TY - JOUR T1 - Combining preference and absolute judgements in a crowd-sourced setting JF - ics.uci.edu Y1 - Submitted A1 - Ye, P A1 - EDU, UMD A1 - David Doermann AB - Abstract This paper addresses the problem of obtaining gold-standard labels of objects based on subjective judgements provided by humans. Assuming each object can be associated with an underlying score, the objective of this work is to predict the underlying ... UR - https://www.ics.uci.edu/~qliu1/MLcrowd_ICML_workshop/Papers/ActivePaper5.pdf ER - TY - JOUR T1 - Environmental and hydroclimatic factors influencing Vibrio populations in the estuarine zone of the Bengal delta JF - Environmental Monitoring and Assessment Y1 - 2018 A1 - Neogi, Sucharit A1 - Rubin, Lara A1 - Alam, Munirul A1 - Harder, Jens A1 - Yamasaki, Shinji A1 - Rita R Colwell AB - The objective of this study was to determine environmental parameters driving Vibrio populations in the estuarine zone of the Bengal delta. Spatio-temporal data were collected at river estuary, mangrove, beach, pond, and canal sites. Effects of salinity, tidal amplitude, and a cyclone and tsunami were included in the study. Vibrio population shifts were found to be correlated with tide-driven salinity and suspended particulate matter (SPM). Increased abundance of Vibrio spp. in surface water was observed after a cyclone, attributed to re-suspension of benthic particulate organic carbon (POC), and increased availability of chitin and dissolved organic carbon (DOC). Approximately a two log10 increase in the (p < 0.05) number of Vibrio spp. was observed in < 20 μm particulates, compared with microphytoplankton (20–60 μm) and zooplankton > 60 μm fractions. Benthic and suspended sediment comprised a major reservoir of Vibrio spp. Results of microcosm experiments showed enhanced growth of vibrios was related to concentration of organic matter in SPM. It is concluded that SPM, POC, chitin, and salinity significantly influence abundance and distribution of vibrios in the Bengal delta estuarine zone. Keywords Vibrio Salinity Cyclone Tide Chitin Sediment dynamics UR - https://link.springer.com/article/10.1007%2Fs10661-018-6925-7 CP - 10 J1 - Environ Monit Assess M3 - 10.1007/s10661-018-6925-7 ER - TY - JOUR T1 - Modeling Sustainability: Population, Inequality, Consumption, and Bidirectional Coupling of the Earth and Human Systems JF - National Science Review Y1 - 2016 A1 - Motesharrei, Safa A1 - Rivas, Jorge A1 - Kalnay, Eugenia A1 - Asrar, Ghassem R. A1 - Busalacchi, Antonio J. A1 - Cahalan, Robert F. A1 - Cane, Mark A. A1 - Rita R Colwell A1 - Feng, Kuishuang A1 - Franklin, Rachel S. A1 - Hubacek, Klaus A1 - Miralles-Wilhelm, Fernando A1 - Miyoshi, Takemasa A1 - Ruth, Matthias A1 - Sagdeev, Roald A1 - Shirmohammadi, Adel A1 - Shukla, Jagadish A1 - Srebric, Jelena A1 - Yakovenko, Victor M. A1 - Zeng, Ning AB - Over the last two centuries, the impact of the Human System has grown dramatically, becoming strongly dominant within the Earth System in many different ways. Consumption, inequality, and population have increased extremely fast, especially since about 1950, threatening to overwhelm the many critical functions and ecosystems of the Earth System. Changes in the Earth System, in turn, have important feedback effects on the Human System, with costly and potentially serious consequences. However, current models do not incorporate these critical feedbacks. We argue that in order to understand the dynamics of either system, Earth System Models must be coupled with Human System Models through bidirectional couplings representing the positive, negative, and delayed feedbacks that exist in the real systems. In particular, key Human System variables, such as demographics, inequality, economic growth, and migration, are not coupled with the Earth System but are instead driven by exogenous estimates, such as United Nations population projections. This makes current models likely to miss important feedbacks in the real Earth–Human system, especially those that may result in unexpected or counterintuitive outcomes, and thus requiring different policy interventions from current models. The importance and imminence of sustainability challenges, the dominant role of the Human System in the Earth System, and the essential roles the Earth System plays for the Human System, all call for collaboration of natural scientists, social scientists, and engineers in multidisciplinary research and modeling to develop coupled Earth–Human system models for devising effective science-based policies and measures to benefit current and future generations. UR - https://academic.oup.com/nsr/article-lookup/doi/10.1093/nsr/nww081 J1 - Nat. Sci. Rev. M3 - 10.1093/nsr/nww081 ER - TY - JOUR T1 - Microbial Community Profiling of Human Saliva Using Shotgun Metagenomic Sequencing JF - PLoS ONE Y1 - 2014 A1 - Hasan, Nur A. A1 - Young, Brian A. A1 - Minard-Smith, Angela T. A1 - Saeed, Kelly A1 - Li, Huai A1 - Heizer, Esley M. A1 - McMillan, Nancy J. A1 - Isom, Richard A1 - Abdullah, Abdul Shakur A1 - Bornman, Daniel M. A1 - Faith, Seth A. A1 - Choi, Seon Young A1 - Dickens, Michael L. A1 - Cebula, Thomas A. A1 - Rita R Colwell ED - Ahmed, Niyaz AB - Human saliva is clinically informative of both oral and general health. Since next generation shotgun sequencing (NGS) is now widely used to identify and quantify bacteria, we investigated the bacterial flora of saliva microbiomes of two healthy volunteers and five datasets from the Human Microbiome Project, along with a control dataset containing short NGS reads from bacterial species representative of the bacterial flora of human saliva. GENIUS, a system designed to identify and quantify bacterial species using unassembled short NGS reads was used to identify the bacterial species comprising the microbiomes of the saliva samples and datasets. Results, achieved within minutes and at greater than 90% accuracy, showed more than 175 bacterial species comprised the bacterial flora of human saliva, including bacteria known to be commensal human flora but also Haemophilus influenzae, Neisseria meningitidis, Streptococcus pneumoniae, and Gamma proteobacteria. Basic Local Alignment Search Tool (BLASTn) analysis in parallel, reported ca. five times more species than those actually comprising the in silico sample. Both GENIUS and BLAST analyses of saliva samples identified major genera comprising the bacterial flora of saliva, but GENIUS provided a more precise description of species composition, identifying to strain in most cases and delivered results at least 10,000 times faster. Therefore, GENIUS offers a facile and accurate system for identification and quantification of bacterial species and/or strains in metagenomic samples. UR - https://dx.plos.org/10.1371/journal.pone.0097699 CP - 5 J1 - PLoS ONE M3 - 10.1371/journal.pone.0097699 ER - TY - JOUR T1 - Binary to Bushy: Bayesian Hierarchical Clustering with the Beta Coalescent Y1 - 2013 A1 - Hu, Yuening A1 - Jordan Boyd-Graber A1 - Daume III, Hal A1 - Ying, Z Irene AB - Abstract Discovering hierarchical regularities in data is a key problem in interacting with large datasets, modeling cognition, and encoding knowledge. A previous Bayesian solution-- -Kingman's coalescent---provides a convenient probabilistic model for data represented ... UR - http://papers.nips.cc/paper/5161-binary-to-bushy-bayesian-hierarchical-clustering-with-the-beta-coalescent ER - TY - JOUR T1 - A Dataset for Quality Assessment of Camera Captured Document Images Y1 - 2013 A1 - Kumar, J A1 - Ye, P A1 - David Doermann AB - Abstract—With the proliferation of cameras on mobile devices there is an increased desire to image document pages as an alternative to scanning. However, the quality of captured document images is often lower than its scanned equivalent due to hardware limitations ... UR - http://lampsrv02.umiacs.umd.edu/pubs/Papers/kumar-data-13/kumar-data-13.pdf ER - TY - CONF T1 - Document Image Quality Assessment: A Brief Survey T2 - International Conference on Document Analysis and Recognition (ICDAR) Y1 - 2013 A1 - Ye,Peng A1 - David Doermann JA - International Conference on Document Analysis and Recognition (ICDAR) ER - TY - CONF T1 - Real-time No-Reference Image Quality Assessment based on Filter Learning T2 - International Conference on Computer Vision and Pattern Recognition (CVPR) Y1 - 2013 A1 - Ye,Peng A1 - Kumar,Jayant A1 - Kang,Le A1 - David Doermann JA - International Conference on Computer Vision and Pattern Recognition (CVPR) ER - TY - JOUR T1 - Scene Text Detection via Integrated Discrimination of Component Appearance and Consensus Y1 - 2013 A1 - Ye, Q A1 - David Doermann AB - Abstract—In this paper, we propose an approach to scene text detection that leverages both the appearance and consensus of connected components. Component appearance is modeled with an SVM based dictionary classifier and the component consensus is ... UR - http://lampsrv02.umiacs.umd.edu/pubs/Papers/qixiangye-13/qixiangye-13.pdf ER - TY - CHAP T1 - Streaming Authenticated Data Structures T2 - Advances in Cryptology – EUROCRYPT 2013 Y1 - 2013 A1 - Charalampos Papamanthou A1 - Shi, Elaine A1 - Tamassia, Roberto A1 - Yi, Ke ED - Johansson, Thomas ED - Nguyen, Phong Q. KW - Algorithm Analysis and Problem Complexity KW - Data Encryption KW - Discrete Mathematics in Computer Science KW - Systems and Data Security AB - We consider the problem of streaming verifiable computation, where both a verifier and a prover observe a stream of n elements x 1,x 2,…,x n and the verifier can later delegate some computation over the stream to the prover. The prover must return the output of the computation, along with a cryptographic proof to be used for verifying the correctness of the output. Due to the nature of the streaming setting, the verifier can only keep small local state (e.g., logarithmic) which must be updatable in a streaming manner and with no interaction with the prover. Such constraints make the problem particularly challenging and rule out applying existing verifiable computation schemes. We propose streaming authenticated data structures, a model that enables efficient verification of data structure queries on a stream. Compared to previous work, we achieve an exponential improvement in the prover’s running time: While previous solutions have linear prover complexity (in the size of the stream), even for queries executing in sublinear time (e.g., set membership), we propose a scheme with O(logM logn)O(\log M\ log n) prover complexity, where n is the size of the stream and M is the size of the universe of elements. Our schemes support a series of expressive queries, such as (non-)membership, successor, range search and frequency queries, over an ordered universe and even in higher dimensions. The central idea of our construction is a new authentication tree, called generalized hash tree. We instantiate our generalized hash tree with a hash function based on lattices assumptions, showing that it enjoys suitable algebraic properties that traditional Merkle trees lack. We exploit such properties to achieve our results. JA - Advances in Cryptology – EUROCRYPT 2013 T3 - Lecture Notes in Computer Science PB - Springer Berlin Heidelberg SN - 978-3-642-38347-2, 978-3-642-38348-9 UR - http://link.springer.com/chapter/10.1007/978-3-642-38348-9_22 ER - TY - JOUR T1 - Structural similarity for document image classification and retrieval JF - Pattern Recognition Letters Y1 - 2013 A1 - Kumar, Jayant A1 - Ye, Peng A1 - David Doermann AB - Abstract This paper presents a novel approach to defining document image structural similarity for the applications of classification and retrieval. We first build a codebook of SURF descriptors extracted from a set of representative training images. We then encode ... UR - http://linkinghub.elsevier.com/retrieve/pii/S0167865513004224 J1 - Pattern Recognition Letters M3 - 10.1016/j.patrec.2013.10.030 ER - TY - CHAP T1 - On the Centrality of Off-Line E-Cash to Concrete Partial Information Games T2 - Security and Cryptography for Networks Y1 - 2012 A1 - Choi, Seung Geol A1 - Dana Dachman-Soled A1 - Yung, Moti ED - Visconti, Ivan ED - Prisco, Roberto De KW - Computer Appl. in Administrative Data Processing KW - Computer Communication Networks KW - Data Encryption KW - Management of Computing and Information Systems KW - Systems and Data Security AB - Cryptography has developed numerous protocols for solving “partial information games” that are seemingly paradoxical. Some protocols are generic (e.g., secure multi-party computation) and others, due to the importance of the scenario they represent, are designed to solve a concrete problem directly. Designing efficient and secure protocols for (off-line) e-cash, e-voting, and e-auction are some of the most heavily researched concrete problems, representing various settings where privacy and correctness of the procedure is highly important. In this work, we initiate the exploration of the relationships among e-cash, e-voting and e-auction in the universal composability (UC) framework, by considering general variants of the three problems. In particular, we first define ideal functionalities for e-cash, e-voting, and e-auction, and then give a construction of a protocol that UC-realizes the e-voting (resp., e-auction) functionality in the e-cash hybrid model. This (black-box) reducibility demonstrates the centrality of off-line e-cash and implies that designing a solution to e-cash may bear fruits in other areas. Constructing a solution to one protocol problem based on a second protocol problem has been traditional in cryptography, but typically has concentrated on building complex protocols on simple primitives (e.g., secure multi-party computation from Oblivious Transfer, signature from one-way functions, etc.). The novelty here is reducibility among mature protocols and using the ideal functionality as a design tool in realizing other ideal functionalities. We suggest this new approach, and we only consider the very basic general properties from the various primitives to demonstrate its viability. Namely, we only consider the basic coin e-cash model, the e-voting that is correct and private and relies on trusted registration, and e-auction relying on a trusted auctioneer. Naturally, relationships among protocols with further properties (i.e., extended functionalities), using the approach advocated herein, are left as open questions. JA - Security and Cryptography for Networks T3 - Lecture Notes in Computer Science PB - Springer Berlin Heidelberg SN - 978-3-642-32927-2, 978-3-642-32928-9 UR - http://link.springer.com/chapter/10.1007/978-3-642-32928-9_15 ER - TY - CONF T1 - Co-designing an e-health tutorial for older adults T2 - Proceedings of the 2012 iConference Y1 - 2012 A1 - Xie,Bo A1 - Tom Yeh A1 - Walsh,Greg A1 - Watkins,Ivan A1 - Huang,Man KW - e-health literacy KW - health information seeking KW - integrated e-tutorial KW - participatory design AB - Older adults' ability to access and use electronic health information is generally low, requiring innovative approaches for improvement. An integrated e-tutorial overlays instructions onto Websites. The literature suggests integrated e-tutorials are more effective than paper or video-based tutorials for younger people, but little is known about their effectiveness for older adults. This study explores the applicability of an integrated e-health tutorial for older adults. An integrated e-tutorial, the Online Tutorial Overlay Presenter (OnTOP), added an instructional overlay to the NIHSeniorHealth.gov Website. Overlay features were examined in seven participatory design sessions with seven older adults. Participatory design techniques were used to elicit participants' preferences for tutorial features. Three themes emerged: 1) using contextual cues; 2) tailoring to the learner's literacy level; and 3) enhancing interfaces with multimedia cues. These findings improved the design features of OnTOP. They also generated empirical evidence about the effects of multimedia learning among older adults. JA - Proceedings of the 2012 iConference T3 - iConference '12 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0782-6 UR - http://doi.acm.org/10.1145/2132176.2132207 M3 - 10.1145/2132176.2132207 ER - TY - JOUR T1 - Exploiting sparseness in de novo genome assembly JF - BMC bioinformatics Y1 - 2012 A1 - Ye, C. A1 - Ma, Z.S. A1 - Cannon, C.H. A1 - Pop, Mihai A1 - Yu, D.W. AB - The very large memory requirements for the construction of assembly graphs for de novo genome assembly limit current algorithms to super-computing environments.In this paper, we demonstrate that constructing a sparse assembly graph which stores only a small fraction of the observed k-mers as nodes and the links between these nodes allows the de novo assembly of even moderately-sized genomes (~500 M) on a typical laptop computer. We implement this sparse graph concept in a proof-of-principle software package, SparseAssembler, utilizing a new sparse k-mer graph structure evolved from the de Bruijn graph. We test our SparseAssembler with both simulated and real data, achieving ~90% memory savings and retaining high assembly accuracy, without sacrificing speed in comparison to existing de novo assemblers. VL - 13 CP - Suppl 6 ER - TY - JOUR T1 - GAGE: A Critical Evaluation of Genome Assemblies and Assembly Algorithms JF - Genome Research Y1 - 2012 A1 - Salzberg,Steven L. A1 - Phillippy,Adam M A1 - Zimin,Aleksey A1 - Puiu,Daniela A1 - Magoc,Tanja A1 - Koren,Sergey A1 - Treangen,Todd J A1 - Schatz,Michael C A1 - Delcher,Arthur L. A1 - Roberts,Michael A1 - Marçais,Guillaume A1 - Pop, Mihai A1 - Yorke,James A. AB - New sequencing technology has dramatically altered the landscape of whole-genome sequencing, allowing scientists to initiate numerous projects to decode the genomes of previously unsequenced organisms. The lowest-cost technology can generate deep coverage of most species, including mammals, in just a few days. The sequence data generated by one of these projects consist of millions or billions of short DNA sequences (reads) that range from 50 to 150 nt in length. These sequences must then be assembled de novo before most genome analyses can begin. Unfortunately, genome assembly remains a very difficult problem, made more difficult by shorter reads and unreliable long-range linking information. In this study, we evaluated several of the leading de novo assembly algorithms on four different short-read data sets, all generated by Illumina sequencers. Our results describe the relative performance of the different assemblers as well as other significant differences in assembly difficulty that appear to be inherent in the genomes themselves. Three overarching conclusions are apparent: first, that data quality, rather than the assembler itself, has a dramatic effect on the quality of an assembled genome; second, that the degree of contiguity of an assembly varies enormously among different assemblers and different genomes; and third, that the correctness of an assembly also varies widely and is not well correlated with statistics on contiguity. To enable others to replicate our results, all of our data and methods are freely available, as are all assemblers used in this study. VL - 22 UR - http://genome.cshlp.org/content/22/3/557 CP - 3 M3 - 10.1101/gr.131383.111 ER - TY - JOUR T1 - Genomic insights to SAR86, an abundant and uncultivated marine bacterial lineage. JF - ISME J Y1 - 2012 A1 - Dupont, Chris L A1 - Rusch, Douglas B A1 - Yooseph, Shibu A1 - Lombardo, Mary-Jane A1 - Richter, R Alexander A1 - Valas, Ruben A1 - Novotny, Mark A1 - Yee-Greenbaum, Joyclyn A1 - Jeremy D Selengut A1 - Haft, Dan H A1 - Halpern, Aaron L A1 - Lasken, Roger S A1 - Nealson, Kenneth A1 - Friedman, Robert A1 - Venter, J Craig KW - Computational Biology KW - Gammaproteobacteria KW - Genome, Bacterial KW - Genomic Library KW - metagenomics KW - Oceans and Seas KW - Phylogeny KW - plankton KW - Rhodopsin KW - RNA, Ribosomal, 16S KW - Seawater AB -

Bacteria in the 16S rRNA clade SAR86 are among the most abundant uncultivated constituents of microbial assemblages in the surface ocean for which little genomic information is currently available. Bioinformatic techniques were used to assemble two nearly complete genomes from marine metagenomes and single-cell sequencing provided two more partial genomes. Recruitment of metagenomic data shows that these SAR86 genomes substantially increase our knowledge of non-photosynthetic bacteria in the surface ocean. Phylogenomic analyses establish SAR86 as a basal and divergent lineage of γ-proteobacteria, and the individual genomes display a temperature-dependent distribution. Modestly sized at 1.25-1.7 Mbp, the SAR86 genomes lack several pathways for amino-acid and vitamin synthesis as well as sulfate reduction, trends commonly observed in other abundant marine microbes. SAR86 appears to be an aerobic chemoheterotroph with the potential for proteorhodopsin-based ATP generation, though the apparent lack of a retinal biosynthesis pathway may require it to scavenge exogenously-derived pigments to utilize proteorhodopsin. The genomes contain an expanded capacity for the degradation of lipids and carbohydrates acquired using a wealth of tonB-dependent outer membrane receptors. Like the abundant planktonic marine bacterial clade SAR11, SAR86 exhibits metabolic streamlining, but also a distinct carbon compound specialization, possibly avoiding competition.

VL - 6 CP - 6 M3 - 10.1038/ismej.2011.189 ER - TY - RPRT T1 - A Hybrid System for Error Detection in Electronic Dictionaries Y1 - 2012 A1 - Zajic, David A1 - David Doermann A1 - Bloodgood,Michael A1 - Rodrigues,Paul A1 - Ye,Peng A1 - Zotkina,Elena AB - A progress report on CASL’s research on error detection in electronic dictionaries, including a hybrid system, application and evaluation on a second dictionary and a graphical user interface. JA - Technical Reports of the Center for the Advanced Study of Language ER - TY - JOUR T1 - InterPro in 2011: new developments in the family and domain prediction database. JF - Nucleic Acids Res Y1 - 2012 A1 - Hunter, Sarah A1 - Jones, Philip A1 - Mitchell, Alex A1 - Apweiler, Rolf A1 - Attwood, Teresa K A1 - Bateman, Alex A1 - Bernard, Thomas A1 - Binns, David A1 - Bork, Peer A1 - Burge, Sarah A1 - de Castro, Edouard A1 - Coggill, Penny A1 - Corbett, Matthew A1 - Das, Ujjwal A1 - Daugherty, Louise A1 - Duquenne, Lauranne A1 - Finn, Robert D A1 - Fraser, Matthew A1 - Gough, Julian A1 - Haft, Daniel A1 - Hulo, Nicolas A1 - Kahn, Daniel A1 - Kelly, Elizabeth A1 - Letunic, Ivica A1 - Lonsdale, David A1 - Lopez, Rodrigo A1 - Madera, Martin A1 - Maslen, John A1 - McAnulla, Craig A1 - McDowall, Jennifer A1 - McMenamin, Conor A1 - Mi, Huaiyu A1 - Mutowo-Muellenet, Prudence A1 - Mulder, Nicola A1 - Natale, Darren A1 - Orengo, Christine A1 - Pesseat, Sebastien A1 - Punta, Marco A1 - Quinn, Antony F A1 - Rivoire, Catherine A1 - Sangrador-Vegas, Amaia A1 - Jeremy D Selengut A1 - Sigrist, Christian J A A1 - Scheremetjew, Maxim A1 - Tate, John A1 - Thimmajanarthanan, Manjulapramila A1 - Thomas, Paul D A1 - Wu, Cathy H A1 - Yeats, Corin A1 - Yong, Siew-Yit KW - Databases, Protein KW - Protein Structure, Tertiary KW - Proteins KW - Sequence Analysis, Protein KW - software KW - Terminology as Topic KW - User-Computer Interface AB -

InterPro (http://www.ebi.ac.uk/interpro/) is a database that integrates diverse information about protein families, domains and functional sites, and makes it freely available to the public via Web-based interfaces and services. Central to the database are diagnostic models, known as signatures, against which protein sequences can be searched to determine their potential function. InterPro has utility in the large-scale analysis of whole genomes and meta-genomes, as well as in characterizing individual protein sequences. Herein we give an overview of new developments in the database and its associated software since 2009, including updates to database content, curation processes and Web and programmatic interfaces.

