - JOUR T1 - Experience in implementing a learning software organization JF - Software, IEEE Y1 - 2002 A1 - Schneider,K. A1 - von Hunnius,J.-P. A1 - Basili, Victor R. KW - ACQUISITION KW - center;software KW - centres;project KW - DaimlerChrysler;explicit KW - development KW - experience KW - improvement; KW - improvement;automobile KW - industry;computer KW - knowledge KW - management;software KW - organization;previous KW - process KW - processes;software KW - projects;software KW - reuse;learning KW - software AB - In an effort to improve software development and acquisition processes and explicitly reuse knowledge from previous software projects, DaimlerChrysler created a software experience center (SEC). The authors report on challenges the company faced in creating the SEC VL - 19 SN - 0740-7459 CP - 3 M3 - 10.1109/MS.2002.1003453 ER - TY - CHAP T1 - Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol T2 - Dependable Computing EDCC-4 Y1 - 2002 A1 - Joshi,Kaustubh A1 - Michel Cukier A1 - Sanders,William ED - Bondavalli,Andrea ED - Thevenod-Fosse,Pascale KW - Computer science AB - Group communication is an important paradigm for building highly available distributed systems. However, group membership operations often require the system to block message traffic, causing system services to become unavailable. This makes it important to quantify the unavailability induced by membership operations. This paper experimentally evaluates the blocking behavior of the group membership protocol of the Ensemble group communication system using a novel global-state-based fault injection technique. In doing so, we demonstrate how a layered distributed protocol such as the Ensemble group membership protocol can be modeled in terms of a state machine abstraction, and show how the resulting global state space can be used to specify fault triggers and define important measures on the system. Using this approach, we evaluate the cost associated with important states of the protocol under varying workload and group size. We also evaluate the sensitivity of the protocol to the occurrence of a second correlated crash failure during its operation. JA - Dependable Computing EDCC-4 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 2485 SN - 978-3-540-00012-9 UR - http://www.springerlink.com/content/mnkd4upqr14w2r7e/abstract/ ER - TY - JOUR T1 - An extraction-based verification methodology for MEMS JF - Microelectromechanical Systems, Journal of Y1 - 2002 A1 - Baidya,B. A1 - Gupta,S.K. A1 - Mukherjee,T. KW - atomic level KW - canonical representation KW - circuit schematic representation KW - circuit simulation KW - design cycles KW - design productivity KW - design verification KW - digital simulation KW - equivalent circuits KW - equivalent microelectromechanical circuit KW - extraction-based verification methodology KW - feature-based recognition algorithms KW - functional behavior KW - functional level KW - graph-based recognition algorithms KW - layout extraction KW - lumped parameter networks KW - lumped-parameter circuit simulation KW - MEMS KW - microelectromechanical circuit simulators KW - micromachining techniques KW - micromechanical devices KW - simulation accuracy KW - simulation time AB - Micromachining techniques are being increasingly used to develop miniaturized sensor and actuator systems. These system designs tend to be captured as layout, requiring extraction of the equivalent microelectromechanical circuit as a necessary step for design verification. This paper presents an extraction methodology to (re-)construct a circuit schematic representation from the layout, enabling the designer to use microelectromechanical circuit simulators to verify the functional behavior of the layout. This methodology uses a canonical representation of the given layout on which feature-based and graph-based recognition algorithms are applied to generate the equivalent extracted schematic. Extraction can be performed to either the atomic level or the functional level representation of the reconstructed circuit. The choice of level in hierarchy is governed by the trade off between simulation time and simulation accuracy of the extracted circuit. The combination of the MEMS layout extraction and lumped-parameter circuit simulation provides MEMS designers with VLSI-like tools enabling faster design cycles, and improved design productivity VL - 11 SN - 1057-7157 CP - 1 M3 - 10.1109/84.982857 ER - TY - RPRT T1 - Generating 3D Models of MEMS Devices by Process Emulation Y1 - 2002 A1 - Bellam,S. A1 - Gupta, Satyandra K. A1 - Priyadarshi,A. K. KW - Next-Generation Product Realization Systems AB - MEMS designers often use numerical simulation for detecting errors in the mask layout. Numerical simulation involves generating 3D models of MEMS device from the mask layout and process description. The generated models can be meshed and simulated over different domains. This report describes an efficient algorithm that can generate 3D geometric models of MEMS devices. Specifically, the algorithm emulates the manufacturing of a single functional polysilicon layer MEMS devices using the MUMPSprocess. PB - Institute for Systems Research, University of Maryland, College Park VL - ISR; TR 2002-57 UR - http://drum.lib.umd.edu//handle/1903/6285 ER - TY - JOUR T1 - Genome sequence and comparative analysis of the model rodent malaria parasite Plasmodium yoelii yoelii JF - Nature Y1 - 2002 A1 - Carlton,Jane M. A1 - Angiuoli,Samuel V A1 - Suh,Bernard B. A1 - Kooij,Taco W. A1 - Pertea,Mihaela A1 - Silva,Joana C. A1 - Ermolaeva,Maria D. A1 - Allen,Jonathan E A1 - Jeremy D Selengut A1 - Koo,Hean L. A1 - Peterson,Jeremy D. A1 - Pop, Mihai A1 - Kosack,Daniel S. A1 - Shumway,Martin F. A1 - Bidwell,Shelby L. A1 - Shallom,Shamira J. A1 - Aken,Susan E. van A1 - Riedmuller,Steven B. A1 - Feldblyum,Tamara V. A1 - Cho,Jennifer K. A1 - Quackenbush,John A1 - Sedegah,Martha A1 - Shoaibi,Azadeh A1 - Cummings,Leda M. A1 - Florens,Laurence A1 - Yates,John R. A1 - Raine,J. Dale A1 - Sinden,Robert E. A1 - Harris,Michael A. A1 - Cunningham,Deirdre A. A1 - Preiser,Peter R. A1 - Bergman,Lawrence W. A1 - Vaidya,Akhil B. A1 - Lin,Leo H. van A1 - Janse,Chris J. A1 - Waters,Andrew P. A1 - Smith,Hamilton O. A1 - White,Owen R. A1 - Salzberg,Steven L. A1 - Venter,J. Craig A1 - Fraser,Claire M. A1 - Hoffman,Stephen L. A1 - Gardner,Malcolm J. A1 - Carucci,Daniel J. AB - Species of malaria parasite that infect rodents have long been used as models for malaria disease research. Here we report the whole-genome shotgun sequence of one species, Plasmodium yoelii yoelii, and comparative studies with the genome of the human malaria parasite Plasmodium falciparum clone 3D7. A synteny map of 2,212 P. y. yoelii contiguous DNA sequences (contigs) aligned to 14 P. falciparum chromosomes reveals marked conservation of gene synteny within the body of each chromosome. Of about 5,300 P. falciparum genes, more than 3,300 P. y. yoelii orthologues of predominantly metabolic function were identified. Over 800 copies of a variant antigen gene located in subtelomeric regions were found. This is the first genome sequence of a model eukaryotic parasite, and it provides insight into the use of such systems in the modelling of Plasmodium biology and disease. VL - 419 SN - 0028-0836 UR - http://www.nature.com/nature/journal/v419/n6906/full/nature01099.html CP - 6906 M3 - 10.1038/nature01099 ER - TY - CONF T1 - Getting real about speech: overdue or overhyped? T2 - CHI '02 extended abstracts on Human factors in computing systems Y1 - 2002 A1 - James,Frankie A1 - Lai,Jennifer A1 - Suhm,Bernhard A1 - Balentine,Bruce A1 - Makhoul,John A1 - Nass,Clifford A1 - Shneiderman, Ben KW - cognitive load KW - social responses KW - speech interfaces AB - Speech has recently made headway towards becoming a more mainstream interface modality. For example, there is an increasing number of call center applications, especially in the airline and banking industries. However, speech still has many properties that cause its use to be problematic, such as its inappropriateness in both very quiet and very noisy environments, and the tendency of speech to increase cognitive load. Concerns about such problems are valid; however, they do not explain why the use of speech is so controversial in the HCI community. This panel would like to address the issues underlying the controversy around speech, by discussing the current state of the art, the reasons it is so difficult to build a good speech interface, and how HCI research can contribute to the development of speech interfaces. JA - CHI '02 extended abstracts on Human factors in computing systems T3 - CHI EA '02 PB - ACM CY - New York, NY, USA SN - 1-58113-454-1 UR - http://doi.acm.org/10.1145/506443.506557 M3 - 10.1145/506443.506557 ER - TY - JOUR T1 - High-level synthesis of DSP applications using adaptive negative cycle detection JF - EURASIP J. Appl. Signal Process. Y1 - 2002 A1 - Chandrachoodan,Nitin A1 - Bhattacharyya, Shuvra S. A1 - Liu,K. J.R KW - adaptive performance estimation KW - dynamic graphs KW - maximum cycle mean KW - negative cycle detection AB - The problem of detecting negative weight cycles in a graph is examined in the context of the dynamic graph structures that arise in the process of high level synthesis (HLS). The concept of adaptive negative cycle detection is introduced, in which a graph changes over time and negative cycle detection needs to be done periodically, but not necessarily after every individual change. We present an algorithm for this problem, based on a novel extension of the well-known Bellman-Ford algorithm that allows us to adapt existing cycle information to the modified graph, and show by experiments that our algorithm significantly outperforms previous incremental approaches for dynamic graphs. In terms of applications, the adaptive technique leads to a very fast implementation of Lawlers algorithm for the computation of the maximum cycle mean (MCM) of a graph, especially for a certain form of sparse graph. Such sparseness often occurs in practical circuits and systems, as demonstrated, for example, by the ISCAS 89/93 benchmarks. The application of the adaptive technique to design-space exploration (synthesis) is also demonstrated by developing automated search techniques for scheduling iterative data-flow graphs. VL - 2002 SN - 1110-8657 UR - http://dl.acm.org/citation.cfm?id=1283100.1283192 CP - 1 ER - TY - JOUR T1 - Identification of non-autonomous non-LTR retrotransposons in the genome of Trypanosoma cruzi JF - Molecular and Biochemical Parasitology Y1 - 2002 A1 - Bringaud,Frédéric A1 - García-Pérez,José Luis A1 - Heras,Sara R. A1 - Ghedin,Elodie A1 - El‐Sayed, Najib M. A1 - Andersson,Björn A1 - Baltz,Théo A1 - Lopez,Manuel C. KW - Ingi KW - L1Tc KW - Non-LTR retrotransposon KW - RIME KW - Trypanosoma brucei KW - Trypanosoma cruzi AB - As observed for most eukaryotic cells, trypanosomatids contains non-LTR retrotransposons randomly inserted in the nuclear genome. Autonomous retroelements which, code for their own transposition, have been characterized in Trypanosoma brucei (ingi) and Trypanosoma cruzi (L1Tc), whereas non-autonomous retroelements have only been characterized in T. brucei (RIME). Here, we have characterized in the genome of Trypanosoma cruzi four complete copies of a non-autonomous non-LTR retrotransposon, called NARTc. This 0.26 kb NARTc element has the characteristics of non-LTR retrotransposons: the presence a poly(dA) tail and of a short flanking duplicated motif. Analysis of the Genome Survey Sequence databases indicated that the Trypanosoma cruzi haploid genome contains about 140 NARTc copies and about twice as many L1Tc copies. Interestingly, the NARTc and L1Tc retroelements share, with the Trypanosoma brucei ingi and RIME retrotransposons, a common sequence (the first 45 bp with 91% identity), whereas the remaining sequences are very divergent. This suggests that these four trypanosome non-LTR retrotransposons were derived from the same common ancester and the sequence of their 5'-extremity may have a functional role. In addition, the genome of Leishmania major contains the same conserved motif present in the trypanosome retroelements, whicle no transposable elements have been detected so far in Leishmania sp. VL - 124 SN - 0166-6851 UR - http://www.sciencedirect.com/science/article/pii/S0166685102001676 CP - 1-2 M3 - 16/S0166-6851(02)00167-6 ER - TY - JOUR T1 - Impediments to software engineering technology transfer JF - Journal of Systems and Software. Forthcoming Y1 - 2002 A1 - Zelkowitz, Marvin V A1 - Wallace,D. R A1 - Binkley,D. W ER - TY - JOUR T1 - Incremental unforgeable encryption JF - Fast Software Encryption Y1 - 2002 A1 - Buonanno,E. A1 - Katz, Jonathan A1 - Yung,M. AB - The recent selection of the AES block cipher to replace DES has generated interest in developing new modes of operation to supplement the modes defined as part of the DES standard [1,16,23]. We initiate the study of modes of encryption which are both incremental and unforgeable, and point out a number of applications for modes meeting these requirements. We also propose three specific modes achieving these goals, and discuss the strengths and weaknesses of each. M3 - 10.1007/3-540-45473-X_9 ER - TY - JOUR T1 - Infranet: Circumventing web censorship and surveillance JF - Proceedings of the 11th USENIX Security Symposium Y1 - 2002 A1 - Feamster, Nick A1 - Balazinska,M. A1 - Harfst,G. A1 - Balakrishnan,H. A1 - Karger,D. AB - An increasing number of countries and companies routinely block or monitor access to parts of the Internet. To counteract these measures, we propose Infranet, a system that enables clients to surreptitiously retrieve sensitive content via cooperating Web servers distributed across the global Internet. These Infranet servers provide clients access to censored sites while continuing to host normal uncensored content. Infranet uses a tunnel protocol that provides a covert communication channel between its clients and servers, modulated over standard HTTP transactions that resemble innocuous Web browsing. In the upstream direction, Infranet clients send covert messages to Infranet servers by associating meaning to the sequence of HTTP requests being made. In the downstream direction, Infranet servers return content by hiding censored data in uncensored images using steganographic techniques. We describe the design, a prototype implementation, security properties, and performance of Infranet. Our security analysis shows that Infranet can successfully circumvent several sophisticated censoring techniques. ER - TY - JOUR T1 - Intermediate representations for design automation of multiprocessor DSP systems JF - Design Automation for Embedded Systems Y1 - 2002 A1 - Bambha,N. A1 - Kianzad,V. A1 - Khandelia,M. A1 - Bhattacharyya, Shuvra S. VL - 7 CP - 4 ER - TY - CONF T1 - Lessons learned from 25 years of process improvement: the rise and fall of the NASA software engineering laboratory T2 - Proceedings of the 24th International Conference on Software Engineering Y1 - 2002 A1 - Basili, Victor R. A1 - McGarry,Frank E. A1 - Pajerski,Rose A1 - Zelkowitz, Marvin V AB - For 25 years the NASA/GSFC Software Engineering Laboratory (SEL) has been a major resource in software process improvement activities. But due to a changing climate at NASA, agency reorganization, and budget cuts, the SEL has lost much of its impact. In this paper we describe the history of the SEL and give some lessons learned on what we did right, what we did wrong, and what others can learn from our experiences. We briefly describe the research that was conducted by the SEL, describe how we evolved our understanding of software process improvement, and provide a set of lessons learned and hypotheses that should enable future groups to learn from and improve on our quarter century of experiences. JA - Proceedings of the 24th International Conference on Software Engineering T3 - ICSE '02 PB - ACM CY - New York, NY, USA SN - 1-58113-472-X UR - http://doi.acm.org/10.1145/581339.581351 M3 - 10.1145/581339.581351 ER - TY - CONF T1 - A light-weight process for capturing and evolving defect reduction experience T2 - Engineering of Complex Computer Systems, 2002. Proceedings. Eighth IEEE International Conference on Y1 - 2002 A1 - Basili, Victor R. A1 - Lindvall,M. A1 - Shull, F. KW - bases;experience KW - CeBASE;NSF KW - defect KW - development;software KW - experience;software KW - funded KW - knowledge;software KW - management;lightweight KW - management;software KW - project;decision KW - projects;software KW - reduction KW - reusability;software KW - reuse;software KW - support;eWorkshops;experience KW - tools; KW - tools;knowledge AB - Selecting technologies for developing software is a crucial activity in software projects. Defect reduction is an example of an area in which software developers have to decide what technologies to use. CeBASE is a NSF funded project that has the role of improving software development by providing decision support on the selection of techniques and tools. The decision support is based on empirical data organized in experience bases and refined into high-level models. Empirical data is collected through various activities, for example through eWorkshops in which experts discuss important issues, and formalized using the lightweight knowledge dust to knowledge pearl process. JA - Engineering of Complex Computer Systems, 2002. Proceedings. Eighth IEEE International Conference on M3 - 10.1109/ICECCS.2002.1181505 ER - TY - JOUR T1 - Modeling the Effects of Greenbelts at the Urban-Rural Fringe JF - Proceedings of IEMSS 2002 Y1 - 2002 A1 - Brown,D.G. A1 - Page,S.E. A1 - Riolo,R A1 - Rand, William AB - We present and evaluate an agent based model (ABM) of land use change at the rural-urban fringe,comparing its performance to a mathematical model of the same process. Our simplified model was developed in Swarm using agents with heterogeneous preferences and a landscape with heterogeneous properties. The context of this work is a larger project that includes surveys of the preferences of residents and data on historical patterns of development. Our broader goal is to use the model to evaluate the ecological effects of alternative policies and designs. We begin by evaluating the influence of a greenbelt, which is located next to a developing area and in which no development is permitted. We present results of a mathematical model that illustrates the necessary trade-off between greenbelt placement and greenbelt width on its effectiveness at delaying develop- ment beyond. Experiments run with the ABM are validated by the mathematical model and illustrate analyses that can be performed by extending to two-dimensions, variable agent preferences, and multiple, and ultimately realistic, patterns of landscape variability. ER - TY - JOUR T1 - Navigation patterns and usability of zoomable user interfaces with and without an overview JF - ACM Transactions on Computer-Human Interaction (TOCHI) Y1 - 2002 A1 - Hornbaek,K. A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine VL - 9 CP - 4 ER - TY - JOUR T1 - A new, expressed multigene family containing a hot spot for insertion of retroelements is associated with polymorphic subtelomeric regions of Trypanosoma brucei JF - Eukaryotic cell Y1 - 2002 A1 - Bringaud,F. A1 - Biteau,N. A1 - Melville,S. E. A1 - Hez,S. A1 - El‐Sayed, Najib M. A1 - Leech,V. A1 - Berriman,M. A1 - Hall,N. A1 - Donelson,J. E A1 - Baltz,T. VL - 1 CP - 1 ER - TY - CONF T1 - A non-intrusive Kalman filter-based tracker for pursuit eye movement T2 - American Control Conference, 2002. Proceedings of the 2002 Y1 - 2002 A1 - Abd-Almageed, Wael A1 - Fadali,M. S A1 - Bebis,G. KW - Application software KW - characterization KW - Computer vision KW - Current measurement KW - deterministic component KW - Electric variables measurement KW - eye position estimation KW - eye tracking KW - gaze tracking KW - Human computer interaction KW - Kalman filter KW - Kalman filters KW - Lenses KW - Motion estimation KW - Optical reflection KW - pursuit eye movement KW - pursuit motion KW - random component KW - Skin KW - tracking AB - In this paper, we introduce a new non-intrusive approach to estimating the eye position during pursuit motion of the eye. We introduce a new characterization for the pursuit eye movement. Our characterization is based on the decomposition of the pursuit eye motion into a deterministic component and random component. We use a discrete Kalman filter to estimate the random component and calculate the deterministic component. We add the two components to obtain an estimate of the eye position. Simulation results are provided to illustrate the eye position estimation. JA - American Control Conference, 2002. Proceedings of the 2002 PB - IEEE VL - 2 SN - 0-7803-7298-0 UR - http://ieeexplore.ieee.org/ielx5/7965/22015/01023224.pdf?tp=&arnumber=1023224&isnumber=22015 M3 - 10.1109/ACC.2002.1023224 ER - TY - JOUR T1 - An operational process for goal-driven definition of measures JF - Software Engineering, IEEE Transactions on Y1 - 2002 A1 - Briand,L.C. A1 - Morasca,S. A1 - Basili, Victor R. KW - attributes; KW - definition; KW - development KW - empirical KW - engineering; KW - expected KW - experimental KW - goal-driven KW - GQM KW - GQM/MEDEA; KW - hypotheses; KW - management; KW - mathematical KW - measure KW - measurement; KW - metrics; KW - operational KW - paradigm; KW - process; KW - Product KW - properties; KW - quality; KW - software KW - verification; AB - We propose an approach (GOM/MEDEA) for defining measures of product attributes in software engineering. The approach is driven by the experimental goals of measurement, expressed via the GQM paradigm, and a set of empirical hypotheses. To make the empirical hypotheses quantitatively verifiable, GQM/MEDEA supports the definition of theoretically valid measures for the attributes of interest based on their expected mathematical properties. The empirical hypotheses are subject to experimental verification. This approach integrates several research contributions from the literature into a consistent, practical, and rigorous approach. VL - 28 SN - 0098-5589 CP - 12 M3 - 10.1109/TSE.2002.1158285 ER - TY - JOUR T1 - Optimizing execution of component-based applications using group instances JF - Future Generation Computer Systems Y1 - 2002 A1 - Beynon,Michael D. A1 - Kurc,Tahsin A1 - Sussman, Alan A1 - Saltz,Joel KW - DataCutter KW - Grid KW - Wide-area network AB - Recent research on programming models for developing applications on the Grid has proposed component-based models as a viable approach, in which an application is composed of multiple interacting computational objects. We have been developing a framework, called filter-stream programming, for building data-intensive applications that query, analyze and manipulate very large datasets in a distributed environment. In this model, the processing structure of an application is represented as a set of processing units, referred to as filters. In this paper, we develop the problem of scheduling instances of a filter group. A filter group is a set of filters collectively performing a computation for an application. In particular, we seek the answer to the following question: should a new instance be created, or an existing one reused? We experimentally investigate the effects on performance of instantiating multiple filter groups under varying application characteristics. VL - 18 SN - 0167-739X UR - http://www.sciencedirect.com/science/article/pii/S0167739X0100070X CP - 4 M3 - 10.1016/S0167-739X(01)00070-X ER - TY - JOUR T1 - Ordered and quantum treemaps: Making effective use of 2D space to display hierarchies JF - ACM Transactions on Graphics (TOG) Y1 - 2002 A1 - Bederson, Benjamin B. A1 - Shneiderman, Ben A1 - Wattenberg,Martin KW - hierarchies KW - Human-computer interaction KW - image browsers KW - Information Visualization KW - jazz KW - ordered treemaps KW - treemaps KW - TREES KW - zoomable user interfaces (ZUIs). AB - Treemaps, a space-filling method for visualizing large hierarchical data sets, are receiving increasing attention. Several algorithms have been previously proposed to create more useful displays by controlling the aspect ratios of the rectangles that make up a treemap. While these algorithms do improve visibility of small items in a single layout, they introduce instability over time in the display of dynamically changing data, fail to preserve order of the underlying data, and create layouts that are difficult to visually search. In addition, continuous treemap algorithms are not suitable for displaying fixed-sized objects within them, such as images.This paper introduces a new "strip" treemap algorithm which addresses these shortcomings, and analyzes other "pivot" algorithms we recently developed showing the trade-offs between them. These ordered treemap algorithms ensure that items near each other in the given order will be near each other in the treemap layout. Using experimental evidence from Monte Carlo trials and from actual stock market data, we show that, compared to other layout algorithms, ordered treemaps are more stable, while maintaining relatively favorable aspect ratios of the constituent rectangles. A user study with 20 participants clarifies the human performance benefits of the new algorithms. Finally, we present quantum treemap algorithms, which modify the layout of the continuous treemap algorithms to generate rectangles that are integral multiples of an input object size. The quantum treemap algorithm has been applied to PhotoMesa, an application that supports browsing of large numbers of images. VL - 21 SN - 0730-0301 UR - http://doi.acm.org/10.1145/571647.571649 CP - 4 M3 - 10.1145/571647.571649 ER - TY - CONF T1 - OZONE: A zoomable interface for navigating ontology information T2 - Proceedings of the Working Conference on Advanced Visual Interfaces Y1 - 2002 A1 - Suh,B. A1 - Bederson, Benjamin B. JA - Proceedings of the Working Conference on Advanced Visual Interfaces ER - TY - CONF T1 - P5 : a protocol for scalable anonymous communication T2 - 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings Y1 - 2002 A1 - Sherwood,R. A1 - Bhattacharjee, Bobby A1 - Srinivasan, Aravind KW - Broadcasting KW - communication efficiency KW - Computer science KW - cryptography KW - data privacy KW - Educational institutions KW - Internet KW - large anonymous groups KW - P5 protocol KW - packet-level simulations KW - Particle measurements KW - Peer to peer computing KW - peer-to-peer personal privacy protocol KW - privacy KW - Protocols KW - receiver anonymity KW - scalable anonymous communication KW - security of data KW - sender anonymity KW - sender-receiver anonymity KW - Size measurement KW - telecommunication security AB - We present a protocol for anonymous communication over the Internet. Our protocol, called P5 (peer-to-peer personal privacy protocol) provides sender-, receiver-, and sender-receiver anonymity. P5 is designed to be implemented over current Internet protocols, and does not require any special infrastructure support. A novel feature of P5 is that it allows individual participants to trade-off degree of anonymity for communication efficiency, and hence can be used to scalably implement large anonymous groups. We present a description of P5, an analysis of its anonymity and communication efficiency, and evaluate its performance using detailed packet-level simulations. JA - 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings PB - IEEE SN - 0-7695-1543-6 M3 - 10.1109/SECPRI.2002.1004362 ER - TY - JOUR T1 - Packet loss recovery for streaming video JF - 12th International Packet Video Workshop Y1 - 2002 A1 - Feamster, Nick A1 - Balakrishnan,H. AB - While there is an increasing demand for streaming video applica-tions on the Internet, various network characteristics make the de- ployment of these applications more challenging than traditional TCP-based applications like email and the Web. Packet loss can be detrimental to compressed video with interdependent frames be- cause errors potentially propagate across many frames. While la- tency requirements do not permit retransmission of all lost data, we leverage the characteristics of MPEG-4 to selectively retrans- mit only the most important data in the bitstream. When latency constraints do not permit retransmission, we propose a mechanism for recovering this data using postprocessing techniques at the re- ceiver. We quantify the effects of packet loss on the quality of MPEG-4 video, develop an analytical model to explain these ef- fects, present a system to adaptively deliver MPEG-4 video in the face of packet loss and variable Internet conditions, and evaluate the effectiveness of the system under various network conditions. ER - TY - JOUR T1 - Perturbation technique for LLG dynamics in uniformly magnetized bodies subject to RF fields JF - Magnetics, IEEE Transactions on Y1 - 2002 A1 - Bertotti,G. A1 - Mayergoyz, Issak D A1 - Serpico,C. KW - analytical KW - anisotropy KW - anisotropy; KW - applied KW - bodies; KW - circularly KW - component; KW - constant-in-time KW - constant; KW - damping KW - demagnetisation; KW - demagnetizing KW - differential KW - dynamics; KW - effective KW - elliptically KW - equation; KW - equations; KW - exactly KW - factors; KW - field; KW - film; KW - films; KW - Frequency KW - gyromagnetic KW - harmonic; KW - higher KW - Landau-Lifshitz-Gilbert KW - large KW - linear KW - magnetic KW - magnetisation; KW - magnetization KW - magnetization; KW - magnetized KW - modes; KW - MOTION KW - order KW - partial KW - particle; KW - particles; KW - perturbation KW - polarized KW - radio KW - ratio; KW - RF KW - saturation KW - solution; KW - solvable KW - system; KW - technique; KW - techniques; KW - thin KW - time-harmonic KW - uniaxial KW - uniformly AB - The problem of magnetization dynamics of a uniformly magnetized uniaxial particle or film, under elliptically polarized applied field, is considered. In the special case of circularly polarized applied field and particles (films) with a symmetry axis, pure time-harmonic magnetization modes exist that can be computed analytically. Deviations from these highly symmetric conditions are treated as perturbation of the symmetric case. The perturbation technique leads to the exactly solvable system of linear differential equations for the perturbations which enables one to compute higher order magnetization harmonic. The analytical solutions are obtained and then compared with numerical results. VL - 38 SN - 0018-9464 CP - 5 M3 - 10.1109/TMAG.2002.803596 ER - TY - JOUR T1 - Processing large-scale multi-dimensional data in parallel and distributed environments JF - Parallel Computing Y1 - 2002 A1 - Beynon,Michael A1 - Chang,Chialin A1 - Catalyurek,Umit A1 - Kurc,Tahsin A1 - Sussman, Alan A1 - Andrade,Henrique A1 - Ferreira,Renato A1 - Saltz,Joel KW - Data-intensive applications KW - Distributed computing KW - Multi-dimensional datasets KW - PARALLEL PROCESSING KW - Runtime systems AB - Analysis of data is an important step in understanding and solving a scientific problem. Analysis involves extracting the data of interest from all the available raw data in a dataset and processing it into a data product. However, in many areas of science and engineering, a scientist's ability to analyze information is increasingly becoming hindered by dataset sizes. The vast amount of data in scientific datasets makes it a difficult task to efficiently access the data of interest, and manage potentially heterogeneous system resources to process the data. Subsetting and aggregation are common operations executed in a wide range of data-intensive applications. We argue that common runtime and programming support can be developed for applications that query and manipulate large datasets. This paper presents a compendium of frameworks and methods we have developed to support efficient execution of subsetting and aggregation operations in applications that query and manipulate large, multi-dimensional datasets in parallel and distributed computing environments. VL - 28 SN - 0167-8191 UR - http://www.sciencedirect.com/science/article/pii/S0167819102000972 CP - 5 M3 - 10.1016/S0167-8191(02)00097-2 ER - TY - CONF T1 - Query routing in the TerraDir distributed directory T2 - Proceedings of the SPIE ITCOM Y1 - 2002 A1 - Silaghi,B. A1 - Bhattacharjee, Bobby A1 - Keleher,P. AB - We present the design and evaluation of the query-routing protocol of the TerraDir distributed directory.TerraDir is a wide-area distributed directory designed for hierarchical namespaces, and provides a lookup service for mapping keys to objects. We introduce distributed lookup and caching algorithms that leverage the underlying data hierarchy. Our algorithms provide efficient lookups while avoiding the load imbalances often associated with hierarchical systems. The TerraDir load balancing scheme also incorporates a node replication algorithm that provides configurable failure resilience with provably low overheads. JA - Proceedings of the SPIE ITCOM VL - 4868 ER - TY - CONF T1 - Remote access to large spatial databases T2 - Proceedings of the 10th ACM international symposium on Advances in geographic information systems Y1 - 2002 A1 - Tanin,Egemen A1 - Brabec,František A1 - Samet, Hanan KW - client/server KW - GIS KW - Internet KW - peer-to-peer AB - Enterprises in the public and private sectors have been making their large spatial data archives available over the Internet. However, interactive work with such large volumes of online spatial data is a challenging task. We propose two efficient approaches to remote access to large spatial data. First, we introduce a client-server architecture where the work is distributed between the server and the individual clients for spatial query evaluation, data visualization, and data management. We enable the minimization of the requirements for system resources on the client side while maximizing system responsiveness as well as the number of connections one server can handle concurrently. Second, for prolonged periods of access to large online data, we introduce APPOINT (an Approach for Peer-to-Peer Offloading the INTernet). This is a centralized peer-to-peer approach that helps Internet users transfer large volumes of online data efficiently. In APPOINT, active clients of the client-server architecture act on the server's behalf and communicate with each other to decrease network latency, improve service bandwidth, and resolve server congestions. JA - Proceedings of the 10th ACM international symposium on Advances in geographic information systems T3 - GIS '02 PB - ACM CY - New York, NY, USA SN - 1-58113-591-2 UR - http://doi.acm.org/10.1145/585147.585150 M3 - 10.1145/585147.585150 ER - TY - CONF T1 - Remote thin-client access to spatial database systems T2 - Proceedings of the 2002 annual national conference on Digital government research Y1 - 2002 A1 - Samet, Hanan A1 - Brabec,František AB - Numerous federal agencies produce official statistics that are made accessible to ordinary citizens for searching and data retrieval. This is often done via the Internet through a web browser interface. If this data is presented in textual format, it can often be searched and retrieved by such attributes as topic, responsible agency, keywords, or press release. However, if the data is of spatial nature, e.g., in the form of a map, then using text-based queries is often too cumbersome for the intended audience. We propose to use the capabilities of the SAND Spatial Browser to provide more power to users of these databases. Using the SAND Spatial Browser allows users to define the spatial region of interest with greater specificity, instead of forcing them to retrieve data just for a particular location or a region with a predefined boundary. They can also make use of ranking which is the ability to retrieve data in the order of distance from other instances of the data or aggregates of data that are user-defined. Work is distributed between the SAND server and the individual clients for query evaluation, data visualization and data management. This enables the minimization of the necessary requirements for system resources on the client side while maximizing the number of connections one server can handle concurrently. Concrete experience with interfacing the SAND system with FedStats data is also discussed. JA - Proceedings of the 2002 annual national conference on Digital government research T3 - dg.o '02 PB - Digital Government Society of North America UR - http://dl.acm.org/citation.cfm?id=1123098.1123170 ER - TY - JOUR T1 - Rover: scalable location-aware computing JF - Computer Y1 - 2002 A1 - Banerjee,S. A1 - Agarwal,S. A1 - Kamel,K. A1 - Kochut, A. A1 - Kommareddy,C. A1 - Nadeem,T. A1 - Thakkar,P. A1 - Trinh,Bao A1 - Youssef,A. A1 - Youssef, M. A1 - Larsen,R.L. A1 - Udaya Shankar,A. A1 - Agrawala, Ashok K. KW - amusement KW - application-specific KW - architecture; KW - automation; KW - business KW - business; KW - computing; KW - data KW - entertainment; KW - handheld KW - humanities; KW - integration KW - LAN; KW - location-aware KW - malls; KW - mobile KW - museums; KW - office KW - parks; KW - processing; KW - resource KW - Rover; KW - scalability; KW - scalable KW - scheduling; KW - shopping KW - software KW - system KW - theme KW - units; KW - user; KW - wireless AB - All the components necessary for realizing location-aware computing are available in the marketplace today. What has hindered the widespread deployment of location-based systems is the lack of an integration architecture that scales with user populations. The authors have completed the initial implementation of Rover, a system designed to achieve this sort of integration and to automatically tailor information and services to a mobile user's location. Their studies have validated Rover's underlying software architecture, which achieves system scalability through high-resolution, application-specific resource scheduling at the servers and network. The authors believe that this technology will greatly enhance the user experience in many places, including museums, amusement and theme parks, shopping malls, game fields, offices, and business centers. They designed the system specifically to scale to large user populations and expect its benefits to increase with them. VL - 35 SN - 0018-9162 CP - 10 M3 - 10.1109/MC.2002.1039517 ER - TY - JOUR T1 - Scalable application layer multicast JF - SIGCOMM Comput. Commun. Rev. Y1 - 2002 A1 - Banerjee,Suman A1 - Bhattacharjee, Bobby A1 - Kommareddy,Christopher KW - application layer multicast KW - hierarchy KW - overlay networks KW - peer-to-peer systems KW - scalability AB - We describe a new scalable application-layer multicast protocol, specifically designed for low-bandwidth, data streaming applications with large receiver sets. Our scheme is based upon a hierarchical clustering of the application-layer multicast peers and can support a number of different data delivery trees with desirable properties.We present extensive simulations of both our protocol and the Narada application-layer multicast protocol over Internet-like topologies. Our results show that for groups of size 32 or more, our protocol has lower link stress (by about 25%), improved or similar end-to-end latencies and similar failure recovery properties. More importantly, it is able to achieve these results by using orders of magnitude lower control traffic.Finally, we present results from our wide-area testbed in which we experimented with 32-100 member groups distributed over 8 different sites. In our experiments, average group members established and maintained low-latency paths and incurred a maximum packet loss rate of less than 1% as members randomly joined and left the multicast group. The average control overhead during our experiments was less than 1 Kbps for groups of size 100. VL - 32 SN - 0146-4833 UR - http://doi.acm.org/10.1145/964725.633045 CP - 4 M3 - 10.1145/964725.633045 ER - TY - CONF T1 - Scalable peer finding on the Internet T2 - Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE Y1 - 2002 A1 - Banerjee,S. A1 - Kommareddy,C. A1 - Bhattacharjee, Bobby KW - application KW - application-layer; KW - Beaconing; KW - CONTROL KW - finding; KW - Internet-like KW - Internet; KW - measurement KW - network KW - overhead KW - peer KW - peer-finding KW - peers; KW - protocol; KW - protocols; KW - reduction; KW - scalable KW - scheme; KW - services; KW - simulations; KW - solution; KW - Tiers; KW - topologies; KW - topology; AB - We consider the problem of finding nearby application peers over the Internet. We define a new peer-finding scheme (called Tiers) that scales to large application peer groups. Tiers creates a hierarchy of the peers, which allows an efficient and scalable solution to this problem. The scheme can be implemented entirely in the application-layer and does not require the deployment of either any additional measurement services, or well-known reference landmarks in the network. We present detailed evaluation of Tiers and compare it to one previously proposed scheme called Beaconing. Through analysis and detailed simulations on 10,000 node Internet-like topologies we show that Tiers achieves comparable or better performance with a significant reduction in control overheads for groups of size 32 or more. JA - Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE VL - 3 M3 - 10.1109/GLOCOM.2002.1189023 ER - TY - JOUR T1 - Scalable secure group communication over IP multicast JF - Selected Areas in Communications, IEEE Journal on Y1 - 2002 A1 - Banerjee,S. A1 - Bhattacharjee, Bobby KW - access KW - algorithm; KW - authentication; KW - Bandwidth KW - communication; KW - CONTROL KW - costs; KW - cryptography; KW - dynamics; KW - group KW - group; KW - Internet KW - Internet-like KW - Internet; KW - IP KW - logarithmic KW - map; KW - membership; KW - message KW - Multicast KW - multicast; KW - network KW - overhead; KW - PROCESSING KW - protocol KW - protocols; KW - rekeying KW - requirements; KW - routers; KW - routing; KW - scalable KW - secure KW - security; KW - server; KW - simulation; KW - storage KW - Telecommunication KW - topologies; KW - Topology KW - topology; KW - transport KW - usage; AB - We introduce and analyze a scalable rekeying scheme for implementing secure group communications Internet protocol multicast. We show that our scheme incurs constant processing, message, and storage overhead for a rekey operation when a single member joins or leaves the group, and logarithmic overhead for bulk simultaneous changes to the group membership. These bounds hold even when group dynamics are not known a priori. Our rekeying algorithm requires a particular clustering of the members of the secure multicast group. We describe a protocol to achieve such clustering and show that it is feasible to efficiently cluster members over realistic Internet-like topologies. We evaluate the overhead of our own rekeying scheme and also of previously published schemes via simulation over an Internet topology map containing over 280 000 routers. Through analysis and detailed simulations, we show that this rekeying scheme performs better than previous schemes for a single change to group membership. Further, for bulk group changes, our algorithm outperforms all previously known schemes by several orders of magnitude in terms of actual bandwidth usage, processing costs, and storage requirements. VL - 20 SN - 0733-8716 CP - 8 M3 - 10.1109/JSAC.2002.803986 ER - TY - CONF T1 - SpaceTree: Design evolution of a node link tree browser T2 - Proc. InfoVis Y1 - 2002 A1 - Plaisant, Catherine A1 - Grosjean,J. A1 - Bederson, Benjamin B. JA - Proc. InfoVis ER - TY - CONF T1 - SpaceTree: supporting exploration in large node link tree, design evolution and empirical evaluation T2 - Information Visualization, 2002. INFOVIS 2002. IEEE Symposium on Y1 - 2002 A1 - Plaisant, Catherine A1 - Grosjean,J. A1 - Bederson, Benjamin B. KW - browser; KW - camera KW - data KW - design KW - diagrams; KW - dynamic KW - evolution; KW - experiment; KW - exploration; KW - filter KW - functions; KW - graphical KW - icons; KW - integrated KW - interfaces; KW - large KW - link KW - movement; KW - node KW - novel KW - optimized KW - rescaling; KW - search; KW - SpaceTree; KW - structures; KW - topology; KW - tree KW - user KW - visualisation; KW - visualization; AB - We present a novel tree browser that builds on the conventional node link tree diagrams. It adds dynamic rescaling of branches of the tree to best fit the available screen space, optimized camera movement, and the use of preview icons summarizing the topology of the branches that cannot be expanded. In addition, it includes integrated search and filter functions. This paper reflects on the evolution of the design and highlights the principles that emerged from it. A controlled experiment showed benefits for navigation to already previously visited nodes and estimation of overall tree topology. JA - Information Visualization, 2002. INFOVIS 2002. IEEE Symposium on M3 - 10.1109/INFVIS.2002.1173148 ER - TY - CONF T1 - Supporting access to large digital oral history archives T2 - Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries Y1 - 2002 A1 - Gustman,Samuel A1 - Soergel,Dagobert A1 - Oard, Douglas A1 - Byrne,William A1 - Picheny,Michael A1 - Ramabhadran,Bhuvana A1 - Greenberg,Douglas KW - cataloging KW - oral history KW - research agenda AB - This paper describes our experience with the creation, indexing, and provision of access to a very large archive of videotaped oral