VL - 40 CP - Database issue M3 - 10.1093/nar/gkr948 ER - TY - CONF T1 - Learning Document Structure for Retrieval and Classification T2 - International Conference on Pattern Recognition (ICPR 2012) Y1 - 2012 A1 - Kumar,Jayant A1 - Ye,Peng A1 - David Doermann AB - In this paper, we present a method for the retrieval of document images with chosen layout characteristics. The proposed method is based on statistics of patch codewords over different regions of image. We begin with a set of wanted and a random set of unwanted images representative of a large heterogeneous collection. We then use raw-image patches extracted from the unlabeled images to learn a codebook. To model the spatial relationships between patches, the image is recursively partitioned horizontally and vertically, and a histogram of patch-codewords is computed in each partition. The resulting set of features give a high precision and recall for the retrieval of hand-drawn and machine-print table-documents, and unconstrained mixed form-type documents, when trained using a random forest classifier. We compare our method to the spatial-pyramid method, and show that the proposed approach for learning layout characteristics is competitive for document images. JA - International Conference on Pattern Recognition (ICPR 2012) ER - TY - CONF T1 - Learning features for predicting OCR accuracy T2 - International Conference on Pattern Recognition (ICPR) Y1 - 2012 A1 - Ye,Peng A1 - David Doermann AB - In this paper, we present a new method for assessing the quality of degraded document images using unsupervised feature learning. The goal is to build a computational model to automatically predict OCR accuracy of a degraded document image without a reference image. Current approaches for this problem typically rely on hand-crafted features whose design is based on heuristic rules that may not be generalizable. In contrast, we explore an unsupervised feature learning framework to learn effective and efficient features for predicting OCR accuracy. Our experimental results, on a set of historic newspaper images, show that the proposed method outperforms a baseline method which combines features from previous works. JA - International Conference on Pattern Recognition (ICPR) ER - TY - CONF T1 - Learning Text-line Segmentation using Codebooks and Graph Partitioning T2 - International Conference on Frontiers in Handwriting Recognition (ICFHR) Y1 - 2012 A1 - Kang,Le A1 - Kumar,Jayant A1 - Ye,Peng A1 - David Doermann AB - In this paper, we present a codebook based method for handwritten text-line segmentation which uses image patches in the training data to learn a graph-based similarity for clustering. We first construct a codebook of image-patches using K-medoids, and obtain exemplars which encode local evidence. We then obtain the corresponding codewords for all patches extracted from a given image and construct a similarity graph using the learned evidence and partitioned to obtain textlines. Our learning based approach performs well on a field dataset containing degraded and un-constrained handwritten Arabic document images. Results on ICDAR 2009 segmentation contest dataset show that the method is competitive with previous approaches. JA - International Conference on Frontiers in Handwriting Recognition (ICFHR) ER - TY - JOUR T1 - No-Reference Image Quality Assessment using Visual Codebooks JF - Image Processing, IEEE Transactions on Y1 - 2012 A1 - Ye,P. A1 - David Doermann AB - The goal of no-reference objective image quality assessment (NR-IQA) is to develop a computational model that can predict the human perceived quality of distorted images accurately and automatically without any prior knowledge of reference images. Most existing NR-IQA approaches are distortionspecific (DS) and are typically limited to one or two specific types of distortions. In most practical applications, however, information about the distortion type is not really available. In this paper, we propose a general-purpose NR-IQA approach based on visual codebooks. A visual codebook consisting of Gabor filter based local features extracted from local image patches is used to capture complex statistics of a natural image. The codebook encodes statistics by quantizing the feature space and accumulating histograms of patch appearances. This method does not assume any specific types of distortions, however, when evaluating images with a particular type of distortion, it does require examples with the same or similar distortion for training. Experimental results demonstrate that the predicted quality score using our method is consistent with human perceived image quality. The proposed method is comparable to state-ofthe- art general purpose NR-IQA methods and outperforms the full-reference image quality metrics, peak signal-to-noise ratio (PSNR) and structural similarity index (SSIM) on the LIVE image quality assessment database. VL - PP SN - 1057-7149 CP - 99 M3 - 10.1109/TIP.2012.2190086 ER - TY - CONF T1 - A Random Forest System Combination Approach for Error Detection in Digital Dictionaries T2 - Innovative hybrid approaches to the processing of textual data, EACL 2012 Workshop Y1 - 2012 A1 - Bloodgood,Michael A1 - Ye,Peng A1 - Rodrigues,Paul A1 - Zajic, David A1 - David Doermann AB - When digitizing a print bilingual dictionary, whether via optical character recognition or manual entry, it is inevitable that errors are introduced into the electronic version that is created. We investigate automating the process of detecting errors in an XML representation of a digitized print dictionary using a hybrid approach that combines rule-based, feature-based, and language model-based methods. We investigate combining methods and show that using random forests is a promising approach. We find that in isolation, unsupervised methods rival the performance of supervised methods. Random forests typically require training data so we investigate how we can apply random forests to combine individual base methods that are themselves unsupervised without requiring large amounts of training data. Experiments reveal empirically that a relatively small amount of data is sufficient and can potentially be further reduced through specific selection criteria. JA - Innovative hybrid approaches to the processing of textual data, EACL 2012 Workshop ER - TY - JOUR T1 - Role of Shrimp Chitin in the Ecology of Toxigenic Vibrio cholerae and Cholera Transmission JF - Frontiers in Microbiology Y1 - 2012 A1 - Nahar,Shamsun A1 - Sultana,Marzia A1 - Naser,M. Niamul A1 - Nair,Gopinath B. A1 - Watanabe,Haruo A1 - Ohnishi,Makoto A1 - Yamamoto,Shouji A1 - Endtz,Hubert A1 - Cravioto,Alejandro A1 - Sack,R. Bradley A1 - Hasan,Nur A. A1 - Sadique,Abdus A1 - Huq,Anwar A1 - Rita R Colwell A1 - Alam,Munirul AB - Seasonal plankton blooms correlate with occurrence of cholera in Bangladesh, although the mechanism of how dormant Vibrio cholerae, enduring interepidemic period in biofilms and plankton, initiates seasonal cholera is not fully understood. In this study, laboratory microcosms prepared with estuarine Mathbaria water (MW) samples supported active growth of toxigenic V. cholerae O1 up to 7 weeks as opposed to 6 months when microcosms were supplemented with dehydrated shrimp chitin chips (CC) as the single source of nutrient. Bacterial counting and detection of wbe and ctxA genes were done employing culture, direct fluorescent antibody (DFA) assay, and multiplex-polymerase chain reaction methods. In MW microcosm, the aqueous phase became clear as the non-culturable cells settled, whereas the aqueous phase of the MW–CC microcosm became turbid from bacterial growth stimulated by chitin. Bacterial chitin degradation and biofilm formation proceeded from an initial steady state to a gradually declining bacterial culturable count. V. cholerae within the microenvironments of chitin and chitin-associated biofilms remained metabolically active even in a high acidic environment without losing either viability or virulence. It is concluded that the abundance of chitin that occurs during blooms plays an important role in the aquatic life cycle of V. cholerae and, ultimately, in the seasonal transmission of cholera. VL - 2:260 SN - 1664-302X M3 - 10.3389/fmicb.2011.00260 ER - TY - CONF T1 - Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions T2 - the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12 Y1 - 2012 A1 - Martineau, Justin A1 - Mokashi,Ronil A1 - Chapman, David A1 - Grasso, Michael A1 - Brady,Mary A1 - Yesha,Yelena A1 - Yesha,Yaacov A1 - Cardone, Antonio A1 - Dima, Alden JA - the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12 PB - ACM Press CY - Miami, Florida, USANew York, New York, USA SN - 9781450307819 J1 - IHI '12 M3 - 10.1145/211036310.1145/2110363.2110409 ER - TY - CONF T1 - Unsupervised Feature Learning Framework for No-reference Image Quality Assessment T2 - CVPR Y1 - 2012 A1 - Ye,Peng A1 - Kumar,Jayant A1 - Kang,Le A1 - David Doermann AB - In this paper, we present an efficient general-purpose objective no-reference (NR) image quality assessment (IQA) framework based on unsupervised feature learning. The goal is to build a computational model to automatically predict human perceived image quality without a reference image and without knowing the distortion present in the image. Previous approaches for this problem typically rely on hand-crafted features which are carefully designed based on prior knowledge. In contrast, we use raw-image-patches extracted from a set of unlabeled images to learn a dictionary in an unsupervised manner. We use soft-assignment coding with max pooling to obtain effective image representations for quality estimation. The proposed algorithm is very computationally appealing, using raw image patches as local descriptors and using soft-assignment for encoding. Furthermore, unlike previous methods, our unsupervised feature learning strategy enables our method to adapt to different domains. CORNIA (Codebook Representation for No-Reference Image Assessment) was tested on LIVE database and shown to perform statistically better than full-reference quality measure structural similarity index (SSIM) and was shown to be comparable to state-of-the-art general purpose NR-IQA algorithms. JA - CVPR ER - TY - JOUR T1 - Accelerated evolution of 3'avian FOXE1 genes, and thyroid and feather specific expression of chicken FoxE1 JF - BMC Evolutionary Biology Y1 - 2011 A1 - Yaklichkin,Sergey Yu A1 - Darnell,Diana K A1 - Pier,Maricela V A1 - Antin,Parker B A1 - Hannenhalli, Sridhar AB - The forkhead transcription factor gene E1 (FOXE1) plays an important role in regulation of thyroid development, palate formation and hair morphogenesis in mammals. However, avian FOXE1 genes have not been characterized and as such, codon evolution of FOXE1 orthologs in a broader evolutionary context of mammals and birds is not known. VL - 11 SN - 1471-2148 UR - http://www.biomedcentral.com/1471-2148/11/302 CP - 1 M3 - 10.1186/1471-2148-11-302 ER - TY - CONF T1 - Active inference for retrieval in camera networks T2 - Person-Oriented Vision (POV), 2011 IEEE Workshop on Y1 - 2011 A1 - Daozheng Chen A1 - Bilgic,Mustafa A1 - Getoor, Lise A1 - Jacobs, David W. A1 - Mihalkova,Lilyana A1 - Tom Yeh AB - We address the problem of searching camera network videos to retrieve frames containing specified individuals. We show the benefit of utilizing a learned probabilistic model that captures dependencies among the cameras. In addition, we develop an active inference framework that can request human input at inference time, directing human attention to the portions of the videos whose correct annotation would provide the biggest performance improvements. Our primary contribution is to show that by mapping video frames in a camera network onto a graphical model, we can apply collective classification and active inference algorithms to significantly increase the performance of the retrieval system, while minimizing the number of human annotations required. JA - Person-Oriented Vision (POV), 2011 IEEE Workshop on PB - IEEE SN - 978-1-61284-036-9 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5712363&tag=1 M3 - 10.1109/POV.2011.5712363 ER - TY - CONF T1 - Active inference for retrieval in camera networks T2 - Person-Oriented Vision (POV), 2011 IEEE Workshop on Y1 - 2011 A1 - Daozheng Chen A1 - Bilgic,M. A1 - Getoor, Lise A1 - Jacobs, David W. A1 - Mihalkova,L. A1 - Tom Yeh KW - active KW - annotation;probabilistic KW - frame;cameras;inference KW - inference;camera KW - mechanisms;probability;search KW - model;human KW - model;retrieval KW - network;graphical KW - problem;video KW - problems;video KW - processing; KW - retrieval;video KW - signal KW - system;searching AB - We address the problem of searching camera network videos to retrieve frames containing specified individuals. We show the benefit of utilizing a learned probabilistic model that captures dependencies among the cameras. In addition, we develop an active inference framework that can request human input at inference time, directing human attention to the portions of the videos whose correct annotation would provide the biggest performance improvements. Our primary contribution is to show that by mapping video frames in a camera network onto a graphical model, we can apply collective classification and active inference algorithms to significantly increase the performance of the retrieval system, while minimizing the number of human annotations required. JA - Person-Oriented Vision (POV), 2011 IEEE Workshop on M3 - 10.1109/POV.2011.5712363 ER - TY - CONF T1 - Active scene recognition with vision and language T2 - 2011 IEEE International Conference on Computer Vision (ICCV) Y1 - 2011 A1 - Yu,Xiaodong A1 - Fermüller, Cornelia A1 - Ching Lik Teo A1 - Yezhou Yang A1 - Aloimonos, J. KW - accuracy KW - active scene recognition KW - classification performance KW - Cognition KW - Computer vision KW - Detectors KW - Equations KW - high level knowledge utilization KW - HUMANS KW - image classification KW - inference mechanisms KW - object detectors KW - Object recognition KW - reasoning module KW - sensing process KW - sensory module KW - support vector machines KW - Training AB - This paper presents a novel approach to utilizing high level knowledge for the problem of scene recognition in an active vision framework, which we call active scene recognition. In traditional approaches, high level knowledge is used in the post-processing to combine the outputs of the object detectors to achieve better classification performance. In contrast, the proposed approach employs high level knowledge actively by implementing an interaction between a reasoning module and a sensory module (Figure 1). Following this paradigm, we implemented an active scene recognizer and evaluated it with a dataset of 20 scenes and 100+ objects. We also extended it to the analysis of dynamic scenes for activity recognition with attributes. Experiments demonstrate the effectiveness of the active paradigm in introducing attention and additional constraints into the sensing process. JA - 2011 IEEE International Conference on Computer Vision (ICCV) PB - IEEE SN - 978-1-4577-1101-5 M3 - 10.1109/ICCV.2011.6126320 ER - TY - CONF T1 - Associating the visual representation of user interfaces with their internal structures and metadata T2 - Proceedings of the 24th annual ACM symposium on User interface software and technology Y1 - 2011 A1 - Chang,Tsung-Hsiang A1 - Tom Yeh A1 - Miller,Rob KW - accessibility api KW - Graphical user interfaces KW - Pixel KW - text detection KW - text segmentation AB - Pixel-based methods are emerging as a new and promising way to develop new interaction techniques on top of existing user interfaces. However, in order to maintain platform independence, other available low-level information about GUI widgets, such as accessibility metadata, was neglected intentionally. In this paper, we present a hybrid framework, PAX, which associates the visual representation of user interfaces (i.e. the pixels) and their internal hierarchical metadata (i.e. the content, role, and value). We identify challenges to building such a framework. We also develop and evaluate two new algorithms for detecting text at arbitrary places on the screen, and for segmenting a text image into individual word blobs. Finally, we validate our framework in implementations of three applications. We enhance an existing pixel-based system, Sikuli Script, and preserve the readability of its script code at the same time. Further, we create two novel applications, Screen Search and Screen Copy, to demonstrate how PAX can be applied to development of desktop-level interactive systems. JA - Proceedings of the 24th annual ACM symposium on User interface software and technology T3 - UIST '11 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0716-1 UR - http://doi.acm.org/10.1145/2047196.2047228 M3 - 10.1145/2047196.2047228 ER - TY - CONF T1 - AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video T2 - Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on Y1 - 2011 A1 - Oh,Sangmin A1 - Hoogs,Anthony A1 - Perera,Amitha A1 - Cuntoor,Naresh A1 - Chen,Chia-Chih A1 - Lee,Jong Taek A1 - Mukherjee,Saurajit A1 - Aggarwal, JK A1 - Lee,Hyungtae A1 - Davis, Larry S. A1 - Swears,Eran A1 - Wang,Xiaoyang A1 - Ji,Qiang A1 - Reddy,Kishore A1 - Shah,Mubarak A1 - Vondrick,Carl A1 - Pirsiavash,Hamed A1 - Ramanan,Deva A1 - Yuen,Jenny A1 - Torralba,Antonio A1 - Song,Bi A1 - Fong,Anesco A1 - Roy-Chowdhury,Amit A1 - Desai,Mita AB - We introduce to the surveillance community the VIRAT Video Dataset[1], which is a new large-scale surveillance video dataset designed to assess the performance of event recognition algorithms in realistic scenes1. JA - Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on M3 - 10.1109/AVSS.2011.6027400 ER - TY - JOUR T1 - Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? JF - Systematic BiologySyst Biol Y1 - 2011 A1 - Cho,Soowon A1 - Zwick,Andreas A1 - Regier,Jerome C A1 - Mitter,Charles A1 - Cummings, Michael P. A1 - Yao,Jianxiu A1 - Du,Zaile A1 - Zhao,Hong A1 - Kawahara,Akito Y A1 - Weller,Susan A1 - Davis,Donald R A1 - Baixeras,Joaquin A1 - Brown,John W A1 - Parr,Cynthia KW - Ditrysia KW - gene sampling KW - Hexapoda KW - Lepidoptera KW - missing data KW - molecular phylogenetics KW - nuclear genes KW - taxon sampling AB - This paper addresses the question of whether one can economically improve the robustness of a molecular phylogeny estimate by increasing gene sampling in only a subset of taxa, without having the analysis invalidated by artifacts arising from large blocks of missing data. Our case study stems from an ongoing effort to resolve poorly understood deeper relationships in the large clade Ditrysia ( > 150,000 species) of the insect order Lepidoptera (butterflies and moths). Seeking to remedy the overall weak support for deeper divergences in an initial study based on five nuclear genes (6.6 kb) in 123 exemplars, we nearly tripled the total gene sample (to 26 genes, 18.4 kb) but only in a third (41) of the taxa. The resulting partially augmented data matrix (45% intentionally missing data) consistently increased bootstrap support for groupings previously identified in the five-gene (nearly) complete matrix, while introducing no contradictory groupings of the kind that missing data have been predicted to produce. Our results add to growing evidence that data sets differing substantially in gene and taxon sampling can often be safely and profitably combined. The strongest overall support for nodes above the family level came from including all nucleotide changes, while partitioning sites into sets undergoing mostly nonsynonymous versus mostly synonymous change. In contrast, support for the deepest node for which any persuasive molecular evidence has yet emerged (78–85% bootstrap) was weak or nonexistent unless synonymous change was entirely excluded, a result plausibly attributed to compositional heterogeneity. This node (Gelechioidea + Apoditrysia), tentatively proposed by previous authors on the basis of four morphological synapomorphies, is the first major subset of ditrysian superfamilies to receive strong statistical support in any phylogenetic study. A “more-genes-only” data set (41 taxa×26 genes) also gave strong signal for a second deep grouping (Macrolepidoptera) that was obscured, but not strongly contradicted, in more taxon-rich analyses. VL - 60 SN - 1063-5157, 1076-836X UR - http://sysbio.oxfordjournals.org/content/60/6/782 CP - 6 M3 - 10.1093/sysbio/syr079 ER - TY - CONF T1 - A case for query by image and text content: searching computer help using screenshots and keywords T2 - Proceedings of the 20th international conference on World wide web Y1 - 2011 A1 - Tom Yeh A1 - White,Brandyn A1 - San Pedro,Jose A1 - Katz,Boriz A1 - Davis, Larry S. KW - content-based image retrieval KW - multimodal search KW - online help AB - The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their main limitation in the difficulty of creating pictorial queries. As a result, few systems offer the option of querying by visual examples, and rely on automatic concept detection and tagging techniques to provide support for searching visual content using textual queries. This paper proposes and studies a practical multimodal web search scenario, where CBIR fits intuitively to improve the retrieval of rich information queries. Many online articles contain useful know-how knowledge about computer applications. These articles tend to be richly illustrated by screenshots. We present a system to search for such software know-how articles that leverages the visual correspondences between screenshots. Users can naturally create pictorial queries simply by taking a screenshot of the application to retrieve a list of articles containing a matching screenshot. We build a prototype comprising 150k articles that are classified into walkthrough, book, gallery, and general categories, and provide a comprehensive evaluation of this system, focusing on technical (accuracy of CBIR techniques) and usability (perceived system usefulness) aspects. We also consider the study of added value features of such a visual-supported search, including the ability to perform cross-lingual queries. We find that the system is able to retrieve matching screenshots for a wide variety of programs, across language boundaries, and provide subjectively more useful results than keyword-based web and image search engines. JA - Proceedings of the 20th international conference on World wide web T3 - WWW '11 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0632-4 UR - http://doi.acm.org/10.1145/1963405.1963513 M3 - 10.1145/1963405.1963513 ER - TY - CONF T1 - A case for query by image and text content: searching computer help using screenshots and keywords T2 - Proceedings of the 20th international conference on World wide web Y1 - 2011 A1 - Tom Yeh A1 - White,Brandyn A1 - San Pedro,Jose A1 - Katz,Boriz A1 - Davis, Larry S. KW - content-based image retrieval KW - multimodal search KW - online help AB - The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their main limitation in the difficulty of creating pictorial queries. As a result, few systems offer the option of querying by visual examples, and rely on automatic concept detection and tagging techniques to provide support for searching visual content using textual queries.This paper proposes and studies a practical multimodal web search scenario, where CBIR fits intuitively to improve the retrieval of rich information queries. Many online articles contain useful know-how knowledge about computer applications. These articles tend to be richly illustrated by screenshots. We present a system to search for such software know-how articles that leverages the visual correspondences between screenshots. Users can naturally create pictorial queries simply by taking a screenshot of the application to retrieve a list of articles containing a matching screenshot. We build a prototype comprising 150k articles that are classified into walkthrough, book, gallery, and general categories, and provide a comprehensive evaluation of this system, focusing on technical (accuracy of CBIR techniques) and usability (perceived system usefulness) aspects. We also consider the study of added value features of such a visual-supported search, including the ability to perform cross-lingual queries. We find that the system is able to retrieve matching screenshots for a wide variety of programs, across language boundaries, and provide subjectively more useful results than keyword-based web and image search engines. JA - Proceedings of the 20th international conference on World wide web T3 - WWW '11 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0632-4 UR - http://doi.acm.org/10.1145/1963405.1963513 M3 - 10.1145/1963405.1963513 ER - TY - CONF T1 - A Corpus-Guided Framework for Robotic Visual Perception T2 - Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence Y1 - 2011 A1 - Teo,C.L. A1 - Yang, Y. A1 - Daumé, Hal A1 - Fermüller, Cornelia A1 - Aloimonos, J. JA - Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence ER - TY - JOUR T1 - Co‐designing contextual tutorials for older adults on searching health information on the internet JF - Proceedings of the American Society for Information Science and Technology Y1 - 2011 A1 - Xie,Bo A1 - Tom Yeh A1 - Walsh,Greg A1 - Watkins,Ivan A1 - Huang,Man AB - Evidence in the literature suggests an integrated e-tutorial is more effective than a paper- or video-based tutorial among younger people. Yet, relatively little is known about the effectiveness of an integrated e-tutorial on the older population. This study explored the applicability of an integrated e-tutorial to an older population, focusing on the content area of e-health literacy. A specific integrated e- tutorial, the Online Tutorial Overlay Presenter (OnTOP), was used to add an overlay to the NIHSeniorHealth.gov Website. Features of the overlay were examined thoroughly in seven 2-hour-long participatory design sessions with ten older adults. Several participatory design techniques were used to elicit participants' preferences for design features of the OnTOP tutorial. These techniques included drawing on the board, voice recording and integration, and peer instruction. Three major themes emerged: 1) using contextual cues to facilitate learning; 2) tailoring to accommodate the learner's literacy level; and 3) enhancing existing interfaces with multimedia cues. These findings improved the design of OnTOP. They also contribute to the multimedia learning literature, generating empirical evidence about the effects of multimedia learning among the understudied older adult population. VL - 48 SN - 1550-8390 UR - http://onlinelibrary.wiley.com/doi/10.1002/meet.2011.14504801160/abstract CP - 1 M3 - 10.1002/meet.2011.14504801160 ER - TY - CONF T1 - Creating contextual help for GUIs using screenshots T2 - Proceedings of the 24th annual ACM symposium on User interface software and technology Y1 - 2011 A1 - Tom Yeh A1 - Chang,Tsung-Hsiang A1 - Xie,Bo A1 - Walsh,Greg A1 - Watkins,Ivan A1 - Wongsuphasawat,Krist A1 - Huang,Man A1 - Davis, Larry S. A1 - Bederson, Benjamin B. KW - contextual help KW - help KW - pixel analysis AB - Contextual help is effective for learning how to use GUIs by showing instructions and highlights on the actual interface rather than in a separate viewer. However, end-users and third-party tech support typically cannot create contextual help to assist other users because it requires programming skill and source code access. We present a creation tool for contextual help that allows users to apply common computer skills-taking screenshots and writing simple scripts. We perform pixel analysis on screenshots to make this tool applicable to a wide range of applications and platforms without source code access. We evaluated the tool's usability with three groups of participants: developers, in-structors, and tech support. We further validated the applicability of our tool with 60 real tasks supported by the tech support of a university campus. JA - Proceedings of the 24th annual ACM symposium on User interface software and technology T3 - UIST '11 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0716-1 UR - http://doi.acm.org/10.1145/2047196.2047214 M3 - 10.1145/2047196.2047214 ER - TY - CONF T1 - Detecting Structural Irregularity in Electronic Dictionaries Using Language Modeling T2 - Electronic lexicography in the 21st century: new applications for new users (eLEX2011) Y1 - 2011 A1 - Rodrigues,Paul A1 - Zajic, David A1 - Bloodgood,Michael A1 - Ye,Peng A1 - David Doermann AB - Dictionaries are often developed using Extensible Markup Language (XML)-based standards. Very often, these standards allow many high-level repeating elements to represent lexical entries, and utilize descendants of these repeating elements to represent the structure within each lexical entry, in the form of an XML tree. In many cases, dictionaries are published that have errors and inconsistencies that would be too expensive to find manually. This paper discusses a method for dictionary writers to audit structural regularity across entries in a dictionary, quickly, by using statistical language modelling. The approach learns the patterns of XML nodes that could occur within an XML tree, and then calculates the probability of each XML tree in the dictionary against these patterns to look for entries that diverge from the norm. JA - Electronic lexicography in the 21st century: new applications for new users (eLEX2011) ER - TY - CHAP T1 - Directed Symbolic Execution T2 - Static AnalysisStatic Analysis Y1 - 2011 A1 - Ma,Kin-Keung A1 - Yit Phang,Khoo A1 - Foster, Jeffrey S. A1 - Hicks, Michael W. ED - Yahav,Eran AB - In this paper, we study the problem of automatically finding program executions that reach a particular target line. This problem arises in many debugging scenarios; for example, a developer may want to confirm that a bug reported by a static analysis tool on a particular line is a true positive. We propose two new directed symbolic execution strategies that aim to solve this problem: shortest-distance symbolic execution (SDSE) uses a distance metric in an interprocedural control flow graph to guide symbolic execution toward a particular target; and call-chain-backward symbolic execution (CCBSE) iteratively runs forward symbolic execution, starting in the function containing the target line, and then jumping backward up the call chain until it finds a feasible path from the start of the program. We also propose a hybrid strategy, Mix-CCBSE, which alternates CCBSE with another (forward) search strategy. We compare these three with several existing strategies from the literature on a suite of six GNU Coreutils programs. We find that SDSE performs extremely well in many cases but may fail badly. CCBSE also performs quite well, but imposes additional overhead that sometimes makes it slower than SDSE. Considering all our benchmarks together, Mix-CCBSE performed best on average, combining to good effect the features of its constituent components. JA - Static AnalysisStatic Analysis T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6887 SN - 978-3-642-23701-0 UR - http://dx.doi.org/10.1007/978-3-642-23702-7_11 ER - TY - CONF T1 - Face tracking in low resolution videos under illumination variations T2 - 2011 18th IEEE International Conference on Image Processing (ICIP) Y1 - 2011 A1 - Zou, W.W.W. A1 - Chellapa, Rama A1 - Yuen, P.C. KW - Adaptation models KW - Computational modeling KW - Face KW - face recognition KW - face tracking KW - GLF-based tracker KW - gradient methods KW - gradient-logarithmic field feature KW - illumination variations KW - lighting KW - low resolution videos KW - low-resolution KW - particle filter KW - particle filter framework KW - particle filtering (numerical methods) KW - Robustness KW - tracking KW - video signal processing KW - Videos KW - Visual face tracking AB - In practical face tracking applications, the face region is often small and affected by illumination variations. We address this problem by using a new feature, namely the Gradient-Logarithmic Field (GLF) feature, in the particle filter framework. The GLF feature is robust under illumination variations and the GLF-based tracker does not assume any model for the face being tracked and is effective in low-resolution video. Experimental results show that the proposed GFL-based tracker works well under significant illumination changes and outperforms some of the state-of-the-art algorithms. JA - 2011 18th IEEE International Conference on Image Processing (ICIP) PB - IEEE SN - 978-1-4577-1304-0 M3 - 10.1109/ICIP.2011.6116672 ER - TY - CONF T1 - From slacktivism to activism: participatory culture in the age of social media T2 - Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems Y1 - 2011 A1 - Rotman,Dana A1 - Vieweg,Sarah A1 - Yardi,Sarita A1 - Chi,Ed A1 - Preece,Jenny A1 - Shneiderman, Ben A1 - Pirolli,Peter A1 - Glaisyer,Tom KW - activism KW - change KW - design KW - participation KW - slacktivism KW - social media AB - Social networking sites (e.g. Facebook), microblogging services (e.g. Twitter), and content-sharing sites (e.g. YouTube and Flickr) have introduced the opportunity for wide-scale, online social participation. Visibility of national and international priorities such as public health, political unrest, disaster relief, and climate change has increased, yet we know little about the benefits - and possible costs - of engaging in social activism via social media. These powerful social issues introduce a need for scientific research into technology mediated social participation. What are the actual, tangible benefits of "greening" Twitter profile pictures in support of the Iranian elections? Does cartooning a Facebook profile picture really raise awareness of child abuse? Are there unintended negative effects through low-risk, low-cost technology-mediated participation? And, is there a difference - in both outcome and engagement level - between different types of online social activism? This SIG will investigate technology mediated social participation through a critical lens, discussing both the potential positive and negative outcomes of such participation. Approaches to designing for increased participation, evaluating effects of participation, and next steps in scientific research directions will be discussed. JA - Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems T3 - CHI EA '11 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0268-5 UR - http://doi.acm.org/10.1145/1979742.1979543 M3 - 10.1145/1979742.1979543 ER - TY - CONF T1 - GPU algorithms for diamond-based multiresolution terrain processing T2 - Eurographics Symposium on Parallel Graphics and Visualization Y1 - 2011 A1 - Yalçın,M. A. A1 - Weiss,K. A1 - De Floriani, Leila AB - We present parallel algorithms for processing, extracting and rendering adaptively sampled regular terraindatasets represented as a multiresolution model defined by a super-square-based diamond hierarchy. This model represents a terrain as a nested triangle mesh generated through a series of longest edge bisections and encoded in an implicit hierarchical structure, which clusters triangles into diamonds and diamonds into super-squares. We decompose the problem into three parallel algorithms for performing: generation of the diamond hierarchy from a regularly distributed terrain dataset, selective refinement on the diamond hierarchy and generation of the corre- sponding crack-free triangle mesh for processing and rendering. We avoid the data transfer bottleneck common to previous approaches by processing all data entirely on the GPU. We demonstrate that this parallel approach can be successfully applied to interactive terrain visualization with a high tessellation quality on commodity GPUs. JA - Eurographics Symposium on Parallel Graphics and Visualization ER - TY - JOUR T1 - GUI Interaction Testing: Incorporating Event Context JF - Software Engineering, IEEE Transactions on Y1 - 2011 A1 - Xun Yuan A1 - Cohen,M. B A1 - Memon, Atif M. KW - automatic test case generation KW - automatic test pattern generation KW - combinatorial interaction testing KW - event driven nature KW - graphical user interface KW - Graphical user interfaces KW - GUI interaction testing KW - program testing AB - Graphical user interfaces (GUIs), due to their event-driven nature, present an enormous and potentially unbounded way for users to interact with software. During testing, it is important to #x201C;adequately cover #x201D; this interaction space. In this paper, we develop a new family of coverage criteria for GUI testing grounded in combinatorial interaction testing. The key motivation of using combinatorial techniques is that they enable us to incorporate #x201C;context #x201D; into the criteria in terms of event combinations, sequence length, and by including all possible positions for each event. Our new criteria range in both efficiency (measured by the size of the test suite) and effectiveness (the ability of the test suites to detect faults). In a case study on eight applications, we automatically generate test cases and systematically explore the impact of context, as captured by our new criteria. Our study shows that by increasing the event combinations tested and by controlling the relative positions of events defined by the new criteria, we can detect a large number of faults that were undetectable by earlier techniques. VL - 37 SN - 0098-5589 CP - 4 M3 - 10.1109/TSE.2010.50 ER - TY - JOUR T1 - Impossibility of blind signatures from one-way permutations JF - Theory of Cryptography Y1 - 2011 A1 - Katz, Jonathan A1 - Schröder,D. A1 - Yerukhimovich,A. AB - A seminal result in cryptography is that signature schemes can be constructed (in a black-box fashion) from any one-way function. The minimal assumptions needed to construct blind signature schemes, however, have remained unclear. Here, we rule out black-box constructions of blind signature schemes from one-way functions. In fact, we rule out constructions even from a random permutation oracle, and our results hold even for blind signature schemes for 1-bit messages that achieve security only against honest-but-curious behavior. M3 - 10.1007/978-3-642-19571-6_37 ER - TY - CONF T1 - A large-scale benchmark dataset for event recognition in surveillance video T2 - Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on Y1 - 2011 A1 - Oh,Sangmin A1 - Hoogs, A. A1 - Perera,A. A1 - Cuntoor, N. A1 - Chen,Chia-Chih A1 - Lee,Jong Taek A1 - Mukherjee,S. A1 - Aggarwal, JK A1 - Lee,Hyungtae A1 - Davis, Larry S. A1 - Swears,E. A1 - Wang,Xioyang A1 - Ji,Qiang A1 - Reddy,K. A1 - Shah,M. A1 - Vondrick,C. A1 - Pirsiavash,H. A1 - Ramanan,D. A1 - Yuen,J. A1 - Torralba,A. A1 - Song,Bi A1 - Fong,A. A1 - Roy-Chowdhury, A. A1 - Desai,M. KW - algorithm;evaluation KW - CVER KW - databases; KW - databases;video KW - dataset;moving KW - event KW - metrics;large-scale KW - object KW - recognition KW - recognition;diverse KW - recognition;video KW - scenes;surveillance KW - surveillance;visual KW - tasks;computer KW - tracks;outdoor KW - video KW - video;computer KW - vision;continuous KW - vision;image KW - visual AB - We introduce a new large-scale video dataset designed to assess the performance of diverse visual event recognition algorithms with a focus on continuous visual event recognition (CVER) in outdoor areas with wide coverage. Previous datasets for action recognition are unrealistic for real-world surveillance because they consist of short clips showing one action by one individual [15, 8]. Datasets have been developed for movies [11] and sports [12], but, these actions and scene conditions do not apply effectively to surveillance videos. Our dataset consists of many outdoor scenes with actions occurring naturally by non-actors in continuously captured videos of the real world. The dataset includes large numbers of instances for 23 event types distributed throughout 29 hours of video. This data is accompanied by detailed annotations which include both moving object tracks and event examples, which will provide solid basis for large-scale evaluation. Additionally, we propose different types of evaluation modes for visual recognition tasks and evaluation metrics along with our preliminary experimental results. We believe that this dataset will stimulate diverse aspects of computer vision research and help us to advance the CVER tasks in the years ahead. JA - Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on M3 - 10.1109/CVPR.2011.5995586 ER - TY - JOUR T1 - Limits of computational differential privacy in the client/server setting JF - Theory of Cryptography Y1 - 2011 A1 - Groce,A. A1 - Katz, Jonathan A1 - Yerukhimovich,A. AB - Differential privacy is a well established definition guaranteeing that queries to a database do not reveal “too much” information about specific individuals who have contributed to the database. The standard definition of differential privacy is information theoretic in nature, but it is natural to consider computational relaxations and to explore what can be achieved with respect to such notions. Mironov et al. (Crypto 2009) and McGregor et al. (FOCS 2010) recently introduced and studied several variants of computational differential privacy, and show that in the two-party setting (where data is split between two parties) these relaxations can offer significant advantages.Left open by prior work was the extent, if any, to which computational differential privacy can help in the usual client/server setting where the entire database resides at the server, and the client poses queries on this data. We show, for queries with output in ℝ n (for constant n) and with respect to a large class of utilities, that any computationally private mechanism can be converted to a statistically private mechanism that is equally efficient and achieves roughly the same utility. M3 - 10.1007/978-3-642-19571-6_25 ER - TY - JOUR T1 - Limits on the power of zero-knowledge proofs in cryptographic constructions JF - Theory of Cryptography Y1 - 2011 A1 - Brakerski,Z. A1 - Katz, Jonathan A1 - Segev,G. A1 - Yerukhimovich,A. AB - For over 20 years, black-box impossibility results have been used to argue the infeasibility of constructing certain cryptographic primitives (e.g., key agreement) from others (e.g., one-way functions). A widely recognized limitation of such impossibility results, however, is that they say nothing about the usefulness of (known) nonblack-box techniques. This is unsatisfying, as we would at least like to rule out constructions using the set of techniques we have at our disposal.With this motivation in mind, we suggest a new framework for black-box constructions that encompasses constructions with a nonblack-box flavor: specifically, those that rely on zero-knowledge proofs relative to some oracle. We show that our framework is powerful enough to capture the Naor-Yung/Sahai paradigm for building a (shielding) CCA-secure public-key encryption scheme from a CPA-secure one, something ruled out by prior black-box separation results. On the other hand, we show that several black-box impossibility results still hold even in a setting that allows for zero-knowledge proofs. M3 - 10.1007/978-3-642-19571-6_34 ER - TY - CONF T1 - No-reference image quality assessment based on visual codebook T2 - Image Processing (ICIP), 2011 18th IEEE International Conference on Y1 - 2011 A1 - Ye,Peng A1 - David Doermann KW - assessment;quality KW - codebook;Gabor KW - descriptors;complex KW - estimation;visual KW - extraction;image KW - filter;appearance KW - filters;feature KW - gabor KW - image KW - image;no-reference KW - patches;natural KW - QUALITY KW - statistics;local KW - texture; AB - In this paper, we propose a new learning based No-Reference Image Quality Assessment (NR-IQA) algorithm, which uses a visual codebook consisting of robust appearance descriptors extracted from local image patches to capture complex statistics of natural image for quality estimation. We use Gabor filter based local features as appearance descriptors and the codebook method encodes the statistics of natural image classes by vector quantizing the feature space and accumulating histograms of patch appearances based on this coding. This method does not assume any specific types of distortion and experimental results on the LIVE image quality assessment database show that this method provides consistent and reliable performance in quality estimation that exceeds other state-of-the-art NR-IQA approaches and is competitive with the full reference measure PSNR. JA - Image Processing (ICIP), 2011 18th IEEE International Conference on M3 - 10.1109/ICIP.2011.6116318 ER - TY - PAT T1 - Photo-based mobile deixis system and related techniques Y1 - 2011 A1 - Darrell,Trevor J A1 - Tom Yeh A1 - Tollmar,Konrad ED - Massachusetts Institute of Technology AB - A mobile deixis device includes a camera to capture an image and a wireless handheld device, coupled to the camera and to a wireless network, to communicate the image with existing databases to find similar images. The mobile deixis device further includes a processor, coupled to the device, to process found database records related to similar images and a display to view found database records that include web pages including images. With such an arrangement, users can specify a location of interest by simply pointing a camera-equipped cellular phone at the object of interest and by searching an image database or relevant web resources, users can quickly identify good matches from several close ones to find an object of interest. VL - 10/762,941 UR - http://www.google.com/patents?id=jeXwAAAAEBAJ CP - 7872669 ER - TY - CHAP T1 - Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications T2 - Applied Cryptography and Network Security Y1 - 2011 A1 - Dana Dachman-Soled A1 - Malkin, Tal A1 - Raykova, Mariana A1 - Yung, Moti ED - Lopez, Javier ED - Tsudik, Gene KW - additive homomorphic encryption KW - Algorithm Analysis and Problem Complexity KW - Computer Communication Networks KW - Data Encryption KW - Discrete Mathematics in Computer Science KW - Management of Computing and Information Systems KW - multiparty set intersection KW - multivariate polynomial evaluation KW - secret sharing KW - secure multiparty computation KW - Systems and Data Security KW - threshold cryptosystems AB - We present a robust secure methodology for computing functions that are represented as multivariate polynomials where parties hold different variables as private inputs. Our generic efficient protocols are fully black-box and employ threshold additive homomorphic encryption; they do not assume honest majority, yet are robust in detecting any misbehavior. We achieve solutions that take advantage of the algebraic structure of the polynomials, and are polynomial-time in all parameters (security parameter, polynomial size, polynomial degree, number of parties). We further exploit a “round table” communication paradigm to reduce the complexity in the number of parties. A large collection of problems are naturally and efficiently represented as multivariate polynomials over a field or a ring: problems from linear algebra, statistics, logic, as well as operations on sets represented as polynomials. In particular, we present a new efficient solution to the multi-party set intersection problem, and a solution to a multi-party variant of the polynomial reconstruction problem. JA - Applied Cryptography and Network Security T3 - Lecture Notes in Computer Science PB - Springer Berlin Heidelberg SN - 978-3-642-21553-7, 978-3-642-21554-4 UR - http://link.springer.com/chapter/10.1007/978-3-642-21554-4_8 ER - TY - CHAP T1 - Speeding Up Network Layout and Centrality Measures for Social Computing Goals T2 - Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction Y1 - 2011 A1 - Sharma,Puneet A1 - Khurana,Udayan A1 - Shneiderman, Ben A1 - Scharrenbroich,Max A1 - Locke,John ED - Salerno,John ED - Yang,Shanchieh ED - Nau, Dana S. ED - Chai,Sun-Ki AB - This paper presents strategies for speeding up calculation of graph metrics and layout by exploiting the parallel architecture of modern day Graphics Processing Units (GPU), specifically Compute Unified Device Architecture ( CUDA ) by Nvidia . Graph centrality metrics like Eigenvector , Betweenness , Page Rank and layout algorithms like Fruchterman − Rheingold are essential components of Social Network Analysis ( SNA ). With the growth in adoption of SNA in different domains and increasing availability of huge networked datasets for analysis, social network analysts require faster tools that are also scalable. Our results, using NodeXL, show up to 802 times speedup for a Fruchterman-Rheingold graph layout and up to 17,972 times speedup for Eigenvector centrality metric calculations on a 240 core CUDA-capable GPU. JA - Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6589 SN - 978-3-642-19655-3 UR - http://dx.doi.org/10.1007/978-3-642-19656-0_35 ER - TY - JOUR T1 - A survey of virtual LAN usage in campus networks JF - Communications Magazine, IEEE Y1 - 2011 A1 - Yu,Minlan A1 - Rexford,J. A1 - Sun,Xin A1 - Rao,Sanjay A1 - Feamster, Nick KW - academic department KW - campus network KW - educational computing KW - Educational institutions KW - Ethernet scalability KW - Local area networks KW - network policy support KW - university campus KW - virtual LAN usage KW - VLAN AB - VLANs are widely used in today's enterprise networks to improve Ethernet scalability and support network policies. However, manuals and textbooks offer very little information about how VLANs are actually used in practice. Through discussions with network administrators and analysis of configuration data, we describe how three university campuses and one academic department use VLANs to achieve a variety of goals. We argue that VLANs are ill-suited to some of these goals (e.g., VLANs are often used to realize access control policies, but constrain the types of policies that can be expressed). Furthermore, the use of VLANs leads to significant complexity in the configuration of network devices. VL - 49 SN - 0163-6804 CP - 7 M3 - 10.1109/MCOM.2011.5936161 ER - TY - CHAP T1 - Temporal Visualization of Social Network Dynamics: Prototypes for Nation of Neighbors T2 - Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction Y1 - 2011 A1 - Ahn,Jae-wook A1 - Taieb-Maimon,Meirav A1 - Sopan,Awalin A1 - Plaisant, Catherine A1 - Shneiderman, Ben ED - Salerno,John ED - Yang,Shanchieh ED - Nau, Dana S. ED - Chai,Sun-Ki AB - Information visualization is a powerful tool for analyzing the dynamic nature of social communities. Using Nation of Neighbors community network as a testbed, we propose five principles of implementing temporal visualizations for social networks and present two research prototypes: NodeXL and TempoVis. Three different states are defined in order to visualize the temporal changes of social networks. We designed the prototypes to show the benefits of the proposed ideas by letting users interactively explore temporal changes of social networks. JA - Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6589 SN - 978-3-642-19655-3 UR - http://dx.doi.org/10.1007/978-3-642-19656-0_43 ER - TY - JOUR T1 - Towards incremental component compatibility testing JF - Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering, CBSE Y1 - 2011 A1 - Yoon,I. A1 - Sussman, Alan A1 - Memon, Atif M. A1 - Porter, Adam AB - Software components are increasingly assembled from othercomponents. Each component may further depend on oth- ers, and each may have multiple active versions. The to- tal number of configurations—combinations of components and their versions—deployed by end users can be very large. Component developers, therefore, spend considerable time and effort doing compatibility testing – determining whether their components can be built correctly for all deployed con- figurations. In previous work we developed Rachet to sup- port large-scale compatibility testing of components. In this paper, we describe and evaluate methods to enable Rachet to perform incremental compatibility testing. We de- scribe algorithms to compute differences in component com- patibilities between current and previous component builds, a formal test adequacy criterion based on covering the differ- ences, and cache-aware configuration sampling and testing methods that attempt to reuse effort from previous testing sessions. We evaluate our approach using the 5-year evo- lution history of a scientific middleware component. Our results show significant performance improvements over Ra- chet’s previous retest-all approach, making the process of compatibility testing practical for evolving components. VL - 11 ER - TY - JOUR T1 - Visual Exploration across Biomedical Databases JF - IEEE/ACM Transactions on Computational Biology and Bioinformatics Y1 - 2011 A1 - Lieberman,M.D. A1 - Taheri, S. A1 - Guo,Huimin A1 - Mirrashed,F. A1 - Yahav,I. A1 - Aris,A. A1 - Shneiderman, Ben KW - Bioinformatics KW - Biomedical computing KW - biomedical databases KW - cross-database exploration KW - Data exploration and discovery KW - Data visualization KW - database management systems KW - Databases, Factual KW - DNA KW - graph theory KW - Information Storage and Retrieval KW - information visualization. KW - Keyword search KW - medical computing KW - natural language processing KW - Proteins KW - semantic networks KW - semantics KW - sequences KW - text mining KW - User-Computer Interface KW - user-defined semantics KW - visual databases AB - Though biomedical research often draws on knowledge from a wide variety of fields, few visualization methods for biomedical data incorporate meaningful cross-database exploration. A new approach is offered for visualizing and exploring a query-based subset of multiple heterogeneous biomedical databases. Databases are modeled as an entity-relation graph containing nodes (database records) and links (relationships between records). Users specify a keyword search string to retrieve an initial set of nodes, and then explore intra- and interdatabase links. Results are visualized with user-defined semantic substrates to take advantage of the rich set of attributes usually present in biomedical data. Comments from domain experts indicate that this visualization method is potentially advantageous for biomedical knowledge exploration. VL - 8 SN - 1545-5963 CP - 2 M3 - 10.1109/TCBB.2010.1 ER - TY - CONF T1 - Visual Scene Interpretation as a Dialogue between Vision and Language T2 - Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence Y1 - 2011 A1 - Yu,Xiaodong A1 - Fermüller, Cornelia A1 - Aloimonos, J. AB - We present a framework for semantic visual scene interpretation in a system with vision and language. In this framework the system consists of two modules, a language module and a vision module that communicate with each other in a form of a dialogue to actively interpret the scene. The language module is responsible for obtaining domain knowledge from linguistic resources and reasoning on the basis of this knowledge and the visual input. It iteratively creates questions that amount to an attention mechanism for the vision module which in turn shifts its focus to selected parts of the scene and applies selective segmentation and feature extraction. As a formalism for optimizing this dialogue we use information theory. We demonstrate the framework on the problem of recognizing a static scene from its objects and show preliminary results for the problem of human activity recognition from video. Experiments demonstrate the effectiveness of the active paradigm in introducing attention and additional constraints into the sensing process. JA - Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence UR - http://www.aaai.org/ocs/index.php/WS/AAAIW11/paper/viewPaper/3989 ER - TY - JOUR T1 - Authenticated broadcast with a partially compromised public-key infrastructure JF - Stabilization, Safety, and Security of Distributed Systems Y1 - 2010 A1 - Gordon,S. A1 - Katz, Jonathan A1 - Kumaresan,R. A1 - Yerukhimovich,A. AB - Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all existing protocols, however, do not distinguish between corrupted parties (who do not follow the protocol), and honest parties whose secret (signing) keys have been compromised (but who continue to behave honestly). We explore conditions under which it is possible to construct broadcast protocols that still provide the usual guarantees (i.e., validity/agreement) to the latter.Consider a network of n parties, where an adversary has compromised the secret keys of up to t c honest parties and, in addition, fully controls the behavior of up to t a other parties. We show that for any fixed t c  > 0, and any fixed t a , there exists an efficient protocol for broadcast if and only if 2t a  + min (t a , t c ) < n. (When t c  = 0, standard results imply feasibility.) We also show that if t c , t a are not fixed, but are only guaranteed to satisfy the bound above, then broadcast is impossible to achieve except for a few specific values of n; for these “exceptional” values of n, we demonstrate a broadcast protocol. Taken together, our results give a complete characterization of this problem. M3 - 10.1007/978-3-642-16023-3_14 ER - TY - BOOK T1 - Digital Signatures Y1 - 2010 A1 - Yung,Moti A1 - Katz, Jonathan KW - Computers / Computer Science KW - Computers / Hardware / General KW - Computers / Information Theory KW - Computers / Networking / Hardware KW - Computers / Security / General KW - Technology & Engineering / Telecommunications AB - Digital Signatures is the first comprehensive account of the theoretical principles and techniques used in the design of provably secure signature schemes. In addition to providing the reader with a better understanding of the security guarantees provided by digital signatures, the book also contains full descriptions and detailed proofs for essentially all known secure signature schemes in the cryptographic literature. A valuable reference for students, professors, and researchers, Digital Signature Schemes can be used for self-study, as a supplement to a course on theoretical cryptography, or as a textbook in a graduate-level seminar. PB - Springer SN - 9780387277110 ER - TY - JOUR T1 - Generating Event Sequence-Based Test Cases Using GUI Runtime State Feedback JF - Software Engineering, IEEE Transactions on Y1 - 2010 A1 - Xun Yuan A1 - Memon, Atif M. KW - automatic model driven technique KW - event interaction coverage equivalent counterparts KW - event semantic interaction relationships KW - event sequence based test cases KW - Graphical user interfaces KW - GUI runtime state feedback KW - program testing KW - Software quality AB - This paper presents a fully automatic model-driven technique to generate test cases for graphical user interfaces (GUIs)-based applications. The technique uses feedback from the execution of a ??seed test suite,?? which is generated automatically using an existing structural event interaction graph model of the GUI. During its execution, the runtime effect of each GUI event on all other events pinpoints event semantic interaction (ESI) relationships, which are used to automatically generate new test cases. Two studies on eight applications demonstrate that the feedback-based technique 1) is able to significantly improve existing techniques and helps identify serious problems in the software and 2) the ESI relationships captured via GUI state yield test suites that most often detect more faults than their code, event, and event-interaction-coverage equivalent counterparts. VL - 36 SN - 0098-5589 CP - 1 M3 - 10.1109/TSE.2009.68 ER - TY - CONF T1 - GUI testing using computer vision T2 - Proceedings of the 28th international conference on Human factors in computing systems Y1 - 2010 A1 - Chang,Tsung-Hsiang A1 - Tom Yeh A1 - Miller,Robert C. KW - gui automation KW - GUI testing KW - test by demonstration AB - Testing a GUI's visual behavior typically requires human testers to interact with the GUI and to observe whether the expected results of interaction are presented. This paper presents a new approach to GUI testing using computer vision for testers to automate their tasks. Testers can write a visual test script that uses images to specify which GUI components to interact with and what visual feedback to be observed. Testers can also generate visual test scripts by demonstration. By recording both input events and screen images, it is possible to extract the images of components interacted with and the visual feedback seen by the demonstrator, and generate a visual test script automatically. We show that a variety of GUI behavior can be tested using this approach. Also, we show how this approach can facilitate good testing practices such as unit testing, regression testing, and test-driven development. JA - Proceedings of the 28th international conference on Human factors in computing systems T3 - CHI '10 PB - ACM CY - New York, NY, USA SN - 978-1-60558-929-9 UR - http://doi.acm.org/10.1145/1753326.1753555 M3 - 10.1145/1753326.1753555 ER - TY - CONF T1 - Image classification of vascular smooth muscle cells T2 - Proceedings of the 1st ACM International Health Informatics Symposium Y1 - 2010 A1 - Grasso,Michael A. A1 - Mokashi,Ronil A1 - Dalvi,Darshana A1 - Cardone, Antonio A1 - Dima,Alden A. A1 - Bhadriraju,Kiran A1 - Plant,Anne L. A1 - Brady,Mary A1 - Yesha,Yaacov A1 - Yesha,Yelena KW - cell biology KW - digital image processing KW - machine learning JA - Proceedings of the 1st ACM International Health Informatics Symposium T3 - IHI '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0030-8 UR - http://doi.acm.org/10.1145/1882992.1883068 M3 - 10.1145/1882992.1883068 ER - TY - JOUR T1 - Iterative execution-feedback model-directed GUI testing JF - Information and Software Technology Y1 - 2010 A1 - Xun Yuan A1 - Memon, Atif M. KW - event-driven software KW - event-flow graphs KW - GUI testing KW - model-based testing KW - test-case generation AB - Current fully automatic model-based test-case generation techniques for GUIs employ a static model. Therefore they are unable to leverage certain state-based relationships between GUI events (e.g., one enables the other, one alters the other’s execution) that are revealed at run-time and non-trivial to infer statically. We present ALT – a new technique to generate GUI test cases in batches. Because of its “alternating” nature, ALT enhances the next batch by using GUI run-time information from the current batch. An empirical study on four fielded GUI-based applications demonstrated that ALT was able to detect new 4- and 5-way GUI interaction faults; in contrast, previous techniques, due to their requirement of too many test cases, were unable to even test 4- and 5-way GUI interactions. VL - 52 SN - 0950-5849 UR - http://www.sciencedirect.com/science/article/pii/S0950584909002092 CP - 5 M3 - 10.1016/j.infsof.2009.11.009 ER - TY - JOUR T1 - Learning algorithms for link prediction based on chance constraints JF - Machine Learning and Knowledge Discovery in Databases Y1 - 2010 A1 - Doppa,J. A1 - Yu,J. A1 - Tadepalli,P. A1 - Getoor, Lise AB - In this paper, we consider the link prediction problem, where we are given a partial snapshot of a network at some time and the goal is to predict the additional links formed at a later time. The accuracy of current prediction methods is quite low due to the extreme class skew and the large number of potential links. Here, we describe learning algorithms based on chance constrained programs and show that they exhibit all the properties needed for a good link predictor, namely, they allow preferential bias to positive or negative class; handle skewness in the data; and scale to large networks. Our experimental results on three real-world domains—co-authorship networks, biological networks and citation networks—show significant performance improvement over baseline algorithms. We conclude by briefly describing some promising future directions based on this work. M3 - 10.1007/978-3-642-15880-3_28 ER - TY - JOUR T1 - Perturbing the Ubiquitin Pathway Reveals How Mitosis Is Hijacked to Denucleate and Regulate Cell Proliferation and Differentiation In Vivo JF - PLoS ONEPLoS ONE Y1 - 2010 A1 - Caceres,Andrea A1 - Shang,Fu A1 - Wawrousek,Eric A1 - Liu,Qing A1 - Avidan,Orna A1 - Cvekl,Ales A1 - Yang,Ying A1 - Haririnia,Aydin A1 - Storaska,Andrew A1 - Fushman, David A1 - Kuszak,Jer A1 - Dudek,Edward A1 - Smith,Donald A1 - Taylor,Allen AB - BackgroundThe eye lens presents a unique opportunity to explore roles for specific molecules in cell proliferation, differentiation and development because cells remain in place throughout life and, like red blood cells and keratinocytes, they go through the most extreme differentiation, including removal of nuclei and cessation of protein synthesis. Ubiquitination controls many critical cellular processes, most of which require specific lysines on ubiquitin (Ub). Of the 7 lysines (K) least is known about effects of modification of K6. Methodology and Principal Findings We replaced K6 with tryptophan (W) because K6 is the most readily modified K and W is the most structurally similar residue to biotin. The backbone of K6W-Ub is indistinguishable from that of Wt-Ub. K6W-Ub is effectively conjugated and deconjugated but the conjugates are not degraded via the ubiquitin proteasome pathways (UPP). Expression of K6W-ubiquitin in the lens and lens cells results in accumulation of intracellular aggregates and also slows cell proliferation and the differentiation program, including expression of lens specific proteins, differentiation of epithelial cells into fibers, achieving proper fiber cell morphology, and removal of nuclei. The latter is critical for transparency, but the mechanism by which cell nuclei are removed has remained an age old enigma. This was also solved by expressing K6W-Ub. p27kip, a UPP substrate accumulates in lenses which express K6W-Ub. This precludes phosphorylation of nuclear lamin by the mitotic kinase, a prerequisite for disassembly of the nuclear membrane. Thus the nucleus remains intact and DNAseIIβ neither gains entry to the nucleus nor degrades the DNA. These results could not be obtained using chemical proteasome inhibitors that cannot be directed to specific tissues. Conclusions and Significance K6W-Ub provides a novel, genetic means to study functions of the UPP because it can be targeted to specific cells and tissues. A fully functional UPP is required to execute most stages of lens differentiation, specifically removal of cell nuclei. In the absence of a functional UPP, small aggregate prone, cataractous lenses are formed. VL - 5 UR - http://dx.doi.org/10.1371/journal.pone.0013331 CP - 10 M3 - 10.1371/journal.pone.0013331 ER - TY - JOUR T1 - Reversible Post-Translational Carboxylation Modulates the Enzymatic Activity of N-Acetyl-l-ornithine Transcarbamylase JF - Biochemistry Y1 - 2010 A1 - Li,Yongdong A1 - Yu,Xiaolin A1 - Ho,Jeremy A1 - Fushman, David A1 - Allewell,Norma M. A1 - Tuchman,Mendel A1 - Shi,Dashuang AB - N-Acetyl-l-ornithine transcarbamylase (AOTCase), rather than ornithine transcarbamylase (OTCase), is the essential carbamylase enzyme in the arginine biosynthesis of several plant and human pathogens. The specificity of this unique enzyme provides a potential target for controlling the spread of these pathogens. Recently, several crystal structures of AOTCase from Xanthomonas campestris (xc) have been determined. In these structures, an unexplained electron density at the tip of the Lys302 side chain was observed. Using 13C NMR spectroscopy, we show herein that Lys302 is post-translationally carboxylated. The structure of wild-type AOTCase in a complex with the bisubstrate analogue Nδ-(phosphonoacetyl)-Nα-acetyl-l-ornithine (PALAO) indicates that the carboxyl group on Lys302 forms a strong hydrogen bonding network with surrounding active site residues, Lys252, Ser253, His293, and Glu92 from the adjacent subunit either directly or via a water molecule. Furthermore, the carboxyl group is involved in binding N-acetyl-l-ornithine via a water molecule. Activity assays with the wild-type enzyme and several mutants demonstrate that the post-translational modification of lysine 302 has an important role in catalysis.N-Acetyl-l-ornithine transcarbamylase (AOTCase), rather than ornithine transcarbamylase (OTCase), is the essential carbamylase enzyme in the arginine biosynthesis of several plant and human pathogens. The specificity of this unique enzyme provides a potential target for controlling the spread of these pathogens. Recently, several crystal structures of AOTCase from Xanthomonas campestris (xc) have been determined. In these structures, an unexplained electron density at the tip of the Lys302 side chain was observed. Using 13C NMR spectroscopy, we show herein that Lys302 is post-translationally carboxylated. The structure of wild-type AOTCase in a complex with the bisubstrate analogue Nδ-(phosphonoacetyl)-Nα-acetyl-l-ornithine (PALAO) indicates that the carboxyl group on Lys302 forms a strong hydrogen bonding network with surrounding active site residues, Lys252, Ser253, His293, and Glu92 from the adjacent subunit either directly or via a water molecule. Furthermore, the carboxyl group is involved in binding N-acetyl-l-ornithine via a water molecule. Activity assays with the wild-type enzyme and several mutants demonstrate that the post-translational modification of lysine 302 has an important role in catalysis. VL - 49 SN - 0006-2960 UR - http://dx.doi.org/10.1021/bi1007386 CP - 32 M3 - 10.1021/bi1007386 ER - TY - CONF T1 - VizWiz: nearly real-time answers to visual questions T2 - Proceedings of the 23nd annual ACM symposium on User interface software and technology Y1 - 2010 A1 - Bigham,Jeffrey P. A1 - Jayant,Chandrika A1 - Ji,Hanjie A1 - Little,Greg A1 - Miller,Andrew A1 - Miller,Robert C. A1 - Miller,Robin A1 - Tatarowicz,Aubrey A1 - White,Brandyn A1 - White,Samual A1 - Tom Yeh KW - blind users KW - non-visual interfaces KW - real-time human computation AB - The lack of access to visual information like text labels, icons, and colors can cause frustration and decrease independence for blind people. Current access technology uses automatic approaches to address some problems in this space, but the technology is error-prone, limited in scope, and quite expensive. In this paper, we introduce VizWiz, a talking application for mobile phones that offers a new alternative to answering visual questions in nearly real-time - asking multiple people on the web. To support answering questions quickly, we introduce a general approach for intelligently recruiting human workers in advance called quikTurkit so that workers are available when new questions arrive. A field deployment with 11 blind participants illustrates that blind people can effectively use VizWiz to cheaply answer questions in their everyday lives, highlighting issues that automatic approaches will need to address to be useful. Finally, we illustrate the potential of using VizWiz as part of the participatory design of advanced tools by using it to build and evaluate VizWiz::LocateIt, an interactive mobile tool that helps blind people solve general visual search problems. JA - Proceedings of the 23nd annual ACM symposium on User interface software and technology T3 - UIST '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0271-5 UR - http://doi.acm.org/10.1145/1866029.1866080 M3 - 10.1145/1866029.1866080 ER - TY - CONF T1 - VizWiz::LocateIt - enabling blind people to locate objects in their environment T2 - Computer Vision and Pattern Recognition Workshops (CVPRW), 2010 IEEE Computer Society Conference on Y1 - 2010 A1 - Bigham,Jeffrey P. A1 - Jayant,Chandrika A1 - Miller,Andrew A1 - White,Brandyn A1 - Tom Yeh AB - Blind people face a number of challenges when interacting with their environments because so much information is encoded visually. Text is pervasively used to label objects, colors carry special significance, and items can easily become lost in surroundings that cannot be quickly scanned. Many tools seek to help blind people solve these problems by enabling them to query for additional information, such as color or text shown on the object. In this paper we argue that many useful problems may be better solved by directly modeling them as search problems, and present a solution called VizWiz::LocateIt that directly supports this type of interaction. VizWiz::LocateIt enables blind people to take a picture and ask for assistance in finding a specific object. The request is first forwarded to remote workers who outline the object, enabling efficient and accurate automatic computer vision to guide users interactively from their existing cellphones. A two-stage algorithm is presented that uses this information to guide users to the appropriate object interactively from their phone. JA - Computer Vision and Pattern Recognition Workshops (CVPRW), 2010 IEEE Computer Society Conference on PB - IEEE SN - 978-1-4244-7029-7 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5543821 M3 - 10.1109/CVPRW.2010.5543821 ER - TY - CONF T1 - Web-scale computer vision using MapReduce for multimedia data mining T2 - Proceedings of the Tenth International Workshop on Multimedia Data Mining Y1 - 2010 A1 - White,Brandyn A1 - Tom Yeh A1 - Jimmy Lin A1 - Davis, Larry S. KW - background subtraction KW - bag-of-features KW - Cloud computing KW - clustering KW - Computer vision KW - image registration KW - MapReduce AB - This work explores computer vision applications of the MapReduce framework that are relevant to the data mining community. An overview of MapReduce and common design patterns are provided for those with limited MapReduce background. We discuss both the high level theory and the low level implementation for several computer vision algorithms: classifier training, sliding windows, clustering, bag-of-features, background subtraction, and image registration. Experimental results for the k-means clustering and single Gaussian background subtraction algorithms are performed on a 410 node Hadoop cluster. JA - Proceedings of the Tenth International Workshop on Multimedia Data Mining T3 - MDMKDD '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0220-3 UR - http://doi.acm.org/10.1145/1814245.1814254 M3 - 10.1145/1814245.1814254 ER - TY - CHAP T1 - Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning T2 - Computer Vision – ECCV 2010 Y1 - 2010 A1 - Kembhavi,Aniruddha A1 - Tom Yeh A1 - Davis, Larry S. ED - Daniilidis,Kostas ED - Maragos,Petros ED - Paragios,Nikos AB - We develop a video understanding system for scene elements, such as bus stops, crosswalks, and intersections, that are characterized more by qualitative activities and geometry than by intrinsic appearance. The domain models for scene elements are not learned from a corpus of video, but instead, naturally elicited by humans, and represented as probabilistic logic rules within a Markov Logic Network framework. Human elicited models, however, represent object interactions as they occur in the 3D world rather than describing their appearance projection in some specific 2D image plane. We bridge this gap by recovering qualitative scene geometry to analyze object interactions in the 3D world and then reasoning about scene geometry, occlusions and common sense domain knowledge using a set of meta-rules. The effectiveness of this approach is demonstrated on a set of videos of public spaces. JA - Computer Vision – ECCV 2010 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6312 SN - 978-3-642-15551-2 UR - http://dx.doi.org/10.1007/978-3-642-15552-9_50 ER - TY - CONF T1 - Arabic Cross-Document Coreference Resolution T2 - Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$ Y1 - 2009 A1 - Sayeed,A. A1 - Elsayed,T. A1 - Garera,N. A1 - Alexander,D. A1 - Xu,T. A1 - Oard, Douglas A1 - Yarowsky,D. A1 - Piatko,C. JA - Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$ ER - TY - JOUR T1 - On black-box constructions of predicate encryption from trapdoor permutations JF - Advances in Cryptology–ASIACRYPT 2009 Y1 - 2009 A1 - Katz, Jonathan A1 - Yerukhimovich,A. AB - Predicate encryption is a recent generalization of identity-based encryption (IBE), broadcast encryption, attribute-based encryption, and more. A natural question is whether there exist black-box constructions of predicate encryption based on generic building blocks, e.g., trapdoor permutations. Boneh et al. (FOCS 2008) recently gave a negative answer for the specific case of IBE.We show both negative and positive results. First, we identify a combinatorial property on the sets of predicates/attributes and show that, for any sets having this property, no black-box construction of predicate encryption from trapdoor permutations (or even CCA-secure encryption) is possible. Our framework implies the result of Boneh et al. as a special case, and also rules out, e.g., black-box constructions of forward-secure encryption and broadcast encryption (with many excluded users). On the positive side, we identify conditions under which predicate encryption schemes can be constructed based on any CPA-secure (standard) encryption scheme. M3 - 10.1007/978-3-642-10366-7_12 ER - TY - JOUR T1 - Chance-constrained programs for link prediction JF - Proceedings of Workshop on Analyzing Networks and Learning with Graphs at NIPS Conference Y1 - 2009 A1 - Doppa,J.R. A1 - Yu,J. A1 - Tadepalli,P. A1 - Getoor, Lise AB - In this paper, we consider the link prediction problem, where we are given a par-tial snapshot of a network at some time and the goal is to predict additional links at a later time. The accuracy of the current prediction methods is quite low due to the extreme class skew and the large number of potential links. In this paper, we describe learning algorithms based on chance constrained programs and show that they exhibit all the properties needed for a good link predictor, namely, al- low preferential bias to positive or negative class; handle skewness in the data; and scale to large networks. Our experimental results on three real-world co- authorship networks show significant improvement in prediction accuracy over baseline algorithms. ER - TY - JOUR T1 - Efficient and secure authenticated key exchange using weak passwords JF - Journal of the ACM (JACM) Y1 - 2009 A1 - Katz, Jonathan A1 - Ostrovsky,Rafail A1 - Yung,Moti KW - Authentication KW - cryptography KW - passwords AB - Mutual authentication and authenticated key exchange are fundamental techniques for enabling secure communication over public, insecure networks. It is well known how to design secure protocols for achieving these goals when parties share high-entropy cryptographic keys in advance of the authentication stage. Unfortunately, it is much more common for users to share weak, low-entropy passwords which furthermore may be chosen from a known space of possibilities (say, a dictionary of English words). In this case, the problem becomes much more difficult as one must ensure that protocols are immune to off-line dictionary attacks in which an adversary exhaustively enumerates all possible passwords in an attempt to determine the correct one. We propose a 3-round protocol for password-only authenticated key exchange, and provide a rigorous proof of security for our protocol based on the decisional Diffie-Hellman assumption. The protocol assumes only public parameters—specifically, a “common reference string”—which can be “hard-coded” into an implementation of the protocol; in particular, and in contrast to some previous work, our protocol does not require either party to pre-share a public key. The protocol is also remarkably efficient, requiring computation only (roughly) 4 times greater than “classical” Diffie-Hellman key exchange that provides no authentication at all. Ours is the first protocol for password-only authentication that is both practical and provably-secure using standard cryptographic assumptions. VL - 57 SN - 0004-5411 UR - http://doi.acm.org/10.1145/1613676.1613679 CP - 1 M3 - 10.1145/1613676.1613679 ER - TY - CHAP T1 - Efficient Robust Private Set Intersection T2 - Applied Cryptography and Network Security Y1 - 2009 A1 - Dana Dachman-Soled A1 - Malkin, Tal A1 - Raykova, Mariana A1 - Yung, Moti ED - Abdalla, Michel ED - Pointcheval, David ED - Fouque, Pierre-Alain ED - Vergnaud, Damien KW - Coding and Information Theory KW - Computer Communication Networks KW - Cryptographic protocols KW - Data Encryption KW - Data Structures, Cryptology and Information Theory KW - Information Systems Applications (incl.Internet) KW - Privacy Preserving Data Mining KW - Secure Two-party Computation KW - Set Intersection KW - Systems and Data Security AB - Computing Set Intersection privately and efficiently between two mutually mistrusting parties is an important basic procedure in the area of private data mining. Assuring robustness, namely, coping with potentially arbitrarily misbehaving (i.e., malicious) parties, while retaining protocol efficiency (rather than employing costly generic techniques) is an open problem. In this work the first solution to this problem is presented. JA - Applied Cryptography and Network Security T3 - Lecture Notes in Computer Science PB - Springer Berlin Heidelberg SN - 978-3-642-01956-2, 978-3-642-01957-9 UR - http://link.springer.com/chapter/10.1007/978-3-642-01957-9_8 ER - TY - JOUR T1 - Evidence for Bidentate Substrate Binding as the Basis for the K48 Linkage Specificity of Otubain 1 JF - Journal of Molecular Biology Y1 - 2009 A1 - Wang,Tao A1 - Yin,Luming A1 - Cooper,Eric M. A1 - Lai,Ming-Yih A1 - Dickey,Seth A1 - Pickart,Cecile M. A1 - Fushman, David A1 - Wilkinson,Keith D. A1 - Cohen,Robert E. A1 - Wolberger,Cynthia KW - deubiquitination KW - isopeptide KW - linkage specificity KW - otubain KW - polyubiquitin AB - Otubain 1 belongs to the ovarian tumor (OTU) domain class of cysteine protease deubiquitinating enzymes. We show here that human otubain 1 (hOtu1) is highly linkage-specific, cleaving Lys48 (K48)-linked polyubiquitin but not K63-, K29-, K6-, or K11-linked polyubiquitin, or linear α-linked polyubiquitin. Cleavage is not limited to either end of a polyubiquitin chain, and both free and substrate-linked polyubiquitin are disassembled. Intriguingly, cleavage of K48-diubiquitin by hOtu1 can be inhibited by diubiquitins of various linkage types, as well as by monoubiquitin. NMR studies and activity assays suggest that both the proximal and distal units of K48-diubiquitin bind to hOtu1. Reaction of Cys23 with ubiquitin-vinylsulfone identified a ubiquitin binding site that is distinct from the active site, which includes Cys91. Occupancy of the active site is needed to enable tight binding to the second site. We propose that distinct binding sites for the ubiquitins on either side of the scissile bond allow hOtu1 to discriminate among different isopeptide linkages in polyubiquitin substrates. Bidentate binding may be a general strategy used to achieve linkage-specific deubiquitination. VL - 386 SN - 0022-2836 UR - http://www.sciencedirect.com/science/article/pii/S0022283608016124 CP - 4 M3 - 10.1016/j.jmb.2008.12.085 ER - TY - CONF T1 - Fast concurrent object localization and recognition T2 - Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on Y1 - 2009 A1 - Tom Yeh A1 - Lee,J.J. A1 - Darrell,T. AB - Object localization and recognition are important problems in computer vision. However, in many applications, exhaustive search over all object models and image locations is computationally prohibitive. While several methods have been proposed to make either recognition or localization more efficient, few have dealt with both tasks simultaneously. This paper proposes an efficient method for concurrent object localization and recognition based on a data-dependent multi-class branch-and-bound formalism. Existing bag-of-features recognition techniques which can be expressed as weighted combinations of feature counts can be readily adapted to our method. We present experimental results that demonstrate the merit of our algorithm in terms of recognition accuracy, localization accuracy, and speed, compared to baseline approaches including exhaustive search, implicit-shape model (ISM), and efficient sub-window search (ESS). Moreover, we develop two extensions to consider non-rectangular bounding regions-composite boxes and polygons-and demonstrate their ability to achieve higher recognition scores compared to traditional rectangular bounding boxes. JA - Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on PB - IEEE SN - 978-1-4244-3992-8 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5206805 M3 - 10.1109/CVPR.2009.5206805 ER - TY - JOUR T1 - The Ins and Outs of Home Networking: The Case for Useful and Usable Domestic Networking JF - ACM Trans. Comput.-Hum. Interact. Y1 - 2009 A1 - Grinter, Rebecca E. A1 - Edwards, W. Keith A1 - Marshini Chetty A1 - Poole, Erika S. A1 - Sung, Ja-Young A1 - Yang, Jeonghwa A1 - Crabtree, Andy A1 - Tolmie, Peter A1 - Rodden, Tom A1 - Greenhalgh, Chris A1 - Benford, Steve KW - home networking KW - Human computer interaction AB - Householders are increasingly adopting home networking as a solution to the demands created by the presence of multiple computers, devices, and the desire to access the Internet. However, current network solutions are derived from the world of work (and initially the military) and provide poor support for the needs of the home. We present the key findings to emerge from empirical studies of home networks in the UK and US. The studies reveal two key kinds of work that effective home networking relies upon: one, the technical work of setting up and maintaining the home network, and the other, the collaborative and socially organized work of the home which the network is embedded in and supports. The two are thoroughly intertwined and rely upon one another for their realization, yet neither is adequately supported by current networking technologies and applications. Explication of the “work to make the home network work” opens up the design space for the continued integration of the home network in domestic life and elaboration of future support. Key issues for development include the development of networking facilities that do not require advanced networking knowledge, that are flexible and support the local social order of the home and the evolution of its routines, and which ultimately make the home network visible and accountable to household members. VL - 16 SN - 1073-0516 UR - http://doi.acm.org/10.1145/1534903.1534905 CP - 2 ER - TY - THES T1 - Interacting with computers using images for search and automation Y1 - 2009 A1 - Tom Yeh AB - A picture is worth a thousand words. Images have been used extensively by us to interact with other human beings to solve certain problems, for example, showing an image of a hind to a bird expert to identify its species or giving an image of a cosmetic product to a husband to help purchase the right product. However, images have been rarely used to support similar interactions with computers.In this thesis, I present a series of useful applications for users to interact with computers using images and develop several computer vision algorithms; necessary to support such interaction. On the application side, I examine two functional roles of images in human-computer interactions: search and automation. For search, I develop systems for users to obtain useful information about a location or a consumer product by taking its picture using a camera phone, to search online documentation about a GUI by taking its screenshot, and to ask general questions using pictures in a community-based QA service. For automation, I design a visual scripting system to allow end-users insert screenshots of GUI elements directly into program statements. On the computer vision side, I describe the Adaptive Vocabulary Tree algorithm for indexing and searching a large and dynamic collection of images, the Dynamic Visual Category Learning algorithm for training and updating a set of dynamically changing object categories, the Vocabulary Tree SVM algorithm for fast object recognition by approximating the margins of a set of SVM classifiers efficiently, and the Multiclass Brand-and-Bound Window Search algorithm for simultaneously estimating the optimal location and label of an object in a large input image. Finally, I demonstrate the usability of each proposed application with user studies and the technical performance of each algorithm with series of experiments with large datasets. PB - Massachusetts Institute of Technology CY - Cambridge, MA, USA ER - TY - JOUR T1 - Language Identification for Handwritten Document Images Using AShape Codebook JF - Pattern Recognition Y1 - 2009 A1 - Zhu,Guangyu A1 - Yu,Xiaodong A1 - Li,Yi A1 - David Doermann AB - Language identification for handwritten document images is an open document analysis problem. In this paper, we propose a novel approach to language identification for documents containing mixture of handwritten and machine printed text using image descriptors constructed from a codebook of shape features. We encode local text structures using scale and rotation invariant codewords, each representing a segmentation-free shape feature that is generic enough to be detected repeatably. We learn a concise, structurally indexed shape codebook from training by clustering and partitioning similar feature types through graph cuts. Our approach is easily extensible and does not require skew correction, scale normalization, or segmentation. We quantitatively evaluate our approach using a large real-world document image collection, which is composed of 1,512 documents in eight languages (Arabic, Chinese, English, Hindi, Japanese, Korean, Russian, and Thai) and contains a complex mixture of handwritten and machine printed content. Experiments demonstrate the robustness and flexibility of our approach, and show exceptional language identification performance that exceeds the state of the art. VL - 42 ER - TY - JOUR T1 - Moving Object Verification in Airborne Video Sequences JF - Circuits and Systems for Video Technology, IEEE Transactions on Y1 - 2009 A1 - Yue,Zhanfeng A1 - Guarino, D. A1 - Chellapa, Rama KW - airborne KW - database;homography-based KW - databases; KW - matcher;color KW - matcher;image KW - matching;image KW - method;infrared KW - object KW - sequences;color KW - sequences;distance KW - sequences;moving KW - sequences;video KW - synthesis KW - system;exemplar KW - transforms;end-to-end KW - verification;spatial-feature KW - video KW - view AB - This paper presents an end-to-end system for moving object verification in airborne video sequences. Using a sample selection module, the system first selects frames from a short sequence and stores them in an exemplar database. To handle appearance change due to potentially large aspect angle variations, a homography-based view synthesis method is then used to generate a novel view of each image in the exemplar database at the same pose as the testing object in each frame of a testing video segment. A rotationally invariant color matcher and a spatial-feature matcher based on distance transforms are combined using a weighted average rule to compare the novel view and the testing object. After looping over all testing frames, the set of match scores is passed to a temporal analysis module to examine the behavior of the testing object, and calculate a final likelihood. Very good verification performance is achieved over thousands of trials for both color and infrared video sequences using the proposed system. VL - 19 SN - 1051-8215 CP - 1 M3 - 10.1109/TCSVT.2008.2009243 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 9. Some rare and a new species JF - Bangladesh Journal of Plant Taxonomy Y1 - 2009 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - Ten taxa belonging to Chlorophyceae, Cyanophyceae, Bacillariophyceae and Euglenophyceae, and one with an uncertain taxonomic position have been described in this paper. Of these, 10 taxa have been found to be globally rare and new records for Bangladesh, whereas Strombomonas islamii Khondker sp. nov. has been described as new to science. VL - 16 SN - 1028-2092 UR - http://www.banglajol.info/bd/index.php/BJPT/article/viewArticle/2734 CP - 1 M3 - 10.3329/bjpt.v16i1.2734 ER - TY - CONF T1 - Prioritizing component compatibility tests via user preferences T2 - Software Maintenance, 2009. ICSM 2009. IEEE International Conference on Y1 - 2009 A1 - Yoon,Il-Chul A1 - Sussman, Alan A1 - Memon, Atif M. A1 - Porter, Adam KW - compatibility testing prioritization KW - component configurations KW - computer clusters KW - Middleware KW - Middleware systems KW - object-oriented programming KW - program testing KW - software engineering KW - Software systems KW - third-party components KW - user preferences AB - Many software systems rely on third-party components during their build process. Because the components are constantly evolving, quality assurance demands that developers perform compatibility testing to ensure that their software systems build correctly over all deployable combinations of component versions, also called configurations. However, large software systems can have many configurations, and compatibility testing is often time and resource constrained. We present a prioritization mechanism that enhances compatibility testing by examining the ldquomost importantrdquo configurations first, while distributing the work over a cluster of computers. We evaluate our new approach on two large scientific middleware systems and examine tradeoffs between the new prioritization approach and a previously developed lowest-cost-configuration-first approach. JA - Software Maintenance, 2009. ICSM 2009. IEEE International Conference on M3 - 10.1109/ICSM.2009.5306357 ER - TY - CONF T1 - Searching documentation using text, OCR, and image T2 - Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval Y1 - 2009 A1 - Tom Yeh A1 - Katz,Boris KW - Computer vision KW - content-based image retrieval KW - multimodal search AB - We describe a mixed-modality method to index and search software documentation in three ways: plain text, OCR text of embedded figures, and visual features of these figures. Using a corpus of 102 computer books with a total of 62,943 pages and 75,800 figures, we empirically demonstrate that our method achieves better precision/recall than do alternatives based on single modalities. JA - Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval T3 - SIGIR '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-483-6 UR - http://doi.acm.org/10.1145/1571941.1572123 M3 - 10.1145/1571941.1572123 ER - TY - JOUR T1 - Segmentation using appearance of mesostructure roughness JF - International journal of computer vision Y1 - 2009 A1 - Yacoob,Yaser A1 - Davis, Larry S. AB - This paper introduces mesostructure roughness as an effective cue in image segmentation. Mesostructure roughness corresponds to small-scale bumps on the macrostructure (i.e., geometry) of objects. Specifically, the focus is on the texture that is created by the projection of the mesostructure roughness on the camera plane. Three intrinsic images are derived: reflectance, smooth-surface shading and mesostructure roughness shading (meta-texture images). A constructive approach is proposed for computing a meta-texture image by preserving, equalizing and enhancing the underlying surface-roughness across color, brightness and illumination variations. We evaluate the performance on sample images and illustrate quantitatively that different patches of the same material, in an image, are normalized in their statistics despite variations in color, brightness and illumination. We develop an algorithm for segmentation of an image into patches that share salient mesostructure roughness. Finally, segmentation by line-based boundary-detection is proposed and results are provided and compared to known algorithms. VL - 83 CP - 3 ER - TY - CONF T1 - Sikuli: using GUI screenshots for search and automation T2 - Proceedings of the 22nd annual ACM symposium on User interface software and technology Y1 - 2009 A1 - Tom Yeh A1 - Chang,Tsung-Hsiang A1 - Miller,Robert C. KW - Automation KW - image search KW - online help AB - We present Sikuli, a visual approach to search and automation of graphical user interfaces using screenshots. Sikuli allows users to take a screenshot of a GUI element (such as a toolbar button, icon, or dialog box) and query a help system using the screenshot instead of the element's name. Sikuli also provides a visual scripting API for automating GUI interactions, using screenshot patterns to direct mouse and keyboard events. We report a web-based user study showing that searching by screenshot is easy to learn and faster to specify than keywords. We also demonstrate several automation tasks suitable for visual scripting, such as map navigation and bus tracking, and show how visual scripting can improve interactive help systems previously proposed in the literature. JA - Proceedings of the 22nd annual ACM symposium on User interface software and technology T3 - UIST '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-745-5 UR - http://doi.acm.org/10.1145/1622176.1622213 M3 - 10.1145/1622176.1622213 ER - TY - JOUR T1 - Three genomes from the phylum Acidobacteria provide insight into the lifestyles of these microorganisms in soils. JF - Appl Environ Microbiol Y1 - 2009 A1 - Ward, Naomi L A1 - Challacombe, Jean F A1 - Janssen, Peter H A1 - Henrissat, Bernard A1 - Coutinho, Pedro M A1 - Wu, Martin A1 - Xie, Gary A1 - Haft, Daniel H A1 - Sait, Michelle A1 - Badger, Jonathan A1 - Barabote, Ravi D A1 - Bradley, Brent A1 - Brettin, Thomas S A1 - Brinkac, Lauren M A1 - Bruce, David A1 - Creasy, Todd A1 - Daugherty, Sean C A1 - Davidsen, Tanja M A1 - DeBoy, Robert T A1 - Detter, J Chris A1 - Dodson, Robert J A1 - Durkin, A Scott A1 - Ganapathy, Anuradha A1 - Gwinn-Giglio, Michelle A1 - Han, Cliff S A1 - Khouri, Hoda A1 - Kiss, Hajnalka A1 - Kothari, Sagar P A1 - Madupu, Ramana A1 - Nelson, Karen E A1 - Nelson, William C A1 - Paulsen, Ian A1 - Penn, Kevin A1 - Ren, Qinghu A1 - Rosovitz, M J A1 - Jeremy D Selengut A1 - Shrivastava, Susmita A1 - Sullivan, Steven A A1 - Tapia, Roxanne A1 - Thompson, L Sue A1 - Watkins, Kisha L A1 - Yang, Qi A1 - Yu, Chunhui A1 - Zafar, Nikhat A1 - Zhou, Liwei A1 - Kuske, Cheryl R KW - Anti-Bacterial Agents KW - bacteria KW - Biological Transport KW - Carbohydrate Metabolism KW - Cyanobacteria KW - DNA, Bacterial KW - Fungi KW - Genome, Bacterial KW - Macrolides KW - Molecular Sequence Data KW - Nitrogen KW - Phylogeny KW - Proteobacteria KW - Sequence Analysis, DNA KW - sequence homology KW - Soil Microbiology AB -

The complete genomes of three strains from the phylum Acidobacteria were compared. Phylogenetic analysis placed them as a unique phylum. They share genomic traits with members of the Proteobacteria, the Cyanobacteria, and the Fungi. The three strains appear to be versatile heterotrophs. Genomic and culture traits indicate the use of carbon sources that span simple sugars to more complex substrates such as hemicellulose, cellulose, and chitin. The genomes encode low-specificity major facilitator superfamily transporters and high-affinity ABC transporters for sugars, suggesting that they are best suited to low-nutrient conditions. They appear capable of nitrate and nitrite reduction but not N(2) fixation or denitrification. The genomes contained numerous genes that encode siderophore receptors, but no evidence of siderophore production was found, suggesting that they may obtain iron via interaction with other microorganisms. The presence of cellulose synthesis genes and a large class of novel high-molecular-weight excreted proteins suggests potential traits for desiccation resistance, biofilm formation, and/or contribution to soil structure. Polyketide synthase and macrolide glycosylation genes suggest the production of novel antimicrobial compounds. Genes that encode a variety of novel proteins were also identified. The abundance of acidobacteria in soils worldwide and the breadth of potential carbon use by the sequenced strains suggest significant and previously unrecognized contributions to the terrestrial carbon cycle. Combining our genomic evidence with available culture traits, we postulate that cells of these isolates are long-lived, divide slowly, exhibit slow metabolic rates under low-nutrient conditions, and are well equipped to tolerate fluctuations in soil hydration.