histories - 116,000 hours of digitized interviews in 32 languages from 52,000 survivors, liberators, rescuers, and witnesses of the Nazi Holocaust. It goes on to identify a set of critical research issues that must be addressed if we are to provide full and detailed access to collections of this size: issues in user requirement studies, automatic speech recognition, automatic classification, segmentation, summarization, retrieval, and user interfaces. The paper ends by inviting others to discuss use of these materials in their own research. JA - Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries T3 - JCDL '02 PB - ACM CY - New York, NY, USA SN - 1-58113-513-0 UR - http://doi.acm.org/10.1145/544220.544224 M3 - 10.1145/544220.544224 ER - TY - CONF T1 - Topology inference from BGP routing dynamics T2 - Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment Y1 - 2002 A1 - Andersen,David G. A1 - Feamster, Nick A1 - Bauer,Steve A1 - Balakrishnan,Hari AB - This paper describes a method of inferring logical relationships between network prefixes within an Autonomous System (AS) using only passive monitoring of BGP messages. By clustering these prefixes based upon similarities between their update times, we create a hierarchy linking the prefixes within the larger AS. We can frequently identify groups of prefixes routed to the same ISP Point of Presence (POP), despite the lack of identifying information in the BGP messages. Similarly, we observe disparate prefixes under common organizational control, or with long shared network paths. In addition to discovering interesting network characteristics, our passive method facilitates topology discovery by potentially reducing the number of active probes required in traditional traceroute-based Internet mapping mechanisms. JA - Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment T3 - IMW '02 PB - ACM CY - New York, NY, USA SN - 1-58113-603-X UR - http://doi.acm.org/10.1145/637201.637239 M3 - 10.1145/637201.637239 ER - TY - JOUR T1 - Trypanosoma cruzi: RNA structure and post-transcriptional control of tubulin gene expression JF - Experimental Parasitology Y1 - 2002 A1 - Bartholomeu,Daniella C. A1 - Silva,Rosiane A. A1 - Galvão,Lucia M. C. A1 - El‐Sayed, Najib M. A1 - Donelson,John E. A1 - Teixeira,Santuza M.R. AB - Changes in tubulin expression are among the biochemical and morphological adaptations that occur during the life cycle of Trypanosomatids. To investigate the mechanism responsible for the differential accumulation of tubulin mRNAs in Trypanosoma cruzi, we determine the sequences of [alpha]- and [beta]-tubulin transcripts and analyzed their expression during the life cycle of the parasite. Two [beta]-tubulin mRNAs of 1.9 and 2.3 kb were found to differ mainly by an additional 369 nucleotides at the end of the 3' untranslated region (UTR). Although their transcription rates are similar in epimastigotes and amastigotes, [alpha]- and [beta]-tubulin transcripts are 3- to 6-fold more abundant in epimastigotes than in trypomastigotes and amastigotes. Accordingly, the half-lives of [alpha]- and [beta]-tubulin mRNAs are significantly higher in epimastigotes than in amastigotes. Transient transfection experiments indicated that positive regulatory elements occur in the 3' UTR plus downstream intergenic region of the [alpha]-tubulin gene and that both positive and negative elements occur in the equivalent regions of the [beta]-tubulin gene.Index Descriptions and Abbreviations: Kinetoplastida; Trypanosoma cruzi; tubulin; gene regulation; PCR, polymerase chain reaction; UTR, untranslated region; IR, intergenic region; SL, spliced leader; BAC, bacterial artificial chromosome. VL - 102 SN - 0014-4894 UR - http://www.sciencedirect.com/science/article/pii/S0014489403000341 CP - 3-4 M3 - 16/S0014-4894(03)00034-1 ER - TY - CONF T1 - Using latency-recency profiles for data delivery on the web T2 - Proceedings of the 28th international conference on Very Large Data Bases Y1 - 2002 A1 - Bright,L. A1 - Raschid, Louiqa JA - Proceedings of the 28th international conference on Very Large Data Bases ER - TY - JOUR T1 - Virtual Telescopes in Education JF - Journal of Digital Information Y1 - 2002 A1 - Hoban,S. A1 - desJardins, Marie A1 - Farrell,N. A1 - Rathod,P. A1 - Sachs,J. A1 - Sansare,S. A1 - Yesha,Y. A1 - Keating,J. A1 - Busschots,B. A1 - Means,J. A1 - others AB - Virtual Telescopes in Education is providing the services required to operate a virtual observatory comprising distributed telescopes, including an interactive, constraint-based scheduling service, data and resource archive, proposal preparation and review environment, and a VTIE Journal. A major goal of VTIE is to elicit from learners questions about the nature of celestial objects and the physical processes that give rise to the spectacular imagery that catches their imaginations. Generation of constrained science questions will assist learners in the science process. To achieve interoperability with other NSDL resources, our approach follows the Open Archives Initiative and the W3C Semantic Web activity. VL - 2 CP - 4 ER - TY - JOUR T1 - A visual search tool for early elementary science students JF - Journal of Science Education and Technology Y1 - 2002 A1 - Revelle,G. A1 - Druin, Allison A1 - Platner,M. A1 - Bederson, Benjamin B. A1 - Hourcade,J. P A1 - Sherman,L. VL - 11 CP - 1 ER - TY - JOUR T1 - Visual space-time geometry - A tool for perception and the imagination JF - Proceedings of the IEEE Y1 - 2002 A1 - Fermüller, Cornelia A1 - Baker, P. A1 - Aloimonos, J. KW - 3-D motion estimation KW - Buildings KW - Computer vision KW - Geometry KW - Graphics KW - Image sequences KW - Layout KW - Mathematical model KW - mathematical theory KW - model building KW - Motion estimation KW - multiple view geometry KW - multiple views KW - Navigation KW - optical flow KW - optical illusions KW - patch correspondence KW - Rendering (computer graphics) KW - Robotics and automation KW - Solid modeling KW - structure from motion KW - three-dimensional models KW - visual space-time AB - Although the fundamental ideas underlying research efforts in the field of computer vision have not radically changed in the past two decades, there has been a transformation in the way work in this field is conducted. This is primarily due to the emergence of a number of tools, of both a practical and a theoretical nature. One such tool, celebrated throughout the nineties, is the geometry of visual space-time. It is known under a variety of headings, such as multiple view geometry, structure from motion, and model building. It is a mathematical theory relating multiple views (images) of a scene taken at different viewpoints to three-dimensional models of the (possibly dynamic) scene. This mathematical theory gave rise to algorithms that take as input images (or video) and provide as output a model of the scene. Such algorithms are one of the biggest successes of the field and they have many applications in other disciplines, such as graphics (image-based rendering, motion capture) and robotics (navigation). One of the difficulties, however is that the current tools cannot yet be fully automated, and they do not provide very accurate results. More research is required for automation and high precision. During the past few years we have investigated a number of basic questions underlying the structure from motion problem. Our investigations resulted in a small number of principles that characterize the problem. These principles, which give rise to automatic procedures and point to new avenues for studying the next level of the structure from motion problem, are the subject of this paper. VL - 90 SN - 0018-9219 CP - 7 M3 - 10.1109/JPROC.2002.801440 ER - TY - CONF T1 - Web question answering: is more always better? T2 - Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval Y1 - 2002 A1 - Dumais,Susan A1 - Banko,Michele A1 - Brill,Eric A1 - Jimmy Lin A1 - Ng,Andrew AB - This paper describes a question answering system that is designed to capitalize on the tremendous amount of data that is now available online. Most question answering systems use a wide variety of linguistic resources. We focus instead on the redundancy available in large corpora as an important resource. We use this redundancy to simplify the query rewrites that we need to use, and to support answer mining from returned snippets. Our system performs quite well given the simplicity of the techniques being utilized. Experimental results show that question answering accuracy can be greatly improved by analyzing more and more matching passages. Simple passage ranking and n-gram extraction techniques work well in our system making it efficient to use with many backend retrieval engines. JA - Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval T3 - SIGIR '02 PB - ACM CY - New York, NY, USA SN - 1-58113-561-0 UR - http://doi.acm.org/10.1145/564376.564428 M3 - 10.1145/564376.564428 ER - TY - CONF T1 - What we have learned about fighting defects T2 - Software Metrics, 2002. Proceedings. Eighth IEEE Symposium on Y1 - 2002 A1 - Shull, F. A1 - Basili, Victor R. A1 - Boehm,B. A1 - Brown,A. W A1 - Costa,P. A1 - Lindvall,M. A1 - Port,D. A1 - Rus,I. A1 - Tesoriero,R. A1 - Zelkowitz, Marvin V KW - based KW - Center KW - Computer KW - defect KW - development; KW - education; KW - electronic KW - Empiric KW - engineering KW - engineering; KW - eWorkshops; KW - for KW - heuristics; KW - reduction; KW - Science KW - software KW - workshops; AB - The Center for Empirically Based Software Engineering helps improve software development by providing guidelines for selecting development techniques, recommending areas for further research, and supporting software engineering education. A central activity toward achieving this goal has been the running of "e- Workshops" that capture expert knowledge with a minimum of overhead effort to formulate heuristics on a particular topic. The resulting heuristics are a useful summary of the current state of knowledge in an area based on expert opinion. This paper discusses the results to date of a series of e-Workshops on software defect reduction. The original discussion items are presented along with an encapsulated summary of the expert discussion. The reformulated heuristics can be useful both to researchers (for pointing out gaps in the current state of the knowledge requiring further investigation) and to practitioners (for benchmarking or setting expectations about development practices). JA - Software Metrics, 2002. Proceedings. Eighth IEEE Symposium on M3 - 10.1109/METRIC.2002.1011343 ER - TY - JOUR T1 - Zoomable user interfaces as a medium for slide show presentations JF - Information Visualization Y1 - 2002 A1 - Good,L. A1 - Bederson, Benjamin B. VL - 1 CP - 1 ER - TY - CONF T1 - Adaptive negative cycle detection in dynamic graphs T2 - Circuits and Systems, 2001. ISCAS 2001. The 2001 IEEE International Symposium on Y1 - 2001 A1 - Chandrachoodan,N. A1 - Bhattacharyya, Shuvra S. A1 - Liu,K. J.R JA - Circuits and Systems, 2001. ISCAS 2001. The 2001 IEEE International Symposium on VL - 5 ER - TY - CONF T1 - Automated Validation of Software Models T2 - Automated Software Engineering, International Conference on Y1 - 2001 A1 - Sims,Steve A1 - Cleaveland, Rance A1 - Butts,Ken A1 - Ranville,Scott AB - This paper describes the application of an automated verification tool to a software model developed at Ford. Ford already has in place an advanced model-based software development framework that employs the Matlab?, Simulink?, and Stateflow? modeling tools. During this project we applied the invariant checker Salsa to a Simulink?/ Stateflow? model of automotive software to check for nondeterminism, missing cases, dead code, and redundant code. During the analysis, a number of anomalies were detected that had not been found during manual review. We argue that the detection and correction of these problems demonstrates a cost-effective application of formal verification that elevates our level of confidence in the model. JA - Automated Software Engineering, International Conference on PB - IEEE Computer Society CY - Los Alamitos, CA, USA SN - 0-7695-1426-X M3 - http://doi.ieeecomputersociety.org/10.1109/ASE.2001.989794 ER - TY - CONF T1 - Automatically Tracking and Analyzing the Behavior of Live Insect Colonies T2 - AGENTS '01 Proceedings of the Fifth International Conference on Autonomous Agents Y1 - 2001 A1 - Balch, Tucker A1 - Zia Khan A1 - Veloso, Manuela AB - We introduce the study of {\it live} social insect colonies as a relevant and exciting domain for the development and application of multi-agent systems modeling tools. Social insects provide a rich source of {\it traceable} social behavior for testing multi-agent tracking, prediction and modeling algorithms. An additional benefit of this research is the potential for contributions to experimental biology --- the principled techniques developed for analyzing artificial multi-agent systems can be applied to advance the state of knowledge of insect behavior. We contribute a novel machine vision system that addresses the challenge of tracking hundreds of small animals simultaneously. Fast color-based tracking is combined with movement-based tracking to locate ants in a real-time video stream. We also introduce new methods for analyzing the spatial activity of ant colonies. The system was validated in experiments with laboratory colonies of {\it Camponotus festinatus} and several example analyses of the colonies' spatial behavior are provided. JA - AGENTS '01 Proceedings of the Fifth International Conference on Autonomous Agents T3 - AGENTS '01 PB - ACM SN - 1-58113-326-X UR - http://doi.acm.org/10.1145/375735.376434 ER - TY - JOUR T1 - Building an Experience Base for Software Engineering: A report on the first CeBASE eWorkshop JF - Product Focused Software Process Improvement Y1 - 2001 A1 - Basili, Victor R. A1 - Tesoriero,R. A1 - Costa,P. A1 - Lindvall,M. A1 - Rus,I. A1 - Shull, F. A1 - Zelkowitz, Marvin V AB - New information is obtained by research and disseminated by papers in conferences and journals. The synthesis of knowledge depends upon social discourse among the experts in a given domain to discuss the impact of this new information. Meetings among such experts are, however, expensive and time consuming. In this paper we discuss the organization of CeBASE, a center whose goal is the collection and dissemination of empirically-based software engineering knowledge, and the concept of the online workshop or eWorkshop as a way to use the Internet to minimize the needs of face-to-face meetings. We discuss the design of our eWorkshop and give the results of one eWorkshop that discussed the impact of defect reduction strategies.We want to thank Barry Boehm, Scott Henninger, Rayford Vaughn, Winsor Brown, Dan Port and Michael Frey as well as all participants for their contribution to the success of the eWorkshop. We also want to thank students at USC and UMD for their contribution in testing the system and Jennifer Dix for proof reading this paper. M3 - 10.1007/3-540-44813-6_13 ER - TY - JOUR T1 - COTS-based systems top 10 list JF - Computer Y1 - 2001 A1 - Basili, Victor R. A1 - Boehm,B. KW - activity;hypotheses;independently KW - capability;personnel KW - challenges;software KW - code KW - COTS-based KW - defect KW - delivery;glue KW - developed KW - development KW - development;high-risk KW - effort;products KW - effort;software KW - efforts;unused KW - experience;post-deployment KW - features;software KW - instructions;costs;development KW - integration;schedule KW - management;software KW - off-the KW - overruns;software KW - packages;software KW - productivity;early KW - products;personnel KW - quality; KW - reduction;software KW - releases;system KW - shelf KW - support;commercial KW - systems;active KW - systems;computer KW - vendor AB - Presents a COTS-based system (CBS) software defect-reduction list as hypotheses, rather than results, that also serve as software challenges for enhancing our empirical understanding of CBSs. The hypotheses are: (1) more than 99% of all executing computer instructions come from COTS products (each instruction passed a market test for value); (2) more than half the features in large COTS software products go unused; (3) the average COTS software product undergoes a new release every 8-9 months, with active vendor support for only its latest three releases; (4) CBS development and post-deployment efforts can scale as high as the square of the number of independently developed COTS products targeted for integration; (5) CBS post-deployment costs exceed CBS development costs; (6) although glue-code development usually accounts for less than half the total CBS software development effort, the effort per line of glue code averages about three times the effort per line of developed applications code; (7) non-development costs, such as licensing fees, are significant, and projects must plan for and optimize them; (8) CBS assessment and tailoring efforts vary significantly by COTS product class (operating system, database management system, user interface, device driver, etc.); (9) personnel capability and experience remain the dominant factors influencing CBS development productivity; and (10) CBS is currently a high-risk activity, with effort and schedule overruns exceeding non-CBS software overruns, yet many systems have used COTS successfully for cost reduction and early delivery VL - 34 SN - 0018-9162 CP - 5 M3 - 10.1109/2.920618 ER - TY - JOUR T1 - The Design of TerraDir JF - Technical Reports from UMIACS, UMIACS-TR-2001-4299 Y1 - 2001 A1 - Bhattacharjee, Bobby A1 - Keleher,Pete A1 - Silaghi,Bujor KW - Technical Report AB - We present the design and initial evaluation of TerraDir: an approach forimplementing customizable, distributed, peer-to-peer directories over which a broad range of wide-area resource discovery applications can be implemented. TerraDir's structure is two-tiered, consisting of a base protocol for providing arbitrary application-layer connectivity, and dynamic view materializations that efficiently realize different user-specified views of application-layer resources. TerraDir is specifically designed for data that can be arranged in a rooted hierarchy, and provides very efficient and robust lookups over such data while still being able to allow efficient searching. (Also referenced as UMIACS-TR-2001-4299) UR - http://drum.lib.umd.edu/handle/1903/1161 ER - TY - JOUR T1 - Designing an Interactive Message Board as a Technology Probe for Family Communication JF - Technical Reports of the Computer Science Department Y1 - 2001 A1 - Browne,Hilary A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine A1 - Druin, Allison KW - Technical Report AB - In this paper, we describe the design issues and technical implementation of aninteractive Family Message Board. The Family Message Board enables members of a distributed family to communicate with one another both synchronously and asynchronously via simple, pen-based, digital notes. Each household running thi$ Java-based software can view, create, and manipulate notes in a zoomable space. The Family Message Board will be used as a technology probe to help us unders$ the communication needs of distributed families, and to help us design new devi$ to meet those needs. UR - http://drum.lib.umd.edu/handle/1903/526 ER - TY - JOUR T1 - Distributed processing of very large datasets with DataCutter JF - Parallel Computing Y1 - 2001 A1 - Beynon,Michael D. A1 - Kurc,Tahsin A1 - Catalyurek,Umit A1 - Chang,Chialin A1 - Sussman, Alan A1 - Saltz,Joel KW - Component architectures KW - Data analysis KW - Distributed computing KW - Multi-dimensional datasets KW - Runtime systems AB - We describe a framework, called DataCutter, that is designed to provide support for subsetting and processing of datasets in a distributed and heterogeneous environment. We illustrate the use of DataCutter with several data-intensive applications from diverse fields, and present experimental results. VL - 27 SN - 0167-8191 UR - http://www.sciencedirect.com/science/article/pii/S0167819101000990 CP - 11 M3 - 10.1016/S0167-8191(01)00099-0 ER - TY - JOUR T1 - Editorial: Open source and empirical software engineering JF - Empirical Software Engineering Y1 - 2001 A1 - Basili, Victor R. VL - 6 CP - 3 ER - TY - CONF T1 - Efficient Model Checking Via Buchi Tableau Automata⋆ T2 - Computer aided verification: 13th International conference, CAV 2001, Paris, France, July 18-22, 2001: proceedings Y1 - 2001 A1 - Bhat,G. S A1 - Cleaveland, Rance A1 - Groce,A. JA - Computer aided verification: 13th International conference, CAV 2001, Paris, France, July 18-22, 2001: proceedings VL - 2102 ER - TY - CONF T1 - Efficient perspective-accurate silhouette computation and applications T2 - Proceedings of the seventeenth annual symposium on Computational geometry Y1 - 2001 A1 - Pop, Mihai A1 - Duncan,Christian A1 - Barequet,Gill A1 - Goodrich,Michael A1 - Huang,Wenjing A1 - Kumar,Subodh KW - rendering KW - silhouette KW - simplification AB - Silhouettes are perceptually and geometrically salient features of geo metric models. Hence a number of graphics and visualization applications need to find them to aid further processing. The efficient computation of silhouettes, especially in the context of perspective projection, is known to be difficult. This paper presents a novel efficient and practical algorithm to compute silhouettes from a sequence of viewpoints under perspective projection. Parallel projection is a special case of this algorithm. Our approach is based on a point-plane duality in three dimensions, which allows an efficient computation of the \emph{changes} in the silhouette of a polygonal model between consecutive frames. In addition, we present several applications of our technique to problems from computer graphics and medical visualization. We also provide experimental data that show the efficiency of our approach. million vertices on an SGI Onyx workstation. JA - Proceedings of the seventeenth annual symposium on Computational geometry T3 - SCG '01 PB - ACM CY - New York, NY, USA SN - 1-58113-357-X UR - http://doi.acm.org/10.1145/378583.378618 M3 - 10.1145/378583.378618 ER - TY - CONF T1 - An efficient system for multi-perspective imaging and volumetric shape analysis T2 - Proceedings of the 2001 Workshop on Parallel and Distributed Computing in Imaging Processing, Video Processing, and Multimedia Y1 - 2001 A1 - Borovikov,E. A1 - Sussman, Alan A1 - Davis, Larry S. JA - Proceedings of the 2001 Workshop on Parallel and Distributed Computing in Imaging Processing, Video Processing, and Multimedia ER - TY - CONF T1 - An experience management system for a software engineering research organization T2 - Software Engineering Workshop, 2001. Proceedings. 26th Annual NASA Goddard Y1 - 2001 A1 - Basili, Victor R. A1 - Costa,P. A1 - Lindvall,M. A1 - Mendonca,M. A1 - Seaman,C. A1 - Tesoriero,R. A1 - Zelkowitz, Marvin V KW - and KW - approach;knowledge KW - base;experience KW - Center KW - control;knowledge KW - data KW - development KW - dust-to-pearls KW - engineering KW - Engineering;business KW - engineering;software KW - experimental KW - for KW - Fraunhofer KW - houses; KW - knowledge;employee KW - knowledge;experience KW - level KW - maintenance;knowledge KW - management KW - management;knowledge KW - management;software KW - mechanisms;software KW - organization;software KW - organizational KW - organizations;administrative KW - organizations;knowledge KW - organizations;low-barrier KW - ownership;knowledge-intensive KW - processing;personnel;research KW - research KW - software KW - system;human-intensive AB - Most businesses rely on the fact that their employees possess relevant knowledge and that they can apply it to the task at hand. The problem is that this knowledge is not owned by the organization. It is owned and controlled by its employees. Maintaining an appropriate level of knowledge in the organization is a very important issue. It is, however, not an easy task for most organizations, and it is particularly problematic for software organizations, which are human- and knowledge-intensive. Knowledge management is a relatively new area that has attempted to address these problems. This paper introduces an approach called the "knowledge dust-to-pearls" approach. This approach addresses some of the issues with knowledge management by providing low-barrier mechanisms to "jump start" the experience base. This approach allows the experience base to become more useful more quickly than traditional approaches. This paper describes the approach and gives an example of its use at the Fraunhofer Center for Experimental Software Engineering, Maryland, USA JA - Software Engineering Workshop, 2001. Proceedings. 26th Annual NASA Goddard M3 - 10.1109/SEW.2001.992652 ER - TY - CHAP T1 - Experimental Analysis of Algorithms for Bilateral-Contract Clearing Mechanisms Arising in Deregulated Power Industry T2 - Algorithm EngineeringAlgorithm Engineering Y1 - 2001 A1 - Barrett,Chris A1 - Cook,Doug A1 - Hicks,Gregory A1 - Faber,Vance A1 - Marathe,Achla A1 - Marathe,Madhav A1 - Srinivasan, Aravind A1 - Sussmann,Yoram A1 - Thornquist,Heidi ED - Brodal,Gerth ED - Frigioni,Daniele ED - Marchetti-Spaccamela,Alberto AB - We consider the bilateral contract satisfaction problem arising from electrical power networks due to the proposed deregulation of the electric utility industry in the USA. Given a network and a (multi)set of pairs of vertices (contracts) with associated demands, the goal is to find the maximum number of simultaneously satisfiable contracts. We study how four different algorithms perform in fairly realistic settings; we use an approximate electrical power network from Colorado. Our experiments show that three heuristics outperform a theoretically better algorithm. We also test the algorithms on four types of scenarios that are likely to occur in a deregulated marketplace. Our results show that the networks that are adequate in a regulated marketplace might be inadequate for satisfying all the bilateral contracts in a deregulated industry. JA - Algorithm EngineeringAlgorithm Engineering T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 2141 SN - 978-3-540-42500-7 UR - http://dx.doi.org/10.1007/3-540-44688-5_14 ER - TY - CHAP T1 - Eyes from Eyes T2 - 3D Structure from Images — SMILE 20003D Structure from Images — SMILE 2000 Y1 - 2001 A1 - Baker,Patrick A1 - Pless,Robert A1 - Fermüller, Cornelia A1 - Aloimonos, J. ED - Pollefeys,Marc ED - Van Gool,Luc ED - Zisserman,Andrew ED - Fitzgibbon,Andrew AB - We describe a family of new imaging systems, called Argus eyes, that consist of common video cameras arranged in some network. The system we built consists of six cameras arranged so that they sample different parts of the visual sphere. This system has the capability of very accurately estimating its own 3D motion and consequently estimating shape models from the individual videos. The reason is that inherent ambiguities of confusion between translation and rotation disappear in this case. We provide an algorithm and several experiments using real outdoor or indoor images demonstrating the superiority of the new sensor with regard to 3D motion estimation. JA - 3D Structure from Images — SMILE 20003D Structure from Images — SMILE 2000 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 2018 SN - 978-3-540-41845-0 UR - http://dx.doi.org/10.1007/3-540-45296-6_14 ER - TY - CONF T1 - Finding close friends on the Internet T2 - Network Protocols, 2001. Ninth International Conference on Y1 - 2001 A1 - Kommareddy,C. A1 - Shankar,N. A1 - Bhattacharjee, Bobby KW - application-layer; KW - application-peers; KW - Beaconing; KW - beacons; KW - close KW - distance KW - Expanding KW - friends; KW - Internet-like KW - Internet; KW - IP; KW - measurement KW - nearby KW - network KW - peer-location KW - points; KW - protocols; KW - Ring KW - searches; KW - service; KW - solutions; KW - testbed; KW - topologies; KW - topology; KW - transport KW - Triangulation; KW - unicast-only KW - wide-area AB - We consider the problem of finding nearby application-peers (close friends) over the Internet. We focus on unicast-only solutions and introduce a new scheme -Beaconing-for finding peers that are near. Our scheme uses distance measurement points (called beacons) and can be implemented entirely in the application-layer without investing in large infrastructure changes. We present an extensive evaluation of Beaconing and compare it to existing schemes including Expanding Ring searches and Triangulation. Our experiments show that 3-8 beacons are sufficient to provide efficient peer-location service on 10 000 node Internet-like topologies. Further, our results are 2-5 times more accurate than existing techniques. We also present results from an implementation of Beaconing over a non-trivial wide-area testbed. In our experiments, Beaconing is able to efficiently (< 3 K Bytes and < 50 packets on average), quickly (< 1 second on average), and accurately (< 20 ms error on average) find nearby peers on the Internet. JA - Network Protocols, 2001. Ninth International Conference on M3 - 10.1109/ICNP.2001.992910 ER - TY - CONF T1 - Handling uncertainty with active logic T2 - In Proceedings, AAAI Fall Symposium on Uncertainty in Computation Y1 - 2001 A1 - Bhatia,M. A1 - Chi,P. A1 - Chong,W. A1 - Josyula,D. P A1 - Okamoto,Y. A1 - Perlis, Don A1 - Purang,K. JA - In Proceedings, AAAI Fall Symposium on Uncertainty in Computation ER - TY - CONF T1 - Hybrid global/local search strategies for dynamic voltage scaling in embedded multiprocessors T2 - Hardware/Software Codesign, 2001. CODES 2001. Proceedings of the Ninth International Symposium on Y1 - 2001 A1 - Bambha,N. K A1 - Bhattacharyya, Shuvra S. A1 - Teich,J. A1 - Zitzler,E. JA - Hardware/Software Codesign, 2001. CODES 2001. Proceedings of the Ninth International Symposium on ER - TY - CONF T1 - Implementing the Experience Factory concepts as a set of Experience Bases T2 - Proc. 13th Int’l Conf. Software Eng. and Knowledge Eng Y1 - 2001 A1 - Basili, Victor R. A1 - Lindvall,M. A1 - Costa,P. AB - This talk takes the Experience Factory concept, which was originally developed as organizational support for softwaredevelopment and generalizes it to organizational support for any aspect of a business, e.g., business practices. The Experience Factory supports the evolution of processes and other forms of knowledge, based upon experiences within the organization, and related knowledge gathered from outside the organization. It then discusses how you might design an appropriate experience base for the particular set of organizational needs determined to be of importance. Specific examples are given in developing experience bases for specific organizations and it discusses the Experience Management System (EMS) currently being evolved and how it has been applied. JA - Proc. 13th Int’l Conf. Software Eng. and Knowledge Eng ER - TY - RPRT T1 - Integrated Microelectromechanical System (MEMS) Inertial Measurement Unit (IMIMU) Y1 - 2001 A1 - Fedder,Gary K. A1 - Blanton,Shawn A1 - Carley,L. R. A1 - Gupta, Satyandra K. A1 - Koester,David KW - *ELECTROMECHANICAL DEVICES KW - *GYROSCOPES KW - *INERTIAL MEASUREMENT UNITS KW - *INERTIAL NAVIGATION KW - *MICROELECTROMECHANICAL SYSTEMS KW - ACCELEROMETERS KW - BULK MATERIALS KW - CHIPS(ELECTRONICS) KW - CIRCUITS KW - CLOSED LOOP SYSTEMS KW - CORIOLIS EFFECT KW - Detectors KW - DIELECTRICS KW - ELECTRICAL AND ELECTRONIC EQUIPMENT KW - EMBEDDING KW - METALS KW - MICROSENSORS. KW - MICROSTRUCTURE KW - MONOLITHIC STRUCTURES(ELECTRONICS) KW - NAVIGATION AND GUIDANCE KW - PARASITES KW - PE63739E KW - PERFORMANCE(ENGINEERING) KW - POLYSILICONS KW - RESISTORS KW - SILICON KW - TEMPERATURE SENSITIVE ELEMENTS KW - THERMAL STABILITY KW - THIN FILMS KW - tools KW - Topology KW - WUAFRLE1170030 AB - Processes, designs and design tools are developed to enable the monolithic integration of arrays of inertial microsensors with electronics. Accelerometers and gyroscopes, fabricated in a single CMOS process, are functional and demonstrate a single chip IMU. Two integrated post CMOS micro-machining processes are demonstrated. Thin-film microstructures are defined from the metal-dielectric stack of a conventional process. In the second process, a back-side silicon etch, followed by front-side DRIE produces bulk silicon microstructures. Accelerometer and gyroscope designs are developed with accompanying low noise electronic circuitry. Noise performance was limited to 1/f circuit noise. The chip output sensibility is set by the interface circuit design. A thermally stabilized accelerometer and circuit design is demonstrated using embedded polysilicon resistors as temperature sensors and heaters in a closed loop. Nested gyroscope topologies are demonstrated with a lateral MEMS accelerometer used as a coriolis acceleration sensor. Modeling and simulation tools that simultaneously consider the electromechanical transducer and the electronic circuit to predict system performance are developed. Electrical, electromechanical and mechanical parasitics required to enable predictive lumped parameter simulation are identified and can be extracted, enabling a designer to confidently estimate design performance prior to fabrication. Generic physics-based fault models for surface-micromachined actuators and sensors are developed that enable effective testing, diagnosis and design for manufacturability. PB - CARNEGIE-MELLON UNIVERSITY UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA399565 ER - TY - JOUR T1 - On the interactions between layered quality adaptation and congestion control for streaming video JF - 11th International Packet Video Workshop Y1 - 2001 A1 - Feamster, Nick A1 - Bansal,D. A1 - Balakrishnan,H. AB - This paper uses analysis and experiments to study the impact of var-ious congestion control algorithms and receiver buffering strategies on the performance of streaming media delivery. While traditional congestion avoidance schemes such as TCP’s additive-increase/- multiplicativedecrease (AIMD) achieve high utilization, they also cause large oscillations in transmission rates that degrade the smooth- ness and perceptual quality of the video stream. We focus on un- derstanding the interactions of a family of congestion control al- gorithms that generalize AIMD, with buffer-based quality adapta- tion algorithms for hierarchically-encoded and simulcast video. Our work builds on and extends the results of Rejaie et al. [19]; we find that the combination of a non-AIMD algorithm that has smaller os- cillations than AIMD and a suitable receiver buffer allocation and management strategy provides a good combination of low playout delay and TCP-friendly congestion control. The paper describes these mechanisms and the results of experiments conducted using a prototype video server for MPEG-4 video, showing that our ap- proach can improve the interactivity and adaptivity of Internet video. ER - TY - CHAP T1 - Interpretation of Compound Nominals Using WordNet T2 - Computational Linguistics and Intelligent Text ProcessingComputational Linguistics and Intelligent Text Processing Y1 - 2001 A1 - Barrett,Leslie A1 - Davis,Anthony A1 - Dorr, Bonnie J ED - Gelbukh,Alexander AB - We describe an approach to interpreting noun-noun compounds within a question answering system. The system’s lexicon, based on WordNet, provides the basis for heuristics that group noun-noun compounds with seman- tically similar words. The semantic relationship between the nouns in a com- pound is determined by the choice of heuristic for the compound. We discuss procedures for selecting one heuristic in cases where several can apply to a compound, the effects of lexical ambiguity, and some initial results of our methods. JA - Computational Linguistics and Intelligent Text ProcessingComputational Linguistics and Intelligent Text Processing T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 2004 SN - 978-3-540-41687-6 UR - http://dx.doi.org/10.1007/3-540-44686-9_17 ER - TY - JOUR T1 - Judging whether multiple silhouettes can come from the same object JF - Visual Form 2001 Y1 - 2001 A1 - Jacobs, David W. A1 - Belhumeur,P. A1 - Jermyn,I. AB - We consider the problem of recognizing an object from its silhouette. We focus on the case in which the camera translates, and rotates about a known axis parallel to the image, such as when a mobile robot explores an environment. In this case we present an algorithm for determining whether a new silhouette could come from the same object that produced two previously seen silhouettes. In a basic case, when cross-sections of each silhouette are single line segments, we can check for consistency between three silhouettes using linear programming. This provides the basis for methods that handle more complex cases. We show many experiments that demonstrate the performance of these methods when there is noise, some deviation from the assumptions of the algorithms, and partial occlusion. Previous work has addressed the problem of precisely reconstructing an object using many silhouettes taken under controlled conditions. Our work shows that recognition can be performed without complete reconstruction, so that a small number of images can be used, with viewpoints that are only partly constrained. M3 - 10.1007/3-540-45129-3_49 ER - TY - CONF T1 - Lambertian reflectance and linear subspaces T2 - Computer Vision, 2001. ICCV 2001. Proceedings. Eighth IEEE International Conference on Y1 - 2001 A1 - Basri,R. A1 - Jacobs, David W. KW - functions;spherical KW - harmonics;convex KW - Lambertian KW - lighting;object KW - object;convex KW - objects;convex KW - optimization;isotropic KW - programming;object KW - recognition; KW - recognition;reflectance AB - We prove that the set of all reflectance functions (the mapping from surface normals to intensities) produced by Lambertian objects under distant, isotropic lighting lies close to a 9D linear subspace. This implies that the images of a convex Lambertian object obtained under a wide variety of lighting conditions can be approximated accurately with a low-dimensional linear subspace, explaining prior empirical results. We also provide a simple analytic characterization of this linear space. We obtain these results by representing lighting using spherical harmonics and describing the effects of Lambertian materials as the analog of a convolution. These results allow us to construct algorithms for object recognition based on linear methods as well as algorithms that use convex optimization to enforce non-negative lighting functions JA - Computer Vision, 2001. ICCV 2001. Proceedings. Eighth IEEE International Conference on VL - 2 M3 - 10.1109/ICCV.2001.937651 ER - TY - CONF T1 - Learning word pronunciations using a recurrent neural network T2 - Neural Networks, 2001. Proceedings. IJCNN'01. International Joint Conference on Y1 - 2001 A1 - Radio,M. J A1 - Reggia, James A. A1 - Berndt,R. S JA - Neural Networks, 2001. Proceedings. IJCNN'01. International Joint Conference on VL - 1 ER - TY - JOUR T1 - Multiprocessor clustering for embedded systems JF - Euro-Par 2001 Parallel Processing Y1 - 2001 A1 - Kianzad,V. A1 - Bhattacharyya, Shuvra S. ER - TY - JOUR T1 - Optimal collective dichotomous choice under partial order constraints JF - Mathematical Social Sciences Y1 - 2001 A1 - Ben-Yashar,Ruth A1 - Khuller, Samir A1 - Kraus,Sarit KW - constraints KW - Information filtering KW - Optimal collective dichotomous choice AB - This paper generalizes optimal collective dichotomous choices by including constraints which limit combinations of acceptance and rejection decisions for m projects under consideration. Two types of constraints are examined. The first type occurs when acceptance of some projects requires acceptance of others. This type reduces the choice problem to the tractable (solvable in polynomial time) problem of finding a maximum weight closed subset of a directed acyclic graph. The second type occurs when some projects must be accepted when certain others are rejected. We show that this type renders the choice problem to be NP-complete by reduction from the problem of Vertex Cover. Applicability of the generalization to information filtering is discussed. VL - 41 SN - 0165-4896 UR - http://www.sciencedirect.com/science/article/pii/S016548960000069X CP - 3 M3 - 10.1016/S0165-4896(00)00069-X ER - TY - JOUR T1 - Parameterized dataflow modeling for DSP systems JF - Signal Processing, IEEE Transactions on Y1 - 2001 A1 - Bhattacharya,B. A1 - Bhattacharyya, Shuvra S. VL - 49 CP - 10 ER - TY - CONF T1 - Performance optimization for data intensive grid applications T2 - Active Middleware Services, 2001. Third Annual International Workshop on Y1 - 2001 A1 - Beynon,M. D A1 - Sussman, Alan A1 - Catalyurek,U. A1 - Kurc, T. A1 - Saltz, J. JA - Active Middleware Services, 2001. Third Annual International Workshop on ER - TY - JOUR T1 - Projective alignment with regions JF - Pattern Analysis and Machine Intelligence, IEEE Transactions on Y1 - 2001 A1 - Basri,R. A1 - Jacobs, David W. KW - algebra;object KW - alignment;projective KW - approach;segmentation KW - errors;image KW - fixed KW - objects;pose KW - occlusion;planar KW - patterns;partial KW - points;flow KW - recognition; KW - recovery;projective KW - segmentation;matrix KW - transformations;region-based AB - We have previously proposed (Basri and Jacobs, 1999, and Jacobs and Basri, 1999) an approach to recognition that uses regions to determine the pose of objects while allowing for partial occlusion of the regions. Regions introduce an attractive alternative to existing global and local approaches, since, unlike global features, they can handle occlusion and segmentation errors, and unlike local features they are not as sensitive to sensor errors, and they are easier to match. The region-based approach also uses image information directly, without the construction of intermediate representations, such as algebraic descriptions, which may be difficult to reliably compute. We further analyze properties of the method for planar objects undergoing projective transformations. In particular, we prove that three visible regions are sufficient to determine the transformation uniquely and that for a large class of objects, two regions are insufficient for this purpose. However, we show that when several regions are available, the pose of the object can generally be recovered even when some or all regions are significantly occluded. Our analysis is based on investigating the flow patterns of points under projective transformations in the presence of fixed points VL - 23 SN - 0162-8828 CP - 5 M3 - 10.1109/34.922709 ER - TY - CONF T1 - A prototype experience management system for a software consulting organization T2 - Thirteenth International Conference on Software Engineering and Knowledge Engineering Y1 - 2001 A1 - Mendonça Neto,M. G. A1 - Seaman,C. A1 - Basili, Victor R. A1 - Kim,Y. M AB - The Experience Management System (EMS) is aimed atsupporting the capture and reuse of software-related experience, based on the Experience Factory concept. It is being developed for use in a multinational software engineering consultancy, Q-Labs. Currently, a prototype EMS exists and has been evaluated. This paper focuses on the EMS architecture, underlying data model, implementation, and user interface. JA - Thirteenth International Conference on Software Engineering and Knowledge Engineering ER - TY - PAT T1 - Rotation, scale, and translation resilient public watermarking for images using a log-polar fourier transform Y1 - 2001 A1 - Bloom,Jeffrey A. A1 - Cox,Ingemar J. A1 - Miller,Matthew L. A1 - M. Wu A1 - Lin,Ching-Yung A1 - Lui,Yui Man ED - Signafy, Inc. AB - A method for detecting a watermark signal in digital image data. The detecting method includes the steps of: computing a log-polar Fourier transform of the image data to obtain a log-polar Fourier spectrum; projecting the log-polar Fourier spectrum down to a lower dimensional space to obtain an extracted signal; comparing the extracted signal to a target watermark signal; and declaring the presence or absence of the target watermark signal in the image data based on the comparison. Also provided is a method for inserting a watermark signal in digital image data to obtain a watermarked image. The inserting method includes the steps of: computing a log-polar Fourier transform of the image data to obtain a log-polar Fourier spectrum; projecting the log-polar Fourier spectrum down to a lower dimensional space to obtain an extracted signal; modifying the extracted signal such that it is similar to a target watermark; performing a one-to-many mapping of the modified signal back to... UR - http://www.google.com/patents?id=v4AIAAAAEBAJ CP - 6282300 ER - TY - JOUR T1 - Rotation, scale, and translation resilient watermarking for images JF - Image Processing, IEEE Transactions on Y1 - 2001 A1 - Lin,C.