VL - 75 CP - 7 M3 - 10.1128/AEM.02294-08 ER - TY - JOUR T1 - Toward reconstructing the evolution of advanced moths and butterflies (Lepidoptera: Ditrysia): an initial molecular study JF - BMC Evol Biol Y1 - 2009 A1 - Regier,J. C A1 - Zwick,A. A1 - Cummings, Michael P. A1 - Kawahara,A. Y A1 - Cho,S. A1 - Weller,S. A1 - Roe,A. A1 - Baixeras,J. A1 - Brown,J. W A1 - Parr,C. A1 - Davis,DR A1 - Epstein,M A1 - Hallwachs,W A1 - Hausmann,A A1 - Janzen,DH A1 - Kitching,IJ A1 - Solis,MA A1 - Yen,S-H A1 - Bazinet,A. L A1 - Mitter,C AB - BACKGROUND: In the mega-diverse insect order Lepidoptera (butterflies and moths; 165,000 described species), deeper relationships are little understood within the clade Ditrysia, to which 98% of the species belong. To begin addressing this problem, we tested the ability of five protein-coding nuclear genes (6.7 kb total), and character subsets therein, to resolve relationships among 123 species representing 27 (of 33) superfamilies and 55 (of 100) families of Ditrysia under maximum likelihood analysis. RESULTS: Our trees show broad concordance with previous morphological hypotheses of ditrysian phylogeny, although most relationships among superfamilies are weakly supported. There are also notable surprises, such as a consistently closer relationship of Pyraloidea than of butterflies to most Macrolepidoptera. Monophyly is significantly rejected by one or more character sets for the putative clades Macrolepidoptera as currently defined (P < 0.05) and Macrolepidoptera excluding Noctuoidea and Bombycoidea sensu lato (P < or = 0.005), and nearly so for the superfamily Drepanoidea as currently defined (P < 0.08). Superfamilies are typically recovered or nearly so, but usually without strong support. Relationships within superfamilies and families, however, are often robustly resolved. We provide some of the first strong molecular evidence on deeper splits within Pyraloidea, Tortricoidea, Geometroidea, Noctuoidea and others.Separate analyses of mostly synonymous versus non-synonymous character sets revealed notable differences (though not strong conflict), including a marked influence of compositional heterogeneity on apparent signal in the third codon position (nt3). As available model partitioning methods cannot correct for this variation, we assessed overall phylogeny resolution through separate examination of trees from each character set. Exploration of "tree space" with GARLI, using grid computing, showed that hundreds of searches are typically needed to find the best-feasible phylogeny estimate for these data. CONCLUSION: Our results (a) corroborate the broad outlines of the current working phylogenetic hypothesis for Ditrysia, (b) demonstrate that some prominent features of that hypothesis, including the position of the butterflies, need revision, and (c) resolve the majority of family and subfamily relationships within superfamilies as thus far sampled. Much further gene and taxon sampling will be needed, however, to strongly resolve individual deeper nodes. VL - 9 M3 - 10.1186/1471-2148-9-280 ER - TY - CONF T1 - Towards Dynamic Adaptive Automated Test Generation for Graphical User Interfaces T2 - Software Testing, Verification and Validation Workshops, 2009. ICSTW '09. International Conference on Y1 - 2009 A1 - Xun Yuan A1 - Cohen,M. B A1 - Memon, Atif M. KW - adaptive automated test generation KW - computational complexity KW - event sequence length KW - evolutionary algorithm KW - evolutionary computation KW - graphical user interface KW - Graphical user interfaces KW - GUI test case KW - program testing AB - Graphical user interfaces (GUIs) present an enormous number of potential event sequences to users. During testing it is necessary to cover this space, however the complexity of modern GUIs has made this an increasingly difficult task. Our past work has demonstrated that it is important to incorporate "context” into GUI test cases, in terms of event combinations, event sequence length, and by considering all possible starting and ending positions for each event. Despite the use of our most refined modeling techniques, many of the generated test cases remain unexecutable. In this paper, we posit that due to the dynamic state-based nature of GUIs, it is important to incorporate feedback from the execution of tests into test case generation algorithms. We propose the use of an evolutionary algorithm to generate test suites with fewer unexecutable test cases and higher event interaction coverage. JA - Software Testing, Verification and Validation Workshops, 2009. ICSTW '09. International Conference on M3 - 10.1109/ICSTW.2009.26 ER - TY - RPRT T1 - Using GUI Run-Time State as Feedback for Test Automation Y1 - 2009 A1 - Xun Yuan A1 - Memon, Atif M. KW - GUI testing KW - Software testing KW - test automation KW - test-case generation AB - Graphical user interfaces (GUIs) are the sole mode of interactionbetween end-users and back-end code for almost all of today's software applications. Because of this strategic role of GUIs, their quality has become important. During GUI testing, test cases---modeled as sequences of user events---sample the vast input space of all possible sequences with the goal of detecting faults; for effective testing, it is important to sample this space carefully. Existing techniques either sample manually or employ manually constructed abstract models---the abstraction and/or subsequent test-case generation algorithms enable sampling. This report presents an alternative approach to GUI testing -- it's focus is on developing a fully automatic model-driven technique to generate GUI test cases. The technique is novel in that it uses feedback from the execution of a ``seed test suite'' on a GUI. The seed suite is generated automatically using an existing structural event-interaction graph (EIG) model of the GUI. During its execution, the run-time effect of each GUI event on all other events pinpoints new important event-semantic interaction (ESI) relationships between them, which are used to automatically create an ESI graph (ESIG) model and generate new test cases. Together with a reverse-engineering algorithm used to obtain the EIG, seed suite, ESIG, and new test cases, the feedback-based technique yields a fully automatic, end-to-end GUI testing process. PB - Computer Science Research Works, University of Maryland, College Park UR - http://drum.lib.umd.edu//handle/1903/9416 ER - TY - JOUR T1 - Using Satellite Images of Environmental Changes to Predict Infectious Disease Outbreaks JF - Emerging Infectious DiseasesEmerg Infect Dis Y1 - 2009 A1 - Ford,Timothy E. A1 - Rita R Colwell A1 - Rose,Joan B. A1 - Morse,Stephen S. A1 - Rogers,David J. A1 - Yates,Terry L. AB - A strong global satellite imaging system is essential for predicting outbreaks., Recent events clearly illustrate a continued vulnerability of large populations to infectious diseases, which is related to our changing human-constructed and natural environments. A single person with multidrug-resistant tuberculosis in 2007 provided a wake-up call to the United States and global public health infrastructure, as the health professionals and the public realized that today’s ease of airline travel can potentially expose hundreds of persons to an untreatable disease associated with an infectious agent. Ease of travel, population increase, population displacement, pollution, agricultural activity, changing socioeconomic structures, and international conflicts worldwide have each contributed to infectious disease events. Today, however, nothing is larger in scale, has more potential for long-term effects, and is more uncertain than the effects of climate change on infectious disease outbreaks, epidemics, and pandemics. We discuss advances in our ability to predict these events and, in particular, the critical role that satellite imaging could play in mounting an effective response. VL - 15 SN - 1080-6040 CP - 9 M3 - 10.3201/eid/1509.081334 ER - TY - JOUR T1 - Activity Modeling Using Event Probability Sequences JF - Image Processing, IEEE Transactions on Y1 - 2008 A1 - Cuntoor, N.P. A1 - Yegnanarayana,B. A1 - Chellapa, Rama KW - Automated;Reproducibility of Results;Sensitivity and Specificity;Video Recording; KW - Biological;Models KW - Carnegie Mellon University;Credo Intelligence KW - Computer-Assisted;Models KW - Inc.;Motion Capture dataset;Transportation Security Administration;University Central Florida;airport tarmac surveillance dataset;anomaly detection;event probability sequence;event representation;hidden Markov model;human action dataset;human activity rec KW - Statistical;Motor Activity;Movement;Pattern Recognition AB - Changes in motion properties of trajectories provide useful cues for modeling and recognizing human activities. We associate an event with significant changes that are localized in time and space, and represent activities as a sequence of such events. The localized nature of events allows for detection of subtle changes or anomalies in activities. In this paper, we present a probabilistic approach for representing events using the hidden Markov model (HMM) framework. Using trained HMMs for activities, an event probability sequence is computed for every motion trajectory in the training set. It reflects the probability of an event occurring at every time instant. Though the parameters of the trained HMMs depend on viewing direction, the event probability sequences are robust to changes in viewing direction. We describe sufficient conditions for the existence of view invariance. The usefulness of the proposed event representation is illustrated using activity recognition and anomaly detection. Experiments using the indoor University of Central Florida human action dataset, the Carnegie Mellon University Credo Intelligence, Inc., Motion Capture dataset, and the outdoor Transportation Security Administration airport tarmac surveillance dataset show encouraging results. VL - 17 SN - 1057-7149 CP - 4 M3 - 10.1109/TIP.2008.916991 ER - TY - CONF T1 - Alternating GUI Test Generation and Execution T2 - Practice and Research Techniques, 2008. TAIC PART '08. Testing: Academic Industrial Conference Y1 - 2008 A1 - Xun Yuan A1 - Memon, Atif M. KW - ALT KW - complex failure-causing interactions KW - event sequences KW - graphical user interface KW - Graphical user interfaces KW - GUI test generation KW - Testing AB - Users of today's software perform tasks by interacting with a graphical user interface (GUI) front-end via sequences of input events. Due to the flexibility offered by most GUIs, the number of event sequences grows exponentially with length. One ubiquitous challenge of GUI testing is to selectively generate those sequences that lead to potentially problematic states. This paper presents ALT, a new technique that generates GUI test cases in batches, by leveraging GUI run-time information from a previously run batch to obtain the next batch. Each successive batch consists of "longer" test cases that expand the state space to be explored, yet prune the "unimportant" states. The "alternating" nature of ALT allows it to enhance the next batch by leveraging certain relationships between GUI events (e.g., one enables the other, one alters the other's execution) that are revealed only at run-time and non-trivial to infer statically. An empirical study on four fielded GUI-based applications demonstrates that ALT is successful at identifying complex failure-causing interactions between GUI events. JA - Practice and Research Techniques, 2008. TAIC PART '08. Testing: Academic Industrial Conference M3 - 10.1109/TAIC-PART.2008.10 ER - TY - CONF T1 - Bilateral symmetry of object silhouettes under perspective projection T2 - 19th International Conference on Pattern Recognition, 2008. ICPR 2008 Y1 - 2008 A1 - Bitsakos,K. A1 - Yi,H. A1 - Yi,L. A1 - Fermüller, Cornelia KW - Automation KW - bilateral symmetry KW - Computer vision KW - Frequency KW - Image analysis KW - Image coding KW - Image reconstruction KW - Internet KW - Internet images KW - Object detection KW - object silhouettes KW - perspective distortion KW - perspective projection KW - SHAPE KW - symmetric objects AB - Symmetry is an important property of objects and is exhibited in different forms e.g., bilateral, rotational, etc. This paper presents an algorithm for computing the bilateral symmetry of silhouettes of shallow objects under perspective distortion, exploiting the invariance of the cross ratio to projective transformations. The basic idea is to use the cross ratio to compute a number of midpoints of cross sections and then fit a straight line through them. The goodness-of-fit determines the likelihood of the line to be the axis of symmetry. We analytically estimate the midpointpsilas location as a function of the vanishing point for a given object silhouette. Hence finding the symmetry axis amounts to a 2D search in the space of vanishing points. We present experiments on two datasets as well as Internet images of symmetric objects that validate our approach. JA - 19th International Conference on Pattern Recognition, 2008. ICPR 2008 PB - IEEE SN - 978-1-4244-2174-9 M3 - 10.1109/ICPR.2008.4761501 ER - TY - BOOK T1 - Digital Signatures Y1 - 2008 A1 - Yung,M. A1 - Katz, Jonathan PB - Springer Verlag ER - TY - JOUR T1 - The draft genome of the transgenic tropical fruit tree papaya (Carica papaya Linnaeus) JF - Nature Y1 - 2008 A1 - Ming,R. A1 - Hou,S. A1 - Feng,Y. A1 - Yu,Q. A1 - Dionne-Laporte,A. A1 - Saw,J.H. A1 - Senin,P. A1 - Wang,W. A1 - Ly,B.V. A1 - Lewis,K.L.T. A1 - others AB - Papaya, a fruit crop cultivated in tropical and subtropical regions, is known for its nutritional benefits and medicinal applications. Here we report a 3 draft genome sequence of 'SunUp' papaya, the first commercial virus-resistant transgenic fruit tree to be sequenced. The papaya genome is three times the size of the Arabidopsis genome, but contains fewer genes, including significantly fewer disease-resistance gene analogues. Comparison of the five sequenced genomes suggests a minimal angiosperm gene set of 13,311. A lack of recent genome duplication, atypical of other angiosperm genomes sequenced so far, may account for the smaller papaya gene number in most functional groups. Nonetheless, striking amplifications in gene number within particular functional groups suggest roles in the evolution of tree-like habit, deposition and remobilization of starch reserves, attraction of seed dispersal agents, and adaptation to tropical daylengths. Transgenesis at three locations is closely associated with chloroplast insertions into the nuclear genome, and with topoisomerase I recognition sites. Papaya offers numerous advantages as a system for fruit-tree functional genomics, and this draft genome sequence provides the foundation for revealing the basis of Carica's distinguishing morpho-physiological, medicinal and nutritional properties. VL - 452 SN - 0028-0836 UR - http://www.nature.com/nature/journal/v452/n7190/full/nature06856.html CP - 7190 M3 - 10.1038/nature06856 ER - TY - CONF T1 - Dynamic visual category learning T2 - Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on Y1 - 2008 A1 - Tom Yeh A1 - Darrell,Trevor AB - Dynamic visual category learning calls for efficient adaptation as new training images become available or new categories are defined, existing training images or categories become modified or obsolete, or when categories are divided into subcategories or merged together. We develop novel methods for efficient incremental learning of SVM-based visual category classifiers to handle such dynamic tasks. Our method exploits previous classifier estimates to more efficiently learn the optimal parameters for the current set of training images and categories. We show empirically that for dynamic visual category tasks, our incremental learning methods are significantly faster than batch retraining. JA - Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on PB - IEEE SN - 978-1-4244-2242-5 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4587616 M3 - 10.1109/CVPR.2008.4587616 ER - TY - CONF T1 - Effective and scalable software compatibility testing T2 - Proceedings of the 2008 international symposium on Software testing and analysis Y1 - 2008 A1 - Yoon,Il-Chul A1 - Sussman, Alan A1 - Memon, Atif M. A1 - Porter, Adam KW - component-based software system KW - software compatibility testing AB - Today's software systems are typically composed of multiple components, each with different versions. Software compatibility testing is a quality assurance task aimed at ensuring that multi-component based systems build and/or execute correctly across all their versions' combinations, or configurations. Because there are complex and changing interdependencies between components and their versions, and because there are such a large number of configurations, it is generally infeasible to test all potential configurations. Consequently, in practice, compatibility testing examines only a handful of default or popular configurations to detect problems; as a result costly errors can and do escape to the field. This paper presents a new approach to compatibility testing, called Rachet. We formally model the entire configuration space for software systems and use the model to generate test plans to sample a portion of the space. In this paper, we test all direct dependencies between components and execute the test plan efficiently in parallel. We present empirical results obtained by applying our approach to two large-scale scientific middleware systems. The results show that for these systems Rachet scaled well and discovered incompatibilities between components, and that testing only direct dependences did not compromise test quality. JA - Proceedings of the 2008 international symposium on Software testing and analysis T3 - ISSTA '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-050-0 UR - http://doi.acm.org/10.1145/1390630.1390640 M3 - 10.1145/1390630.1390640 ER - TY - JOUR T1 - Environmental signatures associated with cholera epidemics JF - Proceedings of the National Academy of Sciences Y1 - 2008 A1 - Constantin de Magny,G. A1 - Murtugudde,R. A1 - Sapiano,M. R. P. A1 - Nizam,A. A1 - Brown,C. W. A1 - Busalacchi,A. J. A1 - Yunus,M. A1 - Nair,G. B. A1 - Gil,A. I. A1 - Lanata,C. F. A1 - Rita R Colwell AB - The causative agent of cholera, Vibrio cholerae, has been shown to be autochthonous to riverine, estuarine, and coastal waters along with its host, the copepod, a significant member of the zooplankton community. Temperature, salinity, rainfall and plankton have proven to be important factors in the ecology of V. cholerae, influencing the transmission of the disease in those regions of the world where the human population relies on untreated water as a source of drinking water. In this study, the pattern of cholera outbreaks during 1998–2006 in Kolkata, India, and Matlab, Bangladesh, and the earth observation data were analyzed with the objective of developing a prediction model for cholera. Satellite sensors were used to measure chlorophyll a concentration (CHL) and sea surface temperature (SST). In addition, rainfall data were obtained from both satellite and in situ gauge measurements. From the analyses, a statistically significant relationship between the time series for cholera in Kolkata, India, and CHL and rainfall anomalies was determined. A statistically significant one month lag was observed between CHL anomaly and number of cholera cases in Matlab, Bangladesh. From the results of the study, it is concluded that ocean and climate patterns are useful predictors of cholera epidemics, with the dynamics of endemic cholera being related to climate and/or changes in the aquatic ecosystem. When the ecology of V. cholerae is considered in predictive models, a robust early warning system for cholera in endemic regions of the world can be developed for public health planning and decision making.ecology epidemiology microbiology remote sensing VL - 105 SN - 0027-8424, 1091-6490 UR - http://www.pnas.org/content/105/46/17676 CP - 46 M3 - 10.1073/pnas.0809654105 ER - TY - CONF T1 - Extended abstract: A hardware-assisted data hiding based approach in building high performance secure execution systems T2 - Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on Y1 - 2008 A1 - Taylor,M. A1 - Yin,Chi-En A1 - M. Wu A1 - Gang Qu KW - arrays;invasive KW - attacks;mobile KW - codes;data KW - codes;mobile KW - computing; KW - computing;power KW - consumption;proof-of-the-concept KW - count;gate KW - data KW - delay;hardware-assisted KW - embedding;gate KW - embedding;instruction-block KW - encapsulation;distributed KW - execution KW - FPGA KW - gate KW - hiding;information KW - injection;binary KW - level;malicious KW - programmable KW - programming;field KW - prototyping;secure KW - software;mobile KW - systems;binary KW - Trojan AB - Recently, a novel data hiding technique was proposed to embed information into compiled binary codes in order to enhance system performance. Using this technique as a vehicle, we propose a framework to build high-performance secure execution systems by embedding data for security and trust purposes. We illustrate this approach in a mobile computing environment by an instruction-block level data hiding technique, which can be used to defend against malicious attacks (such as Trojan injection). This improves the trustworthiness of mobile codes. It also protects the code providerpsilas intellectual property because the code can be executed only on the designated device. When combined with the existing approach in [4], the proposed data hiding framework can provide trust and high-performance simultaneously. Finally, we conduct a proof-of-the-concept FPGA prototyping to validate the data hiding technique and evaluate the hardware cost in terms of gate count, power consumption, and gate delay. JA - Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on M3 - 10.1109/HST.2008.4559062 ER - TY - JOUR T1 - Fast concurrent object classification and localization JF - CSAIL Technical Reports (July 1, 2003 - present) Y1 - 2008 A1 - Tom Yeh A1 - Lee,John J A1 - Darrell,Trevor AB - Object localization and classification are important problems incomputer vision. However, in many applications, exhaustive searchover all class labels and image locations is computationallyprohibitive. While several methods have been proposed to makeeither classification or localization more efficient, few havedealt with both tasks simultaneously. This paper proposes anefficient method for concurrent object localization andclassification based on a data-dependent multi-classbranch-and-bound formalism. Existing bag-of-featuresclassification schemes, which can be expressed as weightedcombinations of feature counts can be readily adapted to ourmethod. We present experimental results that demonstrate the meritof our algorithm in terms of classification accuracy, localizationaccuracy, and speed, compared to baseline approaches includingexhaustive search, the ISM method, and single-class branch andbound. UR - http://dspace.mit.edu/handle/1721.1/41862 ER - TY - JOUR T1 - Figaro: A Novel Statistical Method for Vector Sequence Removal JF - Bioinformatics Y1 - 2008 A1 - White,James Robert A1 - Roberts,Michael A1 - Yorke,James A. A1 - Pop, Mihai AB - Motivation: Sequences produced by automated Sanger sequencing machines frequently contain fragments of the cloning vector on their ends. Software tools currently available for identifying and removing the vector sequence require knowledge of the vector sequence, specific splice sites and any adapter sequences used in the experiment—information often omitted from public databases. Furthermore, the clipping coordinates themselves are missing or incorrectly reported. As an example, within the ∼1.24 billion shotgun sequences deposited in the NCBI Trace Archive, as many as ∼735 million (∼60%) lack vector clipping information. Correct clipping information is essential to scientists attempting to validate, improve and even finish the increasingly large number of genomes released at a ‘draft’ quality level.Results: We present here Figaro, a novel software tool for identifying and removing the vector from raw sequence data without prior knowledge of the vector sequence. The vector sequence is automatically inferred by analyzing the frequency of occurrence of short oligo-nucleotides using Poisson statistics. We show that Figaro achieves 99.98% sensitivity when tested on ∼1.5 million shotgun reads from Drosophila pseudoobscura. We further explore the impact of accurate vector trimming on the quality of whole-genome assemblies by re-assembling two bacterial genomes from shotgun sequences deposited in the Trace Archive. Designed as a module in large computational pipelines, Figaro is fast, lightweight and flexible. Availability: Figaro is released under an open-source license through the AMOS package (http://amos.sourceforge.net/Figaro). Contact: mpop@umiacs.umd.edu VL - 24 SN - 1367-4803, 1460-2059 UR - http://bioinformatics.oxfordjournals.org/content/24/4/462 CP - 4 M3 - 10.1093/bioinformatics/btm632 ER - TY - CONF T1 - Learning Visual Shape Lexicon for Document Image Content Recognition T2 - The 10th European Conference on Computer Vision (ECCV 2008) Y1 - 2008 A1 - Zhu,Guangyu A1 - Yu,Xiaodong A1 - Li,Yi A1 - David Doermann AB - Developing effective content recognition methods for diverse imagery continues to challenge computer vision researchers. We present a new approach for document image content categorization using a lexicon of shape features. Each lexical word corresponds to a scale and rotation invariant shape feature that is generic enough to be detected repeatably and segmentation free. We learn a concise, structurally indexed shape lexicon from training by clustering and partitioning feature types through graph cuts. We demonstrate our approach on two challenging document image content recognition problems: 1) The classification of 4,500 Web images crawled from Google Image Search into three content categories — pure image, image with text, and document image, and 2) Language identification of 8 languages (Arabic, Chinese, English, Hindi, Japanese, Korean, Russian, and Thai) on a 1,512 complex document image database composed of mixed machine printed text and handwriting. Our approach is capable to handle high intra-class variability and shows results that exceed other state-of-the-art approaches, allowing it to be used as a content recognizer in image indexing and retrieval systems. JA - The 10th European Conference on Computer Vision (ECCV 2008) CY - Marseille, France ER - TY - RPRT T1 - The Maryland Large-Scale Integrated Neurocognitive Architecture Y1 - 2008 A1 - Reggia, James A. A1 - Tagamets,M. A1 - Contreras-Vidal,J. A1 - Jacobs, David W. A1 - Weems,S. A1 - Naqvi,W. A1 - Yang,C. KW - *COMPUTATIONS KW - *HYBRID SYSTEMS KW - *NEURAL NETS KW - *NEUROCOGNITIVE ARCHITECTURE KW - ADAPTIVE SYSTEMS KW - Artificial intelligence KW - BRAIN KW - Cognition KW - COMPUTER PROGRAMMING KW - COMPUTER PROGRAMMING AND SOFTWARE KW - HYBRID AI KW - Machine intelligence KW - MECHANICAL ORGANS KW - MODULAR CONSTRUCTION KW - NERVOUS SYSTEM KW - PE61101E KW - PLASTIC PROPERTIES KW - PROCESSING EQUIPMENT KW - RECURRENT NEURAL NETWORK AB - Recent progress in neural computation, high performance computing, neuroscience and cognitive science suggests that an effort to produce a general-purpose, adaptive machine intelligence is likely to yield a qualitatively more powerful system than those currently existing. Here we outline our progress in developing a framework for creating such a large-scale machine intelligence, or neurocognitive architecture that is based on the modularity, dynamics and plasticity of the human brain. We successfully implemented three intermediate-scale parts of such a system, and these are described. Based on this experience, we concluded that for the short term, optimal results would be obtained by using a hybrid design including neural, symbolic AI, and artificial life methods. We propose a three-tiered architecture that integrates these different methods, and describe a prototype mini-Roboscout that we implemented and evaluated based on this architecture. We also examined, via computational experiments, the effectiveness of genetic programming as a design tool for recurrent neural networks, and the speed-up obtained for adaptive neural networks when they are executed on a graphical processing unit. We conclude that the implementation of a large-scale neurocognitive architecture is feasible, and outline a roadmap for proceeding. PB - University of Maryland College Park UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA481261 ER - TY - CONF T1 - Multimodal question answering for mobile devices T2 - Proceedings of the 13th international conference on Intelligent user interfaces Y1 - 2008 A1 - Tom Yeh A1 - Darrell,Trevor KW - Information retrieval KW - mobile application KW - pattern matching KW - Question answering AB - This paper introduces multimodal question answering, a new interface for community-based question answering services. By offering users an extra modality---photos---in addition to the text modality to formulate queries, multimodal question answering overcomes the limitations of text-only input methods when the users ask questions regarding visually distinctive objects. Such interface is especially useful when users become curious about an interesting object in the environment and want to know about it---simply by taking a photo and asking a question in a situated (from a mobile device) and intuitive (without describing the object in words) manner. We propose a system architecture for multimodal question answering, describe an algorithm for searching the database, and report on the findings of two prototype studies. JA - Proceedings of the 13th international conference on Intelligent user interfaces T3 - IUI '08 PB - ACM CY - New York, NY, USA SN - 978-1-59593-987-6 UR - http://doi.acm.org/10.1145/1378773.1378841 M3 - 10.1145/1378773.1378841 ER - TY - CONF T1 - A New Approach of Dynamic Background Modeling for Surveillance Information T2 - Computer Science and Software Engineering, 2008 International Conference on Y1 - 2008 A1 - Gao,Dongfa A1 - Zhuolin Jiang A1 - Ye,Ming KW - approximate information extraction KW - binary mask images KW - disturbance filtering KW - dynamic background modeling KW - Feature extraction KW - filtering theory KW - Image reconstruction KW - information frame reconstruction KW - NOISE KW - noise filtering KW - orthogonal nonseparable wavelet transformation KW - Surveillance KW - surveillance information KW - Wavelet transforms AB - This paper presents a new approach of best background modeling for surveillance information. The approach makes orthogonal non-separable wavelet transformation of information frames used for background modeling, extracts the approximate information to reconstruct information frames, filters out the disturbance, shadow and noise from the reconstructed frames, constructs basic background with the method of binary mask images, uses multi-frame combination of non-uniform noise to filter noise in basic background, applies mutual information to detect the situation of adjacent changes. If the background has a gradual change, weighted superposition of multi background modeling images with time will be applied to update the background. If the background has a major or sudden change, the background will remodel from this frame. JA - Computer Science and Software Engineering, 2008 International Conference on VL - 1 M3 - 10.1109/CSSE.2008.601 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 2. Cryptophyceae and Synurophyceae JF - Bangladesh Journal of Botany Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents two species of Rhodomonas, four species of Chroomonas, six species of Cryptomonas and Cryptochrysis minor, Cyanomonas coeruleus, Chrysodidymus synuroideus and Mallomonas akrokomos. These species have been reported from some ponds of Mathbaria in Pirojpur and Bakerganj of Barisal district in Bangladesh. VL - 36 SN - 0253-5416 UR - http://www.banglajol.info/bd/index.php/BJB/article/viewArticle/1549 CP - 1 M3 - 10.3329/bjb.v36i1.1549 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 5. Euglena, Euglenocapsa JF - Bangladesh Journal of Plant Taxonomy Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents 20 taxa of the genus Euglena and one species of the rare euglenoid genus Euglenocapsa. All these taxa are reported for the first time from some pond ecosystems of Mathbaria in Pirojpur and Bakerganj of Barisal districts of Bangladesh. VL - 15 SN - 1028-2092 UR - http://www.banglajol.info/index.php/BJPT/article/viewArticle/910 CP - 1 M3 - 10.3329/bjpt.v15i1.910 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 7. Phacus spp. JF - Bangladesh Journal of Botany Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - Thirteen species of Phacus hitherto not reported from Bangladesh have been described and illustrated. Freshwater ponds at southern districts of Pirojpur and Barisal revealed these presence of the species. VL - 37 SN - 0253-5416 UR - http://www.banglajol.info/bd/index.php/BJB/article/viewArticle/1564 CP - 1 M3 - 10.3329/bjb.v37i1.1564 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 8. Trachelomonas Ehr. (Euglenophyceae) JF - Bangladesh Journal of Botany Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - Investigation of pelagic plankton communities from some freshwater ponds of Pirojpur and Barisal districts revealed the presence of 17 species under the genus Trachelomonas Ehr. for the first time in Bangladesh. VL - 37 SN - 0253-5416 UR - http://www.banglajol.info/bd/index.php/BJB/article/viewArticle/1719 CP - 2 M3 - 10.3329/bjb.v37i2.1719 ER - TY - CONF T1 - Photo-based authentication using social networks T2 - Proceedings of the first workshop on Online social networks Y1 - 2008 A1 - Yardi,Sarita A1 - Feamster, Nick A1 - Bruckman,Amy KW - social networks KW - trust AB - We present Lineup, a system that uses the social network graph in Facebook and auxiliary information (e.g., "tagged" user photos) to build a photo-based Web site authentication framework. Lineup's underlying mechanism leverages the concept of CAPTCHAs, programs that are designed to distinguish bots from human users. Lineup extends this functionality to help a Web site ascertain a user's identity or membership in a certain group (e.g., an interest group, invitees to a certain event) in order to infer some level of trust. Lineup works by presenting a user with photographs and asking the user to identify subjects in the photo whom a user with the appropriate identity or group membership should know. We present the design and implementation for Lineup, describe a preliminary prototype implementation, and discuss Lineup's security properties, including possible guarantees and threats. JA - Proceedings of the first workshop on Online social networks T3 - WOSN '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-182-8 UR - http://doi.acm.org/10.1145/1397735.1397748 M3 - 10.1145/1397735.1397748 ER - TY - CONF T1 - Photo-based question answering T2 - Proceedings of the 16th ACM international conference on Multimedia Y1 - 2008 A1 - Tom Yeh A1 - Lee,John J A1 - Darrell,Trevor KW - Computer vision KW - Information retrieval KW - Question answering AB - Photo-based question answering is a useful way of finding information about physical objects. Current question answering (QA) systems are text-based and can be difficult to use when a question involves an object with distinct visual features. A photo-based QA system allows direct use of a photo to refer to the object. We develop a three-layer system architecture for photo-based QA that brings together recent technical achievements in question answering and image matching. The first, template-based QA layer matches a query photo to online images and extracts structured data from multimedia databases to answer questions about the photo. To simplify image matching, it exploits the question text to filter images based on categories and keywords. The second, information retrieval QA layer searches an internal repository of resolved photo-based questions to retrieve relevant answers. The third, human-computation QA layer leverages community experts to handle the most difficult cases. A series of experiments performed on a pilot dataset of 30,000 images of books, movie DVD covers, grocery items, and landmarks demonstrate the technical feasibility of this architecture. We present three prototypes to show how photo-based QA can be built into an online album, a text-based QA, and a mobile application. JA - Proceedings of the 16th ACM international conference on Multimedia T3 - MM '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-303-7 UR - http://doi.acm.org/10.1145/1459359.1459412 M3 - 10.1145/1459359.1459412 ER - TY - JOUR T1 - Pooled ANOVA JF - Computational Statistics & Data Analysis Y1 - 2008 A1 - Last,Michael A1 - Luta,Gheorghe A1 - Orso,Alex A1 - Porter, Adam A1 - Young,Stan AB - We introduce Pooled ANOVA, a greedy algorithm to sequentially select the rare important factors from a large set of factors. Problems such as computer simulations and software performance tuning involve a large number of factors, few of which have an important effect on the outcome or performance measure. We pool multiple factors together, and test the pool for significance. If the pool has a significant effect we retain the factors for deconfounding. If not, we either declare that none of the factors are important, or retain them for follow-up decoding, depending on our assumptions and stage of testing. The sparser important factors are, the bigger the savings. Pooled ANOVA requires fewer assumptions than other, similar methods (e.g. sequential bifurcation), such as not requiring all important effects to have the same sign. We demonstrate savings of 25%-35% when compared to a conventional ANOVA, and also the ability to work in a setting where Sequential Bifurcation fails. VL - 52 SN - 0167-9473 UR - http://www.sciencedirect.com/science/article/pii/S0167947308002168 CP - 12 M3 - 16/j.csda.2008.04.024 ER - TY - JOUR T1 - Reciprocity between the cerebellum and the cerebral cortex: Nonlinear dynamics in microscopic modules for generating voluntary motor commands JF - Complexity Y1 - 2008 A1 - Wang,Jun A1 - Dam,Gregory A1 - Yildirim,Sule A1 - Rand, William A1 - Wilensky,Uri A1 - Houk,James C. KW - agent‐based modeling KW - cerebellum KW - equilibrium point control KW - motor command KW - motor cortex KW - Movement KW - neural network KW - nonlinear dynamics AB - The cerebellum and basal ganglia are reciprocally connected with the cerebral cortex, forming many loops that function as distributed processing modules. Here we present a detailed model of one microscopic loop between the motor cortex and the cerebellum, and we show how small arrays of these microscopic loops (CB modules) can be used to generate biologically plausible motor commands for controlling movement. A fundamental feature of CB modules is the presence of positive feedback loops between the cerebellar nucleus and the motor cortex. We use nonlinear dynamics to model one microscopic loop and to investigate its bistable properties. Simulations demonstrate an ability to program a motor command well in advance of command generation and an ability to vary command duration. However, control of command intensity is minimal, which could interfere with the control of movement velocity. To assess these hypotheses, we use a minimal nonlinear model of the neuromuscular (NM) system that translates motor commands into actual movements. Simulations of the combined CB-NM modular model indicate that movement duration is readily controlled, whereas velocity is poorly controlled. We then explore how an array of eight CB-NM modules can be used to control the direction and endpoint of a planar movement. In actuality, thousands of such microscopic loops function together as an array of adjustable pattern generators for programming and regulating the composite motor commands that control limb movements. We discuss the biological plausibility and limitations of the model. We also discuss ways in which an agent-based representation can take advantage of the modularity in order to model this complex system. © 2008 Wiley Periodicals, Inc. Complexity, 2008 VL - 14 SN - 1099-0526 UR - http://onlinelibrary.wiley.com/doi/10.1002/cplx.20241/abstract CP - 2 M3 - 10.1002/cplx.20241 ER - TY - CONF T1 - Scalable classifiers for Internet vision tasks T2 - Computer Vision and Pattern Recognition Workshops, 2008. CVPRW'08. IEEE Computer Society Conference on Y1 - 2008 A1 - Tom Yeh A1 - Lee,John J A1 - Darrell,Trevor AB - Object recognition systems designed for Internet applications typically need to adapt to userspsila needs in a flexible fashion and scale up to very large data sets. In this paper, we analyze the complexity of several multiclass SVM-based algorithms and highlight the computational bottleneck they suffer at test time: comparing the input image to every training image. We propose an algorithm that overcomes this bottleneck; it offers not only the efficiency of a simple nearest-neighbor classifier, by voting on class labels based on the k nearest neighbors quickly determined by a vocabulary tree, but also the recognition accuracy comparable to that of a complex SVM classifier, by incorporating SVM parameters into the voting scores incrementally accumulated from individual image features. Empirical results demonstrate that adjusting votes by relevant support vector weights can improve the recognition accuracy of a nearest-neighbor classifier without sacrificing speed. Compared to existing methods, our algorithm achieves a ten-fold speed increase while incurring an acceptable accuracy loss that can be easily offset by showing about two more labels in the result. The speed, scalability, and adaptability of our algorithm makes it suitable for Internet vision applications. JA - Computer Vision and Pattern Recognition Workshops, 2008. CVPRW'08. IEEE Computer Society Conference on PB - IEEE SN - 978-1-4244-2339-2 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4562958 M3 - 10.1109/CVPRW.2008.4562958 ER - TY - JOUR T1 - A scalable key management and clustering scheme for wireless ad hoc and sensor networks JF - Future Generation Computer Systems Y1 - 2008 A1 - Li,Jason H. A1 - Bhattacharjee, Bobby A1 - Yu,Miao A1 - Levy,Renato KW - ad hoc networks KW - clustering KW - Group communications KW - Key management KW - sensor networks AB - This paper describes a scalable key management and clustering scheme for secure group communications in ad hoc and sensor networks. The scalability problem is solved by partitioning the communicating devices into subgroups, with a leader in each subgroup, and further organizing the subgroups into hierarchies. Each level of the hierarchy is called a tier or layer. Key generation, distribution, and actual data transmissions follow the hierarchy. The distributed, efficient clustering approach (DECA) provides robust clustering to form subgroups, and analytical and simulation results demonstrate that DECA is energy-efficient and resilient against node mobility. Comparing with most other schemes, our approach is extremely scalable and efficient, provides more security guarantees, and is selective, adaptive and robust. VL - 24 SN - 0167-739X UR - http://www.sciencedirect.com/science/article/pii/S0167739X08000782 CP - 8 M3 - 10.1016/j.future.2008.03.007 ER - TY - JOUR T1 - Script-Independent Text Line Segmentation in Freestyle Handwritten Documents JF - IEEETransactions on Pattern Analysis and Machine Intelligence Y1 - 2008 A1 - Yi,L. A1 - Zheng,Y. A1 - David Doermann A1 - Jaeger,S. AB - Text line segmentation in freestyle handwritten documents remains an open document analysis problem. Curvilinear text lines and small gaps between neighboring text lines present a challenge to algorithms developed for machine printed or hand-printed documents. In this paper, we propose a novel approach based on density estimation and a state-of-the-art image segmentation technique, the level set method. From an input document image, we estimate a probability map, where each element represents the probability of the underlying pixel belonging to a text line. The level set method is then exploited to determine the boundary of neighboring text lines by evolving an initial estimate. Unlike connected component based methods ( [1] and [2] for example), the proposed algorithm does not use any script-specific knowledge. Extensive quantitative experiments on freestyle handwritten documents with diverse scripts, such as Arabic, Chinese, Korean, and Hindi in the University of Maryland Multilingual database, demonstrate that our algorithm consistently outperforms previous methods [1]–[3]. Further experiments show the proposed algorithm is robust to scale change, rotation, and noise. ER - TY - JOUR T1 - Synthesis of Silhouettes and Visual Hull Reconstruction for Articulated Humans JF - Multimedia, IEEE Transactions on Y1 - 2008 A1 - Yue,Zhanfeng A1 - Chellapa, Rama KW - active KW - algorithm;articulated KW - algorithm;inner KW - body KW - camera;visual KW - collection;virtual KW - computation;contour-based KW - Context KW - detection;image KW - distance KW - distance;turntable KW - estimation;shape KW - function KW - hull KW - human KW - image KW - image;approximate KW - localization KW - measurement;silhouette KW - measurement;turning KW - part KW - pose;circular KW - reality; KW - recognition;virtual KW - reconstruction;approximation KW - reconstruction;image KW - segmentation KW - segmentation;pose KW - SHAPE KW - similarity KW - synthesis;silhouette KW - technique;human KW - theory;cameras;edge KW - Trajectory AB - In this paper, we propose a complete framework for improved synthesis and understanding of the human pose from a limited number of silhouette images. It combines the active image-based visual hull (IBVH) algorithm and a contour-based body part segmentation technique. We derive a simple, approximate algorithm to decide the extrinsic parameters of a virtual camera, and synthesize the turntable image collection of the person using the IBVH algorithm by actively moving the virtual camera on a properly computed circular trajectory around the person. Using the turning function distance as the silhouette similarity measurement, this approach can be used to generate the desired pose-normalized images for recognition applications. In order to overcome the inability of the visual hull (VH) method to reconstruct concave regions, we propose a contour-based human body part localization algorithm to segment the silhouette images into convex body parts. The body parts observed from the virtual view are generated separately from the corresponding body parts observed from the input views and then assembled together for a more accurate VH reconstruction. Furthermore, the obtained turntable image collection helps to improve the body part segmentation and identification process. By using the inner distance shape context (IDSC) measurement, we are able to estimate the body part locations more accurately from a synthesized view where we can localize the body part more precisely. Experiments show that the proposed algorithm can greatly improve body part segmentation and hence shape reconstruction results. VL - 10 SN - 1520-9210 CP - 8 M3 - 10.1109/TMM.2008.2007321 ER - TY - CONF T1 - Unconstrained Language Identification Using AShape Codebook T2 - The 11th International Conference on Frontiers in Handwritting Recognition (ICFHR 2008) Y1 - 2008 A1 - Zhu,Guangyu A1 - Yu,Xiaodong A1 - Li,Yi A1 - David Doermann AB - We propose a novel approach to language identification in document images containing handwriting and machine printed text using image descriptors constructed from a codebook of shape features. We encode local text structures using scale and rotation invariant codewords, each representing a characteristic shape feature that is generic enough to appear repeatably. We learn a concise, structurally indexed shape codebook from training data by clustering similar features and partitioning the feature space by graph cuts. Our approach is segmentation free and easily extensible. We quantitatively evaluate our approach using a large real-world document image collection, which consists of more than 1,500 documents in 8 languages (Arabic, Chinese, English, Hindi, Japanese, Korean, Russian, and Thai) and contains a complex mixture of handwritten and machine printed content. Experimental results demonstrate the robustness and flexibility of our approach, and show exceptional language identification performance that exceeds the state of art. JA - The 11th International Conference on Frontiers in Handwritting Recognition (ICFHR 2008) CY - Montreal, Canada ER - TY - CONF T1 - Adaptive Vocabulary Forests br Dynamic Indexing and Category Learning T2 - Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on Y1 - 2007 A1 - Tom Yeh A1 - Lee,John A1 - Darrell,Trevor AB - Histogram pyramid representations computed from a vocabulary tree of visual words have proven valuable for a range of image indexing and recognition tasks; however, they have only used a single, fixed partition of feature space. We present a new efficient algorithm to incrementally compute set-of-trees (forest) vocabulary representations, and show that they improve recognition and indexing performance in methods which use histogram pyramids. Our algorithm incrementally adapts a vocabulary forest with an Inverted file system at the leaf nodes and automatically keeps existing histogram pyramid database entries up-to-date in a forward filesystem. It is possible not only to apply vocabulary tree indexing algorithms directly, but also to compute pyramid match kernel values efficiently. On dynamic recognition tasks where categories or objects under consideration may change over time, we show that adaptive vocabularies offer significant performance advantages in comparison to a single, fixed vocabulary. JA - Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on PB - IEEE SN - 978-1-4244-1630-1 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4409053 M3 - 10.1109/ICCV.2007.4409053 ER - TY - BOOK T1 - Applied cryptography and network security: 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007: proceedings Y1 - 2007 A1 - Katz, Jonathan A1 - Yung,M. PB - Springer-Verlag New York Inc VL - 4521 ER - TY - CONF T1 - Bid based scheduler with backfilling for a multiprocessor system T2 - Proceedings of the ninth international conference on Electronic commerce Y1 - 2007 A1 - Yahav,I. A1 - Raschid, Louiqa A1 - Andrade,H. JA - Proceedings of the ninth international conference on Electronic commerce ER - TY - CONF T1 - Combining motion from texture and lines for visual navigation T2 - IEEE/RSJ International Conference on Intelligent Robots and Systems, 2007. IROS 2007 Y1 - 2007 A1 - Bitsakos,K. A1 - Li Yi A1 - Fermüller, Cornelia KW - 3D structure information KW - CAMERAS KW - Computer vision KW - extended Kalman filter KW - Frequency KW - image frequencies KW - Image motion analysis KW - Image texture KW - Kalman filters KW - Layout KW - motion control KW - Motion estimation KW - Navigation KW - Optical computing KW - phase correlation KW - piecewise planar scene KW - Robustness KW - Simultaneous localization and mapping KW - Speech processing KW - textured plane KW - video signal processing KW - visual navigation AB - Two novel methods for computing 3D structure information from video for a piecewise planar scene are presented. The first method is based on a new line constraint, which clearly separates the estimation of distance from the estimation of slant. The second method exploits the concepts of phase correlation to compute from the change of image frequencies of a textured plane, distance and slant information. The two different estimates together with structure estimates from classical image motion are combined and integrated over time using an extended Kalman filter. The estimation of the scene structure is demonstrated experimentally in a motion control algorithm that allows the robot to move along a corridor. We demonstrate the efficacy of each individual method and their combination and show that the method allows for visual navigation in textured as well as un-textured environments. JA - IEEE/RSJ International Conference on Intelligent Robots and Systems, 2007. IROS 2007 PB - IEEE SN - 978-1-4244-0912-9 M3 - 10.1109/IROS.2007.4399568 ER - TY - CONF T1 - Compact, low power wireless sensor network system for line crossing recognition T2 - Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on Y1 - 2007 A1 - Shen,C. C A1 - Kupershtok,R. A1 - Yang,B. A1 - Vanin,F. M A1 - Shao,X. A1 - Sheth,D. A1 - Goldsman,N. A1 - Balzano,Q. A1 - Bhattacharyya, Shuvra S. JA - Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on ER - TY - JOUR T1 - COMPUTING PERFECT AND STABLE MODELS USING ORDERED MODEL TREES JF - Computational Intelligence Y1 - 2007 A1 - Fernández1,José Alberto A1 - Minker, Jack A1 - Yahya,Adnan KW - disjunctive database KW - model tree KW - ordered model tree KW - perfect model KW - stable model AB - Ordered model trees were introduced as a normal form for disjunctive deductive databases. They were also used to facilitate the computation of minimal models for disjunctive theories by exploiting the order imposed on the Herbrand base of the theory. In this work we show how the order on the Herbrand base can be used to compute perfect models of a disjunctive stratified finite theory. We are able to compute the stable models of a general finite theory by combining the order on the elements of the Herbrand base with previous results that had shown that the stable models of a theory T can be computed as the perfect models of a corresponding disjunctive theory ɛT resulting from applying the so called evidential transformation to T. While other methods consider many models that are rejected at the end, the use of atom ordering allows us to guarantee that every model generated belongs to the class of models being computed. As for negation-free databases, the ordered tree serves as the canonical representation of the database. VL - 11 SN - 1467-8640 UR - http://onlinelibrary.wiley.com/doi/10.1111/j.1467-8640.1995.tb00024.x/abstract CP - 1 M3 - 10.1111/j.1467-8640.1995.tb00024.x ER - TY - CONF T1 - Covering array sampling of input event sequences for automated gui testing T2 - Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering Y1 - 2007 A1 - Xun Yuan A1 - Cohen,Myra A1 - Memon, Atif M. KW - covering arrays KW - event driven software KW - GUI testing AB - This paper describes a new automated technique to generate test cases for GUIs by using covering arrays (CAs). The key motivation is to generate long GUI event sequences that are systematically sampled at a particular coverage strength. CAs, to date, have not been effectively used in sampling event driven systems such as GUIs which maintain state. We leverage a "stateless" abstraction of GUIs that allows us to use CAs. Once the CAs have been generated, we reuse the abstractions to reinsert ordering relationships between GUI events, thereby creating executable test cases. A feasibility study on a well-studied GUI-based application shows that the new technique is able to detect a large number of previously undetected faults JA - Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering T3 - ASE '07 PB - ACM CY - New York, NY, USA SN - 978-1-59593-882-4 UR - http://doi.acm.org/10.1145/1321631.1321695 M3 - 10.1145/1321631.1321695 ER - TY - JOUR T1 - Development of in-mold assembly process for realizing mesoscale revolute joints JF - Transactions of North American Manufacturing Research Institution of SME Y1 - 2007 A1 - Ananthanarayanan,A. A1 - Gupta,S.K. A1 - Bruck,H. A. A1 - Yu,Z. A1 - Rajurkar,K. P. AB - In-mold Assembly process at the mesoscalepresents several manufacturing challenges. Results reported in this paper demonstrate the technical feasibility of creating rigid body mesoscale revolute joints using In-Mold Assembly process. The following new results are reported in this paper. First, we describe a mold design with varying cavity shape to perform In-Mold Assembly. This mold design uses an accurate mold piece positioning method to avoid damage to delicate mesoscale parts during the cavity change step. Second, we describe a mold insert fabrication process for making mold inserts with the desired surface characteristics for mesoscale molding. Finally, we describe methods to limit the adhesion at the interfaces and hence create articulated revolute joint. Using the advances reported in this paper we have successfully molded a mesoscale revolute joint. To the best of our knowledge, this is the first demonstration of In-Mold Assembly process using a varying cavity shape mold to create a mesoscale revolute joint. VL - 35 UR - ftp://ftp.eng.umd.edu/:/home/glue/s/k/skgupta/pub/Publication/NAMRC07_Ananthanarayanan_draft.pdf ER - TY - CONF T1 - Direct-dependency-based software compatibility testing T2 - Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering Y1 - 2007 A1 - Yoon,Il-Chul A1 - Sussman, Alan A1 - Memon, Atif M. A1 - Porter, Adam KW - compatibility testing KW - component-based software system AB - Software compatibility testing is an important quality assurance task aimed at ensuring that component-based software systems build and/or execute properly across a broad range of user system configurations. Because each configuration can involve multiple components with different versions, and because there are complex and changing interdependencies between components and their versions, it is generally infeasible to test all potential configurations. Therefore, compatibility testing usually means examining only a handful of default or popular configurations to detect problems, and as a result costly errors can and do escape to the field This paper presents an improved approach to compatibility testing called RACHET. We formally model the configuration space for component-based systems and use the model to generate test plans covering user-specified portion of the space - the example in this paper is covering all it direct dependencies between components. The test plan is executed efficiently in parallel, by distributing work so as to best utilize test resources. We conducted experimentsand simulation studies applying our approach to a large-scale data management middleware system. The results showed that for this system RACHET discovered incompatibilities between components at a small fraction of the cost for exhaustive testing without compromising test quality JA - Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering T3 - ASE '07 PB - ACM CY - New York, NY, USA SN - 978-1-59593-882-4 UR - http://doi.acm.org/10.1145/1321631.1321696 M3 - 10.1145/1321631.1321696 ER - TY - CONF T1 - Efficiently Determining Silhouette Consistency T2 - Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on Y1 - 2007 A1 - Li Yi A1 - Jacobs, David W. KW - camera;scaled KW - consistency;image KW - miscalibrated KW - orthographic KW - problem;silhouette KW - projection;shape-from-silhouette KW - reconstruction; AB - Volume intersection is a frequently used technique to solve the Shape-From-Silhouette problem, which constructs a 3D object estimate from a set of silhouettes taken with calibrated cameras. It is natural to develop an efficient algorithm to determine the consistency of a set of silhouettes before performing time-consuming reconstruction, so that inaccurate silhouettes can be omitted. In this paper we first present a fast algorithm to determine the consistency of three silhouettes from known (but arbitrary) viewing directions, assuming the projection is scaled orthographic. The temporal complexity of the algorithm is linear in the number of points of the silhouette boundaries. We further prove that a set of more than three convex silhouettes are consistent if and only if any three of them are consistent. Another possible application of our approach is to determine the miscalibrated cameras in a large camera system. A consistent subset of cameras can be determined on the fly and miscalibrated cameras can also be recalibrated at a coarse scale. Real and synthesized data are used to demonstrate our results. JA - Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on M3 - 10.1109/CVPR.2007.383161 ER - TY - JOUR T1 - Evolution of genes and genomes on the Drosophila phylogeny JF - Nature Y1 - 2007 A1 - Clark,Andrew G. A1 - Eisen,Michael B. A1 - Smith,Douglas R. A1 - Bergman,Casey M. A1 - Oliver,Brian A1 - Markow,Therese A. A1 - Kaufman,Thomas C. A1 - Kellis,Manolis A1 - Gelbart,William A1 - Iyer,Venky N. A1 - Pollard,Daniel A. A1 - Sackton,Timothy B. A1 - Larracuente,Amanda M. A1 - Singh,Nadia D. A1 - Abad,Jose P. A1 - Abt,Dawn N. A1 - Adryan,Boris A1 - Aguade,Montserrat A1 - Akashi,Hiroshi A1 - Anderson,Wyatt W. A1 - Aquadro,Charles F. A1 - Ardell,David H. A1 - Arguello,Roman A1 - Artieri,Carlo G. A1 - Barbash,Daniel A. A1 - Barker,Daniel A1 - Barsanti,Paolo A1 - Batterham,Phil A1 - Batzoglou,Serafim A1 - Begun,Dave A1 - Bhutkar,Arjun A1 - Blanco,Enrico A1 - Bosak,Stephanie A. A1 - Bradley,Robert K. A1 - Brand,Adrianne D. A1 - Brent,Michael R. A1 - Brooks,Angela N. A1 - Brown,Randall H. A1 - Butlin,Roger K. A1 - Caggese,Corrado A1 - Calvi,Brian R. A1 - Carvalho,A. Bernardo de A1 - Caspi,Anat A1 - Castrezana,Sergio A1 - Celniker,Susan E. A1 - Chang,Jean L. A1 - Chapple,Charles A1 - Chatterji,Sourav A1 - Chinwalla,Asif A1 - Civetta,Alberto A1 - Clifton,Sandra W. A1 - Comeron,Josep M. A1 - Costello,James C. A1 - Coyne,Jerry A. A1 - Daub,Jennifer A1 - David,Robert G. A1 - Delcher,Arthur L. A1 - Delehaunty,Kim A1 - Do,Chuong B. A1 - Ebling,Heather A1 - Edwards,Kevin A1 - Eickbush,Thomas A1 - Evans,Jay D. A1 - Filipski,Alan A1 - Findei|[szlig]|,Sven A1 - Freyhult,Eva A1 - Fulton,Lucinda A1 - Fulton,Robert A1 - Garcia,Ana C. L. A1 - Gardiner,Anastasia A1 - Garfield,David A. A1 - Garvin,Barry E. A1 - Gibson,Greg A1 - Gilbert,Don A1 - Gnerre,Sante A1 - Godfrey,Jennifer A1 - Good,Robert A1 - Gotea,Valer A1 - Gravely,Brenton A1 - Greenberg,Anthony J. A1 - Griffiths-Jones,Sam A1 - Gross,Samuel A1 - Guigo,Roderic A1 - Gustafson,Erik A. A1 - Haerty,Wilfried A1 - Hahn,Matthew W. A1 - Halligan,Daniel L. A1 - Halpern,Aaron L. A1 - Halter,Gillian M. A1 - Han,Mira V. A1 - Heger,Andreas A1 - Hillier,LaDeana A1 - Hinrichs,Angie S. A1 - Holmes,Ian A1 - Hoskins,Roger A. A1 - Hubisz,Melissa J. A1 - Hultmark,Dan A1 - Huntley,Melanie A. A1 - Jaffe,David B. A1 - Jagadeeshan,Santosh A1 - Jeck,William R. A1 - Johnson,Justin A1 - Jones,Corbin D. A1 - Jordan,William C. A1 - Karpen,Gary H. A1 - Kataoka,Eiko A1 - Keightley,Peter D. A1 - Kheradpour,Pouya A1 - Kirkness,Ewen F. A1 - Koerich,Leonardo B. A1 - Kristiansen,Karsten A1 - Kudrna,Dave A1 - Kulathinal,Rob J. A1 - Kumar,Sudhir A1 - Kwok,Roberta A1 - Lander,Eric A1 - Langley,Charles H. A1 - Lapoint,Richard A1 - Lazzaro,Brian P. A1 - Lee,So-Jeong A1 - Levesque,Lisa A1 - Li,Ruiqiang A1 - Lin,Chiao-Feng A1 - Lin,Michael F. A1 - Lindblad-Toh,Kerstin A1 - Llopart,Ana A1 - Long,Manyuan A1 - Low,Lloyd A1 - Lozovsky,Elena A1 - Lu,Jian A1 - Luo,Meizhong A1 - Machado,Carlos A. A1 - Makalowski,Wojciech A1 - Marzo,Mar A1 - Matsuda,Muneo A1 - Matzkin,Luciano A1 - McAllister,Bryant A1 - McBride,Carolyn S. A1 - McKernan,Brendan A1 - McKernan,Kevin A1 - Mendez-Lago,Maria A1 - Minx,Patrick A1 - Mollenhauer,Michael U. A1 - Montooth,Kristi A1 - Mount, Stephen M. A1 - Mu,Xu A1 - Myers,Eugene A1 - Negre,Barbara A1 - Newfeld,Stuart A1 - Nielsen,Rasmus A1 - Noor,Mohamed A. F. A1 - O'Grady,Patrick A1 - Pachter,Lior A1 - Papaceit,Montserrat A1 - Parisi,Matthew J. A1 - Parisi,Michael A1 - Parts,Leopold A1 - Pedersen,Jakob S. A1 - Pesole,Graziano A1 - Phillippy,Adam M A1 - Ponting,Chris P. A1 - Pop, Mihai A1 - Porcelli,Damiano A1 - Powell,Jeffrey R. A1 - Prohaska,Sonja A1 - Pruitt,Kim A1 - Puig,Marta A1 - Quesneville,Hadi A1 - Ram,Kristipati Ravi A1 - Rand,David A1 - Rasmussen,Matthew D. A1 - Reed,Laura K. A1 - Reenan,Robert A1 - Reily,Amy A1 - Remington,Karin A. A1 - Rieger,Tania T. A1 - Ritchie,Michael G. A1 - Robin,Charles A1 - Rogers,Yu-Hui A1 - Rohde,Claudia A1 - Rozas,Julio A1 - Rubenfield,Marc J. A1 - Ruiz,Alfredo A1 - Russo,Susan A1 - Salzberg,Steven L. A1 - Sanchez-Gracia,Alejandro A1 - Saranga,David J. A1 - Sato,Hajime A1 - Schaeffer,Stephen W. A1 - Schatz,Michael C A1 - Schlenke,Todd A1 - Schwartz,Russell A1 - Segarra,Carmen A1 - Singh,Rama S. A1 - Sirot,Laura A1 - Sirota,Marina A1 - Sisneros,Nicholas B. A1 - Smith,Chris D. A1 - Smith,Temple F. A1 - Spieth,John A1 - Stage,Deborah E. A1 - Stark,Alexander A1 - Stephan,Wolfgang A1 - Strausberg,Robert L. A1 - Strempel,Sebastian A1 - Sturgill,David A1 - Sutton,Granger A1 - Sutton,Granger G. A1 - Tao,Wei A1 - Teichmann,Sarah A1 - Tobari,Yoshiko N. A1 - Tomimura,Yoshihiko A1 - Tsolas,Jason M. A1 - Valente,Vera L. S. A1 - Venter,Eli A1 - Venter,J. Craig A1 - Vicario,Saverio A1 - Vieira,Filipe G. A1 - Vilella,Albert J. A1 - Villasante,Alfredo A1 - Walenz,Brian A1 - Wang,Jun A1 - Wasserman,Marvin A1 - Watts,Thomas A1 - Wilson,Derek A1 - Wilson,Richard K. A1 - Wing,Rod A. A1 - Wolfner,Mariana F. A1 - Wong,Alex A1 - Wong,Gane Ka-Shu A1 - Wu,Chung-I A1 - Wu,Gabriel A1 - Yamamoto,Daisuke A1 - Yang,Hsiao-Pei A1 - Yang,Shiaw-Pyng A1 - Yorke,James A. A1 - Yoshida,Kiyohito A1 - Zdobnov,Evgeny A1 - Zhang,Peili A1 - Zhang,Yu A1 - Zimin,Aleksey V. A1 - Baldwin,Jennifer A1 - Abdouelleil,Amr A1 - Abdulkadir,Jamal A1 - Abebe,Adal A1 - Abera,Brikti A1 - Abreu,Justin A1 - Acer,St Christophe A1 - Aftuck,Lynne A1 - Alexander,Allen A1 - An,Peter A1 - Anderson,Erica A1 - Anderson,Scott A1 - Arachi,Harindra A1 - Azer,Marc A1 - Bachantsang,Pasang A1 - Barry,Andrew A1 - Bayul,Tashi A1 - Berlin,Aaron A1 - Bessette,Daniel A1 - Bloom,Toby A1 - Blye,Jason A1 - Boguslavskiy,Leonid A1 - Bonnet,Claude A1 - Boukhgalter,Boris A1 - Bourzgui,Imane A1 - Brown,Adam A1 - Cahill,Patrick A1 - Channer,Sheridon A1 - Cheshatsang,Yama A1 - Chuda,Lisa A1 - Citroen,Mieke A1 - Collymore,Alville A1 - Cooke,Patrick A1 - Costello,Maura A1 - D'Aco,Katie A1 - Daza,Riza A1 - Haan,Georgius De A1 - DeGray,Stuart A1 - DeMaso,Christina A1 - Dhargay,Norbu A1 - Dooley,Kimberly A1 - Dooley,Erin A1 - Doricent,Missole A1 - Dorje,Passang A1 - Dorjee,Kunsang A1 - Dupes,Alan A1 - Elong,Richard A1 - Falk,Jill A1 - Farina,Abderrahim A1 - Faro,Susan A1 - Ferguson,Diallo A1 - Fisher,Sheila A1 - Foley,Chelsea D. A1 - Franke,Alicia A1 - Friedrich,Dennis A1 - Gadbois,Loryn A1 - Gearin,Gary A1 - Gearin,Christina R. A1 - Giannoukos,Georgia A1 - Goode,Tina A1 - Graham,Joseph A1 - Grandbois,Edward A1 - Grewal,Sharleen A1 - Gyaltsen,Kunsang A1 - Hafez,Nabil A1 - Hagos,Birhane A1 - Hall,Jennifer A1 - Henson,Charlotte A1 - Hollinger,Andrew A1 - Honan,Tracey A1 - Huard,Monika D. A1 - Hughes,Leanne A1 - Hurhula,Brian A1 - Husby,M Erii A1 - Kamat,Asha A1 - Kanga,Ben A1 - Kashin,Seva A1 - Khazanovich,Dmitry A1 - Kisner,Peter A1 - Lance,Krista A1 - Lara,Marcia A1 - Lee,William A1 - Lennon,Niall A1 - Letendre,Frances A1 - LeVine,Rosie A1 - Lipovsky,Alex A1 - Liu,Xiaohong A1 - Liu,Jinlei A1 - Liu,Shangtao A1 - Lokyitsang,Tashi A1 - Lokyitsang,Yeshi A1 - Lubonja,Rakela A1 - Lui,Annie A1 - MacDonald,Pen A1 - Magnisalis,Vasilia A1 - Maru,Kebede A1 - Matthews,Charles A1 - McCusker,William A1 - McDonough,Susan A1 - Mehta,Teena A1 - Meldrim,James A1 - Meneus,Louis A1 - Mihai,Oana A1 - Mihalev,Atanas A1 - Mihova,Tanya A1 - Mittelman,Rachel A1 - Mlenga,Valentine A1 - Montmayeur,Anna A1 - Mulrain,Leonidas A1 - Navidi,Adam A1 - Naylor,Jerome A1 - Negash,Tamrat A1 - Nguyen,Thu A1 - Nguyen,Nga A1 - Nicol,Robert A1 - Norbu,Choe A1 - Norbu,Nyima A1 - Novod,Nathaniel A1 - O'Neill,Barry A1 - Osman,Sahal A1 - Markiewicz,Eva A1 - Oyono,Otero L. A1 - Patti,Christopher A1 - Phunkhang,Pema A1 - Pierre,Fritz A1 - Priest,Margaret A1 - Raghuraman,Sujaa A1 - Rege,Filip A1 - Reyes,Rebecca A1 - Rise,Cecil A1 - Rogov,Peter A1 - Ross,Keenan A1 - Ryan,Elizabeth A1 - Settipalli,Sampath A1 - Shea,Terry A1 - Sherpa,Ngawang A1 - Shi,Lu A1 - Shih,Diana A1 - Sparrow,Todd A1 - Spaulding,Jessica A1 - Stalker,John A1 - Stange-Thomann,Nicole A1 - Stavropoulos,Sharon A1 - Stone,Catherine A1 - Strader,Christopher A1 - Tesfaye,Senait A1 - Thomson,Talene A1 - Thoulutsang,Yama A1 - Thoulutsang,Dawa A1 - Topham,Kerri A1 - Topping,Ira A1 - Tsamla,Tsamla A1 - Vassiliev,Helen A1 - Vo,Andy A1 - Wangchuk,Tsering A1 - Wangdi,Tsering A1 - Weiand,Michael A1 - Wilkinson,Jane A1 - Wilson,Adam A1 - Yadav,Shailendra A1 - Young,Geneva A1 - Yu,Qing A1 - Zembek,Lisa A1 - Zhong,Danni A1 - Zimmer,Andrew A1 - Zwirko,Zac A1 - Jaffe,David B. A1 - Alvarez,Pablo A1 - Brockman,Will A1 - Butler,Jonathan A1 - Chin,CheeWhye A1 - Gnerre,Sante A1 - Grabherr,Manfred A1 - Kleber,Michael A1 - Mauceli,Evan A1 - MacCallum,Iain AB - Comparative analysis of multiple genomes in a phylogenetic framework dramatically improves the precision and sensitivity of evolutionary inference, producing more robust results than single-genome analyses can provide. The genomes of 12 Drosophila species, ten of which are presented here for the first time (sechellia, simulans, yakuba, erecta, ananassae, persimilis, willistoni, mojavensis, virilis and grimshawi), illustrate how rates and patterns of sequence divergence across taxa can illuminate evolutionary processes on a genomic scale. These genome sequences augment the formidable genetic tools that have made Drosophila melanogaster a pre-eminent model for animal genetics, and will further catalyse fundamental research on mechanisms of development, cell biology, genetics, disease, neurobiology, behaviour, physiology and evolution. Despite remarkable similarities among these Drosophila species, we identified many putatively non-neutral changes in protein-coding genes, non-coding RNA genes, and cis-regulatory regions. These may prove to underlie differences in the ecology and behaviour of these diverse species. VL - 450 SN - 0028-0836 UR - http://www.nature.com/nature/journal/v450/n7167/full/nature06341.html CP - 7167 M3 - 10.1038/nature06341 ER - TY - JOUR T1 - Genome Analysis Linking Recent European and African Influenza (H5N1) Viruses JF - Emerging Infectious DiseasesEmerg Infect Dis Y1 - 2007 A1 - Salzberg,Steven L. A1 - Kingsford, Carl A1 - Cattoli,Giovanni A1 - Spiro,David J. A1 - Janies,Daniel A. A1 - Aly,Mona Mehrez A1 - Brown,Ian H. A1 - Couacy-Hymann,Emmanuel A1 - De Mia,Gian Mario A1 - Dung,Do Huu A1 - Guercio,Annalisa A1 - Joannis,Tony A1 - Ali,Ali Safar Maken A1 - Osmani,Azizullah A1 - Padalino,Iolanda A1 - Saad,Magdi D. A1 - Savić,Vladimir A1 - Sengamalay,Naomi A. A1 - Yingst,Samuel A1 - Zaborsky,Jennifer A1 - Zorman-Rojs,Olga A1 - Ghedin,Elodie A1 - Capua,Ilaria AB - Although linked, these viruses are distinct from earlier outbreak strains., To better understand the ecology and epidemiology of the highly pathogenic avian influenza virus in its transcontinental spread, we sequenced and analyzed the complete genomes of 36 recent influenza A (H5N1) viruses collected from birds in Europe, northern Africa, and southeastern Asia. These sequences, among the first complete genomes of influenza (H5N1) viruses outside Asia, clearly depict the lineages now infecting wild and domestic birds in Europe and Africa and show the relationships among these isolates and other strains affecting both birds and humans. The isolates fall into 3 distinct lineages, 1 of which contains all known non-Asian isolates. This new Euro-African lineage, which was the cause of several recent (2006) fatal human infections in Egypt and Iraq, has been introduced at least 3 times into the European-African region and has split into 3 distinct, independently evolving sublineages. One isolate provides evidence that 2 of these sublineages have recently reassorted. VL - 13 SN - 1080-6040 CP - 5 M3 - 10.3201/eid1305.070013 ER - TY - JOUR T1 - Genome-wide expression profiling and bioinformatics analysis of diurnally regulated genes in the mouse prefrontal cortex JF - Genome Biology Y1 - 2007 A1 - Yang,Shuzhang A1 - Wang,Kai A1 - Valladares,Otto A1 - Hannenhalli, Sridhar A1 - Bucan,Maja AB - The prefrontal cortex is important in regulating sleep and mood. Diurnally regulated genes in the prefrontal cortex may be controlled by the circadian system, by sleep:wake states, or by cellular metabolism or environmental responses. Bioinformatics analysis of these genes will provide insights into a wide-range of pathways that are involved in the pathophysiology of sleep disorders and psychiatric disorders with sleep disturbances. VL - 8 SN - 1465-6906 UR - http://genomebiology.com/2007/8/11/R247 CP - 11 M3 - 10.1186/gb-2007-8-11-r247 ER - TY - CONF T1 - Geometry and Charge State of Mixed‐Ligand Au13 Nanoclusters T2 - X-RAY ABSORPTION FINE STRUCTURE - XAFS13: 13th International Conference Y1 - 2007 A1 - Frenkel, A. I. A1 - Menard, L. D. A1 - Northrup, P. A1 - Rodriguez, J. A. A1 - Zypman, F. A1 - Dana Dachman-Soled A1 - Gao, S.