-Y. A1 - Wu,M. A1 - Bloom,J.A. A1 - Cox,I.J. A1 - Miller,M.L. A1 - Lui,Y.M. KW - axis;one-dimensional KW - coding;security KW - coefficient;cropping;cyclical KW - compression;RST KW - coordinates;log-radius KW - data; KW - detection;correlation KW - distortions;blind KW - distortions;images;log-polar KW - encapsulation;image KW - Fourier KW - images;translation KW - magnitudes;Fourier KW - measure;geometric KW - of KW - protection;data KW - resilient KW - shift;detection KW - signal;public KW - transform;JPEG KW - transforms;copy KW - watermark;resampling;rotation;scale;search;still KW - watermarking;video;Fourier AB - Many electronic watermarks for still images and video content are sensitive to geometric distortions. For example, simple rotation, scaling, and/or translation (RST) of an image can prevent blind detection of a public watermark. In this paper, we propose a watermarking algorithm that is robust to RST distortions. The watermark is embedded into a one-dimensional (1-D) signal obtained by taking the Fourier transform of the image, resampling the Fourier magnitudes into log-polar coordinates, and then summing a function of those magnitudes along the log-radius axis. Rotation of the image results in a cyclical shift of the extracted signal. Scaling of the image results in amplification of the extracted signal, and translation of the image has no effect on the extracted signal. We can therefore compensate for rotation with a simple search, and compensate for scaling by using the correlation coefficient as the detection measure. False positive results on a database of 10 000 images are reported. Robustness results on a database of 2000 images are described. It is shown that the watermark is robust to rotation, scale, and translation. In addition, we describe tests examining the watermarks resistance to cropping and JPEG compression VL - 10 SN - 1057-7149 CP - 5 M3 - 10.1109/83.918569 ER - TY - JOUR T1 - Software Defect Reduction Top 10 List JF - Computer Y1 - 2001 A1 - Boehm,Barry A1 - Basili, Victor R. AB - Software's complexity and accelerated development schedules make avoiding defects difficult. These 10 techniques can help reduce the flaws in your code. VL - 34 SN - 0018-9162 UR - http://dx.doi.org/10.1109/2.962984 CP - 1 M3 - 10.1109/2.962984 ER - TY - CONF T1 - A spherical eye from multiple cameras (makes better models of the world) T2 - Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2001. CVPR 2001 Y1 - 2001 A1 - Baker, P. A1 - Fermüller, Cornelia A1 - Aloimonos, J. A1 - Pless, R. KW - 3D motion estimation KW - Calibration KW - camera network KW - CAMERAS KW - Computer vision KW - egomotion recovery KW - geometric configuration KW - geometric constraint KW - image gradients KW - image sampling KW - imaging system KW - Laboratories KW - Layout KW - Motion estimation KW - multiple cameras KW - Pixel KW - Robot vision systems KW - SHAPE KW - shape models KW - Space technology KW - spherical eye KW - system calibration KW - video KW - video cameras KW - video signal processing KW - visual sphere sampling AB - The paper describes an imaging system that has been designed specifically for the purpose of recovering egomotion and structure from video. The system consists of six cameras in a network arranged so that they sample different parts of the visual sphere. This geometric configuration has provable advantages compared to small field of view cameras for the estimation of the system's own motion and consequently the estimation of shape models from the individual cameras. The reason is that inherent ambiguities of confusion between translation and rotation disappear. We provide algorithms for the calibration of the system and 3D motion estimation. The calibration is based on a new geometric constraint that relates the images of lines parallel in space to the rotation between the cameras. The 3D motion estimation uses a constraint relating structure directly to image gradients. JA - Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2001. CVPR 2001 PB - IEEE VL - 1 SN - 0-7695-1272-0 M3 - 10.1109/CVPR.2001.990525 ER - TY - CONF T1 - Statistical Analysis in Music Information Retrieval T2 - Proceedings of the Second Annual International Symposium on Music Information Retrieval ISMIR 2001 Y1 - 2001 A1 - Rand, William A1 - Birmingham,William P. AB - We introduce a statistical model of music that allows for the retrieval of music based upon an audio input. This model uses frequency counts of state transitions to index pieces of music. Several methods of comparing these index values to choose an appropriate match are examined. We describe how this model can serve as the basis for a query-by-humming system. The model is also shown to be robust to several kinds of errors. JA - Proceedings of the Second Annual International Symposium on Music Information Retrieval ISMIR 2001 VL - 25--26 ER - TY - CONF T1 - Towards the ultimate motion capture technology T2 - Deformable avatars: IFIP TC5/WG5. 10 DEFORM'2000 Workshop, November 29-30, 2000, Geneva, Switzerland and AVATARS'2000 Workshop, November 30-December 1, 2000, Lausanne, Switzerland Y1 - 2001 A1 - Stuart, B. A1 - Baker, P. A1 - Aloimonos, J. JA - Deformable avatars: IFIP TC5/WG5. 10 DEFORM'2000 Workshop, November 29-30, 2000, Geneva, Switzerland and AVATARS'2000 Workshop, November 30-December 1, 2000, Lausanne, Switzerland VL - 68 ER - TY - CONF T1 - A trend analysis of exploitations T2 - 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings Y1 - 2001 A1 - Browne,H. K A1 - Arbaugh, William A. A1 - McHugh,J. A1 - Fithen,W. L KW - Computer science KW - computer security exploits KW - Data analysis KW - data mining KW - Educational institutions KW - exploitations KW - Performance analysis KW - Predictive models KW - Regression analysis KW - Risk management KW - security of data KW - software engineering KW - system intrusions KW - System software KW - trend analysis KW - vulnerabilities KW - vulnerability exploitation AB - We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the exploit are reported to CERT can be modeled using a common mathematical framework. Data associated with three significant exploits involving vulnerabilities in phf, imap, and bind can all be modeled using the formula C=I+S×√M where C is the cumulative count of reported incidents, M is the time since the start of the exploit cycle, and I and S are the regression coefficients determined by analysis of the incident report data. Further analysis of two additional exploits involving vulnerabilities in mountd and statd confirm the model. We believe that the models will aid in predicting the severity of subsequent vulnerability exploitations, based on the rate of early incident reports JA - 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings PB - IEEE SN - 0-7695-1046-9 M3 - 10.1109/SECPRI.2001.924300 ER - TY - CONF T1 - Validating an access cost model for wide area applications T2 - Cooperative Information Systems Y1 - 2001 A1 - Zadorozhny,V. A1 - Raschid, Louiqa A1 - Zhan,T. A1 - Bright,L. JA - Cooperative Information Systems ER - TY - CONF T1 - VEHICLE SPEED INFORMATION DISPLAYS FOR PUBLIC WEBSITES: A STUDY OF USER PREFERENCES T2 - ITS 2001: Conference Proceedings Y1 - 2001 A1 - Plaisant, Catherine A1 - Bhamidipati,P. A1 - Tarnoff,P. JA - ITS 2001: Conference Proceedings ER - TY - JOUR T1 - Active source location and beamforming JF - The Journal of the Acoustical Society of America Y1 - 2000 A1 - Duraiswami, Ramani A1 - Zotkin,Dmitry N A1 - Borovikov,Eugene A. A1 - Davis, Larry S. VL - 107 SN - 00014966 UR - http://asadl.org/jasa/resource/1/jasman/v107/i5/p2790_s4 M3 - 10.1121/1.428978 ER - TY - JOUR T1 - An API for Runtime Code Patching JF - International Journal of High Performance Computing Applications Y1 - 2000 A1 - Buck, Bryan A1 - Hollingsworth, Jeffrey K AB - The authors present a postcompiler program manipulation tool called Dyninst, which provides a C++ class library for program instrumentation. Using this library, it is possible to instrument and modify application programs during execution. A unique feature of this library is that it permits machine-independent binary instrumentation programs to be written. The authors describe the interface that a tool sees when using this library. They also discuss three simple tools built using this interface: a utility to count the number of times a function is called, a program to capture the output of an already running program to a file, and an implementation of conditional breakpoints. For the conditional breakpoint example, the authors show that by using their interface compared with gdb, they are able to execute a program with conditional breakpoints up to 900 times faster. VL - 14 UR - http://hpc.sagepub.com/content/14/4/317.abstract CP - 4 M3 - 10.1177/109434200001400404 ER - TY - JOUR T1 - Approximating low-congestion routing and column-restricted packing problems JF - Information Processing Letters Y1 - 2000 A1 - Baveja,Alok A1 - Srinivasan, Aravind KW - algorithms KW - Approximation algorithms KW - integer programming KW - Packing KW - Routing AB - We contribute to a body of research asserting that the fractional and integral optima of column-sparse integer programs are “nearby”. This yields improved approximation algorithms for some generalizations of the knapsack problem, with applications to low-congestion routing in networks, file replication in distributed databases, and other packing problems. VL - 74 SN - 0020-0190 UR - http://www.sciencedirect.com/science/article/pii/S0020019000000338 CP - 1–2 M3 - 10.1016/S0020-0190(00)00033-8 ER - TY - JOUR T1 - Approximation Algorithms for Disjoint Paths and Related Routing and Packing Problems JF - Mathematics of Operations ResearchMathematics of Operations Research Y1 - 2000 A1 - Baveja,Alok A1 - Srinivasan, Aravind KW - Approximation algorithms KW - Disjoint paths KW - integer programming KW - Linear programming KW - multicommodity flow KW - Packing KW - randomized algorithms KW - rounding KW - Routing KW - unsplittable flow AB - Given a network and a set of connection requests on it, we consider the maximum edge-disjoint paths and related generalizations and routing problems that arise in assigning paths for these requests. We present improved approximation algorithms and/or integrality gaps for all problems considered; the central theme of this work is the underlying multicommodity flow relaxation. Applications of these techniques to approximating families of packing integer programs are also presented. VL - 25 SN - 0364-765X, 1526-5471 UR - http://mor.journal.informs.org/content/25/2/255 CP - 2 M3 - 10.1287/moor.25.2.255.12228 ER - TY - CONF T1 - Comparative Evaluation of a Natural Language Dialog Based System and a Menu-Driven System for Information Access: A Case Study T2 - In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000) Y1 - 2000 A1 - Chai,J. A1 - Jimmy Lin A1 - Zadrozny,W. A1 - Ye,Y. A1 - Budzikowska,M. A1 - Horvath,V. A1 - Kambhatla,N. A1 - Wolf,C. AB - This paper describes the evaluation of a natural language dialog based navigation system (HappyAssistant) thathelps users access e-commerce sites to find relevant information about products and services. The prototype system leverages technologies in natural language processing and human computer interaction to create a faster and more intuitive way of interacting with websites, especially for the less experienced users. The result of a comparative study shows that users prefer the natural language enabled navigation two to one over the menu driven navigation. In addition, the study confirmed the efficiency of using natural language dialog in terms of the number of clicks and the amount of time required to obtain the relevant information. In the case study, comparing to the menu driven system, the average number of clicks used in the natural language system was reduced by 63.2% and the average time was reduced by 33.3%. JA - In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000) ER - TY - JOUR T1 - Convexity in Perceptual Completion JF - KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE Y1 - 2000 A1 - Liu,Z. A1 - Jacobs, David W. A1 - Basri,R. ER - TY - CONF T1 - DataCutter: Middleware for filtering very large scientific datasets on archival storage systems T2 - NASA conference publication Y1 - 2000 A1 - Beynon, M. A1 - Ferreira,R. A1 - Kurc, T. A1 - Sussman, Alan A1 - Saltz, J. JA - NASA conference publication ER - TY - JOUR T1 - Design and use of linear models for image motion analysis JF - International Journal of Computer Vision Y1 - 2000 A1 - Fleet,D. J A1 - Black,M. J A1 - Yacoob,Yaser A1 - Jepson,A. D VL - 36 CP - 3 ER - TY - CONF T1 - Design of a Framework for Data-Intensive Wide-Area Applications T2 - Heterogeneous Computing Workshop Y1 - 2000 A1 - Beynon,Michael D. A1 - Kurc,Tahsin A1 - Sussman, Alan A1 - Saltz,Joel KW - application decomposition KW - data analysis and exploration KW - Data-intensive applications AB - Applications that use collections of very large, distributed datasets have become an increasingly important part of science and engineering. With high performance wide-area networks become more pervasive, there is interest in making collective use of distributed computational and data resources. Recent work has converged to the notion of the Grid, which attempts to uniformly present a heterogeneous collection of distributed resources. Current Grid research covers many areas from low-level infrastructure issues to high-level application concerns. However, providing support for efficient exploration and processing of very large scientific datasets stored in distributed archival storage systems remains a challenging research issue.We have initiated an effort that focuses on developing efficient data-intensive applications in a Grid environment. In this paper, we present a framework, called filter-stream programming that represents the processing units of a data-intensive application as a set of filters, which are designed to be efficient in their use of memory and scratch space. We describe a prototype infrastructure that supports execution of applications using the proposed framework. We present the implementation of two applications using the filter-stream programming framework, and discuss experimental results demonstrating the effects of heterogeneous resources on application performance. JA - Heterogeneous Computing Workshop PB - IEEE Computer Society CY - Los Alamitos, CA, USA M3 - http://doi.ieeecomputersociety.org/10.1109/HCW.2000.843737 ER - TY - CONF T1 - Designing StoryRooms: interactive storytelling spaces for children T2 - Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques Y1 - 2000 A1 - Alborzi,H. A1 - Druin, Allison A1 - Montemayor,J. A1 - Platner,M. A1 - Porteous,J. A1 - Sherman,L. A1 - Boltman,A. A1 - Taxén,G. A1 - Best,J. A1 - Hammer,J. A1 - others JA - Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques ER - TY - CONF T1 - Designing storytelling technologies to encouraging collaboration between young children T2 - Proceedings of the SIGCHI conference on Human factors in computing systems Y1 - 2000 A1 - Benford,S. A1 - Bederson, Benjamin B. A1 - \AAkesson,K. P A1 - Bayon,V. A1 - Druin, Allison A1 - Hansson,P. A1 - Hourcade,J. P A1 - Ingram,R. A1 - Neale,H. A1 - O'Malley,C. A1 - others JA - Proceedings of the SIGCHI conference on Human factors in computing systems ER - TY - JOUR T1 - Detecting independent motion: The statistics of temporal continuity JF - Pattern Analysis and Machine Intelligence, IEEE Transactions on Y1 - 2000 A1 - Pless, R. A1 - Brodsky, T. A1 - Aloimonos, J. VL - 22 CP - 8 ER - TY - CONF T1 - Domain name based visualization of Web histories in a zoomable user interface T2 - 11th International Workshop on Database and Expert Systems Applications, 2000. Proceedings Y1 - 2000 A1 - Gandhi,R. A1 - Kumar,G. A1 - Bederson, Benjamin B. A1 - Shneiderman, Ben KW - Computer science KW - data visualisation KW - domain name KW - domain name based visualization KW - Domain Tree Browser KW - Educational institutions KW - History KW - hypermedia KW - hypertext links KW - hypertext systems KW - information resources KW - Navigation KW - online front-ends KW - thumbnails KW - Tree graphs KW - tree structured visual navigation history KW - Uniform resource locators KW - URLs KW - User interfaces KW - Visualization KW - Web browser companion KW - Web histories KW - Web pages KW - World Wide Web KW - zoomable user interface KW - zoomable window AB - Users of hypertext systems like the World Wide Web (WWW) often find themselves following hypertext links deeper and deeper, only to find themselves “lost” and unable to find their way back to the previously visited pages. We have implemented a Web browser companion called Domain Tree Browser (DTB) that builds a tree structured visual navigation history while browsing the Web. The Domain Tree Browser organizes the URLs visited based on the domain name of each URL and shows thumbnails of each page in a zoomable window JA - 11th International Workshop on Database and Expert Systems Applications, 2000. Proceedings PB - IEEE SN - 0-7695-0680-1 M3 - 10.1109/DEXA.2000.875085 ER - TY - CONF T1 - Efficient remote data access in a mobile computing environment T2 - ICPP Y1 - 2000 A1 - Bright,L. A1 - Raschid, Louiqa JA - ICPP ER - TY - BOOK T1 - Embedded multiprocessors: Scheduling and synchronization Y1 - 2000 A1 - Sriram,S. A1 - Bhattacharyya, Shuvra S. PB - CRC VL - 3 ER - TY - JOUR T1 - The experimental validation and packaging of software technologies JF - ACM SIGSOFT Software Engineering Notes Y1 - 2000 A1 - Shull, Forrest A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V VL - 25 SN - 0163-5948 UR - http://doi.acm.org/10.1145/340855.341021 CP - 1 M3 - 10.1145/340855.341021 ER - TY - CONF T1 - A first step towards automated detection of buffer overrun vulnerabilities T2 - The 2000 Network and Distributed Systems Security Conference. San Diego, CA Y1 - 2000 A1 - Wagner,D. A1 - Foster, Jeffrey S. A1 - Brewer,E.A. A1 - Aiken,A. JA - The 2000 Network and Distributed Systems Security Conference. San Diego, CA VL - 14 ER - TY - JOUR T1 - High performance computing algorithms for land cover dynamics using remote sensing data JF - International Journal of Remote Sensing Y1 - 2000 A1 - Kalluri, SNV A1 - JaJa, Joseph F. A1 - Bader, D.A. A1 - Zhang,Z. A1 - Townshend,J.R.G. A1 - Fallah-Adl,H. AB - Global and regional land cover studies need to apply complex models on selected subsets of large volumes of multi-sensor and multi-temporal data sets that have been derived from raw instrument measurements using widely accepted pre-processing algorithms. The computational and storage requirements of most of these studies far exceed what is possible on a single workstation environment. We have been pursuing a new approach that couples scalable and open distributed heterogeneous hardware with the development of high performance software for processing, indexing and organizing remotely sensed data. Hierarchical data management tools are used to ingest raw data, create metadata and organize the archived data so as to automatically achieve computational load balancing among the available nodes and minimize input/output overheads. We illustrate our approach with four specific examples. The first is the development of the first fast operational scheme for the atmospheric correction of Landsat Thematic Mapper scenes, while the second example focuses on image segmentation using a novel hierarchical connected components algorithm. Retrieval of the global Bidirectional Reflectance Distribution Function in the red and near-infrared wavelengths using four years (1983 to 1986) of Pathfinder Advanced Very High Resolution Radiometer (AVHRR) Land data is the focus of our third example. The fourth example is the development of a hierarchical data organization scheme that allows on-demand processing and retrieval of regional and global AVHRR data sets. Our results show that substantial reductions in computational times can be achieved by the high performance computing technology. VL - 21 SN - 0143-1161 UR - http://www.tandfonline.com/doi/abs/10.1080/014311600210290 CP - 6-7 M3 - 10.1080/014311600210290 ER - TY - CONF T1 - In search of illumination invariants T2 - Computer Vision and Pattern Recognition, 2000. Proceedings. IEEE Conference on Y1 - 2000 A1 - Chen,H. F A1 - Belhumeur,P. N. A1 - Jacobs, David W. KW - comparison;image KW - gradient;face KW - invariants;image KW - Lambertian KW - recognition; KW - recognition;illumination KW - recognition;object KW - reflectance;face AB - We consider the problem of determining functions of an image of an object that are insensitive to illumination changes. We first show that for an object with Lambertian reflectance there are no discriminative functions that are invariant to illumination. This result leads as to adopt a probabilistic approach in which we analytically determine a probability distribution for the image gradient as a function of the surface's geometry and reflectance. Our distribution reveals that the direction of the image gradient is insensitive to changes in illumination direction. We verify this empirically by constructing a distribution for the image gradient from more than 20 million samples of gradients in a database of 1,280 images of 20 inanimate objects taken under varying lighting condition. Using this distribution we develop an illumination insensitive measure of image comparison and test it on the problem of face recognition JA - Computer Vision and Pattern Recognition, 2000. Proceedings. IEEE Conference on VL - 1 M3 - 10.1109/CVPR.2000.855827 ER - TY - CONF T1 - Jazz: an extensible zoomable user interface graphics toolkit in Java T2 - Proceedings of the 13th annual ACM symposium on User interface software and technology Y1 - 2000 A1 - Bederson, Benjamin B. A1 - Meyer,J. A1 - Good,L. JA - Proceedings of the 13th annual ACM symposium on User interface software and technology ER - TY - JOUR T1 - Kronos: A software system for the processing and retrieval of large-scale AVHRR data sets JF - PE & RS- Photogrammetric Engineering and Remote Sensing Y1 - 2000 A1 - Zhang,Z. A1 - JaJa, Joseph F. A1 - Bader, D.A. A1 - Kalluri, SNV A1 - Song,H. A1 - El Saleous,N. A1 - Vermote,E. A1 - Townshend,J.R.G. AB - Raw remotely sensed satellite data have to be processed andmapped into a standard projection in order to produce a multi- temporal data set which can then be used for regional or global Earth science studies. However, traditional methods of processing remotely sensed satellite data have inherent limitations because they are based on a fixed processing chain. Different users may need the data in different forms with possibly different processing steps; hence, additional transformations may have to be applied to the processed data, resulting in potentially significant errors. In this paper, we describe a software system, Kronos, for the generation of custom-tailored products from the Advanced Very High Resolution Radiometer (AVHRR) sensor. It allows the generation of a rich set of products that can be easily specified through a simple interface by scientists wishing to carry out Earth system modeling or analysis. Kronos is based on a flexible methodology and consists of four major components: ingest and preprocessing, indexing and storage, a search and processing engine, and a Java interface. After geo-location and calibration, every pixel is indexed and stored using a combination of data structures. Following the users' queries, data are selectively retrieved and secondary processing such as atmospheric correction, compositing, and projection are performed as specified. The processing is divided into two stages, the first of which involves the geo-location and calibration of the remotely sensed data and, hence, results in no loss of information. The second stage involves the retrieval of the appropriate data subsets and the application of the secondary processing specified by the user. This scheme allows the indexing and the storage of data from different sensors without any loss of information and, therefore, allows assimilation of data from multiple sensors. User specified processing can be applied later as needed. VL - 66 CP - 9 ER - TY - JOUR T1 - Ligand-Receptor Pairing Via Tree Comparison JF - Journal of Computational Biology Y1 - 2000 A1 - Bafna,Vineet A1 - Hannenhalli, Sridhar A1 - Rice,Ken A1 - Vawter,Lisa AB - This paper introduces a novel class of tree comparison problems strongly motivated by an important and cost intensive step in drug discovery pipeline viz., mapping cell bound receptors to the ligands they bind to and vice versa. Tree comparison studies motivated by problems such as virus-host tree comparison, gene-species tree comparison and consensus tree problem have been reported. None of these studies are applicable in our context because in all these problems, there is a well-defined mapping of the nodes the trees are built on across the set of trees being compared. A new class of tree comparison problems arises in cases where finding the correspondence among the nodes of the trees being compared is itself the problem. The problem arises while trying to find the interclass correspondence between the members of a pair of coevolving classes, e.g., cell bound receptors and their ligands. Given the evolution of the two classes, the combinatorial problem is to find a mapping among the leaves of the two trees that optimizes a given cost function. In this work we formulate various combinatorial optimization problems motivated by the aforementioned biological problem for the first time. We present hardness results, give an efficient algorithm for a restriction of the problem and demonstrate its applicability. VL - 7 SN - 1066-5277, 1557-8666 UR - http://www.liebertonline.com/doi/abs/10.1089/10665270050081388 CP - 1-2 M3 - 10.1089/10665270050081388 ER - TY - JOUR T1 - The Loading Time Scheduling Problem JF - Journal of Algorithms Y1 - 2000 A1 - Bhatia,Randeep A1 - Khuller, Samir A1 - Naor,Joseph (Seffi) AB - In this paper we study precedence constrained scheduling problems, where the tasks can only be executed on a specified subset of the set of machines. Each machine has a loading time that is incurred only for the first task that is scheduled on the machine in a particular run. This basic scheduling problem arises in the context of machining on numerically controlled machines and query optimization in databases and in other artificial intelligence applications. We give the first nontrivial approximation algorithm for this problem. We also prove nontrivial lower bounds on best possible approximation ratios for these problems. These improve on the nonapproximability results that are implied by the nonapproximability results for the shortest common supersequence problem. We use the same algorithm technique to obtain approximation algorithms for a problem arising in the context of code generation for parallel machines and for the weighted shortest common supersequence problem. VL - 36 SN - 0196-6774 UR - http://www.sciencedirect.com/science/article/pii/S0196677400910769 CP - 1 M3 - 10.1006/jagm.2000.1076 ER - TY - CONF T1 - On local search and placement of meters in networks T2 - Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms Y1 - 2000 A1 - Khuller, Samir A1 - Bhatia,Randeep A1 - Pless,Robert JA - Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms T3 - SODA '00 PB - Society for Industrial and Applied Mathematics CY - Philadelphia, PA, USA SN - 0-89871-453-2 UR - http://dl.acm.org/citation.cfm?id=338219.338268 ER - TY - CONF T1 - Multi-camera networks: eyes from eyes T2 - IEEE Workshop on Omnidirectional Vision, 2000. Proceedings Y1 - 2000 A1 - Fermüller, Cornelia A1 - Aloimonos, J. A1 - Baker, P. A1 - Pless, R. A1 - Neumann, J. A1 - Stuart, B. KW - Biosensors KW - CAMERAS KW - Computer vision KW - Eyes KW - Image sequences KW - intelligent systems KW - Layout KW - Machine vision KW - Robot vision systems KW - Robustness KW - Spatiotemporal phenomena KW - video cameras KW - Virtual reality AB - Autonomous or semi-autonomous intelligent systems, in order to function appropriately, need to create models of their environment, i.e., models of space time. These are descriptions of objects and scenes and descriptions of changes of space over time, that is, events and actions. Despite the large amount of research on this problem, as a community we are still far from developing robust descriptions of a system's spatiotemporal environment using video input (image sequences). Undoubtedly, some progress has been made regarding the understanding of estimating the structure of visual space, but it has not led to solutions to specific applications. There is, however, an alternative approach which is in line with today's “zeitgeist.” The vision of artificial systems can be enhanced by providing them with new eyes. If conventional video cameras are put together in various configurations, new sensors can be constructed that have much more power and the way they “see” the world makes it much easier to solve problems of vision. This research is motivated by examining the wide variety of eye design in the biological world and obtaining inspiration for an ensemble of computational studies that relate how a system sees to what that system does (i.e. relating perception to action). This, coupled with the geometry of multiple views that has flourished in terms of theoretical results in the past few years, points to new ways of constructing powerful imaging devices which suit particular tasks in robotics, visualization, video processing, virtual reality and various computer vision applications, better than conventional cameras. This paper presents a number of new sensors that we built using common video cameras and shows their superiority with regard to developing models of space and motion JA - IEEE Workshop on Omnidirectional Vision, 2000. Proceedings PB - IEEE SN - 0-7695-0704-2 M3 - 10.1109/OMNVIS.2000.853797 ER - TY - JOUR T1 - Multidimensional exploration of software implementations for DSP algorithms JF - The Journal of VLSI Signal Processing Y1 - 2000 A1 - Zitzler,E. A1 - Teich,J. A1 - Bhattacharyya, Shuvra S. VL - 24 CP - 1 ER - TY - JOUR T1 - New eyes for building models from video JF - Computational Geometry Y1 - 2000 A1 - Fermüller, Cornelia A1 - Aloimonos, J. A1 - Brodský,Tomáš KW - model building KW - shape reconstruction KW - structure from motion KW - video analysis AB - Models of real-world objects and actions for use in graphics, virtual and augmented reality and related fields can only be obtained through the use of visual data and particularly video. This paper examines the question of recovering shape models from video information. Given video of an object or a scene captured by a moving camera, a prerequisite for model building is to recover the three-dimensional (3D) motion of the camera which consists of a rotation and a translation at each instant. It is shown here that a spherical eye (an eye or system of eyes providing panoramic vision) is superior to a camera-type eye (an eye with restricted field of view such as a common video camera) as regards the competence of 3D motion estimation. This result is derived from a geometric/statistical analysis of all the possible computational models that can be used for estimating 3D motion from an image sequence. Regardless of the estimation procedure for a camera-type eye, the parameters of the 3D rigid motion (translation and rotation) contain errors satisfying specific geometric constraints. Thus, translation is always confused with rotation, resulting in inaccurate results. This confusion does not happen for the case of panoramic vision. Insights obtained from this study point to new ways of constructing powerful imaging devices that suit particular tasks in visualization and virtual reality better than conventional cameras, thus leading to a new camera technology. Such new eyes are constructed by putting together multiple existing video cameras in specific ways, thus obtaining eyes from eyes. For a new eye of this kind we describe an implementation for deriving models of scenes from video data, while avoiding the correspondence problem in the video sequence. VL - 15 SN - 0925-7721 UR - http://www.sciencedirect.com/science/article/pii/S0925772199000449 CP - 1–3 M3 - 10.1016/S0925-7721(99)00044-9 ER - TY - CHAP T1 - New Eyes for Shape and Motion Estimation T2 - Biologically Motivated Computer VisionBiologically Motivated Computer Vision Y1 - 2000 A1 - Baker,Patrick A1 - Pless,Robert A1 - Fermüller, Cornelia A1 - Aloimonos, J. ED - Lee,Seong-Whan ED - Bülthoff,Heinrich ED - Poggio,Tomaso AB - Motivated by the full field of view of insect eyes and their fast and accurate estimation of egomotion, we constructed a system of cameras to take advantage of the full field of view (FOV) constraints that insects use. In this paper, we develop a new ego-motion algorithm for a rigidly mounted set of cameras undergoing arbitrary rigid motion. This egomotion algorithm combines the unambiguous components of the motion computed by each separate camera. We prove that the cyclotorsion is resistant to errors and show this empirically. We show how to calibrate the system with two novel algorithms, one using secondary cameras and one using self calibration. Given this system calibration, the new 3D motion algorithm first computes the rotation and then the 3D translation. We apply this algorithm to a camera system constructed with four rigidly mounted synchronized cameras pointing in various directions and present motion estimation results at www.cfar.umd.edu/ pbaker/argus.html. JA - Biologically Motivated Computer VisionBiologically Motivated Computer Vision T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1811 SN - 978-3-540-67560-0 UR - http://dx.doi.org/10.1007/3-540-45482-9_12 ER - TY - JOUR T1 - Perceptual Completion Behind Occluders: The Role of Convexity JF - Perceptual Organization for Artificial Vision Systems Y1 - 2000 A1 - Liu,Z. A1 - Jacobs, David W. A1 - Basri,R. AB - An important problem in perceptual organization is to determine whether two image regions belong to the same object. In this chapter, we consider the situation when two image regions potentially group into a single object behind a common occluder. We study the extent to which two image regions are grouped more strongly than two other image regions. Existing theories in both human and computer vision have mainly emphasized the role of good continuation. Namely, the shorter and smoother the completing contours are between two image regions, the stronger the grouping will be. In contrast, Jacobs [3] has proposed a theory that considers relative positions and orientations of two image regions. For instance, the theory predicts that two image regions that can be linked by convex completing contours are grouped more strongly than those that can only be linked by concave completing contours, even though the completing contours are identical in shape. We present, in addition to our previous work (Liu, Jacobs, and Basri, 1999), human psychophysical evidence that concurs with the predictions of this theory and suggests an important role of convexity in perceptual grouping. M3 - 10.1007/978-1-4615-4413-5_6 ER - TY - CONF T1 - Receiver based management of low bandwidth access links T2 - IEEE INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings Y1 - 2000 A1 - Spring, Neil A1 - Chesire,M. A1 - Berryman,M. A1 - Sahasranaman,V. A1 - Anderson,T. A1 - Bershad,B. KW - Bandwidth KW - buffer storage KW - bulk-transfer applications KW - complex Web page KW - congestion control policy KW - Delay KW - dynamically loadable Linux kernel module KW - information resources KW - interactive network KW - Internet KW - Kernel KW - link utilization KW - Linux KW - low-bandwidth access links KW - mixed traffic load KW - packet latency KW - queue length KW - queueing theory KW - receive socket buffer sizes KW - receiver-based management KW - response time KW - short flow prioritizing KW - Size control KW - Sockets KW - subscriber loops KW - TCP flow control KW - telecommunication congestion control KW - telecommunication network management KW - Telecommunication traffic KW - Testing KW - Throughput KW - Transport protocols KW - Unix KW - Web pages AB - In this paper, we describe a receiver-based congestion control policy that leverages TCP flow control mechanisms to prioritize mixed traffic loads across access links. We manage queueing at the access link to: (1) improve the response time of interactive network applications; (2) reduce congestion-related packet losses; while (3) maintaining high throughput for bulk-transfer applications. Our policy controls queue length by manipulating receive socket buffer sizes. We have implemented this solution in a dynamically loadable Linux kernel module, and tested it over low-bandwidth links. Our approach yields a 7-fold improvement in packet latency over an unmodified system while maintaining 94% link utilization. In the common case, congestion-related packet losses at the access link can be eliminated. Finally, by prioritizing short flows, we show that our system reduces the time to download a complex Web page during a large background transfer by a factor of two JA - IEEE INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings PB - IEEE VL - 1 SN - 0-7803-5880-5 M3 - 10.1109/INFCOM.2000.832194 ER - TY - JOUR T1 - Resynchronization for multiprocessor DSP systems JF - Circuits and Systems I: Fundamental Theory and Applications, IEEE Transactions on Y1 - 2000 A1 - Bhattacharyya, Shuvra S. A1 - Sriram,S. A1 - Lee,E. A VL - 47 CP - 11 ER - TY - JOUR T1 - Retrieval scheduling for collaborative multimedia presentations JF - Multimedia Systems Y1 - 2000 A1 - Bai,Ping A1 - Prabhakaran,B. A1 - Srinivasan, Aravind AB - The single-system approach is no longer sufficient to handle the load on popular Internet servers, especially for those offering extensive multimedia content. Such services have to be replicated to enhance their availability, performance, and reliability. In a highly replicated and available environment, server selection is an important issue. In this paper, we propose an application-layer broker (ALB) for this purpose. ALB employs a content-based, client-centric approach to negotiate with the servers and to identify the best server for the requested objects. ALB aims to maximize client buffer utilization in order to efficiently handle dynamic user interactions such as skip, reverse presentation, go back in time. We also present details of a collaborative multimedia presentation platform that we have developed based on ALB. VL - 8 SN - 0942-4962 UR - http://dx.doi.org/10.1007/s005300050157 CP - 2 ER - TY - RPRT T1 - Reverse Engineering and UML: A Case Study of AuctionBot Y1 - 2000 A1 - Bangera,R. A1 - Rand, William PB - University of Michigan VL - EECS 581 ER - TY - JOUR T1 - Robustly estimating changes in image appearance JF - Computer Vision and Image Understanding Y1 - 2000 A1 - Black,M. J A1 - Fleet,D. J A1 - Yacoob,Yaser VL - 78 CP - 1 ER - TY - JOUR T1 - Rotation, scale, and translation resilient public watermarking for images JF - PROC SPIE INT SOC OPT ENG Y1 - 2000 A1 - Lin,C.Y. A1 - Wu,M. A1 - Bloom,J.A. A1 - Cox,I.J. A1 - Miller,M.L. A1 - Lui,Y.M. AB - Many electronic watermarks for still images and video content are sensitive to geometric distortions. For example,simple rotation, scaling, and/or translation (RST) of an image can prevent detection of a public watermark. In this paper, we propose a watermarking algorithm that is robust to RST distortions. The watermark is embedded into a 1-dimensional signal obtained by first taking the Fourier transform of the image, resampling the Fourier magnitudes into log-polar coordinates, and then summing a function of those magnitudes along the log-radius axis. If the image is rotated, the resulting signal is cyclically shifted. If it is scaled, the signal is multiplied by some value. And if the image is translated, the signal is unaffected. We can therefore compensate for rotation with a simple search, and for scaling by using the correlation coefficient for the detection metric. False positive results on a database of 10,000 images are reported. Robustness results on a database of 2,000 images are described. It is shown that the watermark is robust to rotation, scale and translation. In addition, the algorithm shows resistance to cropping. VL - 3971 ER - TY - JOUR T1 - Structure from motion: Beyond the epipolar constraint JF - International Journal of Computer Vision Y1 - 2000 A1 - Brodskỳ, T. A1 - Fermüller, Cornelia A1 - Aloimonos, J. VL - 37 CP - 3 ER - TY - CONF T1 - Systematic consolidation of input and output buffers in synchronous dataflow specifications T2 - Signal Processing Systems, 2000. SiPS 2000. 2000 IEEE Workshop on Y1 - 2000 A1 - Murthy,P. K A1 - Bhattacharyya, Shuvra S. JA - Signal Processing Systems, 2000. SiPS 2000. 2000 IEEE Workshop on ER - TY - CONF T1 - Using hardware performance monitors to isolate memory bottlenecks T2 - Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM) Y1 - 2000 A1 - Buck, B. R A1 - Hollingsworth, Jeffrey K JA - Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM) ER - TY - JOUR T1 - Vehicle Speed Information Displays for Public Websites A Survey of User Preferences JF - Technical Reports from UMIACS Y1 - 2000 A1 - Plaisant, Catherine A1 - Bhamidipati,Phanikumar KW - Technical Report AB - The paper reports on a study comparing alternative presentations offreeway speed data on maps. The goal of the study was to inform the design of displays of real time speed data over the Internet to the general public. Subjects were presented with a series of displays and asked to rate their preferences. We looked at different choices of color (3 colors, 6 colors or a continuous range), and proposed line, sensor, and segment representations of the speed data. We also collected feedback on more complex displays such as comparison between current and "normal" speeds, and a chart of speed variation over a period of time at given locations. (Also cross-referenced as HCIL-TR-2000-23) (Also cross-referenced as UMIACS-TR-2000-73) UR - http://drum.lib.umd.edu/handle/1903/1109 ER - TY - CONF T1 - Web Query Optimizer T2 - Data Engineering, International Conference on Y1 - 2000 A1 - Zadorozhny,Vladimir A1 - Bright,Laura A1 - Raschid, Louiqa A1 - Urhan,Tolga A1 - Vidal,Maria Esther AB - We demonstrate a Web Query Optimizer (WQO) within an architecture of mediators and wrappers, for WebSources of limited capability in a wide area environment. The WQO has several innovative features including a CBR (capability based rewriting) Tool, an enhanced randomized relational optimizer extended to a Web environment, and a WebWrapper cost model that can provide relevant metrics for accessing WebSources. The prototype has been tested against a number of WebSources. JA - Data Engineering, International Conference on PB - IEEE Computer Society CY - Los Alamitos, CA, USA M3 - http://doi.ieeecomputersociety.org/10.1109/ICDE.2000.839484 ER - TY - JOUR T1 - 3-d to 2-d pose determination with regions JF - International Journal of Computer Vision Y1 - 1999 A1 - Jacobs, David W. A1 - Basri,R. AB - This paper presents a novel approach to parts-based object recognition in the presence of occlusion. We focus on the problem of determining the pose of a 3-D object from a single 2-D image when convex parts of the object have been matched to corresponding regions in the image. We consider three types of occlusions: self-occlusion, occlusions whose locus is identified in the image, and completely arbitrary occlusions. We show that in the first two cases this is a convex optimization problem, derive efficient algorithms, and characterize their performance. For the last case, we prove that the problem of finding valid poses is computationally hard, but provide an efficient, approximate algorithm. This work generalizes our previous work on region-based object recognition, which focused on the case of planar models. VL - 34 CP - 2 M3 - 10.1023/A:1008135819955 ER - TY - CONF T1 - Advances in spherical harmonic device modeling: calibration and nanoscale electron dynamics T2 - Simulation of Semiconductor Processes and Devices, 1999. SISPAD '99. 1999 International Conference on Y1 - 1999 A1 - Lin,Chung-Kai A1 - Goldsman,N. A1 - Mayergoyz, Issak D A1 - Aronowitz,S. A1 - Belova,N. KW - Boltzmann KW - characteristics;SHBTE KW - current;surface KW - device KW - dynamics;spherical KW - electron KW - equation;calibration;semiconductor KW - equation;I-V KW - harmonic KW - model;substrate KW - models;surface KW - scattering; KW - scattering;Boltzmann KW - simulation;calibration;nanoscale KW - transport AB - Improvements in the Spherical Harmonic (SH) method for solving Boltzmann Transport Equation (BTE) are presented. The simulation results provide the same physical detail as analytical band Monte Carlo (MC) calculations, and are obtained approximately a thousand times faster. A new physical model for surface scattering has also been developed. As a result, the SHBTE model achieves calibration for a complete process of I-V characteristics and substrate current consistently for the first time JA - Simulation of Semiconductor Processes and Devices, 1999. SISPAD '99. 1999 International Conference on M3 - 10.1109/SISPAD.1999.799287 ER - TY - CONF T1 - Application-layer broker for scalable Internet services with resource reservation T2 - Proceedings of the seventh ACM international conference on Multimedia (Part 2) Y1 - 1999 A1 - Bai,Ping A1 - Prabhakaran,B. A1 - Srinivasan, Aravind JA - Proceedings of the seventh ACM international conference on Multimedia (Part 2) T3 - MULTIMEDIA '99 PB - ACM CY - New York, NY, USA SN - 1-58113-239-5 UR - http://doi.acm.org/10.1145/319878.319906 M3 - 10.1145/319878.319906 ER - TY - CONF T1 - Building dependable distributed applications using AQUA Y1 - 1999 A1 - Ren,J. A1 - Michel Cukier A1 - Rubel,P. A1 - Sanders,W. H. A1 - Bakken,D. E. A1 - Karr,D. A. KW - ad hoc methods KW - application programmer KW - AQuA KW - complexities KW - computational complexity KW - dependable distributed applications KW - distributed CORBA application KW - distributed object management KW - Fault tolerance KW - fault tolerant computing KW - proteus AB - Building dependable distributed systems using ad hoc methods is a challenging task. Without proper support, an application programmer must face the daunting requirement of having to provide fault tolerance at the application level, in addition to dealing with the complexities of the distributed application itself. This approach requires a deep knowledge of fault tolerance on the part of the application designer, and has a high implementation cost. What is needed is a systematic approach to providing dependability to distributed applications. Proteus, part of the AQuA architecture, fills this need and provides facilities to make a standard distributed CORBA application dependable, with minimal changes to an application. Furthermore, it permits applications to specify, either directly or via the Quality Objects (QuO) infrastructure, the level of dependability they expect of a remote object, and will attempt to configure the system to achieve the requested dependability level. Our previous papers have focused on the architecture and implementation of Proteus. This paper describes how to construct dependable applications using the AQuA architecture, by describing the interface that a programmer is presented with and the graphical monitoring facilities that it provides M3 - 10.1109/HASE.1999.809494 ER - TY - CONF T1 - Building dependable distributed objects with the AQuA architecture Y1 - 1999 A1 - Michel Cukier A1 - Ren,J. A1 - Rubel,P. A1 - Bakken,D. E. A1 - Karr,D. A. UR - http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.16.2819&rep=rep1&type=pdf ER - TY - CONF T1 - Designing PETS: a personal electronic teller of stories T2 - Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit Y1 - 1999 A1 - Druin, Allison A1 - Montemayor,Jamie A1 - Hendler,Jim A1 - McAlister,Britt A1 - Boltman,Angela A1 - Fiterman,Eric A1 - Plaisant,Aurelie A1 - Kruskal,Alex A1 - Olsen,Hanne A1 - Revett,Isabella A1 - Schwenn,Thomas Plaisant A1 - Sumida,Lauren A1 - Wagner,Rebecca KW - children KW - cooperative inquiry KW - design techniques KW - educational applications KW - intergenerational design team KW - PETS KW - ROBOTICS AB - We have begun the development of a new robotic pet that cansupport children in the storytelling process. Children can build their own pet by snapping together the modular animal parts of the PETS robot. After their pet is built, children can tell stories using the My Pets software. These stories can then be acted out by their robotic pet. This video paper describes the motivation for this research and the design process of our intergenerational design team in building the first PETS prototypes. We will discuss our progress to date and our focus for the future. JA - Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit T3 - CHI '99 PB - ACM CY - New York, NY, USA SN - 0-201-48559-1 UR - http://doi.acm.org/10.1145/302979.303103 M3 - 10.1145/302979.303103 ER - TY - CONF T1 - Does animation help users build mental maps of spatial information? T2 - Information Visualization, 1999.(Info Vis' 99) Proceedings. 1999 IEEE Symposium on Y1 - 1999 A1 - Bederson, Benjamin B. A1 - Boltman,A. JA - Information Visualization, 1999.(Info Vis' 99) Proceedings. 1999 IEEE Symposium on ER - TY - CONF T1 - Does zooming improve image browsing T2 - Proceedings of the fourth ACM conference on Digital libraries Y1 - 1999 A1 - Tammara,T.A.C. A1 - Bederson, Benjamin B. JA - Proceedings of the fourth ACM conference on Digital libraries ER - TY - CONF T1 - Efficient perspective-accurate silhouette computation T2 - Proceedings of the fifteenth annual symposium on Computational geometry Y1 - 1999 A1 - Barequet,G. A1 - Duncan,C. A A1 - Goodrich,M. T A1 - Kumar,S. A1 - Pop, Mihai JA - Proceedings of the fifteenth annual symposium on Computational geometry T3 - SCG '99 PB - ACM CY - New York, NY, USA SN - 1-58113-068-6 UR - http://doi.acm.org/10.1145/304893.304999 M3 - 10.1145/304893.304999 ER - TY - CONF T1 - A hierarchical data archiving and processing system to generate custom tailored products from AVHRR data T2 - Geoscience and Remote Sensing Symposium, 1999. IGARSS '99 Proceedings. IEEE 1999 International Y1 - 1999 A1 - Kalluri, SNV A1 - Zhang,Z. A1 - JaJa, Joseph F. A1 - Bader, D.A. A1 - Song,H. A1 - El Saleous,N. A1 - Vermote,E. A1 - Townshend,J.R.G. KW - archiving;image KW - AVHRR;GIS;PACS;custom KW - data KW - image;land KW - image;remote KW - mapping; KW - mapping;PACS;geophysical KW - measurement KW - PROCESSING KW - processing;geophysical KW - product;data KW - remote KW - scheme;infrared KW - sensing;optical KW - sensing;terrain KW - signal KW - surface;multispectral KW - system;indexing KW - tailored KW - technique;hierarchical KW - techniques;remote AB - A novel indexing scheme is described to catalogue satellite data on a pixel basis. The objective of this research is to develop an efficient methodology to archive, retrieve and process satellite data, so that data products can be generated to meet the specific needs of individual scientists. When requesting data, users can specify the spatial and temporal resolution, geographic projection, choice of atmospheric correction, and the data selection methodology. The data processing is done in two stages. Satellite data is calibrated, navigated and quality flags are appended in the initial processing. This processed data is then indexed and stored. Secondary processing such as atmospheric correction and projection are done after a user requests the data to create custom made products. By dividing the processing in to two stages saves time, since the basic processing tasks such as navigation and calibration which are common to all requests are not repeated when different users request satellite data. The indexing scheme described can be extended to allow fusion of data sets from different sensors JA - Geoscience and Remote Sensing Symposium, 1999. IGARSS '99 Proceedings. IEEE 1999 International VL - 5 M3 - 10.1109/IGARSS.1999.771514 ER - TY - JOUR T1 - Human-centered computing, online communities, and virtual environments JF - IEEE Computer Graphics and Applications Y1 - 1999 A1 - Brown,J. R A1 - van Dam,A. A1 - Earnshaw,R. A1 - Encarnacao,J. A1 - Guedj,R. A1 - Preece,J. A1 - Shneiderman, Ben A1 - Vince,J. KW - Books KW - Collaboration KW - Collaborative work KW - Conferences KW - EC/NSF joint Advanced Research Workshop KW - Feeds KW - Human computer interaction KW - human-centered computing KW - Internet KW - Joining materials KW - Laboratories KW - Online communities KW - Research initiatives KW - USA Councils KW - User interfaces KW - Virtual environment KW - virtual environments KW - Virtual reality AB - This report summarizes results of the first EC/NSF joint Advanced Research Workshop, which identified key research challenges and opportunities in information technology. The group agreed that the first joint research workshop should concentrate on the themes of human-centered computing and VEs. Human-centered computing is perceived as an area of strategic importance because of the move towards greater decentralization and decomposition in the location and provision of computation. The area of VEs is one where increased collaboration should speed progress in solving some of the more intractable problems in building effective applications VL - 19 SN - 0272-1716 CP - 6 M3 - 10.1109/38.799742 ER - TY - CONF T1 - Independent motion: the importance of history T2 - Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on. Y1 - 1999 A1 - Pless, R. A1 - Brodsky, T. A1 - Aloimonos, J. KW - aerial visual surveillance KW - background image KW - Fluid flow measurement KW - Frequency measurement KW - History KW - Motion detection KW - Motion estimation KW - Motion measurement KW - Noise measurement KW - Optical computing KW - Optical noise KW - spatiotemporal image intensity gradient measurements KW - Spatiotemporal phenomena KW - Surveillance KW - Video sequences AB - We consider a problem central in aerial visual surveillance applications-detection and tracking of small, independently moving objects in long and noisy video sequences. We directly use spatiotemporal image intensity gradient measurements to compute an exact model of background motion. This allows the creation of accurate mosaics over many frames and the definition of a constraint violation function which acts as an indication of independent motion. A novel temporal integration method maintains confidence measures over long subsequences without computing the optic flow, requiring object models, or using a Kalman filler. The mosaic acts as a stable feature frame, allowing precise localization of the independently moving objects. We present a statistical analysis of the effects of image noise on the constraint violation measure and find a good match between the predicted probability distribution function and the measured sample frequencies in a test sequence JA - Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on. PB - IEEE VL - 2 SN - 0-7695-0149-4 M3 - 10.1109/CVPR.1999.784614 ER - TY - JOUR T1 - Interface and data architecture for query preview in networked information systems JF - ACM Trans. Inf. Syst. Y1 - 1999 A1 - Plaisant, Catherine A1 - Shneiderman, Ben A1 - Doan,Khoa A1 - Bruns,Tom KW - direct manipulation KW - dynamic query KW - EOSDIS KW - graphical user interface KW - query preview KW - query refinement KW - science data AB - There are numerous problems associated with formulating queries onnetworked information systems. These include increased data volume and complexity, accompanied by slow network access. This article proposes a new approach to a network query user interfaces that consists of two phases: query preview and query refinement. This new approach is based on the concepts of dynamic queries and query previews, which guides users in rapidly and dynamically eliminating undesired records, reducing the data volume to a manageable size, and refining queries locally before submission over a network. Examples of two applications are given: a Restaurant Finder and a prototype for NASA's Earth Observing Systems Data Information Systems (EOSDIS). Data architecture is discussed, and user feedback is presented. VL - 17 SN - 1046-8188 UR - http://doi.acm.org/10.1145/314516.314522 CP - 3 M3 - 10.1145/314516.314522 ER - TY - JOUR T1 - Machine Translation JF - Multilingual Information Management: Current Levels and Future Abilities Y1 - 1999 A1 - Bel,N. A1 - Dorr, Bonnie J A1 - Hovy,E. A1 - Knight,K. A1 - Iida,H. A1 - Boitet,C. A1 - Maegaard,B. A1 - Wilks,Y. ER - TY - JOUR T1 - Model-checking concurrent systems with unbounded integer variables: symbolic representations, approximations, and experimental results JF - ACM Transactions on Programming Languages and SystemsACM Trans. Program. Lang. Syst. Y1 - 1999 A1 - Bultan,Tevfik A1 - Gerber,Richard A1 - Pugh, William VL - 21 SN - 01640925 UR - http://dl.acm.org/citation.cfm?id=325480 CP - 4 M3 - 10.1145/325478.325480 ER - TY - CONF T1 - Motion Segmentation: A Synergistic Approach T2 - Computer Vision and Pattern Recognition, IEEE Computer Society Conference on Y1 - 1999 A1 - Fermüller, Cornelia A1 - Brodsky, Tomas A1 - Aloimonos, J. KW - epipolar minimization KW - independent motion detection KW - Motion analysis AB - Since estimation of camera motion requires knowledge of independent motion, and moving object detection and localization requires knowledge about the camera motion, the two problems of motion estimation and segmentation need to be solved together in a synergistic manner. This paper provides an approach to treating both these problems simultaneously. The technique introduced here is based on a novel concept, ``scene ruggedness,'' which parameterizes the variation in estimated scene depth with the error in the underlying three-dimensional (3D) motion. The idea is that incorrect 3D motion estimates cause distortions in the estimated depth map, and as a result smooth scene patches are computed as rugged surfaces. The correct 3D motion can be distinguished, as it does not cause any distortion and thus gives rise to the background patches with the least depth variation between depth discontinuities, with the locations corresponding to independent motion being rugged. The algorithm presented employs a binocular observer whose nature is exploited in the extraction of depth discontinuities, a step that facilitates the overall procedure, but the technique can be extended to a monocular observer in a variety of ways. JA - Computer Vision and Pattern Recognition, IEEE Computer Society Conference on PB - IEEE Computer Society CY - Los Alamitos, CA, USA VL - 2 M3 - http://doi.ieeecomputersociety.org/10.1109/CVPR.1999.784633 ER - TY - CHAP T1 - Network Programming Using PLAN T2 - Internet Programming LanguagesInternet Programming Languages Y1 - 1999 A1 - Hicks, Michael W. A1 - Kakkar,Pankaj A1 - Moore,Jonathan A1 - Gunter,Carl A1 - Nettles,Scott ED - Bal,Henri ED - Belkhouche,Boumediene ED - Cardelli,Luca AB - We present here a methodology for programming active networks in the environment defined by our new language PLAN (Packet Language for Active Networks). This environment presumes a two-level architecture consisting of: 1. active packets carrying PLAN code; and 2. downloadable, node-resident services written in more general-purpose languages. We present several examples which illustrate how these two features can be combined to implement various network functions. JA - Internet Programming LanguagesInternet Programming Languages T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1686 SN - 978-3-540-66673-8 UR - http://dx.doi.org/10.1007/3-540-47959-7_7 ER - TY - JOUR T1 - Object-relational queries into multidimensional databases with the active data repository JF - Parallel Processing Letters Y1 - 1999 A1 - Ferreira,R. A1 - Kurc, T. A1 - Beynon, M. A1 - Chang,C. A1 - Sussman, Alan A1 - Saltz,J. H VL - 9 CP - 2 ER - TY - JOUR T1 - OSMA Software Program: Domain Analysis Guidebook JF - Technical Reports from UMIACS, UMIACS-TR-99-16 Y1 - 1999 A1 - Basili, Victor R. A1 - Seaman,Carolyn A1 - Tesoriero,Roseanne A1 - Zelkowitz, Marvin V KW - Technical Report AB - Domain analysis is the process of identifying and organizing knowledge abouta class of problems. This guidebook presents a method of performing experience domain analysis in software development organizations. The purpose of the guidebook is to facilitate the reader in characterizing two given development environments, applying domain analysis to model each, and then applying an evaluation process, based upon the Goal/Metric/Paradigm, to transfer a given development technology from one of the environments to the other. This guidebook describes this process and gives an example of its use within NASA. Also cross-referenced as UMIACS-TR-99-16 UR - http://drum.lib.umd.edu/handle/1903/1000 ER - TY - BOOK T1 - Perceptual Organization in Computer Vision Y1 - 1999 A1 - Boyer,K.L. A1 - Sarkar,S. A1 - Feldman,J. A1 - Granlund,G. A1 - Horaud,R. A1 - Hutchinson,S. A1 - Jacobs, David W. A1 - Kak,A. A1 - Lowe,D. A1 - Malik,J. PB - Academic Press ER - TY - CONF T1 - Performance impact of proxies in data intensive client-server applications T2 - Proceedings of the 13th international conference on Supercomputing Y1 - 1999 A1 - Beynon,M. D A1 - Sussman, Alan A1 - Saltz, J. JA - Proceedings of the 13th international conference on Supercomputing ER - TY - JOUR T1 - Perspective-based Usability Inspection: An Empirical Validation of Efficacy JF - Empirical Software Engineering Y1 - 1999 A1 - Zhang,Zhijun A1 - Basili, Victor R. A1 - Shneiderman, Ben AB - Inspection is a fundamental means of achieving software usability. Past research showed that the current usability inspection techniques were rather ineffective. We developed perspective-based usability inspection, which divides the large variety of usability issues along different perspectives and focuses each inspection session on one perspective. We conducted a controlled experiment to study its effectiveness, using a post-test only control group experimental design, with 24 professionals as subjects. The control group used heuristic evaluation, which is the most popular technique for usability inspection. The experimental design and the results are presented, which show that inspectors applying perspective-based inspection not only found more usability problems related to their assigned perspectives, but also found more overall problems. Perspective-based inspection was shown to be more effective for the aggregated results of multiple inspectors, finding about 30% more usability problems for 3 inspectors. A management implication of this study is that assigning inspectors more specific responsibilities leads to higher performance. Internal and external threats to validity are discussed to help better interpret the results and to guide future empirical studies. VL - 4 SN - 1382-3256 UR - http://dx.doi.org/10.1023/A:1009803214692 CP - 1 ER - TY - JOUR T1 - A practical approach to implementing real-time semantics JF - Annals of Software Engineering Y1 - 1999 A1 - Bhat,G. A1 - Cleaveland, Rance A1 - L\üttgen,G. VL - 7 CP - 1 ER - TY - CONF T1 - Proteus: a flexible infrastructure to implement adaptive fault tolerance in AQuA Y1 - 1999 A1 - Sabnis,C. A1 - Michel Cukier A1 - Ren,J. A1 - Rubel,P. A1 - Sanders,W. H. A1 - Bakken,D. E. A1 - Karr,D. KW - adaptive fault tolerance KW - AQuA KW - commercial off-the-shelf components KW - CORBA applications KW - cost KW - dependable distributed systems KW - distributed object management KW - object replication KW - proteus KW - reconfigurable architectures KW - Runtime KW - Software architecture KW - software fault tolerance AB - Building dependable distributed systems from commercial off-the-shelf components is of growing practical importance. For both cost and production reasons, there is interest in approaches and architectures that facilitate building such systems. The AQuA architecture is one such approach; its goal is to provide adaptive fault tolerance to CORBA applications by replicating objects, providing a high-level method for applications to specify their desired dependability, and providing a dependability manager that attempts to reconfigure a system at runtime so that dependability requests are satisfied. This paper describes how dependability is provided in AQuA. In particular it describes Proteus, the part of AQuA that dynamically manages replicated distributed objects to make them dependable. Given a dependability request, Proteus chooses a fault tolerance approach and reconfigures the system to try to meet the request. The infrastructure of Proteus is described in this paper, along with its use in implementing active replication and a simple dependability policy M3 - 10.1109/DCFTS.1999.814294 ER - TY - CONF T1 - Refining query previews techniques for data with multivalued attributes: the case of NASA EOSDIS T2 - Research and Technology Advances in Digital Libraries, 1999. ADL '99. Proceedings. IEEE Forum on Y1 - 1999 A1 - Plaisant, Catherine A1 - Venkatraman,M. A1 - Ngamkajorwiwat,K. A1 - Barth,R. A1 - Harberts,B. A1 - Feng,Wenlan KW - attribute KW - attributes;processing KW - collection;memory KW - computing;meta KW - data KW - data;abstracted KW - data;digital KW - data;multivalued KW - data;query KW - Earth KW - EOSDIS;NASA KW - libraries;geophysics KW - metadata;dataset;digital KW - NASA KW - previews KW - processing; KW - requirements;multi-valued KW - Science KW - techniques;undesired KW - time;query AB - Query Previews allow users to rapidly gain an understanding of the content and scope of a digital data collection. These previews present overviews of abstracted metadata, enabling users to rapidly and dynamically avoid undesired data. We present our recent work on developing query previews for a variety of NASA EOSDIS situations. We focus on approaches that successfully address the challenge of multi-valued attribute data. Memory requirements and processing time associated with running these new solutions remain independent of the number of records in the dataset. We describe two techniques and their respective prototypes used to preview NASA Earth science data JA - Research and Technology Advances in Digital Libraries, 1999. ADL '99. Proceedings. IEEE Forum on M3 - 10.1109/ADL.1999.777690 ER - TY - JOUR T1 - The role of convexity in perceptual completion: beyond good continuation JF - Vision Research Y1 - 1999 A1 - Liu,Zili A1 - Jacobs, David W. A1 - Basri,Ronen KW - Amodal completion KW - Convexity KW - Good continuation KW - Grouping KW - Stereoscopic depth AB - Since the seminal work of the Gestalt psychologists, there has been great interest in understanding what factors determine the perceptual organization of images. While the Gestaltists demonstrated the significance of grouping cues such as similarity, proximity and good continuation, it has not been well understood whether their catalog of grouping cues is complete — in part due to the paucity of effective methodologies for examining the significance of various grouping cues. We describe a novel, objective method to study perceptual grouping of planar regions separated by an occluder. We demonstrate that the stronger the grouping between two such regions, the harder it will be to resolve their relative stereoscopic depth. We use this new method to call into question many existing theories of perceptual completion (Ullman, S. (1976). Biological Cybernetics, 25, 1–6; Shashua, A., & Ullman, S. (1988). 2nd International Conference on Computer Vision (pp. 321–327); Parent, P., & Zucker, S. (1989). IEEE Transactions on Pattern Analysis and Machine Intelligence, 11, 823–839; Kellman, P. J., & Shipley, T. F. (1991). Cognitive psychology, Liveright, New York; Heitger, R., & von der Heydt, R. (1993). A computational model of neural contour processing, figure-ground segregation and illusory contours. In Internal Conference Computer Vision (pp. 32–40); Mumford, D. (1994). Algebraic geometry and its applications, Springer, New York; Williams, L. R., & Jacobs, D .W. (1997). Neural Computation, 9, 837–858) that are based on Gestalt grouping cues by demonstrating that convexity plays a strong role in perceptual completion. In some cases convexity dominates the effects of the well known Gestalt cue of good continuation. While convexity has been known to play a role in figure/ground segmentation (Rubin, 1927; Kanizsa & Gerbino, 1976), this is the first demonstration of its importance in perceptual completion. VL - 39 SN - 0042-6989 UR - http://www.sciencedirect.com/science/article/pii/S0042698999001418 CP - 25 M3 - 10.1016/S0042-6989(99)00141-8 ER - TY - CONF T1 - A rotation, scale and translation resilient public watermark T2 - Acoustics, Speech, and Signal Processing, 1999. Proceedings., 1999 IEEE International Conference on Y1 - 1999 A1 - Wu,M. A1 - Miller,M.L. A1 - Bloom,J.A. A1 - Cox,I.J. KW - algorithms;Fourier KW - coding; KW - coding;image KW - data;transform KW - dimensions;projection KW - Fourier-Mellin KW - image KW - invariant KW - methods;detector;experimental KW - of KW - pattern;rotation KW - projection;mapping;original KW - public KW - registration;security KW - resilient KW - results;geometric KW - transform;detection KW - transform;RST KW - transformations;image KW - transforms;image KW - transforms;Radon KW - watermark;RST KW - watermark;scale KW - watermark;translation KW - watermark;watermarking KW - waveform;registration AB - Summary form only given. Watermarking algorithms that are robust to the common geometric transformations of rotation, scale and translation (RST) have been reported for cases in which the original unwatermarked content is available at the detector so as to allow the transformations to be inverted. However, for public watermarks the problem is significantly more difficult since there is no original content to register with. Two classes of solution have been proposed. The first embeds a registration pattern into the content while the second seeks to apply detection methods that are invariant to these geometric transformations. This paper describes a public watermarking method which is invariant (or bares a simple relation) to the common geometric transforms of rotation, scale, and translation. It is based on the Fourier-Mellin transform which has previously been suggested. We extend this work, using a variation based on the Radon transform. The watermark is inserted into a projection of the image. The properties of this projection are such that RST transforms produce simple or no effects on the projection waveform. When a watermark is inserted into a projection, the signal must eventually be back projected to the original image dimensions. This is a one to many mapping that allows for considerable flexibility in the watermark insertion process. We highlight some theoretical and practical issues that affect the implementation of an RST invariant watermark. Finally, we describe preliminary experimental results JA - Acoustics, Speech, and Signal Processing, 1999. Proceedings., 1999 IEEE International Conference on VL - 4 M3 - 10.1109/ICASSP.1999.758337 ER - TY - CONF T1 - Running EveryWare on the computational grid T2 - Proceedings of the 1999 ACM/IEEE conference on Supercomputing (CDROM) Y1 - 1999 A1 - Wolski,R. A1 - Brevik,J. A1 - Krintz,C. A1 - Obertelli,G. A1 - Spring, Neil A1 - Su,A. JA - Proceedings of the 1999 ACM/IEEE conference on Supercomputing (CDROM) ER - TY - CONF T1 - Shape from Video T2 - Computer Vision and Pattern Recognition, IEEE Computer Society Conference on Y1 - 1999 A1 - Brodsky, Tomas A1 - Fermüller, Cornelia A1 - Aloimonos, J. KW - epipolar minimization KW - model extraction KW - Motion analysis KW - vision and graphics AB - This paper presents a novel technique for recovering the shape of a static scene from a video sequence due to a rigidly moving camera. The solution procedure consists of two stages. In the first stage, the rigid motion of the camera at each instant in time is recovered. This provides the transformation between successive viewing positions. The solution is achieved through new constraints which relate 3D motion and shape directly to the image derivatives. These constraints allow the combination of the processes of 3D motion estimation and segmentation by exploiting the geometry and statistics inherent in the data. In the second stage the scene surfaces are reconstructed through an optimization procedure which utilizes data from all the frames of a short video sequence. A number of experimental results demonstrate the potential of the approach. JA - Computer Vision and Pattern Recognition, IEEE Computer Society Conference on PB - IEEE Computer Society CY - Los Alamitos, CA, USA VL - 2 M3 - http://doi.ieeecomputersociety.org/10.1109/CVPR.1999.784622 ER - TY - JOUR T1 - Sheet metal bending: generating shared setups JF - TRANSACTIONS-AMERICAN SOCIETY OF MECHANICAL ENGINEERS JOURNAL OF MANUFACTURING SCIENCE AND ENGINEERING Y1 - 1999 A1 - Gupta,S.K. A1 - Bourne,D. A. AB - Contemporary process planners for sheet metal bending solve the process planning problemfor individual parts. Quite often, many different parts can be produced on shared setups. However, plans generated by current process planning systems fail to exploit this commonality between setups and try to generate optimal setups for individual parts. In this paper, we present an algorithm for multi-part setup planning for sheet metal bending. This algorithm takes a set of parts and operation sequences for these parts, and tries to find a shared setup plan that can work for every part in the set. Setup changes constitute a major portion of the production time in batch production environments. Therefore, multi-part setup planning techniques can be used to significantly cut down the total number of setups and increase the overall through-put. VL - 121 UR - http://terpconnect.umd.edu/~skgupta/Publication/JMSE99_Gupta_draft.pdf ER - TY - JOUR T1 - Simple: A Methodology for Programming High Performance Algorithms on Clusters of Symmetric Multiprocessors (SMPs) JF - Journal of Parallel and Distributed Computing Y1 - 1999 A1 - Bader,David A. A1 - JaJa, Joseph F. KW - cluster computing KW - communication primitives KW - experimental parallel algorithms KW - message passing (MPI) KW - Parallel algorithms KW - parallel performance KW - shared memory KW - symmetric multiprocessors (SMP) AB - We describe a methodology for developing high performance programs running on clusters of SMP nodes. The SMP cluster programming methodology is based on a small prototype kernel (Simple) of collective communication primitives that make efficient use of the hybrid shared and message-passing environment. We illustrate the power of our methodology by presenting experimental results for sorting integers, two-dimensional fast Fourier transforms (FFT), and constraint-satisfied searching. Our testbed is a cluster of DEC AlphaServer 2100 4/275 nodes interconnected by an ATM switch. VL - 58 SN - 0743-7315 UR - http://www.sciencedirect.com/science/article/pii/S0743731599915411 CP - 1 M3 - 10.1006/jpdc.1999.1541 ER - TY - CONF T1 - Single display groupware: a model for co-present collaboration T2 - Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit Y1 - 1999 A1 - Stewart,J. A1 - Bederson, Benjamin B. A1 - Druin, Allison JA - Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit ER - TY - CHAP T1 - A Survey of Current Paradigms in Machine Translation T2 - Advances in Computers Y1 - 1999 A1 - Dorr, Bonnie J A1 - Jordan,Pamela W. A1 - Benoit,John W. ED - Zelkowitz, Marvin V AB - This paper is a survey of the current machine translation research in the US, Europe and Japan. A short history of machine translation is presented first, followed by an overview of the current research work. Representative examples of a wide range of different approaches adopted by machine translation researchers are presented. These are described in detail along with a discussion of the practicalities of scaling up these approaches for operational environments. In support of this discussion, issues in, and techniques for, evaluating machine translation systems are addressed. JA - Advances in Computers PB - Elsevier VL - Volume 49 SN - 0065-2458 UR - http://www.sciencedirect.com/science/article/pii/S006524580860282X ER - TY - JOUR T1 - Synthesis of embedded software from synchronous dataflow specifications JF - The Journal of VLSI Signal Processing Y1 - 1999 A1 - Bhattacharyya, Shuvra S. A1 - Murthy,P. K A1 - Lee,E. A VL - 21 CP - 2 ER - TY - JOUR T1 - TennisViewer: A Browser for Competition Trees JF - Readings in information visualization: using vision to think Y1 - 1999 A1 - Johnson,B. A1 - Shneiderman, Ben A1 - Baker,MJ A1 - Eick,SG ER - TY - JOUR T1 - A Theory of Efficiency for Markovian Processes JF - University of Bologna Y1 - 1999 A1 - Bernardo,M. A1 - Cleaveland, Rance ER - TY - RPRT T1 - XMT-M: A Scalable Decentralized Processor Y1 - 1999 A1 - Berkovich,Efraim A1 - Nuzman,Joseph A1 - Franklin,Manoj A1 - Jacob,Bruce A1 - Vishkin, Uzi KW - Technical Report AB - A defining challenge for research in computer science and engineering hasbeen the ongoing quest for reducing the completion time of a single computation task. Even outside the parallel processing communities, there is little doubt that the key to further progress in this quest is to do parallel processing of some kind. A recently proposed parallel processing framework that spans the entire spectrum from (parallel) algorithms to architecture to implementation is the explicit multi-threading (XMT) framework. This framework provides: (i) simple and natural parallel algorithms for essentially every general-purpose application, including notoriously difficult irregular integer applications, and (ii) a multi-threaded programming model for these algorithms which allows an ``independence-of-order'' semantics: every thread can proceed at its own speed, independent of other concurrent threads. To the extent possible, the XMT framework uses established ideas in parallel processing. This paper presents XMT-M, a microarchitecture implementation of the XMT model that is possible with current technology. XMT-M offers an engineering design point that addresses four concerns: buildability, programmability, performance, and scalability. The XMT-M hardware is geared to execute multiple threads in parallel on a single chip: relying on very few new gadgets, it can execute parallel threads without busy-waits! Existing code can be run on XMT-M as a single thread without any modifications, thereby providing backward compatibility for commercial acceptance. Simulation-based studies of XMT-M demonstrate considerable improvements in performance relative to the best serial processor even for small, and therefore practical, input sizes. (Also cross-referenced as UMIACS-TR-99-55) PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-99-55 UR - http://drum.lib.umd.edu//handle/1903/1030 ER - TY - CONF T1 - AQuA: an adaptive architecture that provides dependable distributed objects T2 - Seventeenth IEEE Symposium on Reliable Distributed Systems Y1 - 1998 A1 - Cukier, Michel A1 - Ren,J. A1 - Sabnis,C. A1 - Henke,D. A1 - Pistole,J. A1 - Sanders,W. H. A1 - Bakken,D. E. A1 - Berman,M.E. A1 - Karr,D. A. A1 - Schantz,R.E. KW - adaptive architecture KW - AQuA KW - availability requests KW - client-server systems KW - commercial off-the-shelf hardware KW - CORBA KW - dependability manager KW - dependability requirements KW - dependable distributed objects KW - distributed object management KW - Ensemble protocol stack KW - Fault tolerance KW - group communication services KW - middleware software KW - Object Request Brokers KW - process-level communication KW - proteus KW - Quality Objects KW - replication KW - software fault tolerance KW - Software quality AB - Dependable distributed systems are difficult to build. This is particularly true if they have dependability requirements that change during the execution of an application, and are built with commercial off-the-shelf hardware. In that case, fault tolerance must be achieved using middleware software, and mechanisms must be provided to communicate the dependability requirements of a distributed application to the system and to adapt the system's configuration to try to achieve the desired dependability. The AQuA architecture allows distributed applications to request a desired level of availability using the Quality Objects (QuO) framework and includes a dependability manager that attempts to meet requested availability levels by configuring the system in response to outside requests and changes in system resources due to faults. The AQuA architecture uses the QuO runtime to process and invoke availability requests, the Proteus dependability manager to configure the system in response to faults and availability requests, and the Ensemble protocol stack to provide group communication services. Furthermore, a CORBA interface is provided to application objects using the AQuA gateway. The gateway provides a mechanism to translate between process-level communication, as supported by Ensemble, and IIOP messages, understood by Object Request Brokers. Both active and passive replication are supported, and the replication type to use is chosen based on the performance and dependability requirements of particular distributed applications JA - Seventeenth IEEE Symposium on Reliable Distributed Systems M3 - 10.1109/RELDIS.1998.740506 ER - TY - CHAP T1 - Beyond the Epipolar Constraint: Integrating 3D Motion and Structure Estimation T2 - 3D Structure from Multiple Images of Large-Scale Environments3D Structure from Multiple Images of Large-Scale Environments Y1 - 1998 A1 - Brodský,Tomáš A1 - Fermüller, Cornelia A1 - Aloimonos, J. ED - Koch,Reinhard ED - Van Gool,Luc AB - This paper develops a novel solution to the problem of recovering the structure of a scene given an uncalibrated video sequence depicting the scene. The essence of the technique lies in a method for recovering the rigid transformation between the different views in the image sequence. Knowledge of this 3D motion allows for self-calibration and for subsequent recovery of 3D structure. The introduced method breaks away from applying only the traditionally used epipolar constraint and introduces a new constraint based on the interaction between 3D motion and shape. Up to now, structure from motion algorithms proceeded in two well defined steps, where the first and most important step is recovering the rigid transformation between two views, and the subsequent step is using this transformation to compute the structure of the scene in view. Here both aforementioned steps are accomplished in a synergistic manner. Existing approaches to 3D motion estimation are mostly based on the use of optic flow which however poses a problem at the locations of depth discontinuities. If we knew where depth discontinuities were, we could (using a multitude of approaches based on smoothness constraints) estimate accurately flow values for image patches corresponding to smooth scene patches; but to know the discontinuities requires solving the structure from motion problem first. In the past this dilemma has been addressed by improving the estimation of flow through sophisticated optimization techniques, whose performance often depends on the scene in view. In this paper the main idea is based on the interaction between 3D motion and shape which allows us to estimate the 3D motion while at the same time segmenting the scene. If we use a wrong 3D motion estimate to compute depth, then we obtain a distorted version of the depth function. The distortion, however, is such that the worse the motion estimate, the more likely we are to obtain depth estimates that are locally unsmooth, i.e., they vary more than the correct ones. Since local variability of depth is due either to the existence of a discontinuity or to a wrong 3D motion estimate, being able to differentiate between these two cases provides the correct motion, which yields the “smoothest” estimated depth as well as the image locations of scene discontinuities. Although no optic flow values are computed, we show that our algorithm is very much related to minimizing the epipolar constraint when the scene in view is smooth. When however the imaged scene is not smooth, the introduced constraint has in general different properties from the epipolar constraint and we present experimental results with real sequences where it performs better. JA - 3D Structure from Multiple Images of Large-Scale Environments3D Structure from Multiple Images of Large-Scale Environments T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1506 SN - 978-3-540-65310-3 UR - http://dx.doi.org/10.1007/3-540-49437-5_8 ER - TY - CONF T1 - Clustering appearances of 3D objects T2 - Computer Vision and Pattern Recognition, 1998. Proceedings. 1998 IEEE Computer Society Conference on Y1 - 1998 A1 - Basri,R. A1 - Roth,D. A1 - Jacobs, David W. KW - 3D KW - clustering;image KW - clustering;sequences KW - images;unsupervised KW - objects;local KW - of KW - properties;reliable KW - recognition; KW - sequences;object AB - We introduce a method for unsupervised clustering of images of 3D objects. Our method examines the space of all images and partitions the images into sets that form smooth and parallel surfaces in this space. It further uses sequences of images to obtain more reliable clustering. Finally, since our method relies on a non-Euclidean similarity measure we introduce algebraic techniques for estimating local properties of these surfaces without first embedding the images in a Euclidean space. We demonstrate our method by applying it to a large database of images JA - Computer Vision and Pattern Recognition, 1998. Proceedings. 1998 IEEE Computer Society Conference on M3 - 10.1109/CVPR.1998.698639 ER - TY - CONF T1 - Comparing images under variable illumination T2 - Computer Vision and Pattern Recognition, 1998. Proceedings. 1998 IEEE Computer Society Conference on Y1 - 1998 A1 - Jacobs, David W. A1 - Belhumeur,P. N. A1 - Basri,R. KW - conditions;matching KW - illumination;visual KW - images;point KW - Lambertian KW - matching;object KW - model;database;lighting KW - object KW - recognition; KW - recognition;image KW - reflectance KW - sources;pose;variable AB - We consider the problem of determining whether two images come from different objects or the same object in the same pose, but under different illumination conditions. We show that this problem cannot be solved using hard constraints: even using a Lambertian reflectance model, there is always an object and a pair of lighting conditions consistent with any two images. Nevertheless, we show that for point sources and objects with Lambertian reflectance, the ratio of two images from the same object is simpler than the ratio of images from different objects. We also show that the ratio of the two images provides two of the three distinct values in the Hessian matrix of the object's surface. Using these observations, we develop a simple measure for matching images under variable illumination, comparing its performance to other existing methods on a database of 450 images of 10 individuals JA - Computer Vision and Pattern Recognition, 1998. Proceedings. 