-P. A1 - Xu, H. A1 - Yang, J. C. A1 - Nuzzo, R. G. KW - Atom surface interactions KW - Charge transfer KW - Data analysis KW - Extended X-ray absorption fine structure spectroscopy KW - Gold KW - nanoparticles KW - Scanning transmission electron microscopy KW - Surface strains KW - Total energy calculations KW - X-ray absorption near edge structure AB - The integration of synthetic, experimental and theoretical tools into a self‐consistent data analysis methodology allowed us to develop unique new levels of detail in nanoparticle characterization. We describe our methods using an example of Au 13 monolayer‐protected clusters (MPCs), synthesized by ligand exchange methods. The combination of atom counting methods of scanning transmission electron microscopy and Au L3‐edge EXAFS allowed us to characterize these clusters as icosahedral, with surface strain reduced from 5% (as in ideal, regular icosahedra) to 3%, due to the interaction with ligands. Charge transfer from Au to the thiol and phosphine ligands was evidenced by S and P K‐edge XANES. A comparison of total energies of bare clusters of different geometries was performed by equivalent crystal theory calculations. JA - X-RAY ABSORPTION FINE STRUCTURE - XAFS13: 13th International Conference PB - AIP Publishing VL - 882 UR - http://scitation.aip.org/content/aip/proceeding/aipcp/10.1063/1.2644652 ER - TY - JOUR T1 - Human appearance modeling for matching across video sequences JF - Machine Vision and Applications Y1 - 2007 A1 - Yu,Y. A1 - Harwood,D. A1 - Yoon,K. A1 - Davis, Larry S. AB - We present an appearance model for establishing correspondence between tracks of people which may be taken at different places, at different times or across different cameras. The appearance model is constructed by kernel density estimation. To incorporate structural information and to achieve invariance to motion and pose, besides color features, an additional feature of path-length is used. To achieve illumination invariance, two types of illumination insensitive color features are discussed: brightness color feature and RGB rank feature. The similarity between a test image and an appearance model is measured by the information gain or Kullback–Leibler distance. To thoroughly represent the information contained in a video sequence with as little data as possible, a key frame selection and matching scheme is proposed. Experimental results demonstrate the important role of the path-length feature in the appearance model and the effectiveness of the proposed appearance model and matching method. VL - 18 CP - 3 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 3. Volvocales JF - Bangladesh Journal of Plant Taxonomy Y1 - 2007 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents 21 species of Chlamydomonas, four species of Carteria, two species of each of Nephroselmis, Pyramidomonas and Scherffelia, and Collodictyon triciliatum, Polytoma minus, Tetrachloridium ? allorgei and Tetraselmis cordiformis. These species have been reported from some ponds of Mathbaria of Pirojpur and Bakerganj of Barisal districts in Bangladesh. VL - 14 SN - 1028-2092 UR - http://www.banglajol.info/bd/index.php/BJPT/article/viewArticle/518 CP - 1 M3 - 10.3329/bjpt.v14i1.518 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 4. Chlorococcales JF - Bangladesh Journal of Plant Taxonomy Y1 - 2007 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasim,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents three species from each of Schroederia, Monoraphidium and Ankistrodesmus, two species and one variety of Dictyosphaerium, two varieties of Pediastrum, and Tetraedron arthrodesmiforme var. contorta, Chlorotetraedron polymorphum, Myrmecia aquatica, Oocystis tainoensis, Nephrocytium spirale, Kirchneriella irregularis, Coelastrum indicum and Scenedesmus similagineus. These taxa have been reported from some ponds of Mathbaria of Pirojpur and Bakerganj of Barisal Districts in Bangladesh. VL - 14 SN - 1028-2092 UR - http://www.banglajol.info/bd/index.php/BJPT/article/viewArticle/528 CP - 2 M3 - 10.3329/bjpt.v14i2.528 ER - TY - JOUR T1 - Object detection using a shape codebook JF - British Machine Vision Conference Y1 - 2007 A1 - Yu,X. A1 - Yi,L. A1 - Fermüller, Cornelia A1 - David Doermann AB - This paper presents a method for detecting categories of objects in real-worldimages. Given training images of an object category, our goal is to recognize and localize instances of those objects in a candidate image. The main contribution of this work is a novel structure of the shape code- book for object detection. A shape codebook entry consists of two compo- nents: a shape codeword and a group of associated vectors that specify the object centroids. Like their counterpart in language, the shape codewords are simple and generic such that they can be easily extracted from most object categories. The associated vectors store the geometrical relationships be- tween the shape codewords, which specify the characteristics of a particular object category. Thus they can be considered as the “grammar” of the shape codebook. In this paper, we use Triple-Adjacent-Segments (TAS) extracted from im- age edges as the shape codewords. Object detection is performed in a prob- abilistic voting framework. Experimental results on public datasets show performance similiar to the state-of-the-art, yet our method has significantly lower complexity and requires considerably less supervision in the training (We only need bounding boxes for a few training samples, do not need fig- ure/ground segmentation and do not need a validation dataset). VL - 4 ER - TY - CONF T1 - Object Detection Using Shape Codebook T2 - British Machine Vision Conference (BMVC'07) Y1 - 2007 A1 - Yu,Xiaodong A1 - Li,Yi A1 - Fermüller, Cornelia A1 - David Doermann AB - This paper presents a method for detecting categories of objects in real-world images. Given training images of an object category, our goal is to recognize and localize instances of those objects in a candidate image. The main contribution of this work is a novel structure of the shape codebook for object detection. A shape codebook entry consists of two components: a shape codeword and a group of associated vectors that specify the object centroids. Like their counterpart in language, the shape codewords are simple and generic such that they can be easily extracted from most object categories. The associated vectors store the geometrical relationships between the shape codewords, which specify the characteristics of a particular object category. Thus they can be considered as the “grammar” of the shape codebook. In this paper, we use Triple-Adjacent-Segments (TAS) extracted from image edges as the shape codewords. Object detection is performed in a probabilistic voting framework. Experimental results on public datasets show performance similar to the state-of-the-art, yet our method has significantly lower complexity and requires considerably less supervision in the training (We only need bounding boxes for a few training samples, do not need figure/ground segmentation and do not need a validation dataset). JA - British Machine Vision Conference (BMVC'07) PB - BMVC07 ER - TY - JOUR T1 - Pose-Encoded Spherical Harmonics for Face Recognition and Synthesis Using a Single Image JF - EURASIP Journal on Advances in Signal Processing Y1 - 2007 A1 - Yue,Zhanfeng A1 - Zhao,Wenyi A1 - Chellapa, Rama AB - Face recognition under varying pose is a challenging problem, especially when illumination variations are also present. In this paper, we propose to address one of the most challenging scenarios in face recognition. That is, to identify a subject from a test image that is acquired under different pose and illumination condition from only one training sample (also known as a gallery image) of this subject in the database. For example, the test image could be semifrontal and illuminated by multiple lighting sources while the corresponding training image is frontal under a single lighting source. Under the assumption of Lambertian reflectance, the spherical harmonics representation has proved to be effective in modeling illumination variations for a fixed pose. In this paper, we extend the spherical harmonics representation to encode pose information. More specifically, we utilize the fact that 2D harmonic basis images at different poses are related by close-form linear transformations, and give a more convenient transformation matrix to be directly used for basis images. An immediate application is that we can easily synthesize a different view of a subject under arbitrary lighting conditions by changing the coefficients of the spherical harmonics representation. A more important result is an efficient face recognition method, based on the orthonormality of the linear transformations, for solving the above-mentioned challenging scenario. Thus, we directly project a nonfrontal view test image onto the space of frontal view harmonic basis images. The impact of some empirical factors due to the projection is embedded in a sparse warping matrix; for most cases, we show that the recognition performance does not deteriorate after warping the test image to the frontal view. Very good recognition results are obtained using this method for both synthetic and challenging real images. VL - 2008 SN - 1687-6180 UR - http://asp.eurasipjournals.com/content/2008/1/748483 CP - 1 M3 - 10.1155/2008/748483 ER - TY - CONF T1 - Probabilistic go theories Y1 - 2007 A1 - Parker,A. A1 - Yaman,F. A1 - Nau, Dana S. A1 - V.S. Subrahmanian AB - There are numerous cases where we need to rea- son about vehicles whose intentions and itineraries are not known in advance to us. For example, Coast Guard agents tracking boats don’t always know where they are headed. Likewise, in drug en- forcement applications, it is not always clear where drug-carrying airplanes (which do often show up on radar) are headed, and how legitimate planes with an approved flight manifest can avoid them. Likewise, traffic planners may want to understand how many vehicles will be on a given road at a given time. Past work on reasoning about vehi- cles (such as the “logic of motion” by Yaman et. al. [Yaman et al., 2004]) only deals with vehicles whose plans are known in advance and don’t cap- ture such situations. In this paper, we develop a for- mal probabilistic extension of their work and show that it captures both vehicles whose itineraries are known, and those whose itineraries are not known. We show how to correctly answer certain queries against a set of statements about such vehicles. A prototype implementation shows our system to work efficiently in practice. UR - http://www.aaai.org/Papers/IJCAI/2007/IJCAI07-079.pdf ER - TY - JOUR T1 - Reliable Effects Screening: A Distributed Continuous Quality Assurance Process for Monitoring Performance Degradation in Evolving Software Systems JF - Software Engineering, IEEE Transactions on Y1 - 2007 A1 - Yilmaz,C. A1 - Porter, Adam A1 - Krishna,A. S A1 - Memon, Atif M. A1 - Schmidt,D. C A1 - Gokhale,A.S. A1 - Natarajan,B. KW - configuration subset KW - distributed continuous quality assurance process KW - evolving software systems KW - in house testing KW - main effects screening KW - performance bottlenecks KW - performance degradation monitoring KW - performance intensive software systems KW - process configuration KW - process execution KW - program testing KW - regression testing KW - reliable effects screening KW - software benchmarks KW - Software performance KW - software performance evaluation KW - Software quality KW - software reliability KW - tool support AB - Developers of highly configurable performance-intensive software systems often use in-house performance-oriented "regression testing" to ensure that their modifications do not adversely affect their software's performance across its large configuration space. Unfortunately, time and resource constraints can limit in-house testing to a relatively small number of possible configurations, followed by unreliable extrapolation from these results to the entire configuration space. As a result, many performance bottlenecks escape detection until systems are fielded. In our earlier work, we improved the situation outlined above by developing an initial quality assurance process called "main effects screening". This process 1) executes formally designed experiments to identify an appropriate subset of configurations on which to base the performance-oriented regression testing, 2) executes benchmarks on this subset whenever the software changes, and 3) provides tool support for executing these actions on in-the-field and in-house computing resources. Our initial process had several limitations, however, since it was manually configured (which was tedious and error-prone) and relied on strong and untested assumptions for its accuracy (which made its use unacceptably risky in practice). This paper presents a new quality assurance process called "reliable effects screening" that provides three significant improvements to our earlier work. First, it allows developers to economically verify key assumptions during process execution. Second, it integrates several model-driven engineering tools to make process configuration and execution much easier and less error prone. Third, we evaluate this process via several feasibility studies of three large, widely used performance-intensive software frameworks. Our results indicate that reliable effects screening can detect performance degradation in large-scale systems more reliably and with significantly less resources than conventional t- echniques VL - 33 SN - 0098-5589 CP - 2 M3 - 10.1109/TSE.2007.20 ER - TY - JOUR T1 - Report on the Fourth International Workshop on Data Management for Sensor Networks (DMSN 2007) JF - SIGMOD Rec. Y1 - 2007 A1 - Balazinska,Magdalena A1 - Deshpande, Amol A1 - Labrinidis,Alexandros A1 - Luo,Qiong A1 - Madden,Samuel A1 - Yang,Jun AB - Sensor networks enable an unprecedented level of access to the physical world, and hold tremendous potential to revolutionize many application domains. Research on sensor networks spans many areas of computer science, and there are now major conferences, e.g., IPSN and SenSys, devoted to sensor networks. However, there is no focused forum for discussion of early and innovative work on data management in sensor networks. The International Workshop on Data Management for Sensor Networks (DMSN), inaugurated in 2004, aims to fill this significant gap in the database and sensor network communities. VL - 36 SN - 0163-5808 UR - http://doi.acm.org/10.1145/1361348.1361362 CP - 4 M3 - 10.1145/1361348.1361362 ER - TY - JOUR T1 - Scalable protocols for authenticated group key exchange JF - Journal of Cryptology Y1 - 2007 A1 - Katz, Jonathan A1 - Yung,M. AB - We consider the problem of authenticated group key exchange among n parties communicating over an insecure public network. A number of solutions to this problem have been proposed; however, all prior provably secure solutions do not scale well and, in particular, require O(n) rounds. Our main contribution is the first scalable protocol for this problem along with a rigorous proof of security in the standard model under the DDH assumption; our protocol uses a constant number of rounds and requires only O(1) "full" modular exponentiations per user. Toward this goal (and adapting work of Bellare, Canetti, and Krawczyk), we first present an efficient compiler that transforms any group key-exchange protocol secure against a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls all communication in the network. This compiler adds only one round and O(1) communication (per user) to the original scheme. We then prove secure—against a passive adversary—a variant of the two-round group key-exchange protocol of Burmester and Desmedt. Applying our compiler to this protocol results in a provably secure three-round protocol for authenticated group key exchange which also achieves forward secrecy. VL - 20 CP - 1 M3 - 10.1007/s00145-006-0361-5 ER - TY - CONF T1 - Segmentation using Meta-texture Saliency T2 - Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on Y1 - 2007 A1 - Yacoob,Yaser A1 - Davis, Larry S. KW - analysis;image KW - colour KW - enhancement;image KW - image KW - image;salient KW - patches;image KW - segmentation;image KW - segmentation;meta-texture KW - surface-roughness;image KW - texture; AB - We address segmentation of an image into patches that have an underlying salient surface-roughness. Three intrinsic images are derived: reflectance, shading and meta- texture images. A constructive approach is proposed for computing a meta-texture image by preserving, equalizing and enhancing the underlying surface-roughness across color, brightness and illumination variations. We evaluate the performance on sample images and illustrate quantitatively that different patches of the same material, in an image, are normalized in their statistics despite variations in color, brightness and illumination. Finally, segmentation by line-based boundary-detection is proposed and results are provided and compared to known algorithms. JA - Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on M3 - 10.1109/ICCV.2007.4408930 ER - TY - JOUR T1 - Skoll: A Process and Infrastructure for Distributed Continuous Quality Assurance JF - Software Engineering, IEEE Transactions on Y1 - 2007 A1 - Porter, Adam A1 - Yilmaz,C. A1 - Memon, Atif M. A1 - Schmidt,D. C A1 - Natarajan,B. KW - ACE+TAO communication software package KW - component assembly KW - component deployment KW - distributed continuous quality assurance KW - distributed development teams KW - distributed processing KW - end-user customization KW - flexible product design KW - incremental development KW - object-oriented programming KW - Skoll KW - software engineering KW - Software quality KW - systems analysis AB - Software engineers increasingly emphasize agility and flexibility in their designs and development approaches. They increasingly use distributed development teams, rely on component assembly and deployment rather than green field code writing, rapidly evolve the system through incremental development and frequent updating, and use flexible product designs supporting extensive end-user customization. While agility and flexibility have many benefits, they also create an enormous number of potential system configurations built from rapidly changing component implementations. Since today's quality assurance (QA) techniques do not scale to handle highly configurable systems, we are developing and validating novel software QA processes and tools that leverage the extensive computing resources of user and developer communities in a distributed, continuous manner to improve software quality significantly. This paper provides several contributions to the study of distributed, continuous QA (DCQA). First, it shows the structure and functionality of Skoll, which is an environment that defines a generic around-the-world, around-the-clock QA process and several sophisticated tools that support this process. Second, it describes several novel QA processes built using the Skoll environment. Third, it presents two studies using Skoll: one involving user testing of the Mozilla browser and another involving continuous build, integration, and testing of the ACE+TAO communication software package. The results of our studies suggest that the Skoll environment can manage and control distributed continuous QA processes more effectively than conventional QA processes. For example, our DCQA processes rapidly identified problems that had taken the ACE+TAO developers much longer to find and several of which they had not found. Moreover, the automatic analysis of QA results provided developers information that enabled them to quickly find the root causes of problems VL - 33 SN - 0098-5589 CP - 8 M3 - 10.1109/TSE.2007.70719 ER - TY - CONF T1 - Using GUI Run-Time State as Feedback to Generate Test Cases T2 - Software Engineering, 2007. ICSE 2007. 29th International Conference on Y1 - 2007 A1 - Xun Yuan A1 - Memon, Atif M. KW - application under test KW - automated test case generation KW - Feedback KW - feedback-based technique KW - Graphical user interfaces KW - GUI run-time state KW - model-driven technique KW - open-source software KW - program testing KW - public domain software KW - reverse engineering KW - reverse-engineering algorithm KW - seed test suite AB - This paper presents a new automated model-driven technique to generate test cases by using feedback from the execution of a "seed test suite" on an application under test (AUT). The test cases in the seed suite are designed to be generated automatically and executed very quickly. During their execution, feedback obtained from the AUT's run-time state is used to generate new, "improved" test cases. The new test cases subsequently become part of the seed suite. This "anytime technique" continues iteratively, generating and executing additional test cases until resources are exhausted or testing goals have been met. The feedback-based technique is demonstrated for automated testing of graphical user interfaces (GUIs). An existing abstract model of the GUI is used to automatically generate the seed test suite. It is executed; during its execution, state changes in the GUI pinpoint important relationships between GUI events, which evolve the model and help to generate new test cases. Together with a reverse- engineering algorithm used to obtain the initial model and seed suite, the feedback-based technique yields a fully automatic, end-to-end GUI testing process. A feasibility study on four large fielded open-source software (OSS) applications demonstrates that this process is able to significantly improve existing techniques and help identify/report serious problems in the OSS. In response, these problems have been fixed by the developers of the OSS in subsequent versions. JA - Software Engineering, 2007. ICSE 2007. 29th International Conference on M3 - 10.1109/ICSE.2007.94 ER - TY - JOUR T1 - Appearance-based person recognition using color/path-length profile JF - Journal of Visual Communication and Image Representation Y1 - 2006 A1 - Yoon,K. A1 - Harwood,D. A1 - Davis, Larry S. VL - 17 CP - 3 ER - TY - JOUR T1 - Characterization of security notions for probabilistic private-key encryption JF - Journal of Cryptology Y1 - 2006 A1 - Katz, Jonathan A1 - Yung,M. AB - The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptography. Here, we focus on the case of private-key encryption. Extending security notions from the public-key setting, we define security in the sense of both indistinguishability and non-malleability against chosen-plaintext and chosen-ciphertext attacks, considering both non-adaptive (i.e., ``lunchtime'') and adaptive oracle access (adaptive here refers to an adversary's ability to interact with a given oracle even after viewing the challenge ciphertext). We then characterize the 18 resulting security notions in two ways. First, we construct a complete hierarchy of security notions; that is, for every pair of definitions we show whether one definition is stronger than the other, whether the definitions are equivalent, or whether they are incomparable. Second, we partition these notions of security into two classes (computational or information-theoretic) depending on whether one-way functions are necessary in order for encryption schemes satisfying the definition to exist. Perhaps our most surprising result is that security against adaptive chosen-plaintext attack is (polynomially) equivalent to security against non-adaptive chosen-plaintext attack. On the other hand, the ability of an adversary to mount a (non-adaptive) chosen-plaintext attack is the key feature distinguishing computational and information-theoretic notions of security. These results hold for all security notions considered here. VL - 19 CP - 1 M3 - 10.1007/s00145-005-0310-8 ER - TY - JOUR T1 - Covering arrays for efficient fault characterization in complex configuration spaces JF - IEEE Transactions on Software Engineering Y1 - 2006 A1 - Yilmaz,C. A1 - Cohen,M. B A1 - Porter, Adam ER - TY - JOUR T1 - Detection and analysis of hair JF - Pattern Analysis and Machine Intelligence, IEEE Transactions on Y1 - 2006 A1 - Yacoob,Yaser A1 - Davis, Larry S. KW - analysis;hair KW - appearance;image KW - AUTOMATIC KW - detection; KW - detection;hair KW - extraction;image KW - hair KW - indexing;multidimensional KW - recognition;face KW - recognition;feature KW - representation;object KW - representation;person AB - We develop computational models for measuring hair appearance for comparing different people. The models and methods developed have applications to person recognition and image indexing. An automatic hair detection algorithm is described and results reported. A multidimensional representation of hair appearance is presented and computational algorithms are described. Results on a data set of 524 subjects are reported. Identification of people using hair attributes is compared to eigenface-based recognition along with a joint, eigenface-hair-based identification VL - 28 SN - 0162-8828 CP - 7 M3 - 10.1109/TPAMI.2006.139 ER - TY - RPRT T1 - Development of a Large-Scale Integrated Neurocognitive Architecture - Part 2: Design and Architecture Y1 - 2006 A1 - Reggia, James A. A1 - Tagamets,M. A1 - Contreras-Vidal,J. A1 - Jacobs, David W. A1 - Weems,S. A1 - Naqvi,W. A1 - Winder,R. A1 - Chabuk,T. A1 - Jung,J. A1 - Yang,C. KW - Technical Report AB - In Part 1 of this report, we outlined a framework for creating an intelligent agentbased upon modeling the large-scale functionality of the human brain. Building on those results, we begin Part 2 by specifying the behavioral requirements of a large-scale neurocognitive architecture. The core of our long-term approach remains focused on creating a network of neuromorphic regions that provide the mechanisms needed to meet these requirements. However, for the short term of the next few years, it is likely that optimal results will be obtained by using a hybrid design that also includes symbolic methods from AI/cognitive science and control processes from the field of artificial life. We accordingly propose a three-tiered architecture that integrates these different methods, and describe an ongoing computational study of a prototype 'mini-Roboscout' based on this architecture. We also examine the implications of some non-standard computational methods for developing a neurocognitive agent. This examination included computational experiments assessing the effectiveness of genetic programming as a design tool for recurrent neural networks for sequence processing, and experiments measuring the speed-up obtained for adaptive neural networks when they are executed on a graphical processing unit (GPU) rather than a conventional CPU. We conclude that the implementation of a large-scale neurocognitive architecture is feasible, and outline a roadmap for achieving this goal. PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-2006-43 UR - http://drum.lib.umd.edu//handle/1903/3957 ER - TY - JOUR T1 - Employing the hand as an interface device JF - Journal of Multimedia Y1 - 2006 A1 - Sepehri,A. A1 - Yacoob,Yaser A1 - Davis, Larry S. VL - 1 CP - 7 ER - TY - JOUR T1 - Employing the Hand as an Interface Device JF - Journal of Multimedia Y1 - 2006 A1 - Sepehri,Afshin A1 - Yacoob,Yaser A1 - Davis, Larry S. AB - We propose algorithms and applications for using the hand as an interface device in virtual and physical spaces. In virtual drawing, by tracking the hand in 3-D and estimating a virtual plane in space, the intended drawing of user is recognized. In a virtual marble game, the instantaneous orientation of the hand is simulated to render a graphical scene of the game board. Real-time visual feedback allows the user to navigate a virtual ball in a maze. In 3-D model construction, the system tracks the hand motion in space while the user is traversing edges of a physical object. The object is then rendered virtually by the computer. These applications involve estimating the 3-D absolute position and/or orientation of the hand in space. We propose parametric modelling of the central region of the hand to extract this information. A stereo camera is used to first build a preliminary disparity map of the hand. Then, the best fitting plane to the disparity points is computed using robust estimation. The 3-D hand plane is calculated based on the disparity plane and the position and orientation parameters of the hand. Tracking the hand region over a sequence of frames and coping with noise using robust modelling of the hand motion enables estimating the trajectory of the hand in space. The algorithms are real-time and experiments are presented to demonstrate the proposed applications of using the hand as an interface device. VL - 1 SN - 1796-2048 UR - http://www.ojs.academypublisher.com/index.php/jmm/article/viewArticle/01071829 CP - 7 M3 - 10.4304/jmm.1.7.18-29 ER - TY - CHAP T1 - Existential Label Flow Inference Via CFL Reachability T2 - Static AnalysisStatic Analysis Y1 - 2006 A1 - Pratikakis,Polyvios A1 - Foster, Jeffrey S. A1 - Hicks, Michael W. ED - Yi,Kwangkeun AB - In programming languages, existential quantification is useful for describing relationships among members of a structured type. For example, we may have a list in which there exists some mutual exclusion lock l in each list element such that l protects the data stored in that element. With this information, a static analysis can reason about the relationship between locks and locations in the list even when the precise identity of the lock and/or location is unknown. To facilitate the construction of such static analyses, this paper presents a context-sensitive label flow analysis algorithm with support for existential quantification. Label flow analysis is a core part of many static analysis systems. Following Rehof et al, we use context-free language (CFL) reachability to develop an efficient O(n 3) label flow inference algorithm. We prove the algorithm sound by reducing its derivations to those in a system based on polymorphically-constrained types, in the style of Mossin. We have implemented a variant of our analysis as part of a data race detection tool for C programs. JA - Static AnalysisStatic Analysis T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 4134 SN - 978-3-540-37756-6 UR - http://dx.doi.org/10.1007/11823230_7 ER - TY - CONF T1 - Exploring erotics in Emily