1998 IEEE Computer Society Conference on M3 - 10.1109/CVPR.1998.698668 ER - TY - CONF T1 - Culture conflicts in software engineering technology transfer T2 - NASA Goddard Software Engineering Workshop Y1 - 1998 A1 - Zelkowitz, Marvin V A1 - Wallace,D. R A1 - Binkley,D. AB - Although the need to transition new technology to improve the process of developing quality software products is well understood, the computer software industry has done a poor job of carrying out that need. All too often new software technology is touted as the next "silver bullet" to be adopted, only to fail and disappear within a very short period. New technologies are often adopted without any convincing evidence that they will be effective, yet other technologies are ignored despite the published data that they will be useful. It is cClearly there is a clash between those developing new technologies and those responsible for developing quality products. In this paper we discuss a study conducted among a large group of computer software professionals in order to understand what techniques can be used to support the introduction of new technologies, and to understand the biases and opinions of those charged with researching, developing or implementing those new technologies. This study indicates which evaluation techniques are viewed as most successful under various conditions. We show that the research and industrial communities do indeed have different perspectives, which leads to a clash between the goals of the technology developers researchers and the needs of the technology users. JA - NASA Goddard Software Engineering Workshop ER - TY - RPRT T1 - Designing to facilitate browsing: A look back at the Hyperties workstation browser Y1 - 1998 A1 - Shneiderman, Ben A1 - Plaisant, Catherine A1 - Botafogo,Rodrigo A1 - Hopkins,Don A1 - Weiland,William KW - Technical Report AB - Since browsing hypertext can present a formidable cognitivechallenge, user interface design plays a major role in determining acceptability. In the Unix workstation version of Hyperties, a research-oriented prototype, we focussed on design features that facilitate browsing. We first give a general overview of Hyperties and its markup language. Customizable documents can be generated by the conditional text feature that enables dynamic and selective display of text and graphics. In addition we present: - an innovative solution to link identification: pop-out graphical buttons of arbitrary shape. - application of pie menus to permit low cognitive load actions that reduce the distraction of common actions, such as page turning or window selection. - multiple window selection strategies that reduce clutter and housekeeping effort. We preferred piles-of-tiles, in which standard-sized windows were arranged in a consistent pattern on the display and actions could be done rapidly, allowing users to concentrate on the contents. (Also cross-referenced as CAR-TR-494) JA - Technical Reports of the Computer Science Department, University of Maryland UR - http://drum.lib.umd.edu/handle/1903/362 ER - TY - JOUR T1 - Determining the similarity of deformable shapes JF - Vision Research Y1 - 1998 A1 - Basri,Ronen A1 - Costa,Luiz A1 - Geiger,Davi A1 - Jacobs, David W. AB - Determining the similarity of two shapes is a significant task in both machine and human vision systems that must recognize or classify objects. The exact properties of human shape similarity judgements are not well understood yet, and this task is particularly difficult in domains where the shapes are not related by rigid transformations. In this paper we identify a number of possibly desirable properties of a shape similarity method, and determine the extent to which these properties can be captured by approaches that compare local properties of the contours of the shapes, through elastic matching. Special attention is devoted to objects that possess articulations, i.e. articulated parts. Elastic matching evaluates the similarity of two shapes as the sum of local deformations needed to change one shape into another. We show that similarities of part structure can be captured by such an approach, without the explicit computation of part structure. This may be of importance, since although parts appear to play a significant role in visual recognition, it is difficult to stably determine part structure. We also show novel results about how one can evaluate smooth and polyhedral shapes with the same method. Finally, we describe shape similarity effects that cannot be handled by current approaches. VL - 38 SN - 0042-6989 UR - http://www.sciencedirect.com/science/article/pii/S0042698998000431 CP - 15–16 M3 - 10.1016/S0042-6989(98)00043-1 ER - TY - CONF T1 - Digital dynamic telepathology–the Virtual Microscope. T2 - Proceedings of the AMIA Symposium Y1 - 1998 A1 - Afework,A. A1 - Beynon,M. D A1 - Bustamante,F. A1 - Cho,S. A1 - Demarzo,A. A1 - Ferreira,R. A1 - Miller,R. A1 - Silberman,M. A1 - Saltz, J. A1 - Sussman, Alan A1 - others JA - Proceedings of the AMIA Symposium ER - TY - RPRT T1 - Direction of Arrival and the Rank-Revealing URV Decomposition Y1 - 1998 A1 - Boman,E. C A1 - Griffen,M. F A1 - Stewart, G.W. KW - Technical Report AB - In many practical direction-of-arrival (DOA) problems the numberof sources and their directions from an antenna array do not remain stationary. Hence a practical DOA algorithm must be able to track changes with a minimal number of snapshots. In this paper we describe DOA algorithms, based on a new decomposition, that are not expensive to compute or difficult to update. The algorithms are compared with algorithms based on the singular value decomposition (SVD). (Also cross-referenced as UMIACS-TR-91-166) PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-91-166 UR - http://drum.lib.umd.edu/handle/1903/561 ER - TY - JOUR T1 - Directions of Motion Fields are Hardly Ever Ambiguous JF - International Journal of Computer Vision Y1 - 1998 A1 - Brodsky, Tomas A1 - Fermüller, Cornelia A1 - Aloimonos, J. AB - If instead of the full motion field, we consider only the direction of the motion field due to a rigid motion, what can we say about the three-dimensional motion information contained in it? This paper provides a geometric analysis of this question based solely on the constraint that the depth of the surfaces in view is positive. The motivation behind this analysis is to provide a theoretical foundation for image constraints employing only the sign of flow in various directions and justify their utilization for addressing 3D dynamic vision problems. VL - 26 SN - 0920-5691 UR - http://dx.doi.org/10.1023/A:1007928406666 CP - 1 ER - TY - JOUR T1 - EFFICIENT DETERMINATION OF SHAPE FROM MULTIPLE IMAGES CONTAINING PARTIAL INFORMATION JF - Pattern Recognition Y1 - 1998 A1 - Basri,Ronen A1 - GROVE,ADAM J. A1 - Jacobs, David W. KW - 2-D shape recovery from multiple images KW - NP-complete KW - Shape recovery with occlusion AB - We consider the problem of reconstructing the shape of a 2-D object from multiple partial images related by scaled translations, in the presence of occlusion. Lindenbaum and Bruckstein have considered this problem in the specific case of a translating object seen by small sensors, for application to the understanding of insect vision. Their solution is limited by the fact that its run time is exponential in the number of images and sensors. We generalize the problem to allow for arbitrary types of occlusion of objects that translate and change scale. We show that this more general version of the problem can be solved in time that is polynomial in the number of sensors, but that even the original problem posed by Lindenbaum and Bruckstein is, in fact, NP-hard when the number of images is unbounded. Finally, we consider the case where the object is known to be convex. We show that Lindenbaum and Bruckstein’s version of the problem is then efficiently solvable even when many images are used, as is the general problem in certain more restricted cases. VL - 31 SN - 0031-3203 UR - http://www.sciencedirect.com/science/article/pii/S0031320398000508 CP - 11 M3 - 10.1016/S0031-3203(98)00050-8 ER - TY - JOUR T1 - Emergent patterns of teaching/learning in electronic classrooms JF - Educational Technology Research and Development Y1 - 1998 A1 - Shneiderman, Ben A1 - Borkowski,Ellen A1 - Alavi,Maryam A1 - Norman,Kent AB - Novel patterns of teaching/learning have emerged from faculty and students who use our three teaching/learning theaters at the University of Maryland, College Park. These fully-equipped electronic classrooms have been used by 74 faculty in 264 semester-long courses since the fall of 1991 with largely enthusiastic reception by both faculty and students. The designers of the teaching/learning theaters sought to provide a technologically rich environment and a support staff so that faculty could concentrate on changing the traditional lecture from its unidirectional information flow to a more collaborative activity. As faculty have evolved their personal styles in using the electronic classrooms, novel patterns of teaching/learning have emerged. In addition to enhanced lectures, we identified three common patterns: (a) active individual learning, (b) small-group collaborative learning, and (c) entire-class collaborative learning. VL - 46 SN - 1042-1629 UR - http://dx.doi.org/10.1007/BF02299671 CP - 4 ER - TY - JOUR T1 - An Empirical Study of Perspective-Based Usability Inspection JF - Proceedings of the Human Factors and Ergonomics Society Annual MeetingProceedings of the Human Factors and Ergonomics Society Annual Meeting Y1 - 1998 A1 - Zhang,Zhijun A1 - Basili, Victor R. A1 - Shneiderman, Ben AB - Inspection is a fundamental means of achieving software usability. Past research showed that during usability inspection the success rate (percentage of problems detected) of each individual inspector was rather low. We developed perspective-based usability inspection, which divides the large variety of usability issues along different perspectives and focuses each inspection session on one perspective. We conducted a controlled experiment to study its effectiveness, using a post-test only control group experimental design, with 24 professionals as subjects. The control group used heuristic evaluation, which is the most popular technique for usability inspection. The experimental results are that 1) for usability problems covered by each perspective, the inspectors using that perspective had higher success rate than others; 2) for all usability problems, perspective inspectors had higher average success rate than heuristic inspectors; 3) for all usability problems, the union of three perspective inspectors (with one from each perspective) had higher average success rate than the union of three heuristic inspectors. VL - 42 SN - 1071-1813, UR - http://pro.sagepub.com/content/42/19/1346 CP - 19 M3 - 10.1177/154193129804201904 ER - TY - CONF T1 - Explicit Multi-Threading (XMT) bridging models for instruction parallelism (extended abstract) T2 - Proceedings of the tenth annual ACM symposium on Parallel algorithms and architectures Y1 - 1998 A1 - Vishkin, Uzi A1 - Dascal,S. A1 - Berkovich,E. A1 - Nuzman,J. JA - Proceedings of the tenth annual ACM symposium on Parallel algorithms and architectures ER - TY - JOUR T1 - Extension of Spherical Harmonic Method to RF Transient Regime JF - Simulation of semiconductor processes and devices 1998: SISPAD 98 Y1 - 1998 A1 - Lin,C. K. A1 - Goldsman,N. A1 - Chang,C. H. A1 - Mayergoyz, Issak D A1 - Aronowitz,S. A1 - Dong,J. A1 - Belova,N. AB - The space and time dependent electron Boltzmann transport equation (BTE)is solved sclf-consistently with the Poisson and transient hole current-continuity equation. A transient Spherical Harmonic expansion method is used to solve the BTE. By this method we can efficiently solve the BTE in the RF regime to observe how the complete distribution function responds to a rapid transient. Calculations on a BJT, which give the time dependent distribution function over a large energy range 0-3eV, throughout the device, as well as average quantities, require only 40 minutes CPU time on an Alpha workstation. ER - TY - JOUR T1 - Facility Location with Dynamic Distance Functions JF - Journal of Combinatorial Optimization Y1 - 1998 A1 - Khuller, Samir A1 - Sussmann,Y. J A1 - Bhatia,Randeep A1 - Guha,Sudipto AB - Facility location problems have always been studied with theassumption that the edge lengths in the network are static anddo not change over time. The underlying network could be used to model a city street networkfor emergency facility location/hospitals, or an electronic network for locating information centers. In any case, it is clear that due to trafficcongestion the traversal time on links changes with time. Very often, we have estimates as to how the edge lengths change over time, and our objective is to choose a set of locations (vertices) ascenters, such that at every time instant each vertex has a center close to it (clearly, the center close to a vertex may change over time). We also provide approximation algorithms as well as hardness results forthe K-center problem under this model. This is the first comprehensive study regarding approximation algorithmsfor facility location for good time-invariant solutions. VL - 2 CP - 3 M3 - 10.1023/A:1009796525600 ER - TY - CONF T1 - Feature-recognition for MEMS extraction Y1 - 1998 A1 - Baidya,B. A1 - Gupta,S.K. A1 - Mukherjee,T. UR - http://www.ece.cmu.edu/~mems/pubs/pdfs/asme/detc/0029_baidya-1998.pdf ER - TY - CONF T1 - A framework for modeling appearance change in image sequences T2 - Computer Vision, 1998. Sixth International Conference on Y1 - 1998 A1 - Black,M. J A1 - Fleet,D. J A1 - Yacoob,Yaser KW - appearance change KW - camera motion KW - complex occlusion events KW - generic photometric events KW - iconic changes KW - illumination KW - image motion KW - Image sequences KW - Motion estimation KW - optical flow AB - Image ldquo;appearance rdquo; may change over time due to a variety of causes such as: 1) object or camera motion; 2) generic photometric events including variations in illumination (e.g. shadows) and specular reflections; and 3) ldquo;iconic changes rdquo; which are specific to the objects being viewed and include complex occlusion events and changes in the material properties of the objects. We propose a general framework for representing and recovering these ldquo;appearance changes rdquo; in an image sequence as a ldquo;mixture rdquo; of different causes. The approach generalizes previous work on optical flow to provide a richer description of image events and more reliable estimates of image motion JA - Computer Vision, 1998. Sixth International Conference on M3 - 10.1109/ICCV.1998.710788 ER - TY - JOUR T1 - Genetic nomenclature for Trypanosoma and Leishmania. JF - Mol Biochem Parasitol Y1 - 1998 A1 - Clayton, C A1 - Adams, M A1 - Almeida, R A1 - Baltz, T A1 - Barrett, M A1 - Bastien, P A1 - Belli, S A1 - Beverley, S A1 - Biteau, N A1 - Blackwell, J A1 - Blaineau, C A1 - Boshart, M A1 - Bringaud, F A1 - Cross, G A1 - Cruz, A A1 - Degrave, W A1 - Donelson, J A1 - El-Sayed, N A1 - Fu, G A1 - Ersfeld, K A1 - Gibson, W A1 - Gull, K A1 - Ivens, A A1 - Kelly, J A1 - Vanhamme, L KW - Animals KW - Leishmania KW - Terminology as Topic KW - Trypanosoma VL - 97 CP - 1-2 ER - TY - JOUR T1 - Genetic nomenclature for Trypanosoma and Leishmania. JF - Molecular and biochemical parasitology Y1 - 1998 A1 - Clayton,C. A1 - Adams,M. A1 - Almeida,R. A1 - Baltz,T. A1 - Barrett,M. A1 - Bastien,P. A1 - Belli,S. A1 - Beverley,S. A1 - Biteau,N. A1 - Blackwell,J. A1 - others VL - 97 CP - 1-2 ER - TY - JOUR T1 - Implementing a zooming User Interface: experience building Pad++ JF - Software: Practice and Experience Y1 - 1998 A1 - Bederson, Benjamin B. A1 - Meyer,Jon KW - 3D graphics KW - animation KW - Pad++ KW - real‐time computer graphics KW - User Interface Management Systems (UIMS) KW - windowing systems KW - zooming User Interfaces (ZUIs) AB - We are investigating a novel user interface paradigm based on zooming, in which users are presented with a zooming view of a huge planar information surface. We have developed a system called Pad++ to explore this approach. The implementation of Pad++ is related to real-time 3D graphics systems and to 2D windowing systems. However, the zooming nature of Pad++ requires new approaches to rendering, screen management, and spatial indexing. In this paper, we describe the design and implementation of the Pad++ engine, focusing in particular on rendering and data structure issues. Our goal is to present useful techniques that can be adopted in other real-time graphical systems, and also to discuss how 2D zooming systems differ from other graphical systems. © 1998 John Wiley & Sons, Ltd. VL - 28 SN - 1097-024X UR - http://onlinelibrary.wiley.com/doi/10.1002/(SICI)1097-024X(199808)28:10<1101::AID-SPE190>3.0.CO;2-V/abstract CP - 10 M3 - 10.1002/(SICI)1097-024X(199808)28:10<1101::AID-SPE190>3.0.CO;2-V ER - TY - CONF T1 - An intelligent environment for simulating mechanical assembly operations Y1 - 1998 A1 - Gupta,S.K. A1 - Paredis,C. J. J. A1 - Sinha,R. A1 - Wang,C. H. A1 - Brown,P. F. AB - Rapid technical advances in many different areas of scientificcomputing provide the enabling technologies for creating a com- prehensive simulation and visualization environment for assembly design and planning. We have built an intelligent environment in which simple simulations can be composed together to create com- plex simulations for detecting potential assembly problems. Our goal in this project is to develop high fidelity assembly simulation and visualization tools that can detect assembly related problems without going through physical mock-ups. In addition, these tools can be used to create easy-to-visualize instructions for performing assembly and service operations. UR - http://www.cs.cmu.edu/afs/cs.cmu.edu/Web/People/paredis/pubs/DFM98.pdf ER - TY - RPRT T1 - Looking to Parallel Algorithms for ILP and Decentralization Y1 - 1998 A1 - Berkovich,Efraim A1 - Jacob,Bruce A1 - Nuzman,Joseph A1 - Vishkin, Uzi KW - Technical Report AB - We introduce explicit multi-threading (XMT), a decentralized architecturethat exploits fine-grained SPMD-style programming; a SPMD program can translate directly to MIPS assembly language using three additional instruction primitives. The motivation for XMT is: (i) to define an inherently decentralizable architecture, taking into account that the performance of future integrated circuits will be dominated by wire costs, (ii) to increase available instruction-level parallelism (ILP) by leveraging expertise in the world of parallel algorithms, and (iii) to reduce hardware complexity by alleviating the need to detect ILP at run-time: if parallel algorithms can give us an overabundance of work to do in the form of thread-level parallelism, one can extract instruction-level parallelism with greatly simplified dependence-checking. We show that implementations of such an architecture tend towards decentralization and that, when global communication is necessary, overall performance is relatively insensitive to large on-chip delays. We compare the performance of the design to more traditional parallel architectures and to a high-performance superscalar implementation, but the intent is merely to illustrate the performance behavior of the organization and to stimulate debate on the viability of introducing SPMD to the single-chip processor domain. We cannot offer at this stage hard comparisons with well-researched models of execution. When programming for the SPMD model, the total number of operations that the processor has to perform is often slightly higher. To counter this, we have observed that the length of the critical path through the dynamic execution graph is smaller than in the serial domain, and the amount of ILP is correspondingly larger. Fine-grained SPMD programming connects with a broad knowledge base in parallel algorithms and scales down to provide good performance relative to high-performance superscalar designs even with small input sizes and small numbers of functional units. Keywords: Fine-grained SPMD, parallel algorithms. spawn-join, prefix-sum, instruction-level parallelism, decentralized architecture. (Also cross-referenced as UMIACS-TR- 98-40) PB - Department of Computer Science, University of Maryland, College Park VL - CS-TR-3921 UR - http://drum.lib.umd.edu//handle/1903/496 ER - TY - JOUR T1 - A new deterministic parallel sorting algorithm with an experimental evaluation JF - Journal of Experimental Algorithmics (JEA) Y1 - 1998 A1 - Helman,David R. A1 - JaJa, Joseph F. A1 - Bader,David A. KW - generalized sorting KW - integer sorting KW - Parallel algorithms KW - parallel performance KW - sorting by regular sampling AB - We introduce a new deterministic parallel sorting algorithm for distributed memory machines based on the regular sampling approach. The algorithm uses only two rounds of regular all-to-all personalized communication in a scheme that yields very good load balancing with virtually no overhead. Moreover, unlike previous variations, our algorithm efficiently handles the presence of duplicate values without the overhead of tagging each element with a unique identifier. This algorithm was implemented in SPLIT-C and run on a variety of platforms, including the Thinking Machines CM-5, the IBM SP-2-WN, and the Cray Research T3D. We ran our code using widely different benchmarks to examine the dependence of our algorithm on the input distribution. Our experimental results illustrate the efficiency and scalability of our algorithm across different platforms. In fact, the performance compares closely to that of our random sample sort algorithm, which seems to outperform all similar algorithms known to the authors on these platforms. Together, their performance is nearly invariant over the set of input distributions, unlike previous efficient algorithms. However, unlike our randomized sorting algorithm, the performance and memory requirements of our regular sorting algorithm can be deterministically guaranteed. VL - 3 SN - 1084-6654 UR - http://doi.acm.org/10.1145/297096.297128 M3 - 10.1145/297096.297128 ER - TY - CONF T1 - Optimization of wrappers and mediators for web accessible data sources (websources) T2 - Workshop Web Inf. Data Management (WIDM), Washington DC Y1 - 1998 A1 - Bright,L. A1 - Raschid, Louiqa A1 - Vidal,M. E JA - Workshop Web Inf. Data Management (WIDM), Washington DC ER - TY - RPRT T1 - Parallel Algorithms for Image Histogramming and Connected Components with an Experimental Study Y1 - 1998 A1 - Bader,David A. A1 - JaJa, Joseph F. KW - Technical Report AB - This paper presents efficient and portable implementations of two useful primitives in image processing algorithms, histogramming and connected components. Our general framework is a single-address space, distributed memory programming model. We use efficient techniques for distributing and coalescing data as well as efficient combinations of task and data parallelism. Our connected components algorithm uses a novel approach for parallel merging which performs drastically limited updating during iterative steps, and concludes with a total consistency update at the final step. The algorithms have been coded in Split-C and run on a variety of platforms. Our experimental results are consistent with the theoretical analysis and provide the best known execution times for these two primitives, even when compared with machine specific implementations. More efficient implementations of Split-C will likely result in even faster execution times. (Also cross-referenced as UMIACS-TR-94-133.) PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-94-133 UR - http://drum.lib.umd.edu/handle/1903/681 ER - TY - RPRT T1 - A Parallel Sorting Algorithm With an Experimental Study Y1 - 1998 A1 - Helman,David R. A1 - Bader,David A. A1 - JaJa, Joseph F. KW - Technical Report AB - Previous schemes for sorting on general-purpose parallel machineshave had to choose between poor load balancing and irregular communication or multiple rounds of all-to-all personalized communication. In this paper, we introduce a novel variation on sample sort which uses only two rounds of regular all-to-all personalized communication in a scheme that yields very good load balancing with virtually no overhead. This algorithm was implemented in Split-C and run on a variety of platforms, including the Thinking Machines CM-5, the IBM SP-2, and the Cray Research T3D. We ran our code using widely different benchmarks to examine the dependence of our algorithm on the input distribution. Our experimental results are consistent with the theoretical analysis and illustrate the efficiency and scalability of our algorithm across different platforms. In fact, it seems to outperform all similar algorithms known to the authors on these platforms, and its performance is invariant over the set of input distributions unlike previous efficient algorithms. Our results also compare favorably with those reported for the simpler ranking problem posed by the NAS Integer Sorting (IS) Benchmark. (Also cross-referenced as UMIACS-TR-95-102) PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-95-102 UR - http://drum.lib.umd.edu/handle/1903/768 ER - TY - CONF T1 - Parameterized modeling and recognition of activities T2 - Computer Vision, 1998. Sixth International Conference on Y1 - 1998 A1 - Yacoob,Yaser A1 - Black,M. J KW - activities recognition KW - admissible transformations KW - articulated object motion KW - deformable object motion KW - exemplar activities KW - image motion parameters KW - Image sequences KW - Motion estimation KW - parameterized modeling KW - recognition KW - spatio-temporal variants AB - A framework for modeling and recognition of temporal activities is proposed. The modeling of sets of exemplar activities is achieved by parameterizing their representation in the form of principal components. Recognition of spatio-temporal variants of modeled activities is achieved by parameterizing the search in the space of admissible transformations that the activities can undergo. Experiments on recognition of articulated and deformable object motion from image motion parameters are presented JA - Computer Vision, 1998. Sixth International Conference on M3 - 10.1109/ICCV.1998.710709 ER - TY - JOUR T1 - A Randomized Parallel Sorting Algorithm with an Experimental Study JF - Journal of Parallel and Distributed Computing Y1 - 1998 A1 - Helman,David R. A1 - Bader,David A. A1 - JaJa, Joseph F. KW - generalized sorting KW - integer sorting, sample sort, parallel performance KW - Parallel algorithms AB - Previous schemes for sorting on general-purpose parallel machines have had to choose between poor load balancing and irregular communication or multiple rounds of all-to-all personalized communication. In this paper, we introduce a novel variation on sample sort which uses only two rounds of regular all-to-all personalized communication in a scheme that yields very good load balancing with virtually no overhead. Moreover, unlike previous variations, our algorithm efficiently handles the presence of duplicate values without the overhead of tagging each element with a unique identifier. This algorithm was implemented in Split-C and run on a variety of platforms, including the Thinking Machines CM-5, the IBM SP-2, and the Cray Research T3D. We ran our code using widely different benchmarks to examine the dependence of our algorithm on the input distribution. Our experimental results illustrate the efficiency and scalability of our algorithm across different platforms. In fact, it seems to outperform all similar algorithms known to the authors on these platforms, and its performance is invariant over the set of input distributions unlike previous efficient algorithms. Our results also compare favorably with those reported for the simpler ranking problem posed by the NAS Integer Sorting (IS) Benchmark. VL - 52 SN - 0743-7315 UR - http://www.sciencedirect.com/science/article/pii/S0743731598914629 CP - 1 M3 - 10.1006/jpdc.1998.1462 ER - TY - RPRT T1 - Scalable Data Parallel Algorithms for Texture Synthesis and Compression using Gibbs Random Fields Y1 - 1998 A1 - Bader,David A. A1 - JaJa, Joseph F. A1 - Chellapa, Rama KW - Technical Report AB - This paper introduces scalable data parallel algorithms for image processing. Focusing on Gibbs and Markov Random Field model representation for textures, we present parallel algorithms for texture synthesis, compression, and maximum likelihood parameter estimation, currently implemented on Thinking Machines CM-2 and CM-5. Use of fine-grained, data parallel processing techniques yields real-time algorithms for texture synthesis and compression that are substantially faster than the previously known sequential implementations. Although current implementations are on Connection Machines, the methodology presented here enables machine independent scalable algorithms for a number of problems in image processing and analysis. (Also cross-referenced as UMIACS-TR-93-80.) PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-93-80 UR - http://drum.lib.umd.edu/handle/1903/596 ER - TY - CONF T1 - Self-calibration from image derivatives T2 - Sixth International Conference on Computer Vision, 1998 Y1 - 1998 A1 - Brodsky, T. A1 - Fermüller, Cornelia A1 - Aloimonos, J. KW - 3D-rotation KW - active vision KW - Calibration KW - CAMERAS KW - discrete motion KW - Encoding KW - Equations KW - image derivatives KW - image formation KW - image measurements KW - Image motion analysis KW - image motion fields KW - Image reconstruction KW - Image sequences KW - large video databases KW - Layout KW - Levenberg-Marquardt parameter estimation KW - linear pinhole-camera model KW - Motion estimation KW - Motion measurement KW - Optical computing KW - parameter estimation KW - projective transformation KW - rigidly moving camera KW - self-calibration KW - smoothness constraints KW - unknown calibration parameters AB - This study investigates the problem of estimating the calibration parameters from image motion fields induced by a rigidly moving camera with unknown calibration parameters, where the image formation is modeled with a linear pinhole-camera model. The equations obtained show the flow to be clearly separated into a component due to the translation and the calibration parameters and a component due to the rotation and the calibration parameters. A set of parameters encoding the latter component are linearly related to the flow, and from these parameters the calibration can be determined. However, as for discrete motion, in the general case it is not possible, to decouple image measurements from two frames only into their translational and rotational component. Geometrically, the ambiguity takes the form of a part of the rotational component being parallel to the translational component, and thus the scene can be reconstructed only up to a projective transformation. In general, for a full calibration at least four successive image frames are necessary with the 3D-rotation changing between the measurements. The geometric analysis gives rise to a direct self-calibration method that avoids computation of optical flow or point correspondences and uses only normal flow measurements. In this technique the direction of translation is estimated employing in a novel way smoothness constraints. Then the calibration parameters are estimated from the rotational components of several flow fields using Levenberg-Marquardt parameter estimation, iterative in the calibration parameters only. The technique proposed does not require calibration objects in the scene or special camera motions and it also avoids the computation of exact correspondence. This makes it suitable for the calibration of active vision systems which have to acquire knowledge about their intrinsic parameters while they perform other tasks, or as a tool for analyzing image sequences in large video databases JA - Sixth International Conference on Computer Vision, 1998 PB - IEEE SN - 81-7319-221-9 M3 - 10.1109/ICCV.1998.710704 ER - TY - JOUR T1 - Shape from video: Beyond the epipolar constraint JF - Proceedings of the DARPA Image Understanding Workshop Y1 - 1998 A1 - Brodsky, T. A1 - Fermüller, Cornelia A1 - Aloimonos, J. ER - TY - CHAP T1 - Simultaneous estimation of viewing geometry and structure T2 - Computer Vision — ECCV'98Computer Vision — ECCV'98 Y1 - 1998 A1 - Brodský,Tomáš A1 - Fermüller, Cornelia A1 - Aloimonos, J. ED - Burkhardt,Hans ED - Neumann,Bernd AB - Up to now, structure from motion algorithms proceeded in two well defined steps, where the first and most important step is recovering the rigid transformation between two views, and the subsequent step is using this transformation to compute the structure of the scene in view. This paper introduces a novel approach to structure from motion in which both aforementioned steps are accomplished in a synergistic manner. Existing approaches to 3D motion estimation are mostly based on the use of optic flow which however poses a problem at the locations of depth discontinuities. If we knew where depth discontinuities were, we could (using a multitude of approaches based on smoothness constraints) estimate accurately flow values for image patches corresponding to smooth scene patches; but to know the discontinuities requires solving the structure from motion problem first. In the past this dilemma has been addressed by improving the estimation of flow through sophisticated optimization techniques, whose performance often depends on the scene in view. In this paper we follow a different approach. The main idea is based on the interaction between 3D motion and shape which allows us to estimate the 3D motion while at the same time segmenting the scene. If we use a wrong 3D motion estimate to compute depth, then we obtain a distorted version of the depth function. The distortion, however, is such that the worse the motion estimate, the more likely we are to obtain depth estimates that are locally unsmooth, i.e., they vary more than the correct ones. Since local variability of depth is due either to the existence of a discontinuity or to a wrong 3D motion estimate, being able to differentiate between these two cases provides the correct motion, which yields the “smoothest” estimated depth as well as the image location of scene discontinuities. Although no optic flow values are computed, we show that our algorithm is very much related to minimizing the epipolar constraint and we present a number of experimental results with real image sequences indicating the robustness of the method. JA - Computer Vision — ECCV'98Computer Vision — ECCV'98 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1406 SN - 978-3-540-64569-6 UR - http://dx.doi.org/10.1007/BFb0055677 ER - TY - JOUR T1 - Sorting out searching: a user-interface framework for text searches JF - Communications of the ACM Y1 - 1998 A1 - Shneiderman, Ben A1 - Byrd,Donald A1 - Croft,W. Bruce VL - 41 SN - 0001-0782 UR - http://doi.acm.org/10.1145/273035.273069 CP - 4 M3 - 10.1145/273035.273069 ER - TY - RPRT T1 - SRRIT--A FORTRAN Subroutine to Calculate the Dominant Invariant Subspace of a Nonsymmetric Matrix Y1 - 1998 A1 - Bai,Z. A1 - Stewart, G.W. KW - Technical Report AB - SRRIT is a FORTRAN program to calculate an approximateorthonormal basis for a dominant invariant subspace of a real matrix $A$ by the method of simultaneous iteration \cite{stewart76a}. Specifically, given an integer $m$, {\sl SRRIT} attempts to compute a matrix $Q$ with $m$ orthonormal columns and real quasi-triangular matrix $T$ of order $m$ such that the equation \[ AQ = QT \] is satisfied up to a tolerance specified by the user. The eigenvalues of $T$ are approximations to the $m$ largest eigenvalues of $A$, and the columns of $Q$ span the invariant subspace corresponding to those eigenvalues. {\sl SRRIT} references $A$ only through a user provided subroutine to form the product $AQ$; hence it is suitable for large sparse problems. (Also cross-referenced as UMIACS-TR-92-61) PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-92-61 UR - http://drum.lib.umd.edu/handle/1903/572 ER - TY - RPRT T1 - A Survey of Current Paradigms in Machine Translation Y1 - 1998 A1 - Dorr, Bonnie J A1 - Jordan,P.W. A1 - Benoit,J.W. AB - This is paper is a survey of the current machine translation research in the US, Eu-rope, and Japan. A short history of machine translation is presented first, followed by an overview of the current research work. Representative examples of a wide range of different approaches adopted by machine translation researchers are presented. These are described in detail along with a discussion of the practicalities of scaling up these approaches for operational environments. In support of this discussion, issues in, and techniques for, evaluating machine translation systems are discussed. PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park ER - TY - BOOK T1 - Trends in the Early Careers of Life Scientists Y1 - 1998 A1 - Tilghman,S A1 - Astin,HS A1 - Brinkley,W A1 - Chilton,MD A1 - Cummings, Michael P. A1 - Ehrenberg,RG A1 - Fox,MF A1 - Glenn,K A1 - Green,PJ A1 - Hans,S A1 - Kelman,A A1 - LaPidus,J A1 - Levin,B A1 - McIntosh,JR A1 - Riecken,H A1 - Stephen,PE PB - National Academy Press CY - Washington, DC ER - TY - JOUR T1 - Trends in the early careers of life scientists - Preface and executive summary JF - Mol Biol Cell Y1 - 1998 A1 - Tilghman,S A1 - Astin,HS A1 - Brinkley,W A1 - Chilton,MD A1 - Cummings, Michael P. A1 - Ehrenberg,RG A1 - Fox,MF A1 - Glenn,K A1 - Green,PJ A1 - Hans,S A1 - Kelman,A A1 - LaPidus,J A1 - Levin,B A1 - McIntosh,JR A1 - Riecken,H A1 - Stephen,PE VL - 9 CP - 11 ER - TY - CHAP T1 - The Video Yardstick T2 - Modelling and Motion Capture Techniques for Virtual EnvironmentsModelling and Motion Capture Techniques for Virtual Environments Y1 - 1998 A1 - Brodský,Tomáš A1 - Fermüller, Cornelia A1 - Aloimonos, J. ED - Magnenat-Thalmann,Nadia ED - Thalmann,Daniel AB - Given uncalibrated video sequences, how can we recover rich descriptions of the scene content, beyond two-dimensional (2D) measurements such as color/texture or motion fields — descriptions of shape and three-dimensional (3D) motion? This is the well known structure from motion (SFM) problem. Up to now, SFM algorithms proceeded in two well defined steps, where the first and most important step is recovering the rigid transformation between two views, and the subsequent step is using this transformation to compute the structure of the scene in view. This paper introduces a novel approach to structure from motion in which both steps are accomplished in a synergistic manner. It deals with the classical structure from motion problem considering a calibrated camera as well as the extension to an uncalibrated optical device. Existing approaches to estimation of the viewing geometry are mostly based on the use of optic flow, which, however, poses a problem at the locations of depth discontinuities. If we knew where depth discontinuities were, we could (using a multitude of approaches based on smoothness constraints) accurately estimate flow values for image patches corresponding to smooth scene patches; but to know the discontinuities requires solving the structure from motion problem first. In the past this dilemma has been addressed by improving the estimation of flow through sophisticated optimization techniques, whose performance often depends on the scene in view. In this paper we follow a different approach. We directly utilize the image derivatives and employ constraints which involve the 3D motion and shape of the scene, leading to a geometric and statistical estimation problem. The main idea is based on the interaction between 3D motion and shape which allows us to estimate the 3D motion while at the same time segmenting the scene. If we use a wrong 3D motion estimate to compute depth, we obtain a distorted version of the depth function. The distortion, however, is such that the worse the motion estimate, the more likely we are to obtain depth estimates that are locally unsmooth, i.e., they vary more than the correct ones. Since local variability of depth is due either to the existence of a discontinuity or to a wrong 3D motion estimate, being able to differentiate between these two cases provides the correct motion, which yields the “smoothest” estimated depth as well as the image locations of scene discontinuities. We analyze the new constraints introduced by our approach and show their relationship to the minimization of the epipolar constraint, which becomes a special case of our theory. Finally, we present a number of experimental results with real image sequences indicating the robustness of our method and the improvement over traditional methods. The resulting system is a video yardstick that can be applied to any video sequence to recover first the calibration parameters of the camera that captured the video and, subsequently, the structure of the scene. JA - Modelling and Motion Capture Techniques for Virtual EnvironmentsModelling and Motion Capture Techniques for Virtual Environments T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1537 SN - 978-3-540-65353-0 UR - http://dx.doi.org/10.1007/3-540-49384-0_12 ER - TY - CONF T1 - Is the Web really different from everything else? T2 - CHI 98 conference summary on Human factors in computing systems Y1 - 1998 A1 - Shneiderman, Ben A1 - Nielsen,Jakob A1 - Butler,Scott A1 - Levi,Michael A1 - Conrad,Frederick KW - design KW - user experience KW - World Wide Web JA - CHI 98 conference summary on Human factors in computing systems T3 - CHI '98 PB - ACM CY - New York, NY, USA SN - 1-58113-028-7 UR - http://doi.acm.org/10.1145/286498.286545 M3 - 10.1145/286498.286545 ER - TY - CHAP T1 - What is computed by structure from motion algorithms? T2 - Computer Vision — ECCV'98 Y1 - 1998 A1 - Fermüller, Cornelia A1 - Aloimonos, J. ED - Burkhardt,Hans ED - Neumann,Bernd AB - In the literature we find two classes of algorithms which, on the basis of two views of a scene, recover the rigid transformation between the views and subsequently the structure of the scene. The first class contains techniques which require knowledge of the correspondence or the motion field between the images and are based on the epipolar constraint. The second class contains so-called direct algorithms which require knowledge about the value of the flow in one direction only and are based on the positive depth constraint. Algorithms in the first class achieve the solution by minimizing a function representing deviation from the epipolar constraint while direct algorithms find the 3D motion that, when used to estimate depth, produces a minimum number of negative depth values. This paper presents a stability analysis of both classes of algorithms. The formulation is such that it allows comparison of the robustness of algorithms in the two classes as well as within each class. Specifically, a general statistical model is employed to express the functions which measure the deviation from the epipolar constraint and the number of negative depth values, and these functions are studied with regard to their topographic structure, specifically as regards the errors in the 3D motion parameters at the places representing the minima of the functions. The analysis shows that for algorithms in both classes which estimate all motion parameters simultaneously, the obtained solution has an error such that the projections of the translational and rotational errors on the image plane are perpendicular to each other. Furthermore, the estimated projection of the translation on the image lies on a line through the origin and the projection of the real translation. JA - Computer Vision — ECCV'98 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1406 SN - 978-3-540-64569-6 UR - http://dx.doi.org/10.1007/BFb0055678 ER - TY - CONF T1 - When Two Hands Are Better Than One: Enhancing Collaboration Using Single Display Groupware. CHI’98 T2 - Extended Abstracts Y1 - 1998 A1 - Stewart,J. A1 - Raybourn,E. A1 - Bederson, Benjamin B. A1 - Druin, Allison JA - Extended Abstracts ER - TY - CONF T1 - Wrapper generation for Web accessible data sources T2 - 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings Y1 - 1998 A1 - Gruser,J. A1 - Raschid, Louiqa A1 - Vidal,M. E A1 - Bright,L. KW - application program interfaces KW - data mining KW - Databases KW - Educational institutions KW - Electrical capacitance tomography KW - HTML KW - HTML documents KW - Internet KW - Query processing KW - Read only memory KW - Search engines KW - Specification languages KW - Uniform resource locators KW - World Wide Web KW - wrapper generation toolkit KW - WWW AB - There is an increase in the number of data sources that can be queried across the WWW. Such sources typically support HTML forms-based interfaces and search engines query collections of suitably indexed data. The data is displayed via a browser: One drawback to these sources is that there is no standard programming interface suitable for applications to submit queries. Second, the output (answer to a query) is not well structured. Structured objects have to be extracted from the HTML documents which contain irrelevant data and which may be volatile. Third, domain knowledge about the data source is also embedded in HTML documents and must be extracted. To solve these problems, we present technology to define and (automatically) generate wrappers for Web accessible sources. Our contributions are as follows: (1) Defining a wrapper interface to specify the capability of Web accessible data sources. (2) Developing a wrapper generation toolkit of graphical interfaces and specification languages to specify the capability of sources and the functionality of the wrapper (3) Developing the technology to automatically generate a wrapper appropriate to the Web accessible source, from the specifications. JA - 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings PB - IEEE SN - 0-8186-8380-5 M3 - 10.1109/COOPIS.1998.706180 ER - TY - CONF T1 - 3-D to 2-D recognition with regions T2 - Computer Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE Computer Society Conference on Y1 - 1997 A1 - Jacobs, David W. A1 - Basri,R. KW - 2-D KW - algorithms;object KW - complexity;image KW - hard;efficient KW - image;3-D KW - object;computationally KW - poses;computational KW - recognition; KW - recognition;occlusion;occlusions;performance;regions;valid KW - segmentation;object AB - This paper presents a novel approach to parts-based object recognition in the presence of occlusion. We focus on the problem of determining the pose of a 3-D object from a single 2-D image when convex parts of the object have been matched to corresponding regions in the image. We consider three types of occlusions: self-occlusion, occlusions whose locus is identified in the image, and completely arbitrary occlusions. We derive efficient algorithms for the first two cases, and characterize their performance. For the last case, we prove that the problem of finding valid poses is computationally hard, but provide an efficient, approximate algorithm. This work generalizes our previous work on region-based object recognition, which focused on the case of planar models JA - Computer Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE Computer Society Conference on M3 - 10.1109/CVPR.1997.609379 ER - TY - JOUR T1 - Algorithm 776: SRRIT: a Fortran subroutine to calculate the dominant invariant subspace of a nonsymmetric matrix JF - ACM Trans. Math. Softw. Y1 - 1997 A1 - Bai,Z. A1 - Stewart, G.W. KW - invariant subspace KW - nonsymmetric eigenvalue problem KW - project method AB - SRRT is a Fortran program to calculate an approximate orthonomral basis fr a dominant invariant subspace of a real matrix A by the method of simultaneous iteration. Specifically, given an integer m, SRRIT computes a matrix Q with m orthonormal columns and real quasi-triangular matrix T or order m such that the equation AQ = QT is satisfied up to a tolerance specified by the user. The eigenvalues of T are approximations to the m eigenvalues of largest absolute magnitude of A and the columns of Q span the invariant subspace corresponding to those eigenvalues. SRRIT references A only through a user-provided subroutine to form the product AQ; hence it is suitable for large sparse problems. VL - 23 SN - 0098-3500 UR - http://doi.acm.org/10.1145/279232.279234 CP - 4 M3 - 10.1145/279232.279234 ER - TY - JOUR T1 - APGAN and RPMC: Complementary heuristics for translating DSP block diagrams into efficient software implementations JF - Design Automation for Embedded Systems Y1 - 1997 A1 - Bhattacharyya, Shuvra S. A1 - Murthy,P. K A1 - Lee,E. A VL - 2 CP - 1 ER - TY - CONF T1 - Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program T2 - Proceedings of the SIGCHI conference on Human factors in computing systems Y1 - 1997 A1 - Plaisant, Catherine A1 - Marchionini,Gary A1 - Bruns,Tom A1 - Komlodi,Anita A1 - Campbell,Laura KW - browse KW - design process KW - digital libraries KW - dynamic query KW - java KW - preview KW - search KW - web design JA - Proceedings of the SIGCHI conference on Human factors in computing systems T3 - CHI '97 PB - ACM CY - New York, NY, USA SN - 0-89791-802-9 UR - http://doi.acm.org/10.1145/258549.259009 M3 - 10.1145/258549.259009 ER - TY - JOUR T1 - Clarifying search: A user-interface framework for text searches JF - D-lib magazine Y1 - 1997 A1 - Shneiderman, Ben A1 - Byrd,D. A1 - Croft, W.B. AB - Current user interfaces for textual database searching leave much to be desired: individually, they are often confusing, and as a group, they are seriously inconsistent. We propose a four- phase framework for user-interface design: the framework provides common structure and terminology for searching while preserving the distinct features of individual collections and search mechanisms. Users will benefit from faster learning, increased comprehension, and better control, leading to more effective searches and higher satisfaction. VL - 3 CP - 1 ER - TY - JOUR T1 - Comments on "Towards a framework for software measurement validation" JF - Software Engineering, IEEE Transactions on Y1 - 1997 A1 - Morasca,S. A1 - Briand,L.C. A1 - Basili, Victor R. A1 - Weyuker,E.J. A1 - Zelkowitz, Marvin V A1 - Kitchenham,B. A1 - Lawrence Pfleeger,S. A1 - Fenton,N. KW - measurement KW - metrics; KW - software KW - testing;program KW - validation;program KW - verification;software AB - A view of software measurement that disagrees with the model presented by Kitchenham, Pfleeger, and Fenton (1995), is given. Whereas Kitchenham et al. argue that properties used to define measures should not constrain the scale type of measures, the authors contend that that is an inappropriate restriction. In addition, a misinterpretation of Weyuker's (1988) properties is noted. VL - 23 SN - 0098-5589 CP - 3 M3 - 10.1109/32.585506 ER - TY - JOUR T1 - Computer models: A new approach to the investigation of disease JF - MD Computing Y1 - 1997 A1 - Reggia, James A. A1 - Ruppin,E. A1 - Berndt,R. S VL - 14 ER - TY - JOUR T1 - Constancy and similarity JF - Computer Vision and Image Understanding Y1 - 1997 A1 - Basri,R. A1 - Jacobs, David W. VL - 65 CP - 3 ER - TY - CONF T1 - Design and evaluation of incremental data structures and algorithms for dynamic query interfaces T2 - IEEE Symposium on Information Visualization, 1997. Proceedings Y1 - 1997 A1 - Tanin,E. A1 - Beigel,R. A1 - Shneiderman, Ben KW - Algorithm design and analysis KW - Bars KW - Computer science KW - continuous real-time feedback KW - Data structures KW - data visualisation KW - Data visualization KW - database access mechanism KW - Displays KW - DQI algorithms KW - dynamic query interfaces KW - Feedback KW - Graphical user interfaces KW - Heuristic algorithms KW - incremental data structures KW - Information Visualization KW - large databases KW - Manipulator dynamics KW - NASA KW - query formulation KW - query languages KW - Query processing KW - real-time systems KW - small databases KW - User interfaces KW - very large databases KW - visual databases KW - visual languages AB - A dynamic query interface (DQI) is a database access mechanism that provides continuous real-time feedback to the user during query formulation. Previous work shows that DQIs are elegant and powerful interfaces to small databases. Unfortunately, when applied to large databases, previous DQI algorithms slow to a crawl. We present a new incremental approach to DQI algorithms and display updates that work well with large databases, both in theory and in practice. JA - IEEE Symposium on Information Visualization, 1997. Proceedings PB - IEEE SN - 0-8186-8189-6 M3 - 10.1109/INFVIS.1997.636790 ER - TY - CONF T1 - The distributed information search component (disco) and the world wide web T2 - Proc. of ACM SIGMOD Conf. on Management of Data Y1 - 1997 A1 - Naacke,H. A1 - Kapitskaia,O. A1 - Tomasic,A. A1 - Bonnet,P. A1 - Raschid, Louiqa A1 - Amouroux,R. JA - Proc. of ACM SIGMOD Conf. on Management of Data ER - TY - JOUR T1 - Dynamic priorities for modeling real-time JF - Proc. of the Formal Description Techniques and Protocol Specification, Testing and Verification (FORTE X/PSTV XVII’97) Y1 - 1997 A1 - Bhat,G. A1 - Cleaveland, Rance A1 - L\üttgen,G. ER - TY - JOUR T1 - Editorial: Evaluation and assessment in software engineering JF - Information and Software Technology Y1 - 1997 A1 - Kitchenham,B. A1 - Brereton,P. A1 - Budgen,D. A1 - Linkman,S. A1 - Almstrum,V. L A1 - Pfleeger,S. L A1 - Zelkowitz, Marvin V A1 - Wallace,D. VL - 39 CP - 11 ER - TY - CONF T1 - If your version control system could talk T2 - ICSE Workshop on Process Modelling and Empirical Studies of Software Engineering Y1 - 1997 A1 - Ball,T. A1 - Kim,J. M A1 - Porter, Adam A1 - Siy,H. P JA - ICSE Workshop on Process Modelling and Empirical Studies of Software Engineering ER - TY - JOUR T1 - Joint minimization of code and data for synchronous dataflow programs JF - Formal Methods in System Design Y1 - 1997 A1 - Murthy,P. K A1 - Bhattacharyya, Shuvra S. A1 - Lee,E. A VL - 11 CP - 1 ER - TY - CONF T1 - KidPad: a design collaboration between children, technologists, and educators T2 - Proceedings of the SIGCHI conference on Human factors in computing systems Y1 - 1997 A1 - Druin, Allison A1 - Stewart,J. A1 - Proft,D. A1 - Bederson, Benjamin B. A1 - Hollan,J. JA - Proceedings of the SIGCHI conference on Human factors in computing systems ER - TY - CONF T1 - Learning parameterized models of image motion T2 - Computer Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE Computer Society Conference on Y1 - 1997 A1 - Black,M. J A1 - Yacoob,Yaser A1 - Jepson,A. D A1 - Fleet,D. J KW - image motion KW - Image sequences KW - learning KW - learning (artificial intelligence) KW - model-based recognition KW - Motion estimation KW - multi-resolution scheme KW - non-rigid motion KW - optical flow KW - optical flow estimation KW - parameterized models KW - Principal component analysis KW - training set AB - A framework for learning parameterized models of optical flow from image sequences is presented. A class of motions is represented by a set of orthogonal basis flow fields that are computed from a training set using principal component analysis. Many complex image motions can be represented by a linear combination of a small number of these basis flows. The learned motion models may be used for optical flow estimation and for model-based recognition. For optical flow estimation we describe a robust, multi-resolution scheme for directly computing the parameters of the learned flow models from image derivatives. As examples we consider learning motion discontinuities, non-rigid motion of human mouths, and articulated human motion JA - Computer Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE Computer Society Conference on M3 - 10.1109/CVPR.1997.609381 ER - TY - JOUR T1 - Local Rules for Protein Folding on a Triangular Lattice and Generalized Hydrophobicity in the HP Model JF - Journal of Computational Biology Y1 - 1997 A1 - Agarwala,Richa A1 - Batzoglou,Serafim A1 - DančíK,Vlado A1 - Decatur,Scott E. A1 - Hannenhalli, Sridhar A1 - Farach,Martin A1 - Muthukrishnan,S. A1 - Skiena,Steven AB - We consider the problem of determining the three-dimensional folding of a protein given its one-dimensional amino acid sequence. We use the HP model for protein folding proposed by Dill (1985), which models protein as a chain of amino acid residues that are either hydrophobic or polar, and hydrophobic interactions are the dominant initial driving force for the protein folding. Hart and Istrail (1996a) gave approximation algorithms for folding proteins on the cubic lattice under the HP model. In this paper, we examine the choice of a lattice by considering its algorithmic and geometric implications and argue that the triangular lattice is a more reasonable choice. We present a set of folding rules for a triangular lattice and analyze the approximation ratio they achieve. In addition, we introduce a generalization of the HP model to account for residues having different levels of hydrophobicity. After describing the biological foundation for this generalization, we show that in the new model we are able to achieve similar constant factor approximation guarantees on the triangular lattice as were achieved in the standard HP model. While the structures derived from our folding rules are probably still far from biological reality, we hope that having a set of folding rules with different properties will yield more interesting folds when combined. VL - 4 SN - 1066-5277, 1557-8666 UR - http://www.liebertonline.com/doi/abs/10.1089/cmb.1997.4.275 CP - 3 M3 - 10.1089/cmb.1997.4.275 ER - TY - JOUR T1 - A note on conjugate gradient convergence JF - Numerische Mathematik Y1 - 1997 A1 - Naiman, A. E A1 - Babuška, I. M A1 - Elman, Howard VL - 76 CP - 2 ER - TY - JOUR T1 - Optimized software synthesis for synchronous dataflow JF - Proceedings of the ASAP97 Y1 - 1997 A1 - Bhattacharyya, Shuvra S. A1 - America,H. ER - TY - JOUR T1 - Optimizing synchronization in multiprocessor DSP systems JF - Signal Processing, IEEE Transactions on Y1 - 1997 A1 - Bhattacharyya, Shuvra S. A1 - Sriram,S. A1 - Lee,E. A VL - 45 CP - 6 ER - TY - JOUR T1 - Query previews for networked information systems: a case study with NASA environmental data JF - SIGMOD Record Y1 - 1997 A1 - Doan,K. A1 - Plaisant, Catherine A1 - Shneiderman, Ben A1 - Bruns,T. AB - Formulating queries on networked information systemsis laden with problems: data diversity, data complexity, network growth, varied user base, and slow network access. This paper proposes a new approach to a network query user interface which consists of two phases: query preview and query refinement. This new approach is based on dynamic queries and tight coupling, guiding users to rapidly and dynamically eliminate undesired items, reduce the data volume to a manageable size, and refine queries locally before submission over a network. A two-phase dynamic query system for NASA’s Earth Observing Systems--Data Information Systems (EOSDIS) is presented. The prototype was well received by the team of scientists who evaluated the interface. VL - 26 CP - 1 ER - TY - CONF T1 - Query previews in networked information systems: the case of EOSDIS T2 - CHI '97 extended abstracts on Human factors in computing systems: looking to the future Y1 - 1997 A1 - Plaisant, Catherine A1 - Bruns,Tom A1 - Shneiderman, Ben A1 - Doan,Khoa KW - direct manipulation KW - dynamic query KW - earth science KW - network information system KW - query preview KW - Visualization AB - Dynamic queries have been shown to be an effective technique to browse information, and to find patterns and exceptions. Dynamic queries involve the interactive control by a user of visual query parameters that generate rapid (100 ms update), animated, and visual displays of database search results. The data of early implementations was stored in local memory to guarantee optimal speed. Problems arise when the data is very large and distributed over a network. To overcome the problems of slow networks and data volume we propose a two-phase approach to query formulation using query previews and query refinements [1]. Preview mechanisms have been used in the past [2] and we believe that their use will be a major component of successful networked information systems interfaces (e.g. [3]). JA - CHI '97 extended abstracts on Human factors in computing systems: looking to the future T3 - CHI EA '97 PB - ACM CY - New York, NY, USA SN - 0-89791-926-2 UR - http://doi.acm.org/10.1145/1120212.1120343 M3 - 10.1145/1120212.1120343 ER - TY - JOUR T1 - Recognition using region correspondences JF - International Journal of Computer Vision Y1 - 1997 A1 - Basri,R. A1 - Jacobs, David W. AB - Recognition systems attempt to recover information about the identity of observed objects and their location in the environment. A fundamental problem in recognition is pose estimation. This is the problem of using a correspondence between some portions of an object model and some portions of an image to determine whether the image contains an instance of the object, and, in case it does, to determine the transformation that relates the model to the image. The current approaches to this problem are divided into methods that use ldquoglobalrdquo properties of the object (e.g., centroid and moments of inertia) and methods that use ldquolocalrdquo properties of the object (e.g., corners and line segments). Global properties are sensitive to occlusion and, specifically, to self occlusion. Local properties are difficult to locate reliably, and their matching involves intensive computation.We present a novel method for recognition that uses region information. In our approach the model and the image are divided into regions. Given a match between subsets of regions (without any explicit correspondence between different pieces of the regions) the alignment transformation is computed. The method applies to planar objects under similarity, affine, and projective transformations and to projections of 3-D objects undergoing affine and projective transformations. The new approach combines many of the advantages of the previous two approaches, while avoiding some of their pitfalls. Like the global methods, our approach makes use of region information that reflects the true shape of the object. But like local methods, our approach can handle occlusion. VL - 25 CP - 2 M3 - 10.1023/A:1007919917506 ER - TY - CONF T1 - Symbolic model checking of infinite state systems using Presburger arithmetic T2 - Computer Aided Verification Y1 - 1997 A1 - Bultan,T. A1 - Gerber,R. A1 - Pugh, William JA - Computer Aided Verification ER - TY - JOUR T1 - Testing simple polygons JF - Computational Geometry Y1 - 1997 A1 - Arkin,Esther M. A1 - Belleville,Patrice A1 - Mitchell,Joseph S.B. A1 - Mount, Dave A1 - Romanik,Kathleen A1 - Salzberg,Steven A1 - Souvaine,Diane KW - probing KW - Testing KW - Verifying AB - We consider the problem of verifying a simple polygon in the plane using “test points”. A test point is a geometric probe that takes as input a point in Euclidean space, and returns “+” if the point is inside the object being probed or “−” if it is outside. A verification procedure takes as input a description of a target object, including its location and orientation, and it produces a set of test points that are used to verify whether a test object matches the description. We give a procedure for verifying an n-sided, non-degenerate, simple target polygon using 5n test points. This testing strategy works even if the test polygon has n + 1 vertices, and we show a lower bound of 3n + 1 test points for this case. We also give algorithms using O(n) test points for simple polygons that may be degenerate and for test polygons that may have up to n + 2 vertices. All of these algorithms work for polygons with holes. We also discuss extensions of our results to higher dimensions. VL - 8 SN - 0925-7721 UR - http://www.sciencedirect.com/science/article/pii/S0925772196000156 CP - 2 M3 - 10.1016/S0925-7721(96)00015-6 ER - TY - CONF T1 - Titan: a High-Performance Remote-sensing Database T2 - In Proceedings of the 1997 International Conference on Data Engineering Y1 - 1997 A1 - Bongki,C. C A1 - Chang,C. A1 - Moon,B. A1 - Acharya, A. A1 - Shock,C. A1 - Sussman, Alan A1 - Saltz, J. JA - In Proceedings of the 1997 International Conference on Data Engineering ER - TY - CHAP T1 - Toward motion picture grammars T2 - Computer Vision — ACCV'98Computer Vision — ACCV'98 Y1 - 1997 A1 - Bolle,Ruud A1 - Aloimonos, J. A1 - Fermüller, Cornelia ED - Chin,Roland ED - Pong,Ting-Chuen AB - We are interested in processing video data for the purpose of solving a variety of problems in video search, analysis, indexing, browsing and compression. Instead of concentrating on a particular problem, in this paper we present a framework for developing video applications. Our basic thesis is that video data can be represented at a higher level of abstraction as a string generated by a grammar, termed motion picture grammar. The rules of that grammar relate different spatiotemporal representations of the video content and, in particular, representations of action. JA - Computer Vision — ACCV'98Computer Vision — ACCV'98 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1352 SN - 978-3-540-63931-2 UR - http://dx.doi.org/10.1007/3-540-63931-4_228 ER - TY - CONF T1 - The vegetation canopy lidar mission T2 - Proceedings of Land Satellite Information in the Next Decade, II: Sources and Applications. Bethesda (MD): American Society of Photogrammetry and Remote Sensing Y1 - 1997 A1 - Dubayah, R. A1 - Blair,J. B. A1 - Bufton,J. L. A1 - Clark,D. B. A1 - JaJa, Joseph F. A1 - Knox,R. A1 - Luthcke,S. B. A1 - Prince,S. A1 - Weishampel,J. AB - The Vegetation Canopy Lidar (VCL) is the first selected mission of NASA’s new EarthSystem Science Pathfinder program. The principal goal of VCL is the characterization of the three-dimensional structure of the earth; in particular, canopy vertical and horizontal structure and land surface topography. Its primary science objectives are: landcover characterization for terrestrial ecosystem modeling, monitoring and prediction; landcover characterization for climate modeling and prediction; and, production of a global reference data set of topographic spot heights and transects. VCL will provide unique data sets for understanding important environ- mental issues including climatic change and variability, biotic erosion and sustainable landuse, and will dramatically improve our estimation of global biomass and carbon stocks, fractional forest cover, forest extent and condition. It will also provide canopy data critical for biodiversity, natural hazard, and climate studies. Scheduled for launch in early 2000, VCL is an active lidar remote sensing system consisting of a five-beam instrument with 25 m contiguous along track resolution. The five beams are in a circular configuration 8 km across and each beam traces a separate ground track spaced 2 km apart, eventually producing 2 km coverage between 65° N and S. VCL’s core measurement objectives are: (1) canopy top heights; (2) vertical distribution of intercepted surfaces (e.g. leaves and branches); and, (3) ground surface topographic elevations. These measurements are used to derive a variety of science data products including canopy heights, canopy vertical distribution, and ground elevations gridded monthly at 1° resolution and every 6 months at 2 km resolution, as well as a 2 km fractional forest cover product. JA - Proceedings of Land Satellite Information in the Next Decade, II: Sources and Applications. Bethesda (MD): American Society of Photogrammetry and Remote Sensing ER - TY - JOUR T1 - Visual surveillance of human activity JF - Computer Vision—ACCV'98 Y1 - 1997 A1 - Davis, Larry S. A1 - Fejes,S. A1 - Harwood,D. A1 - Yacoob,Yaser A1 - Hariatoglu,I. A1 - Black,M. ER - TY - JOUR T1 - A zooming web browser JF - Human Factors in Web Development Y1 - 1997 A1 - Bederson, Benjamin B. A1 - Hollan,J.D. A1 - Stewart,J. A1 - Rogers,D. A1 - Druin, Allison A1 - Vick,D. A1 - Ring,L. A1 - Grose,E. A1 - Forsythe,C. ER - TY - CHAP T1 - Directions of motion fields are hardly ever ambiguous T2 - Computer Vision — ECCV '96Computer Vision — ECCV '96 Y1 - 1996 A1 - Brodsky, Tomas A1 - Fermüller, Cornelia A1 - Aloimonos, J. ED - Buxton,Bernard ED - Cipolla,Roberto AB - Recent literature [7, 10, 11, 9, 13, 17] provides a number of results regarding uniqueness aspects of motion fields and exact image displacements due to 3-D rigid motion. Here instead of the full motion field we consider only the direction of the motion field due to a rigid motion and ask what can we say about the three-dimensional motion information contained in it. This paper provides a geometric analysis of this question based solely on the fact that the depth of the surfaces in view is positive (i.e. that the surface in view is in front of the camera). With this analysis we thus offer a theoretical foundation for image constraints employing only the sign of flow in various directions and provide a solid basis for their utilization in addressing 3D dynamic vision problems. JA - Computer Vision — ECCV '96Computer Vision — ECCV '96 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1065 SN - 978-3-540-61123-3 UR - http://dx.doi.org/10.1007/3-540-61123-1_132 ER - TY - JOUR T1 - Efficient local model-checking for fragments of the modal $\mu$-calculus JF - Tools and Algorithms for the Construction and Analysis of Systems Y1 - 1996 A1 - Bhat,G. A1 - Cleaveland, Rance ER - TY - CONF T1 - Efficient model checking via the equational μ-calculus T2 - , Eleventh Annual IEEE Symposium on Logic in Computer Science, 1996. LICS '96. Proceedings Y1 - 1996 A1 - Bhat,G. A1 - Cleaveland, Rance KW - Automata KW - BDD-based algorithms KW - Boolean functions KW - Calculus KW - compositional model-checking approaches KW - computational complexity KW - Computer science KW - CTL* KW - Data structures KW - Encoding KW - equational variant KW - equational μ-calculus KW - Equations KW - expressive temporal logic KW - Logic KW - Maintenance KW - modal μ-calculus KW - Model checking KW - on-the-fly procedures KW - Surges KW - temporal logic KW - temporal logic model checking KW - unified framework AB - This paper studies the use of an equational variant of the modal μ-calculus as a unified framework for efficient temporal logic model checking. In particular we show how an expressive temporal logic, CTL*, may be efficiently translated into the μ-calculus. Using this translation, one may then employ μ-calculus model-checking techniques, including on-the-fly procedures, BDD-based algorithms and compositional model-checking approaches, to determine if systems satisfy formulas in CTL* JA - , Eleventh Annual IEEE Symposium on Logic in Computer Science, 1996. LICS '96. Proceedings PB - IEEE SN - 0-8186-7463-6 M3 - 10.1109/LICS.1996.561358 ER - TY - JOUR T1 - The empirical investigation of Perspective-Based Reading JF - Empirical Software Engineering Y1 - 1996 A1 - Basili, Victor R. A1 - Green,Scott A1 - Laitenberger,Oliver A1 - Lanubile,Filippo A1 - Shull, Forrest A1 - Sørumgård,Sivert A1 - Zelkowitz, Marvin V KW - Computer KW - Science AB - We consider reading techniques a fundamental means of achieving high quality software. Due to the lack of research in this area, we are experimenting with the application and comparison of various reading techniques. This paper deals with our experiences with a family of reading techniques known as Perspective-Based Reading (PBR), and its application to requirements documents. The goal of PBR is to provide operational scenarios where members of a review team read a document from a particular perspective, e.g., tester, developer, user. Our assumption is that the combination of different perspectives provides better coverage of the document, i.e., uncovers a wider range of defects, than the same number of readers using their usual technique. VL - 1 SN - 1382-3256 UR - http://dx.doi.org/10.1007/BF00368702 CP - 2 ER - TY - JOUR T1 - Evolutionary biology of parasitic platyhelminths: The role of molecular phylogenetics JF - Parasitol Today Y1 - 1996 A1 - Blair,D A1 - Campos,A. A1 - Cummings, Michael P. A1 - Laclette,J. P AB - As our appreciation of the diversity within the flatworms has grown, so too has our curiosity about the ways in which these varied creatures are related to one another. In particular, the parasitic groups (trematodes, cestodes and monogeneans have been the focus of enquiry. Until recently, morphology, anatomy and life histories have provided the raw data for building hypotheses on relationships. Now, ultrastructural evidence, and most recently, molecular data from nucleic acid sequences, have been brought to bear on the topic. Here, David Blair, Andrés Campos, Michael Cummings and Juan Pedro Laclette discuss the ways in which molecular data, in particular, are helping us recognize the various lineages of flatworms. VL - 12 CP - 2 ER - TY - JOUR T1 - A fast parallel algorithm for finding the convex hull of a sorted point set JF - International Journal of Computational Geometry and Applications Y1 - 1996 A1 - Berkman,O. A1 - Schieber,B. A1 - Vishkin, Uzi VL - 6 ER - TY - CHAP T1 - Fast sorting by reversal T2 - Combinatorial Pattern MatchingCombinatorial Pattern Matching Y1 - 1996 A1 - Berman,Piotr A1 - Hannenhalli, Sridhar ED - Hirschberg,Dan ED - Myers,Gene AB - Analysis of genomes evolving by inversions leads to a combinatorial problem of sorting by reversals studied in detail recently. Following a series of work recently, Hannenhalli and Pevzner developed the first polynomial algorithm for the problem of sorting signed permutations by reversals and proposed an O(n 4 ) implementation of the algorithm. In this paper we exploit a few combinatorial properties of the cycle graph of a permutation and propose an O(n 2 (n)) implementation of the algorithm where is the inverse Ackerman function. Besides making this algorithm practical, our technique improves implementations of the other rearrangement distance problems. JA - Combinatorial Pattern MatchingCombinatorial Pattern Matching T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1075 SN - 978-3-540-61258-2 UR - http://dx.doi.org/10.1007/3-540-61258-0_14 ER - TY - JOUR T1 - Feature discovery and classification of Doppler umbilical artery blood flow velocity waveforms JF - Computers in Biology and Medicine Y1 - 1996 A1 - Baykal,Nazife A1 - Reogia,James A. A1 - Yalabik,Nese A1 - Erkmen,Aydan A1 - Beksac,M.Sinan KW - Doppler umbilical artery blood flow velocity waveforms KW - Feature extraction KW - IMAGE PROCESSING KW - Pattern classification AB - Doppler umbilical artery blood flow velocity waveform measurements are used in perinatal surveillance for the evaluation of fetal condition. There is an ongoing debate on the predictive value of Doppler measurements concerning the critical effect of the selection of parameters for the interpretation of Doppler waveforms. In this paper, we describe how neural network methods can be used both to discover relevant classification features and subsequently to classify Doppler umbilical artery blood flow velocity waveforms. Results obtained from 199 normal and high risk patients' umbilical artery waveforms highlighted a classification concordance varying from 90 to 98% accuracy. VL - 26 SN - 0010-4825 UR - http://www.sciencedirect.com/science/article/pii/S0010482596000182 CP - 6 M3 - 10.1016/S0010-4825(96)00018-2 ER - TY - JOUR T1 - Hybrid network management (communication systems) JF - 16th AIAA International Communications Satellite Systems Conference Y1 - 1996 A1 - Baras,J. S A1 - Ball,M. A1 - Karne,R. K A1 - Kelley,S. A1 - Jang,K.D. A1 - Plaisant, Catherine A1 - Roussopoulos, Nick A1 - Stathatos,K. A1 - Vakhutinsky,A. A1 - Valluri,J. AB - We describe our collaborative efforts towards the design and implementation of a next-generation integrated network management system for hybrid networks (INMS/HN). We describe the overall software architecture of the system at its current stage of development. This NMS is specifically designed to address issues relevant to complex heterogeneous networks consisting of seamlessly interoperable terrestrial and satellite networks. NMSs are a key element for interoperability in such networks. We describe the integration of configuration management and performance management. The next step in this integration is fault management. In particular, we describe the object model, issues concerning the graphical user interface, browsing tools, performance data graphical widget displays, and management information database organization issues. ER - TY - JOUR T1 - Incremental data structures and algorithms for dynamic query interfaces JF - ACM SIGMOD Record Y1 - 1996 A1 - Tanin,Egemen A1 - Beigel,Richard A1 - Shneiderman, Ben KW - algorithm KW - data structure KW - database KW - direct manipulation KW - dynamic query KW - Information Visualization KW - user interface AB - Dynamic query interfaces (DQIs) form a recently developed method of database access that provides continuous realtime feedback to the user during the query formulation process. Previous work shows that DQIs are elegant and powerful interfaces to small databases. Unfortunately, when applied to large databases, previous DQI algorithms slow to a crawl. We present a new approach to DQI algorithms that works well with large databases. VL - 25 SN - 0163-5808 UR - http://doi.acm.org/10.1145/245882.245891 CP - 4 M3 - 10.1145/245882.245891 ER - TY - JOUR T1 - Integrated network management of hybrid networks JF - AIP Conference Proceedings Y1 - 1996 A1 - Baras,John S A1 - Ball,Mike A1 - Karne,Ramesh K A1 - Kelley,Steve A1 - Jang,Kap D A1 - Plaisant, Catherine A1 - Roussopoulos, Nick A1 - Stathatos,Kostas A1 - Vakhutinsky,Andrew A1 - Jaibharat,Valluri A1 - Whitefield,David AB - We describe our collaborative efforts towards the design and implementation of a next generation integrated network management system for hybrid networks (INMS/HN). We describe the overall software architecture of the system at its current stage of development. This network management system is specifically designed to address issues relevant for complex heterogeneous networks consisting of seamlessly interoperable terrestrial and satellite networks. Network management systems are a key element for interoperability in such networks. We describe the integration of configuration management and performance management. The next step in this integration is fault management. In particular we describe the object model, issues of the Graphical User Interface (GUI), browsing tools and performance data graphical widget displays, management information database (MIB) organization issues. Several components of the system are being commercialized by Hughes Network Systems. © 1996 American Institute of Physics. VL - 361 SN - 0094243X UR - http://proceedings.aip.org/resource/2/apcpcs/361/1/345_1?isAuthorized=no CP - 1 M3 - doi:10.1063/1.50028 ER - TY - CONF T1 - Learning activation rules for associative networks T2 - Neural Networks, 1996., IEEE International Conference on Y1 - 1996 A1 - Reggia, James A. A1 - Grundstrom,E. A1 - Berndt,R. S JA - Neural Networks, 1996., IEEE International Conference on VL - 1 ER - TY - CONF T1 - Local tools: an alternative to tool palettes T2 - Proceedings of the 9th annual ACM symposium on User interface software and technology Y1 - 1996 A1 - Bederson, Benjamin B. A1 - Hollan,J.D. A1 - Druin, Allison A1 - Stewart,J. A1 - Rogers,D. A1 - Proft,D. JA - Proceedings of the 9th annual ACM symposium on User interface software and technology ER - TY - JOUR T1 - Matching convex polygons and polyhedra, allowing for occlusion JF - Applied Computational Geometry Towards Geometric Engineering Y1 - 1996 A1 - Basri,R. A1 - Jacobs, David W. AB - We review our recent results on visual object recognition and reconstruction allowing for occlusion. Our scheme uses matches between convex parts of objects in the model and image to determine structure and pose, without relying on specific correspondences between local or global geometric features of the objects. We provide results determining the minimal number of regions required to uniquely determine the pose under a variety of situations, and also showing that, depending on the situation, the problem of determining pose may be a convex optimization problem that is efficiently solved, or it may be a non-convex optimization problem which has no known, efficient solution. We also relate the problem of determining pose using region matching to the problem of finding the transformation that places one polygon inside another and the problem of finding a line that intersects each of a set of 3-D volumes. M3 - 10.1007/BFb0014491 ER - TY - JOUR T1 - Parallel algorithms for image enhancement and segmentation by region growing, with an experimental study JF - The Journal of Supercomputing Y1 - 1996 A1 - Bader, D.A. A1 - JaJa, Joseph F. A1 - Harwood,D. A1 - Davis, Larry S. AB - This paper presents efficient and portable implementations of a powerful image enhancement process, the Symmetric Neighborhood Filter (SNF), and an image segmentation technique that makes use of the SNF and a variant of the conventional connected components algorithm which we call delta-Connected Components. We use efficient techniques for distributing and coalescing data as well as efficient combinations of task and data parallelism. The image segmentation algorithm makes use of an efficient connected components algorithm based on a novel approach for parallel merging. The algorithms have been coded in Split-C and run on a variety of platforms, including the Thinking Machines CM-5, IBM SP-1 and SP-2, Cray Research T3D, Meiko Scientific CS-2, Intel Paragon, and workstation clusters. Our experimental results are consistent with the theoretical analysis (and provide the best known execution times for segmentation, even when compared with machine-specific implementations). Our test data include difficult images from the Landsat Thematic Mapper (TM) satellite data. VL - 10 CP - 2 M3 - 10.1007/BF00130707 ER - TY - CONF T1 - Parallel algorithms for personalized communication and sorting with an experimental study (extended abstract) T2 - Proceedings of the eighth annual ACM symposium on Parallel algorithms and architectures Y1 - 1996 A1 - Helman,David R. A1 - Bader,David A. A1 - JaJa, Joseph F. JA - Proceedings of the eighth annual ACM symposium on Parallel algorithms and architectures T3 - SPAA '96 PB - ACM CY - New York, NY, USA SN - 0-89791-809-6 UR - http://doi.acm.org/10.1145/237502.237558 M3 - 10.1145/237502.237558 ER - TY - CONF T1 - Practical parallel algorithms for dynamic data redistribution, median finding, and selection T2 - Parallel Processing Symposium, 1996., Proceedings of IPPS '96, The 10th International Y1 - 1996 A1 - Bader, D.A. A1 - JaJa, Joseph F. KW - algorithms;performance KW - algorithms;scalability;statistical KW - allocation; KW - balancing KW - clusters;distributed KW - CM-5;communication KW - CS-2;SPLIT-C;Thinking KW - data KW - data;median KW - evaluation;resource KW - finding;parallel KW - Gray KW - Machines KW - memory KW - model;dynamic KW - Paragon;Meiko KW - primitives;distributed KW - problem;workstation KW - Programming KW - redistribution;load KW - research KW - scientific KW - SP-1;Intel KW - systems;parallel KW - T3D;IBM AB - A common statistical problem is that of finding the median element in a set of data. This paper presents a fast and portable parallel algorithm for finding the median given a set of elements distributed across a parallel machine. In fact, our algorithm solves the general selection problem that requires the determination of the element of rank i, for an arbitrarily given integer i. Practical algorithms needed by our selection algorithm for the dynamic redistribution of data are also discussed. Our general framework is a distributed memory programming model enhanced by a set of communication primitives. We use efficient techniques for distributing, coalescing, and load balancing data as well as efficient combinations of task and data parallelism. The algorithms have been coded in SPLIT-C and run on a variety of platforms, including the Thinking Machines CM-5, IBM SP-1 and SP-2, Gray Research T3D, Meiko Scientific CS-2, Intel Paragon, and workstation clusters. Our experimental results illustrate the scalability and efficiency of our algorithms across different platforms and improve upon all the related experimental results known to the authors JA - Parallel Processing Symposium, 1996., Proceedings of IPPS '96, The 10th International M3 - 10.1109/IPPS.1996.508072 ER - TY - JOUR T1 - Practical parallel algorithms for personalized communication and integer sorting JF - Journal of Experimental Algorithmics (JEA) Y1 - 1996 A1 - Bader,David A. A1 - Helman,David R. A1 - JaJa, Joseph F. AB - A fundamental challenge for parallel computing is to obtain high-level, architecture independent, algorithms which efficiently execute on general-purpose parallel machines. With the emergence of message passing standards such as MPI, it has become easier to design efficient and portable parallel algorithms by making use of these communication primitives. While existing primitives allow an assortment of collective communication routines, they do not handle an important communication event when most or all processors have non-uniformly sized personalized messages to exchange with each other. We focus in this paper on the h-relation personalized communication whose efficient implementation will allow high performance implementations of a large class of algorithms. While most previous h-relation algorithms use randomization, this paper presents a new deterministic approach for h-relation personalized communication with asymptotically optimal complexity for h>p2. As an application, we present an efficient algorithm for stable integer sorting. The algorithms presented in this paper have been coded in Split-C and run on a variety of platforms, including the Thinking Machines CM-5, IBM SP-1 and SP-2, Cray Research T3D, Meiko Scientific CS-2, and the Intel Paragon. Our experimental results are consistent with the theoretical analysis and illustrate the scalability and efficiency of our algorithms across different platforms. In fact, they seem to outperform all similar algorithms known to the authors on these platforms. VL - 1 SN - 1084-6654 UR - http://doi.acm.org/10.1145/235141.235148 M3 - 10.1145/235141.235148 ER - TY - CONF T1 - Simplification envelopes T2 - Proceedings of the 23rd annual conference on Computer graphics and interactive techniques Y1 - 1996 A1 - Cohen,Jonathan A1 - Varshney, Amitabh A1 - Manocha,Dinesh A1 - Turk,Greg A1 - Weber,Hans A1 - Agarwal,Pankaj A1 - Brooks,Frederick A1 - Wright,William KW - geometric modeling KW - hierarchical approximation KW - levels-of-detail generation KW - model simplification KW - offsets KW - shape approximation JA - Proceedings of the 23rd annual conference on Computer graphics and interactive techniques T3 - SIGGRAPH '96 PB - ACM CY - New York, NY, USA SN - 0-89791-746-4 UR - http://doi.acm.org/10.1145/237170.237220 M3 - 10.1145/237170.237220 ER - TY - BOOK T1 - Software synthesis from dataflow graphs Y1 - 1996 A1 - Bhattacharyya, Shuvra S. A1 - Murthy,P. K A1 - Lee,E. A PB - Springer ER - TY - CHAP T1 - Spatiotemporal representations for visual navigation T2 - Computer Vision — ECCV '96Computer Vision — ECCV '96 Y1 - 1996 A1 - LoongFah Cheong A1 - Fermüller, Cornelia A1 - Aloimonos, J. ED - Buxton,Bernard ED - Cipolla,Roberto AB - The study of visual navigation problems requires the integration of visual processes with motor control. Most essential in approaching this integration is the study of appropriate spatio-temporal representations which the system computes from the imagery and which serve as interfaces to all motor activities. Since representations resulting from exact quantitative reconstruction have turned out to be very hard to obtain, we argue here for the necessity of representations which can be computed easily, reliably and in real time and which recover only the information about the 3D world which is really needed in order to solve the navigational problems at hand. In this paper we introduce a number of such representations capturing aspects of 3D motion and scene structure which are used for the solution of navigational problems implemented in visual servo systems. In particular, the following three problems are addressed: (a) to change the robot's direction of motion towards a fixed direction, (b) to pursue a moving target while keeping a certain distance from the target, and (c) to follow a wall-like perimeter. The importance of the introduced representations lies in the following: – They can be extracted using minimal visual information, in particular the sign of flow measurements or the the first order spatiotemporal derivatives of the image intensity function. In that sense they are direct representations needing no intermediate level of computation such as correspondence. – They are global in the sense that they represent how three-dimensional information is globally encoded in them. Thus, they are robust representations since local errors do not affect them. – Usually, from sequences of images, three-dimensional quantities such as motion and shape are computed and used as input to control processes. The representations discussed here are given directly as input to the control procedures, thus resulting in a real time solution. JA - Computer Vision — ECCV '96Computer Vision — ECCV '96 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1064 SN - 978-3-540-61122-6 UR - http://dx.doi.org/10.1007/BFb0015577 ER - TY - CONF T1 - Tuning the performance of I/O-intensive parallel applications T2 - Proceedings of the fourth workshop on I/O in parallel and distributed systems: part of the federated computing research conference Y1 - 1996 A1 - Acharya, A. A1 - Uysal, M. A1 - Bennett, R. A1 - Mendelson, A. A1 - Beynon, M. A1 - Hollingsworth, Jeffrey K A1 - Saltz, J. A1 - Sussman, Alan JA - Proceedings of the fourth workshop on I/O in parallel and distributed systems: part of the federated computing research conference ER - TY - JOUR T1 - Verification of an active control system using temporal process algebra JF - Engineering with computers Y1 - 1996 A1 - Elseaidy,W. M A1 - Baugh,J. W. A1 - Cleaveland, Rance VL - 12 CP - 1 ER - TY - CHAP T1 - Video representations T2 - Recent Developments in Computer Vision Y1 - 1996 A1 - Bolle,Ruud A1 - Aloimonos, J. A1 - Fermüller, Cornelia ED - Li,Stan ED - Mital,Dinesh ED - Teoh,Eam ED - Wang,Han JA - Recent Developments in Computer Vision T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1035 SN - 978-3-540-60793-9 UR - http://dx.doi.org/10.1007/3-540-60793-5_60 ER - TY - JOUR T1 - Almost fully-parallel parentheses matching JF - Discrete applied mathematics Y1 - 1995 A1 - Berkman,O. A1 - Vishkin, Uzi VL - 57 CP - 1 ER - TY - JOUR T1 - Automatic generation of multiresolution for polygonal models JF - First Workshop on Simulation and Interaction in Virtual Environments Y1 - 1995 A1 - Varshney, Amitabh A1 - Agarwal,P. A1 - Brooks,F. A1 - Wright,W. A1 - Weber,H. ER - TY - JOUR T1 - cDNA expressed sequence tags of Trypanosoma brucei rhodesiense provide new insights into the biology of the parasite JF - Molecular and Biochemical Parasitology Y1 - 1995 A1 - El‐Sayed, Najib M. A1 - Alarcon,Clara M. A1 - Beck,John C. A1 - Sheffield,Val C. A1 - Donelson,John E. KW - cDNA KW - Expressed sequence tag KW - Trypanosoma brucei rhodesiense AB - A total of 518 expressed sequence tags (ESTs) have been generated from clones randomly selected from a cDNA library and a spliced leader sub-library of a Trypanosoma brucei rhodesiense bloodstream clone. 205 (39%) of the clones were identified based on matches to 113 unique genes in the public databases. Of these, 71 cDNAs display significant similarities to genes in unrelated organisms encoding metabolic enzymes, signal transduction proteins, transcription factors, ribosomal proteins, histones, a proliferation-associated protein and thimet oligopeptidase, among others. 313 of the cDNAs are not related to any other sequences in the databases. These cDNA ESTs provide new avenues of research for exploring both the novel trypanosome-specific genes and the genome organization of this parasite, as well as a resource for identifying trypanosome homologs to genes expressed in other organisms. VL - 73 SN - 0166-6851 UR - http://www.sciencedirect.com/science/article/pii/016668519500098L CP - 1-2 M3 - 16/0166-6851(95)00098-L ER - TY - JOUR T1 - Comparing detection methods for software requirements inspections: a replicated experiment JF - IEEE Transactions on Software Engineering Y1 - 1995 A1 - Porter, Adam A1 - Votta,L. G. A1 - Basili, Victor R. KW - Assembly KW - Computer science KW - Design for experiments KW - detection methods KW - Fault detection KW - fault detection rate KW - Fault diagnosis KW - formal specification KW - formal verification KW - Gain measurement KW - individual fault detection rate KW - Inspection KW - Loss measurement KW - nonsystematic techniques KW - performance evaluation KW - Performance gain KW - replicated experiment KW - scenario-based method KW - Software development management KW - software requirements inspections KW - software requirements specifications KW - team fault detection rate AB - Software requirements specifications (SRS) are often validated manually. One such process is inspection, in which several reviewers independently analyze all or part of the specification and search for faults. These faults are then collected at a meeting of the reviewers and author(s). Usually, reviewers use Ad Hoc or Checklist methods to uncover faults. These methods force all reviewers to rely on nonsystematic techniques to search for a wide variety of faults. We hypothesize that a Scenario-based method, in which each reviewer uses different, systematic techniques to search for different, specific classes of faults, will have a significantly higher success rate. We evaluated this hypothesis using a 3×24 partial factorial, randomized experimental design. Forty eight graduate students in computer science participated in the experiment. They were assembled into sixteen, three-person teams. Each team inspected two SRS using some combination of Ad Hoc, Checklist or Scenario methods. For each inspection we performed four measurements: (1) individual fault detection rate, (2) team fault detection rate, (3) percentage of faults first identified at the collection meeting (meeting gain rate), and (4) percentage of faults first identified by an individual, but never reported at the collection meeting (meeting loss rate). The experimental results are that (1) the Scenario method had a higher fault detection rate than either Ad Hoc or Checklist methods, (2) Scenario reviewers were more effective at detecting the faults their scenarios are designed to uncover, and were no less effective at detecting other faults than both Ad Hoc or Checklist reviewers, (3) Checklist reviewers were no more effective than Ad Hoc reviewers, and (4) Collection meetings produced no net improvement in the fault detection rate-meeting gains were offset by meeting losses VL - 21 SN - 0098-5589 CP - 6 M3 - 10.1109/32.391380 ER - TY - CONF T1 - Defining, Computing, and Visualizing Molecular Interfaces T2 - Proceedings of the 6th conference on Visualization '95 Y1 - 1995 A1 - Varshney, Amitabh A1 - Brooks Jr,Frederick P. A1 - Manocha,Dinesh A1 - Wright,William V. A1 - Richardson,David C. KW - Computational Biochemistry Algorithms Molecular Graphics KW - Connolly Surfaces KW - Molecular Interfaces KW - Molecular Surfaces KW - Protein-Protein Recognition AB - A parallel, analytic approach for defining and computing the inter- and intra-molecular interfaces in three dimensions is described. The "molecular interface surfaces" are derived from approximations to the power-diagrams over the participating molecular units. For a given molecular interface our approach can generate a family of interface surfaces parametrized by alpha and beta, where alpha is the radius of the solvent molecule (also known as the probe-radius) and beta is the interface radius that defines the size of the molecular interface. Molecular interface surfaces provide biochemists with a powerful tool to study surface complementarity and to efficiently characterize the interactions during a protein-substrate docking. The complexity of our algorithm for molecular environments is O(n k \log^2{k}), where n is the number of atoms in the participating molecular units and k is the average number of neighboring atoms -- a constant, given alpha and beta. JA - Proceedings of the 6th conference on Visualization '95 T3 - VIS '95 PB - IEEE Computer Society CY - Washington, DC, USA SN - 0-8186-7187-4 UR - http://dl.acm.org/citation.cfm?id=832271.833834 ER - TY - CONF T1 - Efficient on-the-fly model checking for CTL T2 - , Tenth Annual IEEE Symposium on Logic in Computer Science, 1995. LICS '95. Proceedings Y1 - 1995 A1 - Bhat,G. A1 - Cleaveland, Rance A1 - Grumberg,O. KW - Algorithm design and analysis KW - Automata KW - computational complexity KW - Computer science KW - CTL KW - Encoding KW - finite automata KW - finite-state system KW - global algorithm KW - Logic KW - LTL KW - on-the-fly model checking KW - Performance analysis KW - Safety KW - State-space methods KW - sublogic KW - temporal logic KW - time complexity AB - This paper gives an on-the-fly algorithm for determining whether a finite-state system satisfies a formula in the temporal logic CTL. The time complexity of our algorithm matches that of the best existing “global algorithm” for model checking in this logic, and it performs as well as the best known global algorithms for the sublogics CTL and LTL. In contrast with these approaches, however, our routine constructs the state space of the system under consideration in a need-driven fashion and will therefore perform better in practice JA - , Tenth Annual IEEE Symposium on Logic in Computer Science, 1995. LICS '95. Proceedings PB - IEEE SN - 0-8186-7050-9 M3 - 10.1109/LICS.1995.523273 ER - TY - JOUR T1 - Generating compact code from dataflow specifications of multirate signal processing algorithms JF - Circuits and Systems I: Fundamental Theory and Applications, IEEE Transactions on Y1 - 1995 A1 - Bhattacharyya, Shuvra S. A1 - Buck,J. T A1 - Ha,S. A1 - Lee,E. A VL - 42 CP - 3 ER - TY - RPRT T1 - Generating levels of detail for large-scale polygonal models Y1 - 1995 A1 - Varshney, Amitabh A1 - Agarwal,P. K A1 - Brooks Jr,F. P A1 - Wright,W. V A1 - Weber,H. AB - We present an e cient algorithm for generating various levels-of-detail approximations for agiven polygonal model. Our algorithm guarantees that all points of an approximation are within a user-speci able distance from the original model and all points of the original model are within a distance from the approximation. Each approximation attempts to minimize the total number of polygons required to satisfy the previous constraint. We show how the problem of generating levels- of-detail approximations reduces to the classic set partition problem. The various approximations are guaranteed to be topologically consistent with the input polygonal model. The approximations can be constrained by the user to preserve any desired edges of the input model. We also propose a method to compute an estimate of the quality of the approximation generated by our algorithm with respect to the optimal approximation satisfying the same constraints. We have implemented our algorithm and have obtained experimental results of multiresolution hierarchy generation on over a thousand polygonal objects from a CAD model of a notional submarine. PB - Department of Computer Science, Duke University, North Carolina VL - CS-1995-20 ER - TY - BOOK T1 - Image Analysis and Processing: 8th International Conference, Iciap '95, San Remo, Italy, September 13-15, 1995 : Proceedings Y1 - 1995 A1 - Braccini,Carlo A1 - De Floriani, Leila A1 - Vernazza,Gianni KW - Artificial intelligence KW - COMPUTER AIDED DESIGN KW - Computer Graphics KW - Computer science KW - Computer vision KW - Computers / CAD-CAM KW - Computers / Computer Graphics KW - Computers / Computer Science KW - Computers / Computer Vision & Pattern Recognition KW - Computers / Image Processing KW - Computers / Intelligence (AI) & Semantics KW - Computers / Optical Data Processing KW - Computers / Software Development & Engineering / General KW - Electronic books KW - IMAGE PROCESSING KW - Image processing/ Congresses KW - Imaging systems KW - Optical data processing KW - Optical pattern recognition KW - software engineering AB - This book presents the proceedings of the 8th International Conference on Image Analysis and Processing, ICIAP '95, held in Sanremo, Italy in September 1995 under the sponsorship of the International Association of Pattern Recognition IAPR.The volume presents 108 papers selected from more than 180 submissions together with six invited contributions. The papers are written by a total of 265 contributing authors and give a comprehensive state-of-the-art report on all current issues of image analysis and processing. Theoretical aspects are addressed as well as systems design and advanced applications, particularly in medical imaging. PB - Springer SN - 9783540602989 ER - TY - CONF T1 - The information in the direction of image flow T2 - , International Symposium on Computer Vision, 1995. Proceedings Y1 - 1995 A1 - Brodsky, T. A1 - Fermüller, Cornelia A1 - Aloimonos, J. KW - Automation KW - CAMERAS KW - Computer vision KW - Educational institutions KW - image flow KW - Image motion analysis KW - Image sequences KW - imaging surface KW - Laboratories KW - Layout KW - Motion analysis KW - Motion estimation KW - motion field KW - motion vectors KW - Optical imaging KW - rigid motion KW - rigid motions KW - three-dimensional motion AB - If instead of the full motion field, we consider only the direction of the motion field due to a rigid motion, what can we say about the information regarding the three-dimensional motion? In this paper it is shown that considering as the imaging surface the whole sphere, independently of the scene in view, two different rigid motions cannot give rise to the same directional motion field. If we restrict the image to half of a sphere (or an infinitely large image plane) two different rigid motions with instantaneous translational and rotational velocities (t1, ω1) and (t2, ω2) cannot give rise to the same directional motion field unless the plane through t1 and t2 is perpendicular to the plane through ω1 and ω2 (i.e., (t1×t2)·(ω1 ×ω2)=0). In addition, in order to give a practical significance to these uniqueness results for the case of a limited field of view we also characterize the locations on the image where the motion vectors due to the different motions must have different directions. If (ω1×ω2)·(t1 ×t2)=0 and certain additional constraints are met, then the two rigid motions could produce motion fields with the same direction. For this to happen the depth of each corresponding surface has to be within a certain range, defined by a second and a third order surface JA - , International Symposium on Computer Vision, 1995. Proceedings PB - IEEE SN - 0-8186-7190-4 M3 - 10.1109/ISCV.1995.477071 ER - TY - JOUR T1 - A miniaturized space-variant active vision system: Cortex-I JF - Machine Vision and applications Y1 - 1995 A1 - Bederson, Benjamin B. A1 - Wallace,R.S. A1 - Schwartz,E. VL - 8 CP - 2 ER - TY - JOUR T1 - Next generation network management technology JF - AIP Conference Proceedings Y1 - 1995 A1 - Baras,John S A1 - Atallah,George C A1 - Ball,Mike A1 - Goli,Shravan A1 - Karne,Ramesh K A1 - Kelley,Steve A1 - Kumar,Harsha A1 - Plaisant, Catherine A1 - Roussopoulos, Nick A1 - Schneiderman,Ben A1 - Srinivasarao,Mulugu A1 - Stathatos,Kosta A1 - Teittinen,Marko A1 - Whitefield,David AB - Today’s telecommunications networks are becoming increasingly large, complex, mission critical and heterogeneous in several dimensions. For example, the underlying physical transmission facilities of a given network may be ‘‘mixed media’’ (copper, fiber‐optic, radio, and satellite); the subnetworks may be acquired from different vendors due to economic, performance, or general availability reasons; the information being transmitted over the network may be ‘‘multimedia’’ (video, data, voice, and images) and, finally, varying performance criteria may be imposed e.g., data transfer may require high throughput while the others, whose concern is voice communications, may require low call blocking probability. For these reasons, future telecommunications networks are expected to be highly complex in their services and operations. Due to this growing complexity and the disparity among management systems for individual sub‐networks, efficient network management systems have become critical to the current and future success of telecommunications companies. This paper addresses a research and development effort which focuses on prototyping configuration management, since that is the central process of network management and all other network management functions must be built upon it. Our prototype incorporates ergonomically designed graphical user interfaces tailored to the network configuration management subsystem and to the proposed advanced object‐oriented database structure. The resulting design concept follows open standards such as Open Systems Interconnection (OSI) and incorporates object oriented programming methodology to associate data with functions, permit customization, and provide an open architecture environment. © 1995 American Institute of Physics VL - 325 SN - 0094243X UR - http://proceedings.aip.org/resource/2/apcpcs/325/1/75_1?isAuthorized=no CP - 1 M3 - doi:10.1063/1.47255 ER - TY - JOUR T1 - Parallel algorithms for image histogramming and connected components with an experimental study (extended abstract) JF - ACM SIGPLAN Notices Y1 - 1995 A1 - Bader,David A. A1 - JaJa, Joseph F. KW - connected components KW - histogramming KW - IMAGE PROCESSING KW - image understanding KW - Parallel algorithms KW - scalable parallel processing AB - This paper presents efficient and portable implementations of two useful primitives in image processing algorithms, histogramming and connected components. Our general framework is a single-address space, distributed memory programming model. We use efficient techniques for distributing and coalescing data as well as efficient combinations of task and data parallelism. Our connected components algorithm uses a novel approach for parallel merging which performs drastically limited updating during iterative steps, and concludes with a total consistency update at the final step. The algorithms have been coded in Split-C and run on a variety of platforms. Our experimental results are consistent with the theoretical analysis and provide the best known execution times for these two primitives, even when compared with machine-specific implementations. More efficient implementations of Split-C will likely result in even faster execution times. VL - 30 SN - 0362-1340 UR - http://doi.acm.org/10.1145/209937.209950 CP - 8 M3 - 10.1145/209937.209950 ER - TY - RPRT T1 - The representation of document structure: A generic object-process approach Y1 - 1995 A1 - Dori,D. A1 - David Doermann A1 - Shin,C. A1 - Haralick,R. A1 - Phillips,I. A1 - Buchman,M. A1 - Ross,D. PB - University of Maryland, College Park VL - CAR-TR-785 ER - TY - JOUR T1 - Scalable data parallel algorithms for texture synthesis using Gibbs random fields JF - Image Processing, IEEE Transactions on Y1 - 1995 A1 - Bader, D.A. A1 - JaJa, Joseph F. A1 - Chellapa, Rama KW - algorithms;maximum KW - algorithms;parallel KW - algorithms;scalable KW - algorithms;texture KW - analysis;image KW - CM-2;Thinking KW - CM-5;fine-grained KW - compression;image KW - compression;texture KW - Connection KW - data KW - estimation;model KW - estimation;parallel KW - field;Thinking KW - fields;Markov KW - likelihood KW - machine KW - Machines;Gibbs KW - machines;random KW - Parallel KW - parameter KW - processes; KW - processes;data KW - processing;image KW - processing;machine-independent KW - random KW - representation;real-time KW - scalable KW - synthesis;Markov KW - texture;maximum AB - This article introduces scalable data parallel algorithms for image processing. Focusing on Gibbs and Markov random field model representation for textures, we present parallel algorithms for texture synthesis, compression, and maximum likelihood parameter estimation, currently implemented on Thinking Machines CM-2 and CM-5. The use of fine-grained, data parallel processing techniques yields real-time algorithms for texture synthesis and compression that are substantially faster than the previously known sequential implementations. Although current implementations are on Connection Machines, the methodology presented enables machine-independent scalable algorithms for a number of problems in image processing and analysis VL - 4 SN - 1057-7149 CP - 10 M3 - 10.1109/83.465111 ER - TY - JOUR T1 - SEL's software process improvement program JF - Software, IEEE Y1 - 1995 A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V A1 - McGarry,F. A1 - Page,J. A1 - Waligora,S. A1 - Pajerski,R. KW - baseline;detailed KW - engineering KW - engineering; KW - evolving KW - improvement KW - Laboratory;continually KW - measurements;experiment KW - plans;production KW - process KW - program;software KW - projects;training;software KW - SEL KW - software AB - We select candidates for process change on the basis of quantified Software Engineering Laboratory (SEL) experiences and clearly defined goals for the software. After we select the changes, we provide training and formulate experiment plans. We then apply the new process to one or more production projects and take detailed measurements. We assess process success by comparing these measures with the continually evolving baseline. Based upon the results of the analysis, we adopt, discard, or revise the process VL - 12 SN - 0740-7459 CP - 6 M3 - 10.1109/52.469763 ER - TY - CONF T1 - Space-scale diagrams: understanding multiscale interfaces T2 - Proceedings of the SIGCHI conference on Human factors in computing systems Y1 - 1995 A1 - Furnas,G.W. A1 - Bederson, Benjamin B. JA - Proceedings of the SIGCHI conference on Human factors in computing systems ER - TY - CONF T1 - Tracking and recognizing rigid and non-rigid facial motions using local parametric models of image motion T2 - Computer Vision, 1995. Proceedings., Fifth International Conference on Y1 - 1995 A1 - Black,M. J A1 - Yacoob,Yaser JA - Computer Vision, 1995. Proceedings., Fifth International Conference on ER - TY - JOUR T1 - Vision, Graphic Design, and Visual Display JF - Readings in human-computer interaction: toward the year 2000 Y1 - 1995 A1 - Marcus,A. A1 - Murch,G.M. A1 - Baecker,R. A1 - Small,I. A1 - Mander,R. A1 - Ahlberg,C. A1 - Shneiderman, Ben ER - TY - JOUR T1 - Windows of opportunity in electronic classrooms JF - Communications of the ACM Y1 - 1995 A1 - Shneiderman, Ben A1 - Alavi,Maryann A1 - Norman,Kent A1 - Borkowski,Ellen Yu AB - Paradigm-shifting landmark buildings are cherished by their occupants and remembered because they reshape our expectations of schools, homes, or offices. Classic examples include Thomas Jefferson's communal design of the “academical village” at the University of Virginia where faculty and students lived close to classrooms, Frank Lloyd Wright's organic harmony with nature in Fallingwater (in western Pennsylvania) where the waterfall sounds and leafy surroundings offered a stress-reducing getaway for an urban executive, or Kevin Roche's open glass-walled Ford Foundation (in New York City) that promoted new team-oriented management strategies. VL - 38 SN - 0001-0782 UR - http://doi.acm.org/10.1145/219717.219725 CP - 11 M3 - 10.1145/219717.219725 ER - TY - JOUR T1 - AAAI 1994 Spring Symposium Series Reports JF - AI Magazine Y1 - 1994 A1 - Woods,William A1 - Uckun,Sendar A1 - Kohane,Isaac A1 - Bates,Joseph A1 - Hulthage,Ingemar A1 - Gasser,Les A1 - Hanks,Steve A1 - Gini,Maria A1 - Ram,Ashwin A1 - desJardins, Marie A1 - Johnson,Peter A1 - Etzioni,Oren A1 - Coombs,David A1 - Whitehead,Steven VL - 15 SN - 0738-4602 UR - http://www.aaai.org/ojs/index.php/aimagazine/article/viewArticle/1101 CP - 3 M3 - 10.1609/aimag.v15i3.1101 ER - TY - JOUR T1 - AVI '94: An International Workshop JF - ACM SIGCHI Bulletin Y1 - 1994 A1 - Shneiderman, Ben A1 - Badre,AI A1 - Santos,Paulo AB - The fresh Mediterranean breezes of innovation enlivened the workshop conversations at Advanced Visual Interfaces '94 (Bari, Italy June 1--4, 1994). More than 100 participants met on the flower-gardened grounds of the Grande Albergo di Villa Romanazzi Carducci, whose modern hotel plus conference center complemented the beautifully restored old villa and the marble-lined swimming pool. Being together with active professionals from Europe and America for 4 days gave us an in-depth chance to learn about each other's professional and personal outlooks. The ancient Roman architecture and the traditional Italian surroundings reminded us that the impact of our work could also last for two thousand years and shape many people's daily lives. VL - 26 SN - 0736-6906 UR - http://doi.acm.org/10.1145/191642.1047934 CP - 4 M3 - 10.1145/191642.1047934 ER - TY - JOUR T1 - Calculation of head sensitivity function from 3-D magnetic fields JF - Magnetics, IEEE Transactions on Y1 - 1994 A1 - Burke,E.R. A1 - Gomez,R.D. A1 - Madabhushi,R. A1 - Mayergoyz, Issak D KW - 3-D KW - fields;finite KW - fields;magnetic KW - function;magnetization;recorded KW - head;very KW - heads;magnetisation;sensitivity; KW - magnetic KW - narrow KW - Sensitivity KW - series;magnetic KW - tracks;Fourier KW - tracks;reproduce KW - widths;head AB - A head sensitivity function is calculated using 3-D magnetic fields. The 3-D magnetic fields are calculated for recorded tracks with finite widths. The magnetization in the medium is expressed in 2-D Fourier series in the plane of the film and is assumed uniform through the thickness of the film. The reproduce head is idealized. These techniques are applied to data found in the literature for very narrow tracks ( 0.5 mu;m). A surprising amount of the experimental data can be explained by the finite width of the tracks. The fine structure of the measurements can then be isolated and attributed to the particular features of the individual heads VL - 30 SN - 0018-9464 CP - 6 M3 - 10.1109/20.334060 ER - TY - JOUR T1 - Computing smooth molecular surfaces JF - Computer Graphics and Applications, IEEE Y1 - 1994 A1 - Varshney, Amitabh A1 - Brooks, F.P.,Jr. A1 - Wright,W. V KW - 3D KW - algorithm;smooth KW - algorithms;physics KW - analytical KW - atoms;three KW - complexity;computational KW - complexity;parallel KW - computing; KW - computing;surface KW - dimensional KW - geometry;interactive KW - geometry;parallel KW - improvements;computation KW - molecular KW - rates;linear KW - regular KW - surface KW - time;computational KW - triangulation;algorithmic KW - triangulation;computational AB - We consider how we set out to formulate a parallel analytical molecular surface algorithm that has expected linear complexity with respect to the total number of atoms in a molecule. To achieve this goal, we avoided computing the complete 3D regular triangulation over the entire set of atoms, a process that takes time O(n log n), where n is the number of atoms in the molecule. We aim to compute and display these surfaces at interactive rates, by taking advantage of advances in computational geometry, making further algorithmic improvements and parallelizing the computations.<> VL - 14 SN - 0272-1716 CP - 5 M3 - 10.1109/38.310720 ER - TY - CONF T1 - Design for manufacture in multi-enterprise partnerships: current status and future directions Y1 - 1994 A1 - Nau, Dana S. A1 - Ball,M. O A1 - Gupta,S.K. A1 - Minis,I. E. A1 - Zhang, G. AB - To pursue market and technology opportunities effectively, US commercial and defense industries will be relying increasingly on multi-enterprise partnerships. Horizontal partnering combines the strengths of multiple firms in product design, manufacture, after sales support and customer service, in order to launch superior products in the global market. To support effective partnering, new approaches will be needed for integrating the activities of design, planning, and production. It is important to address both the fundamental modeling of design, process planning, and production planning in ways that account for the capabilities of potential manufacturing partners, and the development of optimization procedures to address the underlying decision problems. This paper elaborates on these issues and discusses approaches for addressing them. UR - http://www.csa.com/partners/viewrecord.php?requester=gs&collection=TRD&recid=0160471CI ER - TY - JOUR T1 - Finding level-ancestors in trees JF - Journal of Computer and System Sciences Y1 - 1994 A1 - Berkman,O. A1 - Vishkin, Uzi VL - 48 CP - 2 ER - TY - CONF T1 - Interactive visualization of weighted three-dimensional alpha hulls T2 - Proceedings of the tenth annual symposium on Computational geometry Y1 - 1994 A1 - Varshney, Amitabh A1 - Brooks,Frederick P. A1 - Wright,William V. AB - An interactive visualization of weighted three-dimensional &agr;-hulls is presented for static and dynamic spheres. The &agr;-hull is analytically computed and represented by a triangulated mesh. The entire surface is computed and displayed in real-time at interactive rates. The weighted three-dimensional &agr;-hulls are equivalent to smooth molecular surfaces of biochemistry. Biochemistry applications of interactive computation and display of &agr;-hulls or smooth molecular surfaces are outlined. JA - Proceedings of the tenth annual symposium on Computational geometry T3 - SCG '94 PB - ACM CY - New York, NY, USA SN - 0-89791-648-4 UR - http://doi.acm.org/10.1145/177424.178120 M3 - 10.1145/177424.178120 ER - TY - CONF T1 - Interpretation of Doppler blood flow velocity waveforms using neural networks. T2 - Proceedings of the Annual Symposium on Computer Application in Medical Care Y1 - 1994 A1 - Baykal,N. A1 - Reggia, James A. A1 - Yalabik,N. A1 - Erkmen,A. A1 - Beksac,M. S. JA - Proceedings of the Annual Symposium on Computer Application in Medical Care ER - TY - CONF T1 - Jovian: A framework for optimizing parallel I/O T2 - Scalable Parallel Libraries Conference, 1994., Proceedings of the 1994 Y1 - 1994 A1 - Bennett, R. A1 - Bryant,K. A1 - Sussman, Alan A1 - Das,R. A1 - Saltz, J. JA - Scalable Parallel Libraries Conference, 1994., Proceedings of the 1994 ER - TY - JOUR T1 - Looped schedules for dataflow descriptions of multirate signal processing algorithms JF - Formal Methods in System Design Y1 - 1994 A1 - Bhattacharyya, Shuvra S. A1 - Lee,E. A VL - 5 CP - 3 ER - TY - JOUR T1 - A miniature pan-tilt actuator: the spherical pointing motor JF - IEEE Transactions on Robotics and Automation Y1 - 1994 A1 - Bederson, Benjamin B. A1 - Wallace,R.S. A1 - Schwartz,E.L. KW - absolute positioning device KW - active vision KW - Actuators KW - Application software KW - Assembly KW - automatic calibration KW - camera sensor KW - CAMERAS KW - CCD image sensors KW - CCD sensor chip KW - Charge coupled devices KW - Charge-coupled image sensors KW - closed-loop control strategies KW - computerised control KW - Lenses KW - Magnetic fields KW - miniature lens assembly KW - miniature pan-tilt actuator KW - open-loop control strategies KW - orthogonal motor windings KW - pan-tilt mechanism KW - Permanent magnet motors KW - position control KW - Scanning probe microscopy KW - spherical pointing motor KW - two-degree-of-freedom device AB - A pan-tilt mechanism is a computer-controlled actuator designed to point an object such as a camera sensor. For applications in active vision, a pan-tilt mechanism should be accurate, fast, small, inexpensive and have low power requirements. The authors have designed and constructed a new type of actuator meeting these requirements, which incorporates both pan and tilt into a single, two-degree-of-freedom device. The spherical pointing motor (SPM) consists of three orthogonal motor windings in a permanent magnetic field, configured to move a small camera mounted on a gimbal. It is an absolute positioning device and is run open-loop. The SPM is capable of panning and tilting a load of 15 grams, for example a CCD image sensor, at rotational velocities of several hundred degrees per second with a repeatability of .15°. The authors have also built a miniature camera consisting of a single CCD sensor chip and miniature lens assembly that fits on the rotor of this motor. In this paper, the authors discuss the theory of the SPM, which includes its basic electromagnetic principles, and derive the relationship between applied currents and resultant motor position. The authors present an automatic calibration procedure and discuss open- and closed-loop control strategies. Finally, the authors present the physical characteristics and results of their prototype VL - 10 SN - 1042-296X CP - 3 M3 - 10.1109/70.294205 ER - TY - JOUR T1 - Navigating in hyperspace: designing a structure-based toolbox JF - Communications of the ACM Y1 - 1994 A1 - Rivlin,Ehud A1 - Botafogo,Rodrigo A1 - Shneiderman, Ben VL - 37 SN - 0001-0782 UR - http://doi.acm.org/10.1145/175235.175242 CP - 2 M3 - 10.1145/175235.175242 ER - TY - RPRT T1 - Next Generation Network Management Technology Y1 - 1994 A1 - Atallah,George C A1 - Ball,Michael O A1 - Baras,John S A1 - Goli,Shravan K A1 - Karne,Ramesh K A1 - Kelley,Stephen A1 - Kumar,Harsha P. A1 - Plaisant, Catherine A1 - Roussopoulos, Nick A1 - Shneiderman, Ben A1 - Srinivasarao,Mulugu A1 - Stathatos,Kostas A1 - Teittinen,Marko A1 - Whitefield,David KW - Constraints for Network Management. KW - Network Configuration Management KW - network management KW - Object Oriented Data Base Model for Network Management KW - Rules KW - Systems Integration KW - Visual Information Management for Network Configuration Management AB - Today's telecommunications networks are becoming increasingly large, complex, mission critical and heterogeneous in several dimensions. For example, the underlying physical transmission facilities of a given network may be ﲭixed media (copper, fiber- optic, radio, and satellite); the sub networks may be acquired from different vendors due to economic, performance, or general availability reasons; the information being transmitted over the network may be ﲭultimedia (video, data, voice, and images) and, finally, varying performance criteria may be imposed e.g. data transfer may require high throughput while the others, whose concern is voice communications, may require low call blocking probability. For these reasons, future telecommunications networks are expected to be highly complex in their services and operations. Due to this growing complexity and the disparity among management systems for individual sub networks, efficient network management systems have become critical to the current and future success of telecommunications companies. This paper addresses a research and development effort which focuses on prototyping configuration management, since that is the central process of network management and all other network management functions must be built upon it. Our prototype incorporates ergonomically designed graphical user interfaces tailored to the network configuration management subsystem and to the proposed advanced object-oriented database structure. The resulting design concept follows open standards such as Open Systems Interconnection (OSI) and incorporates object oriented programming methodology to associate data with functions, permit customization, and provide an open architecture environment. JA - Institute for Systems Research Technical Reports UR - http://drum.lib.umd.edu/handle/1903/5519 ER - TY - CHAP T1 - On a parallel-algorithms method for string matching problems (overview) T2 - Algorithms and ComplexityAlgorithms and Complexity Y1 - 1994 A1 - Sahinalp,Suleyman A1 - Vishkin, Uzi ED - Bonuccelli,M. ED - Crescenzi,P. ED - Petreschi,R. KW - Computer KW - Science JA - Algorithms and ComplexityAlgorithms and Complexity T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 778 SN - 978-3-540-57811-6 UR - http://dx.doi.org/10.1007/3-540-57811-0_3 ER - TY - JOUR T1 - Planning-based integrated decision support systems JF - Artificial Intelligence Planning Systems: Proceedings of the Second International Conference (AIPS-94) Y1 - 1994 A1 - Bienkowski,M.A. A1 - desJardins, Marie ER - TY - CONF T1 - A rule-based approach to prepositional phrase attachment disambiguation T2 - Proceedings of the 15th conference on Computational linguistics-Volume 2 Y1 - 1994 A1 - Brill,E. A1 - Resnik, Philip JA - Proceedings of the 15th conference on Computational linguistics-Volume 2 ER - TY - CONF T1 - A SIMD solution to the sequence comparison problem on the MGAP T2 - International Conference on Application Specific Array Processors, 1994. Proceedings Y1 - 1994 A1 - Borah,M. A1 - Bajwa,R. S A1 - Hannenhalli, Sridhar A1 - Irwin,M. J KW - AT-optimal algorithm KW - Biological information theory KW - biology computing KW - biosequence comparison problem KW - computational complexity KW - Computer science KW - Costs KW - database size KW - Databases KW - DNA computing KW - dynamic programming KW - dynamic programming algorithms KW - fine-grained massively parallel processor array KW - Genetics KW - Heuristic algorithms KW - maximally similar sequence KW - MGAP parallel computer KW - Micro-Grain Array Processor KW - Military computing KW - molecular biology KW - molecular biophysics KW - Nearest neighbor searches KW - nearest-neighbor connections KW - Parallel algorithms KW - pipeline processing KW - pipelined SIMD solution KW - sequence alignment problem KW - sequences AB - Molecular biologists frequently compare an unknown biosequence with a set of other known biosequences to find the sequence which is maximally similar, with the hope that what is true of one sequence, either physically or functionally, could be true of its analogue. Even though efficient dynamic programming algorithms exist for the problem, when the size of the database is large, the time required is quite long, even for moderate length sequences. In this paper, we present an efficient pipelined SIMD solution to the sequence alignment problem on the Micro-Grain Array Processor (MGAP), a fine-grained massively parallel array of processors with nearest-neighbor connections. The algorithm compares K sequences of length O(M) with the actual sequence of length N, in O(M+N+K) time with O(MN) processors, which is AT-optimal. The implementation on the MGAP computes at the rate of about 0.1 million comparisons per second for sequences of length 128 JA - International Conference on Application Specific Array Processors, 1994. Proceedings PB - IEEE SN - 0-8186-6517-3 M3 - 10.1109/ASAP.1994.331791 ER - TY - RPRT T1 - Software Process Improvement in the NASA Software Engineering Laboratory. Y1 - 1994 A1 - McGarry,Frank A1 - Pajerski,Rose A1 - Page,Gerald A1 - Waligora,Sharon A1 - Basili, Victor R. KW - *AWARDS KW - *SOFTWARE ENGINEERING KW - *SYSTEMS ANALYSIS KW - *WORK MEASUREMENT KW - ADMINISTRATION AND MANAGEMENT KW - COMPUTER PROGRAMMING AND SOFTWARE KW - COMPUTER PROGRAMS KW - COMPUTERS KW - data acquisition KW - ENVIRONMENTS KW - EXPERIMENTAL DATA KW - GROUND SUPPORT. KW - measurement KW - Organizations KW - PE63756E KW - Production KW - SOFTWARE PROCESS IMPROVEMENT KW - SPI(SOFTWARE PROCESS IMPROVEMENT) KW - SPN-19950120014 AB - The Software Engineering Laboratory (SEL) was established in 1976 for the purpose of studying and measuring software processes with the intent of identifying improvements that could be applied to the production of ground support software within the Flight Dynamics Division (FDD) at the National Aeronautics and Space Administration (NASA)/Goddard Space Flight Center (GSFC). The SEL has three member organizations: NASA/GSFC, the University of Maryland, and Computer Sciences Corporation (CSC). The concept of process improvement within the SEL focuses on the continual understanding of both process and product as well as goal-driven experimentation and analysis of process change within a production environment. PB - CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INSTITUTE UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA289912 ER - TY - JOUR T1 - Space variant image processing JF - International Journal of Computer Vision Y1 - 1994 A1 - Wallace,R.S. A1 - Ong,P.W. A1 - Bederson, Benjamin B. A1 - Schwartz,E.L. VL - 13 CP - 1 ER - TY - JOUR T1 - Top-Bottom Routing around a Rectangle is as Easy as Computing Prefix Minima JF - SIAM Journal on Computing Y1 - 1994 A1 - Berkman,Omer A1 - JaJa, Joseph F. A1 - Krishnamurthy,Sridhar A1 - Thurimella,Ramakrishna A1 - Vishkin, Uzi KW - Parallel algorithms KW - pram algorithms KW - prefix minima KW - VLSI routing AB - A new parallel algorithm for the prefix minima problem is presented for inputs drawn from the range of integers $[1..s]$. For an input of size $n$, it runs in $O(\log \log \log s)$ time and $O(n)$ work (which is optimal). A faster algorithm is presented for the special case $s = n$; it runs in $O(\log ^ * n)$ time with optimal work. Both algorithms are for the Priority concurrent-read concurrent-write parallel random access machine (CROW PRAM). A possibly surprising outcome of this work is that, whenever the range of the input is restricted, the prefix minima problem can be solved significantly faster than the $\Omega (\log \log n)$ time lower bound in a decision model of parallel computation, as described by Valiant [SIAM J. Comput., 4 (1975), pp. 348–355].The top-bottom routing problem, which is an important subproblem of routing wires around a rectangle in two layers, is also considered. It is established that, for parallel (and hence for serial) computation, the problem of top-bottom routing is no harder than the prefix minima problem with $s = n$, thus giving an $O(\log ^ * n)$ time optimal parallel algorithm for the top-bottom routing problem. This is one of the first nontrivial problems to be given an optimal parallel algorithm that runs in sublogarithmic time. VL - 23 UR - http://link.aip.org/link/?SMJ/23/449/1 CP - 3 M3 - 10.1137/S0097539791218275 ER - TY - CONF T1 - Verifying an intelligent structural control system: a case study T2 - Real-Time Systems Symposium, 1994., Proceedings. Y1 - 1994 A1 - Elseaidy,W. M A1 - Cleaveland, Rance A1 - Baugh,J. W. KW - automatic verification tool KW - case study KW - Concurrency Workbench KW - Distributed computing KW - Distributed control KW - distributed processing KW - finite automata KW - finite-state processes KW - formal verification KW - graphical specification language KW - high-level design KW - intelligent control KW - intelligent structural control system verification KW - Logic KW - Modechart KW - Process algebra KW - Real time systems KW - real-time systems KW - Specification languages KW - structural engineering computing KW - temporal logic KW - temporal process algebra KW - time-varying systems KW - Timing KW - timing properties KW - visual languages AB - Describes the formal verification of the timing properties of the design of an intelligent structural control system using the Concurrency Workbench, an automatic verification tool for finite-state processes. The high-level design of the system is first given in Modechart, a graphical specification language for real-time systems, and then translated into a temporal process algebra supported by the Workbench. The facilities provided by this tool are then used to analyze the system and ultimately show it to be correct JA - Real-Time Systems Symposium, 1994., Proceedings. PB - IEEE SN - 0-8186-6600-5 M3 - 10.1109/REAL.1994.342708 ER - TY - RPRT T1 - Bounding the number of neighbors in protein molecules Y1 - 1993 A1 - Varshney, Amitabh A1 - Wright,W. V A1 - Brooks Jr,F. P PB - Department of Computer Science, University of North Carolina at Chapel Hill VL - UNC-CS-TR-93-039 ER - TY - CONF T1 - Control and design of the spherical pointing motor T2 - , 1993 IEEE International Conference on Robotics and Automation, 1993. Proceedings Y1 - 1993 A1 - Bederson, Benjamin B. A1 - Wallace,R.S. A1 - Schwartz,E.L. KW - absolute positioning device KW - Actuators KW - camera sensor KW - CAMERAS KW - Coils KW - electric actuators KW - electric motors KW - Magnetic field measurement KW - Magnetic sensors KW - Open loop systems KW - open-loop control KW - orthogonal coils KW - pan-tilt actuator KW - permanent magnet KW - Permanent magnet motors KW - Permanent magnets KW - position control KW - Scanning probe microscopy KW - second order system KW - spherical pointing motor KW - velocity control KW - Velocity measurement KW - velocity measurements AB - A miniature pan-tilt actuator, the spherical pointing motor (SPM) has been built. The SPM is an absolute positioning device, designed to orient a small camera sensor in two degrees-of-rotational-freedom. It is 4 cm×5 cm×6 cm and weighs 160 g. The operating principle of the SPM is to orient a permanent magnet to the magnetic field induced by three orthogonal coils by applying the appropriate ratio of currents to the coils. The open-loop control and design of the SPM are described. Physical characteristics and velocity measurements of the prototype are reported. The SPM is modeled with a simple second order system. Without control, it oscillates substantially when a single impulse is applied. By applying a second impulse without feedback, the oscillation can be reduced by as much as a factor of ten JA - , 1993 IEEE International Conference on Robotics and Automation, 1993. Proceedings PB - IEEE SN - 0-8186-3450-2 M3 - 10.1109/ROBOT.1993.291888 ER - TY - CHAP T1 - Evaluating three museum installations of a hypertext system T2 - Sparks of innovation in human-computer interaction Y1 - 1993 A1 - Shneiderman, Ben A1 - Brethauer,D. A1 - Plaisant, Catherine A1 - Potter,R. JA - Sparks of innovation in human-computer interaction PB - Intellect Books VL - 40 SN - 9781567500783 ER - TY - CONF T1 - Fast analytical computation of Richards's smooth molecular surface T2 - Proceedings of the 4th conference on Visualization '93 Y1 - 1993 A1 - Varshney, Amitabh A1 - Brooks,Frederick P. AB - An algorithm for rapid computation of Richards's smooth molecular surface is described. The entire surface is computed analytically, triangulated, and displayed at interactive rates. The faster speeds for our program have been achieved by algorithmic improvements, parallelizing the computations, and by taking advantage of the special geometrical properties of such surfaces. Our algorithm is easily parallelizable and it has a time complexity of O(k log k) over n processors, where n is the number of atoms of the molecule and k is the average number of neighbors per atom. JA - Proceedings of the 4th conference on Visualization '93 T3 - VIS '93 PB - IEEE Computer Society CY - Washington, DC, USA SN - 0-8186-3940-7 UR - http://dl.acm.org/citation.cfm?id=949845.949900 ER - TY - JOUR T1 - A first-pass approach for evaluating machine translation systems JF - Machine Translation Y1 - 1993 A1 - Jordan,P.W. A1 - Dorr, Bonnie J A1 - Benoit,J.W. AB - This paper describes a short-term survey and evaluation project that covered a large number of machine translation products and research. We discuss our evaluation approach and address certain issues and implications relevant to our findings. We represented a variety of potential users of MT systems and were faced with the task of identifying which systems would best help them solve their translation problems. VL - 8 CP - 1 ER - TY - JOUR T1 - MANDATE: managing networks using database technology JF - IEEE Journal on Selected Areas in Communications Y1 - 1993 A1 - Haritsa,J. R A1 - Ball,M. O A1 - Roussopoulos, Nick A1 - Datta,A. A1 - Baras,J. S KW - Communication networks KW - database management systems KW - enterprise communication networks KW - Heart KW - Information management KW - interface KW - internetworking KW - Local area networks KW - management functionality KW - management information database KW - managing networks using database technology KW - MANDATE KW - Manufacturing KW - network operating systems KW - open systems KW - Optical fiber cables KW - Research and development management KW - Technology management KW - telecommunication network management KW - Transaction databases KW - wide area networks AB - There has been a growing demand for the development of tools to manage enterprise communication networks. A management information database is the heart of a network management system-it provides the interface between all functions of the network management system and, therefore, has to provide sophisticated functionality allied with high performance. The authors introduce the design of MANDATE (MAnaging Networks using DAtabase TEchnology), a proposed database system for effectively supporting the management of large enterprise networks. The MANDATE design makes a conscious attempt to take advantage of the special characteristics of network data and transactions, and of advances in database technology, to efficiently derive some of the required management functionality VL - 11 SN - 0733-8716 CP - 9 M3 - 10.1109/49.257929 ER - TY - JOUR T1 - Optimal doubly logarithmic parallel algorithms based on finding all nearest smaller values JF - Journal of Algorithms Y1 - 1993 A1 - Berkman,O. A1 - Schieber,B. A1 - Vishkin, Uzi VL - 14 CP - 3 ER - TY - JOUR T1 - On parallel integer merging JF - Information and Computation Y1 - 1993 A1 - Berkman,O. A1 - Vishkin, Uzi VL - 106 CP - 2 ER - TY - CHAP T1 - Scheduling home control devices: a case study of the transition from the research project to a product T2 - Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction Y1 - 1993 A1 - Plaisant, Catherine A1 - Shneiderman, Ben A1 - Battagtia,J. JA - Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction PB - Intellect Books SN - 9781567500783 ER - TY - JOUR T1 - Scheduling synchronous dataflow graphs for efficient looping JF - The Journal of VLSI Signal Processing Y1 - 1993 A1 - Bhattacharyya, Shuvra S. A1 - Lee,E. A VL - 6 CP - 3 ER - TY - CONF T1 - SOCAP: lessons learned in automating military operations planning T2 - Proceedings of the 6th international conference on Industrial and engineering applications of artificial intelligence and expert systems Y1 - 1993 A1 - Desimone,R. A1 - Wilkins,D. E. A1 - Bienkowski,M. A1 - desJardins, Marie JA - Proceedings of the 6th international conference on Industrial and engineering applications of artificial intelligence and expert systems T3 - IEA/AIE'93 PB - Gordon & Breach Science Publishers SN - 2-88124-604-4 UR - http://dl.acm.org/citation.cfm?id=1114022.1114082 ER - TY - BOOK T1 - Use of lexical conceptual structure for intelligent tutoring Y1 - 1993 A1 - Dorr, Bonnie J A1 - Hendler,J. A1 - Blanksteen,S. A1 - Migdalof,B. AB - We describe the use of an LCS-based semantics for question-answeringexercises in foreign language training. We start by reviewing the LCS model and show how this representation can be used to support a question answering lesson as well as a limited domain discourse. An authoring tool for entering the relevant semantic knowledge is also described. PB - University of Maryland ER - TY - CONF T1 - Anthropomorphism: from Eliza to Terminator 2 T2 - Proceedings of the SIGCHI conference on Human factors in computing systems Y1 - 1992 A1 - Don,Abbe A1 - Brennan,Susan A1 - Laurel,Brenda A1 - Shneiderman, Ben JA - Proceedings of the SIGCHI conference on Human factors in computing systems T3 - CHI '92 PB - ACM CY - New York, NY, USA SN - 0-89791-513-5 UR - http://doi.acm.org/10.1145/142750.142760 M3 - 10.1145/142750.142760 ER - TY - JOUR T1 - Constrained Matrix Sylvester Equations JF - SIAM Journal on Matrix Analysis and Applications Y1 - 1992 A1 - Barlow,Jewel B. A1 - Monahemi,Moghen M. A1 - O'Leary, Dianne P. KW - loop transfer recovery KW - matrix Liapunov equation KW - Sylvester operator AB - The problem of finding matrices $L$ and $T$ satisfying $TA - FT = LC$ and $TB = 0$ is considered. Existence conditions for the solution are established and an algorithm for computing the solution is derived. Conditions under which the matrix $[C^T ,T^T ]$ is full rank are also discussed. The problem arises in control theory in the design of reduced-order observers that achieve loop transfer recovery. VL - 13 UR - http://link.aip.org/link/?SML/13/1/1 CP - 1 M3 - 10.1137/0613002 ER - TY - JOUR T1 - The Design of Reduced Order Observers with Precise Loop Transfer Recovery JF - AIAA Journal of Guidance, Control, and Dynamics Y1 - 1992 A1 - Monahemi,Moghen M. A1 - Barlow,Jewel B. A1 - O'Leary, Dianne P. VL - 15 ER - TY - CONF T1 - Efficient minimum cost matching using quadrangle inequality T2 - Foundations of Computer Science, 1992. Proceedings., 33rd Annual Symposium on Y1 - 1992 A1 - Aggarwal,A. A1 - Bar-Noy,A. A1 - Khuller, Samir A1 - Kravets,D. A1 - Schieber,B. KW - algorithm; KW - array; KW - bipartite KW - bitonic KW - blue KW - complexity; KW - computational KW - cost KW - distance; KW - Euclidean KW - function; KW - geometry; KW - graph KW - graphs; KW - inequality; KW - linear KW - MATCHING KW - matching; KW - minimisation; KW - minimum KW - Monge KW - perfect KW - points; KW - polynomial KW - problem; KW - quadrangle KW - red KW - theory; KW - TIME KW - transportation KW - transportation; KW - weakly AB - The authors present efficient algorithms for finding a minimum cost perfect matching, and for solving the transportation problem in bipartite graphs, G = (Red cup; Blue, Red times; Blue), where |Red| = n, |Blue| = m, n les; m, and the cost function obeys the quadrangle inequality. The first results assume that all the red points and all the blue points lie on a curve that is homeomorphic to either a line or a circle and the cost function is given by the Euclidean distance along the curve. They present a linear time algorithm for the matching problem. They generalize the method to solve the corresponding transportation problem in O((m+n)log(m+n)) time. The next result is an O(n log m) algorithm for minimum cost matching when the cost array is a bitonic Monge array. An example of this is when the red points lie on one straight line and the blue points lie on another straight line (that is not necessarily parallel to the first one). Finally, they provide a weakly polynomial algorithm for the transportation problem in which the associated cost array is a bitonic Monge array JA - Foundations of Computer Science, 1992. Proceedings., 33rd Annual Symposium on M3 - 10.1109/SFCS.1992.267793 ER - TY - CHAP T1 - On the Precise Loop Transfer Recovery and Transmission Zeroes T2 - First IEEE Conference on Control ApplicationsFirst IEEE Conference on Control Applications Y1 - 1992 A1 - Monahemi,M. A1 - Barlow,J. A1 - O'Leary, Dianne P. JA - First IEEE Conference on Control ApplicationsFirst IEEE Conference on Control Applications CY - Dayton, Ohio ER - TY - JOUR T1 - Randomized range-maxima in nearly-constant parallel time JF - Computational Complexity Y1 - 1992 A1 - Berkman,O. A1 - Matias,Y. A1 - Vishkin, Uzi VL - 2 CP - 4 ER - TY - CONF T1 - Real-time procedural textures T2 - Proceedings of the 1992 symposium on Interactive 3D graphics Y1 - 1992 A1 - Rhoades,John A1 - Turk,Greg A1 - Bell,Andrew A1 - State,Andrei A1 - Neumann,Ulrich A1 - Varshney, Amitabh JA - Proceedings of the 1992 symposium on Interactive 3D graphics T3 - I3D '92 PB - ACM CY - New York, NY, USA SN - 0-89791-467-8 UR - http://doi.acm.org/10.1145/147156.147171 M3 - 10.1145/147156.147171 ER - TY - RPRT T1 - Six Generations of Building Walkthrough: Final Technical Report to the National Science Foundation Y1 - 1992 A1 - Brooks,Frederick P. A1 - Airey,John A1 - Alspaugh,John A1 - Bell,Andrew A1 - Brown,Randolph A1 - Hill,Curtis A1 - Nimscheck,Uwe A1 - Rheingans,Penny A1 - Rohlf,John A1 - Smith,Dana A1 - Turner,Douglass A1 - Varshney, Amitabh A1 - Wang,Yulan A1 - Weber,Hans A1 - Yuan,Xialin PB - University of North Carolina at Chapel Hill CY - Chapel Hill, NC, USA ER - TY - JOUR T1 - Software approaches to segmentation analysis JF - Computer Science Technical Report Series; Vol. CS-TR-2991 Y1 - 1992 A1 - D'Autrechy,C. L A1 - Reggia, James A. A1 - Berndt,R. S ER - TY - JOUR T1 - Splicing signals in Drosophila: intron size, information content, and consensus sequences JF - Nucleic Acids ResearchNucl. Acids Res. Y1 - 1992 A1 - Mount, Stephen M. A1 - Burks,Christian A1 - Herts,Gerald A1 - Stormo,Gary D. A1 - White,Owen A1 - Fields,Chris AB - A database of 209 Drosophila Introns was extracted from Genbank (release number 64.0) and examined by a number of methods in order to characterize features that might serve as signals for messenger RNA splicing. A tight distribution of sizes was observed: while the smallest introns in the database are 51 nucleotides, more than half are less than 80 nucleotides in length, and most of these have lengths in the range of 59 – 67 nucleotides. Drosophila splice sites found in large and small introns differ in only minor ways from each other and from those found in vertebrate Introns. However, larger introns have greater pyrimidlne-richness in the region between 11 and 21 nucleotides upstream of 3′ splice sites. The Drosophila branchpoint consensus matrix resembles C T A A T (in which branch formation occurs at the underlined A), and differs from the corresponding mammalian signal in the absence of G at the position immediately preceding the branchpoint. The distribution of occurrences of this sequence suggests a minimum distance between 5′ splice shies and branchpoints of about 38 nucleotides, and a minimum distance between 3′ splice sites and branchpoints of 15 nucleotides. The methods we have used detect no information in exon sequences other than in the few nucleotides immediately adjacent to the splice sites. However, Drosophila resembles many other species in that there is a discontinuity in A + T content between exons and introns, which are A + T rich. VL - 20 SN - 0305-1048, 1362-4962 UR - http://nar.oxfordjournals.org/content/20/16/4255 CP - 16 M3 - 10.1093/nar/20.16.4255 ER - TY - JOUR T1 - Standards-are software engineering process standards really necessary? JF - Computer Y1 - 1992 A1 - Zelkowitz, Marvin V A1 - Buckley,F.J. KW - conformance KW - engineering KW - engineering;standards; KW - process KW - standards;software KW - statements;product KW - testing;policy AB - The need for software engineering process standards-as opposed to product standards-is discussed from two different viewpoints. M.V. Zelkowitz states that process standards are generally written as policy statements on how to conduct certain processes. As such, they give the framework of the underlying model, but not enough guidance to specify details. They are fuzzy and hard to implement, and they make conformance testing extremely difficult. F.J. Buckley responds to several significant issues raised in Zelkowitz's arguments VL - 25 SN - 0018-9162 CP - 11 M3 - 10.1109/2.166422 ER - TY - JOUR T1 - Structural analysis of hypertexts: identifying hierarchies and useful metrics JF - ACM Transactions on Information Systems Y1 - 1992 A1 - Botafogo,Rodrigo A. A1 - Rivlin,Ehud A1 - Shneiderman, Ben KW - graph theory KW - hierarchies KW - hypertext KW - metrics KW - structural analysis AB - Hypertext users often suffer from the “lost in hyperspace” problem: disorientation from too many jumps while traversing a complex network. One solution to this problem is improved authoring to create more comprehensible structures. This paper proposes several authoring tools, based on hypertext structure analysis.In many hypertext systems authors are encouraged to create hierarchical structures, but when writing, the hierarchy is lost because of the inclusion of cross-reference links. The first part of this paper looks at ways of recovering lost hierarchies and finding new ones, offering authors different views of the same hypertext. The second part helps authors by identifying properties of the hypertext document. Multiple metrics are developed including compactness and stratum. Compactness indicates the intrinsic connectedness of the hypertext, and stratum reveals to what degree the hypertext is organized so that some nodes must be read before others. Several existing hypertexts are used to illustrate the benefits of each technique. The collection of techniques provides a multifaceted view of the hypertext, which should allow authors to reduce undesired structural complexity and create documents that readers can traverse more easily. VL - 10 SN - 1046-8188 UR - http://doi.acm.org/10.1145/146802.146826 CP - 2 M3 - 10.1145/146802.146826 ER - TY - CONF T1 - Two miniature pan-tilt devices T2 - Robotics and Automation, 1992. Proceedings., 1992 IEEE International Conference on Y1 - 1992 A1 - Bederson, Benjamin B. A1 - Wallace,R.S. A1 - Schwartz,E.L. JA - Robotics and Automation, 1992. Proceedings., 1992 IEEE International Conference on ER - TY - CHAP T1 - A two-level knowledge representation for machine translation: Lexical semantics and tense/aspect T2 - Lexical Semantics and Knowledge RepresentationLexical Semantics and Knowledge Representation Y1 - 1992 A1 - Dorr, Bonnie J ED - Pustejovsky,James ED - Bergler,Sabine AB - This paper proposes a two-level model that integrates contemporary theories of tense and aspect with lexical semantics. The model is intended to be extensible to realms outside of the temporal domain (e.g., the spatial domain). The integration of tense and aspect with lexical-semantics is especially critical in machine translation because of the lexical selection process during generation: there is often a number of lexical connective and tense/aspect possibilities that may be produced from a lexical semantic representation, which, as defined in the model presented here, is largely underspecified. Temporal/aspectual information from the source-language sentence constrains the choice of target-language terms. In turn, the target-language terms limit the possibilities for generation of tense and aspect. Thus, there is a two-way communication channel between the two processes. JA - Lexical Semantics and Knowledge RepresentationLexical Semantics and Knowledge Representation T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 627 SN - 978-3-540-55801-9 UR - http://dx.doi.org/10.1007/3-540-55801-2_41 ER - TY - CONF T1 - Voice-bandwidth visual communication through logmaps: the Telecortex T2 - Applications of Computer Vision, Proceedings, 1992., IEEE Workshop on Y1 - 1992 A1 - Wallace,R.S. A1 - Bederson, Benjamin B. A1 - Schwartz,E.L. JA - Applications of Computer Vision, Proceedings, 1992., IEEE Workshop on ER - TY - JOUR T1 - Computer based systems engineering workshop JF - Software Engineering Education Y1 - 1991 A1 - Lavi,J. A1 - Agrawala, Ashok K. A1 - Buhr,R. A1 - Jackson,K. A1 - Jackson,M. A1 - Lang,B. AB - Modern computer based systems are complex multi-systems consisting of many connected individual subsystems; each one of them is typically also a multicomputer system. The subsystems in a multi-system can be either geographically distributed or locally connected systems. Typical examples of computer based systems are medical systems, process control systems, communications systems, weapon systems and large information systems.The development of these complex systems requires the establishment of a new engineering discipline in its own right, Computer Based Systems Engineering — CBSE. The definition of the discipline, its current and future practice and the ways to establish and promote it were discussed in an international IEEE workshop held in Neve-Ilan, Israel in May 1990. The major conclusion of the workshop was that CBSE should be established as a new field in its own right. To achieve this goal, the workshop participants recommended that the IEEE Computer Society shall set up a task force for the promotion of the field, the establishment of CBSE Institutes and the development of the educational framework of CBSE. The paper describes the major findings of the workshop that led to these conclusions and recommendations. ER - TY - CHAP T1 - Considerations on Loop Transfer Recovery for Non-minimum Phase Plants T2 - Proceedings of the AIAA Aircraft Design Systems and Operations MeetingProceedings of the AIAA Aircraft Design Systems and Operations Meeting Y1 - 1991 A1 - Monahemi,M. A1 - Barlow,J. A1 - O'Leary, Dianne P. JA - Proceedings of the AIAA Aircraft Design Systems and Operations MeetingProceedings of the AIAA Aircraft Design Systems and Operations Meeting CY - Baltimore VL - AIAA-91-3086 ER - TY - CHAP T1 - The Design of Reduced Order Luenberger Observers with Precise LTR T2 - Proceedings of the AIAA Meeting on Guidance, Navigation and ControlProceedings of the AIAA Meeting on Guidance, Navigation and Control Y1 - 1991 A1 - Monahemi,M. A1 - Barlow,J. A1 - O'Leary, Dianne P. AB - This work concerns the design of reduced-order observers for controllable, observable, and regular systems in which the number of measurements is more than the number of controls. It uses eigenstructure assignment whereas other approaches use Kalman filter (LQG/LTR) methods. The advantages of this approach are: (1) precise LTR rather than approximate LTR, (2) no restriction to minimum phase systems, (3) finite observer gain rather than asymptotic observer gain, and (4) simpler and more efficient numerical calculation. Case studies are presented illustrating these features in aircraft control applications. JA - Proceedings of the AIAA Meeting on Guidance, Navigation and ControlProceedings of the AIAA Meeting on Guidance, Navigation and Control CY - New Orleans VL - AIAA-91-2731 ER - TY - CHAP T1 - Editing to structure a reader's experience T2 - Hypertext/hypermedia handbookHypertext/hypermedia handbook Y1 - 1991 A1 - Shneiderman, Ben A1 - Kreitzberg,C. A1 - Berk,E. JA - Hypertext/hypermedia handbookHypertext/hypermedia handbook ER - TY - CONF T1 - Identifying aggregates in hypertext structures T2 - Proceedings of the third annual ACM conference on Hypertext Y1 - 1991 A1 - Botafogo,Rodrigo A. A1 - Shneiderman, Ben JA - Proceedings of the third annual ACM conference on Hypertext T3 - HYPERTEXT '91 PB - ACM CY - New York, NY, USA SN - 0-89791-461-9 UR - http://doi.acm.org/10.1145/122974.122981 M3 - 10.1145/122974.122981 ER - TY - CONF T1 - Metric-driven analysis and feedback systems for enabling empirically guided software development T2 - Proceedings of the 13th international conference on Software engineering Y1 - 1991 A1 - Selby,R. W A1 - Porter, Adam A1 - Schmidt,D. C A1 - Berney,J. JA - Proceedings of the 13th international conference on Software engineering ER - TY - JOUR T1 - Pyramid computation of neighbor distance statistics in dot patterns JF - CVGIP: Graphical Models and Image Processing Y1 - 1991 A1 - Banerjee,Saibal A1 - Mount, Dave A1 - Rosenfeld,Azriel AB - This paper describes an algorithm for computing statistics of Voronoi neighbor distances in a dot pattern, using a cellular pyramid computer, in a logarithmic number of computational steps. Given a set of dots in a square region of the digital plane, the algorithm determines with high probability the Voronoi neighbors of the dots in the interior of the region and then computes statistics of the neighbor distances. An algorithm of this type may account for the ability of humans to perceive at a glance whether the dots in a pattern are randomly or regularly spaced, i.e., their neighbor distances have high or low variance. VL - 53 SN - 1049-9652 UR - http://www.sciencedirect.com/science/article/pii/104996529190040Q CP - 4 M3 - 10.1016/1049-9652(91)90040-Q ER - TY - JOUR T1 - Recent applications of competitive activation mechanisms JF - Neural Networks: Advances and Applications Y1 - 1991 A1 - Reggia, James A. A1 - Peng,Y. A1 - Bourret,P. ER - TY - JOUR T1 - Image motion estimation by clustering JF - International Journal of Imaging Systems and Technology Y1 - 1990 A1 - Bandopadhay, Amit A1 - Aloimonos, J. AB - Image motion is estimated by matching feature “interest” points in different frames of video image sequences. The matching is based on local similarity of the displacement vectors. Clustering in the displacement vector space is used to determine the set of plausible match vectors. Subsequently, a similarity-based algorithm performs the actual matching. The feature points are computed using a multiple-filter image decomposition operator. The algorithm has been tested on synthetic as well as real video images. The novelty of the approach is that it handles multiple motions and performs motion segmentation. VL - 2 SN - 1098-1098 UR - http://onlinelibrary.wiley.com/doi/10.1002/ima.1850020409/abstract CP - 4 M3 - 10.1002/ima.1850020409 ER - TY - CONF T1 - Multiple underlying systems: Translating user requests into programs to produce answers T2 - Proceedings of the 28th annual meeting on Association for Computational Linguistics Y1 - 1990 A1 - Bobrow,R.J. A1 - Resnik, Philip A1 - Weischedel,R.M. JA - Proceedings of the 28th annual meeting on Association for Computational Linguistics ER - TY - JOUR T1 - An experimental evaluation of three touch screen strategies within a hypertext database JF - International Journal of Human-Computer Interaction Y1 - 1989 A1 - Potter,Richard A1 - Berman,Mitchell A1 - Shneiderman, Ben AB - High resolution touch screens and novel usage strategies have overcome earlier problems with parallax and inaccurate pointing. A study testing the utility of three touch screen strategies within the Hyperties hypertext environment was performed. This provided a replication and extension of an earlier touch screen strategy comparison that focused on small closely?spaced targets. The experiment compared three touch screen strategies in three experimental tasks that reflect hypertext usage. The results showed that a strategy that only uses the initial impact with the touch screen causes the user to miss the target more than other touch strategies. A statistically significant difference in errors was found. Our results should encourage system implementers and touch screen hardware designers to support ?touch mouse? strategies that enable cursor dragging on the touch screen surface.High resolution touch screens and novel usage strategies have overcome earlier problems with parallax and inaccurate pointing. A study testing the utility of three touch screen strategies within the Hyperties hypertext environment was performed. This provided a replication and extension of an earlier touch screen strategy comparison that focused on small closely?spaced targets. The experiment compared three touch screen strategies in three experimental tasks that reflect hypertext usage. The results showed that a strategy that only uses the initial impact with the touch screen causes the user to miss the target more than other touch strategies. A statistically significant difference in errors was found. Our results should encourage system implementers and touch screen hardware designers to support ?touch mouse? strategies that enable cursor dragging on the touch screen surface. VL - 1 SN - 1044-7318 UR - http://www.tandfonline.com/doi/abs/10.1080/10447318909525956 CP - 1 M3 - 10.1080/10447318909525956 ER - TY - JOUR T1 - Gabriel: A design environment for DSP JF - Acoustics, Speech and Signal Processing, IEEE Transactions on Y1 - 1989 A1 - Lee,E. A A1 - Ho,W. H A1 - Goei,E. E A1 - Bier,J. C A1 - Bhattacharyya, Shuvra S. VL - 37 CP - 11 ER - TY - CONF T1 - Hypertext and software engineering T2 - Proceedings of the second annual ACM conference on Hypertext Y1 - 1989 A1 - Balzer,R. A1 - Begeman,M. A1 - Garg,P. K. A1 - Schwartz,M. A1 - Shneiderman, Ben AB - The purpose of this panel is to bring together researchers in software engineering and hypertext and help identify the major issues in the application of hypertext technology and concepts to software engineering and vice versa. JA - Proceedings of the second annual ACM conference on Hypertext T3 - HYPERTEXT '89 PB - ACM CY - New York, NY, USA SN - 0-89791-339-6 UR - http://doi.acm.org/10.1145/74224.74259 M3 - 10.1145/74224.74259 ER - TY - JOUR T1 - On the kinetic depth effect JF - Biological cybernetics Y1 - 1989 A1 - Aloimonos, J. A1 - Brown, C. M. VL - 60 CP - 6 ER - TY - CONF T1 - A method for interactive satellite failure diagnosis: Towards a connectionist solution T2 - NASA. Goddard Space Flight Center, The 1989 Goddard Conference on Space Applications of Artificial Intelligence p 143-152(SEE N 89-26578 20-63) Y1 - 1989 A1 - Bourret,P. A1 - Reggia, James A. JA - NASA. Goddard Space Flight Center, The 1989 Goddard Conference on Space Applications of Artificial Intelligence p 143-152(SEE N 89-26578 20-63) ER - TY - JOUR T1 - Some aspects of parallel implementation of the finite-element method on message passing architectures JF - Journal of Computational and Applied Mathematics Y1 - 1989 A1 - Babuska, I. A1 - Elman, Howard KW - Finite-element methods KW - hp-version KW - nested dissection KW - parallel computations KW - preconditioned conjugate gradient AB - We discuss some aspects of implementing the finite-element method on parallel computers with local memory and message passing. In particular, we compare the costs of using high-order and low-order elements and of direct and iterative solvers for solving the linear systems that occur. Our model of parallel computation is a two-dimensional grid of processors chosen to be similar in shape to the underlying grid. Our main conclusions are that use of high-order methods is an effective way to achieve high accuracy for some problems, on both serial and parallel computers, and that such methods provide a natural way to achieve efficiency in parallel implementations. In addition, we show that sparse direct solvers generalize naturally to methods based on high-order elements, and that direct solvers are adequate for two-dimensional problems, especially for multiple load vectors. VL - 27 SN - 0377-0427 UR - http://www.sciencedirect.com/science/article/pii/0377042789903658 CP - 1-2 M3 - 16/0377-0427(89)90365-8 ER - TY - JOUR T1 - Active vision JF - International Journal of Computer Vision Y1 - 1988 A1 - Aloimonos, J. A1 - Weiss, I. A1 - Bandyopadhyay, A. VL - 1 CP - 4 ER - TY - JOUR T1 - Competitive dynamics in a dual-route connectionist model of print-to-sound transformation JF - Complex Systems Y1 - 1988 A1 - Reggia, James A. A1 - Marsland,P. M A1 - Berndt,R. S VL - 2 CP - 5 ER - TY - JOUR T1 - Program complexity using Hierarchical Abstract Computers JF - Computer Languages Y1 - 1988 A1 - Bail,William G A1 - Zelkowitz, Marvin V KW - CASE tools KW - complexity KW - ENVIRONMENTS KW - measurement KW - Prime programs AB - A model of program complexity is introduced which combines structural control flow measures with data flow measures. This complexity measure is based upon the prime program decomposition of a program written for a Hierarchical Abstract Computer. It is shown that this measure is consistent with the ideas of information hiding and data abstraction. Because this measure is sensitive to the linear form of a program, it can be used to measure different concrete representations of the same algorithm, as in a structured and an unstructured version of the same program. Application of the measure as a model of system complexity is given for “upstream” processes (e.g. specification and design phases) where there is no source program to measure by other techniques. VL - 13 SN - 0096-0551 UR - http://www.sciencedirect.com/science/article/pii/0096055188900197 CP - 3–4 M3 - 10.1016/0096-0551(88)90019-7 ER - TY - JOUR T1 - Robust computation of intrinsic images from multiple cues JF - Advances in Computer Vision Y1 - 1988 A1 - Aloimonos, J. A1 - Brown, C. M. VL - 1 ER - TY - CHAP T1 - Direct manipulation user interfaces for expert systems T2 - Expert systems: the user interfaceExpert systems: the user interface Y1 - 1987 A1 - Baroff,J. A1 - Simon,R. A1 - Gilman,F. A1 - Shneiderman, Ben JA - Expert systems: the user interfaceExpert systems: the user interface ER - TY - BOOK T1 - A robust algorithm for determining the translation of a rigidly moving surface without correspondence, for robotics applications Y1 - 1987 A1 - Basu, A. A1 - Aloimonos, J. PB - University of Maryland ER - TY - RPRT T1 - Determining the Translation of a Rigidly Moving Surface, without Correspondence, Y1 - 1986 A1 - Aloimonos, J. A1 - Basu, Anup KW - *IMAGE PROCESSING KW - *OPTICAL DETECTION KW - *Translation(Image processing) KW - CAMERAS KW - Computer vision KW - COMPUTERS KW - IMMUNITY. KW - MOTION KW - MOVING TARGETS KW - NOISE KW - OPTICAL DETECTION AND DETECTORS KW - SURFACES KW - THREE DIMENSIONAL KW - VISION AB - A method is presented for the recovery of the three-dimensional translation of a rigidly moving textured object from its images. The novelty of the method consists of the fact that four cameras are used in order to avoid the solution of the correspondence problem. The method seems to be immune to small noise percentages and to have good behavior when the noise increases. Keywords: Computer vision. UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA179409 ER - TY - JOUR T1 - Modelling reading aloud and its relevance to acquired dyslexia JF - Computer methods and programs in biomedicine Y1 - 1986 A1 - Reggia, James A. A1 - Berndt,R. S VL - 22 CP - 1 ER - TY - CONF T1 - Shape and 3-d motion from contour without point to point correspondences: General principles T2 - CVPR86 Y1 - 1986 A1 - Aloimonos, J. A1 - Basu, A. JA - CVPR86 ER - TY - CONF T1 - Contour, orientation and motion T2 - Proceedings: Image Understanding Workshop (Miami Beach, FL, December 9–10, 1985) Y1 - 1985 A1 - Aloimonos, J. A1 - Basu, A. A1 - Brown, C. M. JA - Proceedings: Image Understanding Workshop (Miami Beach, FL, December 9–10, 1985) ER - TY - CONF T1 - Deterministic parsing: A modern view Y1 - 1985 A1 - Berwick,R. A1 - Weinberg, Amy VL - 15 ER - TY - JOUR T1 - Dynamic access control for relational views. JF - INFO. SYST. Y1 - 1985 A1 - Roussopoulos, Nick A1 - Bader,C. VL - 10 CP - 3 ER - TY - JOUR T1 - Optimal parallel generation of a computation tree form JF - ACM Transactions on Programming Languages and Systems (TOPLAS) Y1 - 1985 A1 - Bar-On,I. A1 - Vishkin, Uzi VL - 7 CP - 2 ER - TY - JOUR T1 - The Psychology of Program Documentation JF - Conference on Software Maintenance, 1985, Sheraton Inn Washington-Northwest, November 11-13, 1985 Y1 - 1985 A1 - Brooks,R. A1 - Sheppard,S. A1 - Shneiderman, Ben ER - TY - RPRT T1 - Research in Programming Languages and Software Engineering. Y1 - 1985 A1 - Gannon,John A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V A1 - Yeh,Raymond KW - *BEARINGS KW - *COMPUTER PROGRAMS KW - *ESTIMATES KW - *GUIDANCE KW - *KALMAN FILTERING KW - *LINEAR SYSTEMS KW - *STOCHASTIC PROCESSES KW - COMPUTER PROGRAMMING AND SOFTWARE KW - GAIN KW - identification KW - measurement KW - programming languages KW - STATISTICS AND PROBABILITY KW - SYSTEMS ENGINEERING. KW - TARGET DIRECTION, RANGE AND POSITION FINDING AB - During the past year three research papers were written and two published conference presentations were given. Titles of the published research articles are: A Stochastic Analysis of a Modified Gain Extended Kalman Filter with Applications to Estimation with Bearings only Measurements; The Modified Gain Extended Kalman Kilter and Parameter Identification in Linear Systems and Maximum Information Guidance for Homing Missiles. PB - Department of Computer Science, University of Maryland, College Park UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA186269 ER - TY - JOUR T1 - Computer-aided assessment of transient ischemic attacks. A clinical evaluation. JF - Archives of neurology Y1 - 1984 A1 - Reggia, James A. A1 - Tabb,D. R. A1 - Price,T. R. A1 - Banko,M. A1 - Hebel,R. VL - 41 CP - 12 ER - TY - CONF T1 - Direct processing of curvilinear sensor motion from a sequence of perspective images T2 - Proc. Workshop on Computer Vision: Representation and Control Y1 - 1984 A1 - Aloimonos, J. A1 - Brown, C. M. JA - Proc. Workshop on Computer Vision: Representation and Control VL - 72 ER - TY - JOUR T1 - Monitoring an Ada software development JF - ACM SIG Ada Letters Y1 - 1984 A1 - Basili, Victor R. A1 - Chang,Shih A1 - Gannon,John A1 - Katz,Elizabeth A1 - Panlilio-Yap,N. Monina A1 - Ramsey,Connie Loggia A1 - Zelkowitz, Marvin V A1 - Bailey,John A1 - Kruesi,Elizabeth A1 - Sheppard,Sylvia VL - IV SN - 1094-3641 UR - http://doi.acm.org/10.1145/998401.998402 CP - 1 M3 - 10.1145/998401.998402 ER - TY - JOUR T1 - The relationship between optical flow and surface orientation JF - Proc. of the 7-th ICPR, Montreal-Canada Y1 - 1984 A1 - Aloimonos, J. A1 - Brown, C. M. ER - TY - JOUR T1 - Software Engineering Practices in the US and Japan JF - Computer Y1 - 1984 A1 - Zelkowitz, Marvin V A1 - Yeh,R. T A1 - Hamlet,R.G. A1 - Gannon,J. D A1 - Basili, Victor R. VL - 17 SN - 0018-9162 CP - 6 M3 - 10.1109/MC.1984.1659162 ER - TY - CHAP T1 - Human factors of interactive software T2 - Enduser Systems and Their Human FactorsEnduser Systems and Their Human Factors Y1 - 1983 A1 - Shneiderman, Ben ED - Blaser,Albrecht ED - Zoeppritz,Magdalena AB - There is intense interest about human factors issues in interactive computer systems for life-critical applications, industrial/commercial uses, and personal computing in the office or home. Primary design goals include proper functionality, adequate reliability, suitable cost, and adherence to schedule. Measurable human factors issues include time to learn, speed of performance, rate of errors, subjective satisfaction, and retention over time. Specific human factors acceptance tests are described as a natural complement to hardware and software acceptance tests. Project management ideas, information resources, and potential research directions are presented. JA - Enduser Systems and Their Human FactorsEnduser Systems and Their Human Factors T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 150 SN - 978-3-540-12273-9 UR - http://dx.doi.org/10.1007/3-540-12273-7_16 ER - TY - JOUR T1 - Pseudogenes for human small nuclear RNA U3 appear to arise by integration of self-primed reverse transcripts of the RNA into new chromosomal sites JF - CellCell Y1 - 1983 A1 - Bernstein,L B A1 - Mount, Stephen M. A1 - Weiner,A M KW - Animals KW - Base Sequence KW - DNA KW - genes KW - HUMANS KW - Nucleic Acid Conformation KW - Rats KW - Recombination, Genetic KW - Repetitive Sequences, Nucleic Acid KW - RNA KW - RNA, Small Nuclear KW - RNA-Directed DNA Polymerase KW - Templates, Genetic KW - Transcription, Genetic AB - We find that both human and rat U3 snRNA can function as self-priming templates for AMV reverse transcriptase in vitro. The 74 base cDNA is primed by the 3' end of intact U3 snRNA, and spans the characteristically truncated 69 or 70 base U3 sequence found in four different human U3 pseudogenes. The ability of human and rat U3 snRNA to self-prime is consistent with a U3 secondary structure model derived by a comparison between rat U3 snRNA and the homologous D2 snRNA from Dictyostelium discoideum. We propose that U3 pseudogenes are generated in vivo by integration of a self-primed cDNA copy of U3 snRNA at new chromosomal sites. We also consider the possibility that the same cDNA mediates gene conversion at the 5' end of bona fide U3 genes where, over the entire region spanned by the U3 cDNA, the two rat U3 sequence variants U3A and U3B are identical. VL - 32 SN - 0092-8674 UR - http://www.ncbi.nlm.nih.gov/pubmed/6186397 CP - 2 ER - TY - JOUR T1 - The Software Industry: A State of the Art Survey JF - Foundations of Empirical Software Engineering: The Legacy of Victor R. Basili Y1 - 1983 A1 - Zelkowitz, Marvin V A1 - Yeh,R. A1 - Hamlet,R.G. A1 - Gannon,J. D A1 - Basili, Victor R. VL - 1 ER - TY - CONF T1 - Syntactic constraints and efficient parsability Y1 - 1983 A1 - Berwick,Robert C. A1 - Weinberg, Amy AB - A central goal of linguistic theory is to explain why natural languages are the way they are. It has often been supposed that computational considerations ought to play a role in this characterization, but rigorous arguments along these lines have been difficult to come by. In this paper we show how a key "axiom" of certain theories of grammar, Subjacency, can be explained by appealing to general restrictions on on-line parsing plus natural constraints on the rule-writing vocabulary of grammars. The explanation avoids the problems with Marcus' [1980] attempt to account for the same constraint. The argument is robust with respect to machine implementation, and thus avoids the problems that often arise when making detailed claims about parsing efficiency. It has the added virtue of unifying in the functional domain of parsing certain grammatically disparate phenomena, as well as making a strong claim about the way in which the grammar is actually embedded into an on-line sentence processor. T3 - ACL '83 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dx.doi.org/10.3115/981311.981335 M3 - 10.3115/981311.981335 ER - TY - JOUR T1 - Complexity of finding k-path-free dominating sets in graphs JF - INFO. PROC. LETT. Y1 - 1982 A1 - Bar-Yehuda,R. A1 - Vishkin, Uzi VL - 14 CP - 5 ER - TY - BOOK T1 - Directions in human/computer interaction. Y1 - 1982 A1 - Badre,A. A1 - Shneiderman, Ben AB - This book presents current research in interactive system design and human information processing. The contributions offer a mixture of survey, theory, practical recommendations and experimental results reflecting the diversity of research efforts in human/computer interaction. PB - ABLEX PUBL. CORP. CY - 355 CHESTNUT ST., NORWOOD, NJ 07648, USA ER - TY - CONF T1 - Isomorphism of graphs with bounded eigenvalue multiplicity T2 - Proceedings of the fourteenth annual ACM symposium on Theory of computing Y1 - 1982 A1 - Babai,László A1 - Grigoryev,D. Yu. A1 - Mount, Dave AB - We investigate the connection between the spectrum of a graph, i.e. the eigenvalues of the adjacency matrix, and the complexity of testing isomorphism. In particular we describe two polynomial time algorithms which test isomorphism of undirected graphs whose eigenvalues have bounded multiplicity. If X and Y are graphs of eigenvalue multiplicity m, then the isomorphism of X and Y can be tested by an O(n4m+c) deterministic and by an O(n2m+c) Las Vegas algorithm, where n is the number of vertices of X and Y. JA - Proceedings of the fourteenth annual ACM symposium on Theory of computing T3 - STOC '82 PB - ACM CY - New York, NY, USA SN - 0-89791-070-2 UR - http://doi.acm.org/10.1145/800070.802206 M3 - 10.1145/800070.802206 ER - TY - JOUR T1 - Structure and function of small ribonucleoproteins from eukaryotic cells JF - Princess Takamatsu symposiaInt. Symp. Princess Takamatsu Cancer Res. Fund Y1 - 1982 A1 - Steitz,J. A. A1 - Berg,C A1 - Gottlieb,E. A1 - Hardin,J A A1 - Hashimoto,C A1 - Hendrick,J P A1 - Hinterberger,M. A1 - Krikeles,M A1 - Lerner,M R A1 - Mount, Stephen M. KW - Antigen-Antibody Complex KW - Autoantibodies KW - HUMANS KW - Lupus Erythematosus, Systemic KW - Nucleoproteins KW - Ribonucleoproteins KW - RNA Polymerase III KW - Transcription, Genetic AB - Autoantibodies from patients with systemic lupus erythematosus and other related diseases have been used to identify and study small RNA-protein complexes from mammalian cells. Properties of three previously described and several new classes of small ribonucleoproteins (RNPs) are reviewed. The sequence of Drosophila U1 RNA reveals that the region proposed to pair with 5' splice junctions is conserved, while that proposed to interact with 3' junctions diverges; this forces some revision of the model for U1 small nuclear (sn)RNP participation in hnRNA splicing. Further characterization of the Ro and La small RNPs has shown that the Ro small cytoplasmic (sc)RNPs are a subclass of La RNPs. Both tRNA and 5S rRNA precursors are at least transiently associated with the La protein. This raises the possibility that the La protein may be an RNA polymerase III transcription factor. VL - 12 UR - http://www.ncbi.nlm.nih.gov/pubmed/7166547 ER - TY - CONF T1 - Bayesian classification in medicine: The transferability question T2 - Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care Y1 - 1981 A1 - Zagoria,R. A1 - Reggia, James A. A1 - Price,T. A1 - Banko,M. JA - Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care ER - TY - JOUR T1 - Are snRNPs involved in splicing? JF - Nature Y1 - 1980 A1 - Lerner,Michael R. A1 - Boyle,John A. A1 - Mount, Stephen M. A1 - Wolin,Sandra L. A1 - Steitz,Joan A. AB - Discrete, stable small RNA molecules are found in the nuclei of cells from a wide variety of eukaryotic organisms. Many of these small nuclear RNA (snRNA) species, which range in size from about 90 to 220 nucleotides, have been well-characterised biochemically, and some sequenced. However, their function has remained obscure. The most abundant snRNA species exist as a closely related set of RNA–protein complexes called small nuclear ribonucleoproteins (snRNPs). snRNPs are the antigens recognised by antibodies from some patients with lupus erythematosus (LE), an autoimmune rheumatic disease. Anti-RNP antibodies from lupus sera selectively precipitate snRNP species containing Ula7 and Ulb9 RNAs from mouse Ehrlich ascites cell nuclei, whereas anti-Sm antibodies bind these snRNPs and four others containing U2, U4, US and U6 RNAs. Both antibody systems precipitate the same seven prominent nuclear proteins (molecular weight 12,000–32,000). All molecules of the snRNAs U1, U2, U4, U5 and U6 appear to exist in the form of antigenic snRNPs9. The particles sediment at about 10S and each probably contains a single snRNA molecule. Indirect immunofluorescence studies using anti-RNP and anti-Sm sera confirm the nuclear (but non-nucleolar) location of the antigenic snRNPs. Here we present several lines of evidence that suggest a direct involvement of snRNPs in the splicing of hnRNA. Most intriguing is the observation that the nucleotide sequence at the 5′ end of U1 RNA exhibits extensive complementarity to those across splice junctions in hnRNA molecules. VL - 283 UR - http://www.nature.com/nature/journal/v283/n5743/abs/283220a0.html CP - 5743 M3 - 10.1038/283220a0 ER - TY - JOUR T1 - Measuring software development characteristics in the local environment JF - Computers & Structures Y1 - 1979 A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V AB - This paper discusses the characterization and analysis facilities being performed by the Software Engineering Laboratory which can be done with minimal effort on many projects. Some examples are given of the kinds of analyses that can be done to aid in managing, understanding and characterizing the development of software in a production environment. VL - 10 SN - 0045-7949 UR - http://www.sciencedirect.com/science/article/pii/0045794979900713 CP - 1–2 M3 - 10.1016/0045-7949(79)90071-3 ER - TY - CONF T1 - Analyzing medium-scale software development T2 - Proceedings of the 3rd international conference on Software engineering Y1 - 1978 A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V AB - The collection and analysis of data from programming projects is necessary for the appropriate evaluation of software engineering methodologies. Towards this end, the Software Engineering Laboratory was organized between the University of Maryland and NASA Goddard Space Flight Center. This paper describes the structure of the Laboratory and provides some data on project evaluation from some of the early projects that have been monitored. The analysis relates to resource forecasting using a model of the project life cycle based upon the Rayleigh equation and to error rates applying ideas developed by Belady and Lehman. JA - Proceedings of the 3rd international conference on Software engineering T3 - ICSE '78 PB - IEEE Press CY - Piscataway, NJ, USA UR - http://dl.acm.org/citation.cfm?id=800099.803200 ER - TY - CONF T1 - Operation of the Software Engineering Laboratory T2 - Proceedings of the Second US Army/IEEE Software Life Cycle Management Workshop. New York: Computer Societies Press Y1 - 1978 A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V JA - Proceedings of the Second US Army/IEEE Software Life Cycle Management Workshop. New York: Computer Societies Press ER - TY - JOUR T1 - Two experimental comparisons of relational and hierarchical database models JF - International Journal of Man-Machine Studies Y1 - 1978 A1 - Brosey,Margaret A1 - Shneiderman, Ben AB - The data model is a central feature which characterizes and distinguishes database management systems. This paper presents two experimental comparative studies of two prominent data models; the relational and hierarchical models. Comprehension, problem solving situation and memorization tasks were performed by undergraduate subjects. Significant effects were found for the data model, presentation order, subject background and tasks. VL - 10 SN - 0020-7373 UR - http://www.sciencedirect.com/science/article/pii/S0020737378800248 CP - 6 M3 - 10.1016/S0020-7373(78)80024-8 ER - TY - CONF T1 - The software engineering laboratory: Objectives T2 - Proceedings of the fifteenth annual SIGCPR conference Y1 - 1977 A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V AB - A great deal of time and money has been and will continue to be spent in developing software. Much effort has gone into the generation of various software development methodologies that are meant to improve both the process and the product ([MYER, 75], [BAKE, 74], [WOLV, 72]). Unfortunately, it has not always been clear what the underlying principles involved in the software development process are and what effect the methodologies have; it is not always clear what constitutes a better product. Thus progress in finding techniques that produce better, cheaper software depends on developing new deeper understandings of good software and the software development process through studying the underlying principles involved in software and the development process. At the same time we must continue to produce software. A better understanding of the factors that affect the development of software and their interrelationships is required in order to gain better insights into the underlying principles. The Software Engineering Laboratory has been established, in August 1976, at NASA Goddard Space Flight Center in cooperation with the University of Maryland to promote such understanding. The next section gives an overview of the research objectives and experiments being performed at the Laboratory. Section III contains the current list of factors that affect the software development process or product and are to be studied or neutralized. The data collection and data management activities are discussed in Section IV. The last section contains information on the current status and future plans for the Laboratory. JA - Proceedings of the fifteenth annual SIGCPR conference T3 - SIGCPR '77 PB - ACM CY - New York, NY, USA UR - http://doi.acm.org/10.1145/800100.803251 M3 - 10.1145/800100.803251 ER - TY - CHAP T1 - A Generalized Conjugate Gradient Method for the Numerical Solution of Elliptic Partial Differential Equations T2 - Sparse Matrix ComputationsSparse Matrix Computations Y1 - 1976 A1 - Concus,Paul A1 - Golub, Gene H. A1 - O'Leary, Dianne P. ED - Bunch,James R. ED - Rose,Donald J. AB - We consider a generalized conjugate gradient method for solvingsparse, symmetric, positive-definite systems of linear equations, principally those arising from the discretization of boundary value problems for elliptic partial differential equations. The method is based on splitting off from the original coefficient matrix a symmetric, positive-definiteonethat corresponds to a more easily solvable system of equations, and then accelerating the associated iteration using conjugate gradients. Optimality and convergence properties are presented, and the relation to other methods is discussed. Several splittings for which the method seems particularly effective are also discussed, and for some, numerical examples are given JA - Sparse Matrix ComputationsSparse Matrix Computations PB - Academic Press CY - New York ER - TY - JOUR T1 - An internship in information systems: Combining computer science education with realistic problems JF - SIGCSE Bull. Y1 - 1976 A1 - Buck,John A1 - Shneiderman, Ben AB - Computer science graduates who become professional programmers will have a direct and substantial influence on the impact of applications, but little in traditional computer science training curriculum prepares them for this serious responsibility. Recognizing this situation, we designed a two term sequence for advanced undergraduates and masters students which would not only provide them with the required academic knowledge. The educational atmosphere that we tried to create resembles the internship phase followed in teacher training, medical schools, law schools, clinical psychology and other disciplines. VL - 8 SN - 0097-8418 UR - http://doi.acm.org/10.1145/952991.804761 CP - 3 M3 - 10.1145/952991.804761 ER - TY - JOUR T1 - TORUS: A step towards bridging the gap between data bases and the casual user JF - Information Systems Y1 - 1976 A1 - Mylopoulos,J. A1 - Borgida,A. A1 - Cohen,P. A1 - Roussopoulos, Nick A1 - Tsotsos,J. A1 - Wong,H. AB - This paper describes TORUS, a natural language understanding system that serves as a front end to a data base management system in order to facilitate communication with casual users. The system employs a semantic network to store knowledge about a data base of student files. This knowledge is used to find the meaning of each input statement, to decide what action to take with respect to the data base, and to select information that must be output in response to the input statement. A prototype version of TORUS has been implemented. VL - 2 SN - 0306-4379 UR - http://www.sciencedirect.com/science/article/pii/0306437976900090 CP - 2 M3 - 16/0306-4379(76)90009-0 ER - TY - CONF T1 - TORUS-a natural language understanding system for data management T2 - Proceedings of the Fourth International Conference on Artificial Intelligence Y1 - 1975 A1 - Mylopoulos,J. A1 - Borgida,A. A1 - Cohen,P. A1 - Roussopoulos, Nick A1 - Tsotsos,J. A1 - Wong,H. JA - Proceedings of the Fourth International Conference on Artificial Intelligence ER -