Dickinson's correspondence with text mining and visual interfaces T2 - Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries Y1 - 2006 A1 - Plaisant, Catherine A1 - Rose,James A1 - Yu,Bei A1 - Auvil,Loretta A1 - Kirschenbaum,Matthew G. A1 - Smith,Martha Nell A1 - Clement,Tanya A1 - Lord,Greg KW - case studies KW - humanities KW - literary criticism KW - text mining KW - user interface KW - Visualization AB - This paper describes a system to support humanities scholars in their interpretation of literary work. It presents a user interface and web architecture that integrates text mining, a graphical user interface and visualization, while attempting to remain easy to use by non specialists. Users can interactively read and rate documents found in a digital libraries collection, prepare training sets, review results of classification algorithms and explore possible indicators and explanations. Initial evaluation steps suggest that there is a rationale for "provocational" text mining in literary interpretation. JA - Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries T3 - JCDL '06 PB - ACM CY - New York, NY, USA SN - 1-59593-354-9 UR - http://doi.acm.org/10.1145/1141753.1141781 M3 - 10.1145/1141753.1141781 ER - TY - CONF T1 - Frequency Independent Flexible Spherical Beamforming Via Rbf Fitting T2 - 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings Y1 - 2006 A1 - Yerukhimovich,A. A1 - Duraiswami, Ramani A1 - Gumerov, Nail A. A1 - Zotkin,Dmitry N KW - acoustic signal processing KW - array signal processing KW - band-limited radial basis functions KW - Computer science KW - Educational institutions KW - Eigenvalues and eigenfunctions KW - Equations KW - Frequency KW - frequency independent beamformer weights KW - frequency independent flexible spherical beamforming KW - microphone arrays KW - Nails KW - Position measurement KW - RBF fitting KW - Robustness KW - sound analysis KW - spherical array data KW - spherical microphone array AB - We describe a new method for sound analysis using a spherical microphone array without the use of quadrature over the sphere. Quadrature based solutions are very sensitive to the placement of microphones on the sphere, needing measurements to be made at exactly the quadrature positions. We propose to use fitting with band-limited radial basis functions (RBFs) rather than quadrature. Our approach results in frequency independent beamformer weights for flexibly placed microphone locations. Results are demonstrated using both synthetic and real spherical array data JA - 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings PB - IEEE VL - 5 SN - 1-4244-0469-X M3 - 10.1109/ICASSP.2006.1661208 ER - TY - JOUR T1 - Fuzzy svm ensembles for relevance feedback in image retrieval JF - Image and Video Retrieval Y1 - 2006 A1 - Rao,Y. A1 - Mundur, Padma A1 - Yesha,Y. ER - TY - JOUR T1 - IDiexis: Mobile image-based search on world wide web-a picture is worth a thousand keywords JF - Proc. of Mobisys Y1 - 2006 A1 - Tollmar,K. A1 - Tom Yeh A1 - Darrell,T. AB - Images of objects as queries is a new approach to searchfor information on the web. Image-based information retrieval goes beyond only matching images, as information in other modalities also can be extracted from data collections using image search. We demonstrate a new system that uses images to search for web-based information. We introduce a point-by-photograph paradigm, where users can specify an object simply by taking pictures. Our technique uses content-based image retrieval methods to search the web or other databases for matching images and their source pages to find relevant location-based information. We have developed a prototype on a camera phone and conducted user studies to demonstrate the efficacy of our approach compared to other alternatives. ER - TY - JOUR T1 - Molecular Characterization of Serine-, Alanine-, and Proline-Rich Proteins of Trypanosoma cruzi and Their Possible Role in Host Cell Infection JF - Infect. Immun. Y1 - 2006 A1 - Baida,Renata C. P. A1 - Santos,Marcia R. M. A1 - Carmo,Mirian S. A1 - Yoshida,Nobuko A1 - Ferreira,Danielle A1 - Ferreira,Alice Teixeira A1 - El Sayed,Najib M. A1 - Andersson,Bjorn A1 - da Silveira,Jose Franco AB - We previously reported the isolation of a novel protein gene family, termed SAP (serine-, alanine-, and proline-rich protein), from Trypanosoma cruzi. Aided by the availability of the completed genome sequence of T. cruzi, we have now identified 39 full-length sequences of SAP, six pseudogenes and four partial genes. SAPs share a central domain of about 55 amino acids and can be divided into four groups based on their amino (N)- and carboxy (C)-terminal sequences. Some SAPs have conserved N- and C-terminal domains encoding a signal peptide and a glycosylphosphatidylinositol anchor addition site, respectively. Analysis of the expression of SAPs in metacyclic trypomastigotes by two-dimensional electrophoresis and immunoblotting revealed that they are likely to be posttranslationally modified in vivo. We have also demonstrated that some SAPs are shed into the extracellular medium. The recombinant SAP exhibited an adhesive capacity toward mammalian cells, where binding was dose dependent and saturable, indicating a possible ligand-receptor interaction. SAP triggered the host cell Ca2+ response required for parasite internalization. A cell invasion assay performed in the presence of SAP showed inhibition of internalization of the metacyclic forms of the CL strain. Taken together, these results show that SAP is involved in the invasion of mammalian cells by metacyclic trypomastigotes, and they confirm the hypothesis that infective trypomastigotes exploit an arsenal of surface glycoproteins and shed proteins to induce signaling events required for their internalization. VL - 74 UR - http://iai.asm.org/cgi/content/abstract/74/3/1537 CP - 3 M3 -

10.1128/IAI.74.3.1537-1546.2006

ER - TY - CONF T1 - Moving Object Verification from Airborne Video T2 - Computer Vision Systems, 2006 ICVS '06. IEEE International Conference on Y1 - 2006 A1 - Yue,Zhanfeng A1 - Chellapa, Rama A1 - Guarino, D. AB - This paper presents an end-to-end verification system for moving objects in airborne video. Lacking prior training data, the object information is collected on the fly from a short real-time learning sequence. Using a sample selection module, the system selects samples from the learning sequence and stores them in an exemplar database. To handle appearance change due to potentially large aspect angle variations, a homography-based view synthesis method is used to generate a novel view of each image in the exemplar database at the same pose as the query object in each frame of a query sequence. A spatial match score is obtained using a Distance Transform to compare the novel view and query object. After looping over all query frames, the set of match scores is passed to a temporal analysis module to examine the behavior of the query object, and calculate a final likelihood. Very good verification performance is achieved over thousands of trials for both color and infrared video sequences using the proposed system. JA - Computer Vision Systems, 2006 ICVS '06. IEEE International Conference on M3 - 10.1109/ICVS.2006.42 ER - TY - CONF T1 - Parametric Hand Tracking for Recognition of Virtual Drawings T2 - Computer Vision Systems, 2006 ICVS '06. IEEE International Conference on Y1 - 2006 A1 - Sepehri,A. A1 - Yacoob,Yaser A1 - Davis, Larry S. AB - A hand tracking system for recognition of virtual spatial drawings is presented. Using a stereo camera, the 3D position of the hand in space is estimated. Then, by tracking the central region of the hand in 3D and estimating a virtual plane in space, the intended drawing of the user is recognized. Experimental results demonstrate the accuracy and effectiveness of this technique. The system can be used to communicate drawings and alphabets to a computer where a classifier can transform the drawn alphabets into interpretable characters. JA - Computer Vision Systems, 2006 ICVS '06. IEEE International Conference on M3 - 10.1109/ICVS.2006.50 ER - TY - CONF T1 - PCFGs with syntactic and prosodic indicators of speech repairs T2 - Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics Y1 - 2006 A1 - Hale,John A1 - Shafran,Izhak A1 - Yung,Lisa A1 - Dorr, Bonnie J A1 - Harper,Mary A1 - Krasnyanskaya,Anna A1 - Lease,Matthew A1 - Liu,Yang A1 - Roark,Brian A1 - Snover,Matthew A1 - Stewart,Robin AB - A grammatical method of combining two kinds of speech repair cues is presented. One cue, prosodic disjuncture, is detected by a decision tree-based ensemble classifier that uses acoustic cues to identify where normal prosody seems to be interrupted (Lickley, 1996). The other cue, syntactic parallelism, codifies the expectation that repairs continue a syntactic category that was left unfinished in the reparandum (Levelt, 1983). The two cues are combined in a Treebank PCFG whose states are split using a few simple tree transformations. Parsing performance on the Switchboard and Fisher corpora suggests that these two cues help to locate speech repairs in a synergistic way. JA - Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics T3 - ACL-44 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dx.doi.org/10.3115/1220175.1220196 M3 - 10.3115/1220175.1220196 ER - TY - CONF T1 - Reranking for Sentence Boundary Detection in Conversational Speech T2 - 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings Y1 - 2006 A1 - Roark,B. A1 - Liu,Yang A1 - Harper,M. A1 - Stewart,R. A1 - Lease,M. A1 - Snover,M. A1 - Shafran,I. A1 - Dorr, Bonnie J A1 - Hale,J. A1 - Krasnyanskaya,A. A1 - Yung,L. KW - Automatic speech recognition KW - conversational speech KW - data mining KW - Ear KW - EARS metadata extraction tasks KW - Feature extraction KW - hidden Markov models KW - meta data KW - Model driven engineering KW - NIST KW - NIST RT-04F community evaluation KW - oracle accuracy KW - performance evaluation KW - reranking KW - sentence-like unit boundary detection KW - Speech processing KW - Speech recognition KW - Telephony AB - We present a reranking approach to sentence-like unit (SU) boundary detection, one of the EARS metadata extraction tasks. Techniques for generating relatively small n-best lists with high oracle accuracy are presented. For each candidate, features are derived from a range of information sources, including the output of a number of parsers. Our approach yields significant improvements over the best performing system from the NIST RT-04F community evaluation JA - 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings PB - IEEE VL - 1 SN - 1-4244-0469-X M3 - 10.1109/ICASSP.2006.1660078 ER - TY - JOUR T1 - Retroviral DNA Integration: Viral and Cellular Determinants of Target-Site Selection JF - PLoS PathogPLoS Pathog Y1 - 2006 A1 - Lewinski,Mary K A1 - Yamashita,Masahiro A1 - Emerman,Michael A1 - Ciuffi,Angela A1 - Marshall,Heather A1 - Crawford,Gregory A1 - Collins,Francis A1 - Shinn,Paul A1 - Leipzig,Jeremy A1 - Hannenhalli, Sridhar A1 - Berry,Charles C A1 - Ecker,Joseph R A1 - Bushman,Frederic D. AB - Retroviruses differ in their preferences for sites for viral DNA integration in the chromosomes of infected cells. Human immunodeficiency virus (HIV) integrates preferentially within active transcription units, whereas murine leukemia virus (MLV) integrates preferentially near transcription start sites and CpG islands. We investigated the viral determinants of integration-site selection using HIV chimeras with MLV genes substituted for their HIV counterparts. We found that transferring the MLV integrase (IN) coding region into HIV (to make HIVmIN) caused the hybrid to integrate with a specificity close to that of MLV. Addition of MLV gag (to make HIVmGagmIN) further increased the similarity of target-site selection to that of MLV. A chimeric virus with MLV Gag only (HIVmGag) displayed targeting preferences different from that of both HIV and MLV, further implicating Gag proteins in targeting as well as IN. We also report a genome-wide analysis indicating that MLV, but not HIV, favors integration near DNase I–hypersensitive sites (i.e., +/− 1 kb), and that HIVmIN and HIVmGagmIN also favored integration near these features. These findings reveal that IN is the principal viral determinant of integration specificity; they also reveal a new role for Gag-derived proteins, and strengthen models for integration targeting based on tethering of viral IN proteins to host proteins. VL - 2 UR - UR - http://dx.plos.org/10.1371/journal.ppat.0020060,http://dx.plos.org/10.1371/journal.ppat.0020060 CP - 6 M3 - 10.1371/journal.ppat.0020060 ER - TY - CONF T1 - A scalable key management and clustering scheme for ad hoc networks T2 - Proceedings of the 1st international conference on Scalable information systems Y1 - 2006 A1 - Li,Jason H. A1 - Levy,Renato A1 - Yu,Miao A1 - Bhattacharjee, Bobby AB - This paper describes a scalable key management and clustering scheme for secure group communications in ad hoc and sensor networks. The scalability problem is solved by partitioning the communicating devices into subgroups, with a leader in each subgroup, and further organizing the subgroups into hierarchies. Each level of the hierarchy is called a tier or layer. Key generation, distribution, and actual data transmissions follow the hierarchy. The Distributed, Efficient Clustering Approach (DECA) provides robust clustering to form subgroups, and analytical and simulation results demonstrate that DECA is energy-efficient and resilient against node mobility. Comparing with most other schemes, our approach is extremely scalable and efficient, provides more security guarantees, and is selective, adaptive and robust. JA - Proceedings of the 1st international conference on Scalable information systems T3 - InfoScale '06 PB - ACM CY - New York, NY, USA SN - 1-59593-428-6 UR - http://doi.acm.org/10.1145/1146847.1146875 M3 - 10.1145/1146847.1146875 ER - TY - JOUR T1 - Segmentation of planar objects and their shadows in motion sequences JF - International journal of computer vision Y1 - 2006 A1 - Yacoob,Yaser A1 - Davis, Larry S. AB - We investigate segmentation of planar objects and their cast shadows in image sequences. Given two moving image regions in an image sequence we present an algorithm for determining if the two moving regions can be interpreted as a planar object and its cast shadow. Projective geometry and motion properties are employed to directly recover a homology that constrains point correspondences of the outlines of the image regions and determine if they obey an object/shadow relationship. This homology is derived directly from the motions of the regions and therefore is easier to accomplish than determining point-to-point correspondences between candidate object-shadow pairs. Several experiments under approximate point light source illumination are presented. VL - 67 CP - 1 ER - TY - RPRT T1 - SOFTCBIR: Object Searching in Videos Combining Keypoint Matching and Graduated Assignment Y1 - 2006 A1 - Luo,Ming A1 - DeMenthon,Daniel A1 - Yu,Xiaodong A1 - David Doermann AB - This paper proposes a new approach to object searching in video databases, SoftCBIR, which combines a keypoint matching algorithm and a graduated assignment algorithm based on softassign. Compared with previous approaches, SoftCBIR is an innovative combination of two powerful techniques: 1) An energy minimization algorithm is applied to match two groups of keypoints while accounting for both their similarity in descriptor space and the consistency of their geometric configuration. The algorithm computes correspondence and pose transformation between two groups of keypoints iteratively and alternately toward an optimal result. The objective energy function combines normalized distance errors in descriptor space and in the spatial domain. 2) Initial individual keypoint matching relies on Approximate K-Nearest Neighbor (ANN) search. ANN achieves much more accurate initial keypoint matching results in the descriptor space than K-means labeling. Experiments prove the effectiveness of our approach, and demonstrate the performance improvements rising from the combination of the two proposed techniques in the SoftCBIR algorithm. The support of this research by the Department of Defense under contract MDA-9040-2C-0406 is gratefully acknowledged. PB - University of Maryland, College Park VL - LAMP-TR-132,CAR-TR-1013,CS-TR-4804,UMIACS-TR-2006-25 ER - TY - JOUR T1 - Techniques and processes for improving the quality and performance of open-source software JF - Software Process: Improvement and Practice Y1 - 2006 A1 - Porter, Adam A1 - Yilmaz,Cemal A1 - Memon, Atif M. A1 - Krishna,Arvind S. A1 - Schmidt,Douglas C. A1 - Gokhale,Aniruddha KW - distributed continuous quality assurance KW - open-source software development and testing AB - Open-source development processes have emerged as an effective approach to reduce cycle-time and decrease design, implementation, and quality assurance (QA) costs for certain types of software, particularly systems infrastructure software, such as operating systems (OS), compilers and language processing tools, text and drawing editors, and middleware. This article presents two contributions to the study of open-source software processes. First, we describe key challenges of open-source software and illustrate how QA processes—specifically those tailored to open-source development—help mitigate these challenges better than traditional closed-source processes do. Second, we summarize results of empirical studies that evaluate how our Skoll distributed continuous quality assurance (DCQA) techniques and processes help to resolve key challenges in developing and validating open-source software. Our results show that: (a) using models to configure and guide the DCQA process improves developer understanding of open-source software, (b) improving the diversity of platform configurations helps QA engineers find defects missed during conventional testing, and (c) centralizing control of QA activities helps to eliminate redundant work. Copyright © 2006 John Wiley & Sons, Ltd. VL - 11 SN - 1099-1670 UR - http://onlinelibrary.wiley.com/doi/10.1002/spip.260/abstract CP - 2 M3 - 10.1002/spip.260 ER - TY - CONF T1 - And away we go: understanding the complexity of launching complex HPC applications T2 - Proceedings of the second international workshop on Software engineering for high performance computing system applications Y1 - 2005 A1 - Yoon,Il-Chul A1 - Sussman, Alan A1 - Porter, Adam KW - development KW - high-performance KW - Productivity KW - software AB - Although not well-studied, launching HPC applications is extremely complex. To better understand the launching process, we conducted a simple case study. Based in part on this study and an examination of existing toolkits, we have begun to develop a prototype environment to support HPC application launching. JA - Proceedings of the second international workshop on Software engineering for high performance computing system applications T3 - SE-HPCS '05 PB - ACM CY - New York, NY, USA SN - 1-59593-117-1 UR - http://doi.acm.org/10.1145/1145319.1145333 M3 - 10.1145/1145319.1145333 ER - TY - JOUR T1 - Applications of SHOP and SHOP2 JF - Intelligent Systems, IEEE Y1 - 2005 A1 - Nau, Dana S. A1 - Au,T.-C. A1 - Ilghami,O. A1 - Kuter,U. A1 - Wu,D. A1 - Yaman,F. A1 - Munoz-Avila,H. A1 - Murdock,J. W. KW - automated planning KW - hierarchical task network planning KW - ordered task decomposition KW - planning (artificial intelligence) KW - problem solving KW - search-control strategy KW - simple hierarchical ordered planner KW - trees (mathematics) KW - uncertainty handling AB - We design the simple hierarchical ordered planner (SHOP) and its successor, SHOP2, with two goals in mind: to investigate research issues in automated planning and to provide some simple, practical planning tools. SHOP and SHOP2 are based on a planning formalism called hierarchical task network planning. SHOP and SHOP2 use a search-control strategy called ordered task decomposition, which breaks tasks into subtasks and generates the plan's actions in the same order that the plan executor executes them. So, throughout the planning process, the planner can tell what the state of the world at each step of the plan. VL - 20 SN - 1541-1672 CP - 2 M3 - 10.1109/MIS.2005.20 ER - TY - JOUR T1 - Bayesian filtering and integral image for visual tracking JF - Proceedings of the Worshop on Image Analysis for Multimedia Interactive Services (WIAMIS'05) Y1 - 2005 A1 - Han,B. A1 - Yang,C. A1 - Duraiswami, Ramani A1 - Davis, Larry S. AB - This paper describes contributions to two problems related tovisual tracking: control model design and observation process design. We describe the use of kernel-based Bayesian filtering for the tracking control procedure, and feature-based tracking to improve the observation process of tracking. In the kernel- based Bayesian filtering framework, the analytical represen- tation of density functions by density interpolation and density approximation for the likelihood and the posterior contributes to efficient sampling. Feature-based tracking combines rec- tangular features with edge oriented histogram so that the combined features are robust to illumination changes, partial occlusion, and clutter while capturing the spatial information of the target. The use of integral image allows the features to be efficiently evaluated. The effectiveness of both algorithms are demonstrated by object tracking results on real videos. ER - TY - JOUR T1 - A Comparison of Voice Controlled and Mouse Controlled Web Browsing (2000) JF - Institute for Systems Research Technical Reports Y1 - 2005 A1 - Christian,Kevin A1 - Kules,Bill A1 - Shneiderman, Ben A1 - Youssef,Adel KW - Technical Report AB - Voice controlled web browsers allow users to navigate by speaking the text of a link or an associated number instead of clicking with a mouse. One such browser is Conversa, by Conversational Computing. This within subjects study with 18 subjects compared voice browsing with traditional mouse-based browsing. It attempted to identify which of three common hypertext forms (linear slide show, grid/tiled map, and hierarchical menu) are well suited to voice navigation, and whether voice navigation is helped by numbering links. The study shows that voice control adds approximately 50 percent to the performance time for certain types of tasks. Subjective satisfaction measures indicate that for voice browsing, textual links are preferable to numbered links. UR - http://drum.lib.umd.edu/handle/1903/6475 ER - TY - JOUR T1 - Critical Factors Influencing the Occurrence of Vibrio Cholerae in the Environment of Bangladesh JF - Applied and Environmental MicrobiologyAppl. Environ. Microbiol. Y1 - 2005 A1 - Huq,Anwar A1 - Sack,R. Bradley A1 - Nizam,Azhar A1 - Longini,Ira M. A1 - Nair,G. Balakrish A1 - Ali,Afsar A1 - Morris,J. Glenn A1 - Khan,M. N. Huda A1 - Siddique,A. Kasem A1 - Yunus,Mohammed A1 - Albert,M. John A1 - Sack,David A. A1 - Rita R Colwell AB - The occurrence of outbreaks of cholera in Africa in 1970 and in Latin America in 1991, mainly in coastal communities, and the appearance of the new serotype Vibrio cholerae O139 in India and subsequently in Bangladesh have stimulated efforts to understand environmental factors influencing the growth and geographic distribution of epidemic Vibrio cholerae serotypes. Because of the severity of recent epidemics, cholera is now being considered by some infectious disease investigators as a “reemerging” disease, prompting new work on the ecology of vibrios. Epidemiological and ecological surveillance for cholera has been under way in four rural, geographically separated locations in Bangladesh for the past 4 years, during which both clinical and environmental samples were collected at biweekly intervals. The clinical epidemiology portion of the research has been published (Sack et al., J. Infect. Dis. 187:96-101, 2003). The results of environmental sampling and analysis of the environmental and clinical data have revealed significant correlations of water temperature, water depth, rainfall, conductivity, and copepod counts with the occurrence of cholera toxin-producing bacteria (presumably V. cholerae). The lag periods between increases or decreases in units of factors, such as temperature and salinity, and occurrence of cholera correlate with biological parameters, e.g., plankton population blooms. The new information on the ecology of V. cholerae is proving useful in developing environmental models for the prediction of cholera epidemics. VL - 71 SN - 0099-2240, 1098-5336 UR - http://aem.asm.org/content/71/8/4645 CP - 8 M3 - 10.1128/AEM.71.8.4645-4654.2005 ER - TY - CONF T1 - Detection, analysis and matching of hair T2 - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on Y1 - 2005 A1 - Yacoob,Yaser A1 - Davis, Larry S. KW - automatic hair detection KW - eigenface-based recognition KW - eigenface-hair based identification KW - Eigenvalues and eigenfunctions KW - face image indexing KW - face recognition KW - Feature extraction KW - hair analysis KW - hair appearance KW - hair attributes KW - hair matching KW - Image matching KW - image representation KW - multidimensional representation KW - person recognition AB - We develop computational models for measuring hair appearance for comparing different people. The models and methods developed have applications to person recognition and face image indexing. An automatic hair detection algorithm is described and results reported. A multidimensional representation of hair appearance is presented and computational algorithms are described. Results on a dataset of 524 subjects are reported. Identification of people using hair attributes is compared to eigenface-based recognition along with a joint, eigenface-hair based identification. JA - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on VL - 1 M3 - 10.1109/ICCV.2005.75 ER - TY - CONF T1 - Doubleshot: an interactive user-aided segmentation tool T2 - Proceedings of the 10th international conference on Intelligent user interfaces Y1 - 2005 A1 - Tom Yeh A1 - Darrell,Trevor KW - Computer vision KW - mobile application KW - Object recognition AB - In this paper, we describe an intelligent user interface designed for camera phones to allow mobile users to specify the object of interest in the scene simply by taking two pictures: one with the object and one without the object. By comparing these two images, the system can reliably extract the visual appearance of the object, which can be useful to a wide-range of applications such as content-based image retrieval and object recognition. JA - Proceedings of the 10th international conference on Intelligent user interfaces T3 - IUI '05 PB - ACM CY - New York, NY, USA SN - 1-58113-894-6 UR - http://doi.acm.org/10.1145/1040830.1040901 M3 - 10.1145/1040830.1040901 ER - TY - CONF T1 - DSP address optimization using evolutionary algorithms T2 - Proceedings of the 2005 workshop on Software and compilers for embedded systems Y1 - 2005 A1 - Leventhal,S. A1 - Yuan,L. A1 - Bambha,N. K A1 - Bhattacharyya, Shuvra S. A1 - Qu,G. JA - Proceedings of the 2005 workshop on Software and compilers for embedded systems ER - TY - JOUR T1 - Efficient kernel machines using the improved fast Gauss transform JF - Advances in neural information processing systems Y1 - 2005 A1 - Yang,C. A1 - Duraiswami, Ramani A1 - Davis, Larry S. AB - The computation and memory required for kernel machines with N train- ing samples is at least O(N 2). Such a complexity is significant even for moderate size problems and is prohibitive for large datasets. We present an approximation technique based on the improved fast Gauss transform to reduce the computation to O(N ). We also give an error bound for the approximation, and provide experimental results on the UCI datasets. VL - 17 ER - TY - CONF T1 - Efficient mean-shift tracking via a new similarity measure T2 - Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on Y1 - 2005 A1 - Yang,Changjiang A1 - Duraiswami, Ramani A1 - Davis, Larry S. KW - algorithm; KW - analysis; KW - Bhattacharyya KW - coefficient; KW - Color KW - colour KW - density KW - divergence; KW - estimates; KW - extraction; KW - fast KW - feature KW - frame-rate KW - Gauss KW - Gaussian KW - histograms; KW - image KW - Kernel KW - Kullback-Leibler KW - matching; KW - Mean-shift KW - measures; KW - nonparametric KW - processes; KW - sample-based KW - sequences; KW - similarity KW - spaces; KW - spatial-feature KW - tracking KW - tracking; KW - transform; AB - The mean shift algorithm has achieved considerable success in object tracking due to its simplicity and robustness. It finds local minima of a similarity measure between the color histograms or kernel density estimates of the model and target image. The most typically used similarity measures are the Bhattacharyya coefficient or the Kullback-Leibler divergence. In practice, these approaches face three difficulties. First, the spatial information of the target is lost when the color histogram is employed, which precludes the application of more elaborate motion models. Second, the classical similarity measures are not very discriminative. Third, the sample-based classical similarity measures require a calculation that is quadratic in the number of samples, making real-time performance difficult. To deal with these difficulties we propose a new, simple-to-compute and more discriminative similarity measure in spatial-feature spaces. The new similarity measure allows the mean shift algorithm to track more general motion models in an integrated way. To reduce the complexity of the computation to linear order we employ the recently proposed improved fast Gauss transform. This leads to a very efficient and robust nonparametric spatial-feature tracking algorithm. The algorithm is tested on several image sequences and shown to achieve robust and reliable frame-rate tracking. JA - Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on VL - 1 M3 - 10.1109/CVPR.2005.139 ER - TY - JOUR T1 - Extracting the frequencies of the pinna spectral notches in measured head related impulse responses JF - The Journal of the Acoustical Society of America Y1 - 2005 A1 - Raykar,Vikas C. A1 - Duraiswami, Ramani A1 - Yegnanarayana,B. KW - acoustic wave reflection KW - acoustic wave scattering KW - anthropometry KW - Ear KW - hearing KW - physiological models AB - The head related impulse response (HRIR) characterizes the auditory cues created by scattering of sound off a person’s anatomy. The experimentally measured HRIR depends on several factors such as reflections from body parts (torso, shoulder, and knees), head diffraction, and reflection/diffraction effects due to the pinna. Structural models (Algazi et al., 2002; Brown and Duda, 1998) seek to establish direct relationships between the features in the HRIR and the anatomy. While there is evidence that particular features in the HRIR can be explained by anthropometry, the creation of such models from experimental data is hampered by the fact that the extraction of the features in the HRIR is not automatic. One of the prominent features observed in the HRIR, and one that has been shown to be important for elevation perception, are the deep spectral notches attributed to the pinna. In this paper we propose a method to robustly extract the frequencies of the pinna spectral notches from the measured HRIR, distinguishing them from other confounding features. The method also extracts the resonances described by Shaw (1997). The techniques are applied to the publicly available CIPIC HRIR database (Algazi et al., 2001c). The extracted notch frequencies are related to the physical dimensions and shape of the pinna. VL - 118 UR - http://link.aip.org/link/?JAS/118/364/1 CP - 1 M3 - 10.1121/1.1923368 ER - TY - JOUR T1 - Fast Computation of Sums of Gaussians in High Dimensions JF - Technical Reports from UMIACS UMIACS-TR-2005-69 Y1 - 2005 A1 - Raykar,Vikas Chandrakant A1 - Yang,Changjaing A1 - Duraiswami, Ramani A1 - Gumerov, Nail A. KW - Technical Report AB - Evaluating sums of multivariate Gaussian kernels is a key computational task in many problems in computational statistics andmachine learning. The computational cost of the direct evaluation of such sums scales as the product of the number of kernel functions and the evaluation points. The fast Gauss transform proposed by Greengard and Strain (1991) is a $\epsilon$-exact approximation algorithm that reduces the computational complexity of the evaluation of the sum of $N$ Gaussians at $M$ points in $d$ dimensions from $\mathcal{O}(MN)$ to $\mathcal{O}(M+N)$. However, the constant factor in $\mathcal{O}(M+N)$ grows exponentially with increasing dimensionality $d$, which makes the algorithm impractical for dimensions greater than three. In this paper we present a new algorithm where the constant factor is reduced to asymptotically polynomial order. The reduction is based on a new multivariate Taylor's series expansion (which can act both as a local as well as a far field expansion) scheme combined with the efficient space subdivision using the $k$-center algorithm. The proposed method differs from the original fast Gauss transform in terms of a different factorization, efficient space subdivision, and the use of point-wise error bounds. Algorithm details, error bounds, procedure to choose the parameters and numerical experiments are presented. As an example we shows how the proposed method can be used for very fast $\epsilon$-exact multivariate kernel density estimation. UR - http://drum.lib.umd.edu/handle/1903/3020 ER - TY - CONF T1 - Fast multiple object tracking via a hierarchical particle filter T2 - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on Y1 - 2005 A1 - Yang,Changjiang A1 - Duraiswami, Ramani A1 - Davis, Larry S. KW - (numerical KW - algorithm; KW - analysis; KW - Color KW - colour KW - Computer KW - Convergence KW - detection; KW - edge KW - fast KW - filter; KW - Filtering KW - hierarchical KW - histogram; KW - image KW - images; KW - integral KW - likelihood; KW - methods); KW - methods; KW - multiple KW - numerical KW - object KW - observation KW - of KW - orientation KW - particle KW - processes; KW - quasirandom KW - random KW - sampling; KW - tracking KW - tracking; KW - vision; KW - visual AB - A very efficient and robust visual object tracking algorithm based on the particle filter is presented. The method characterizes the tracked objects using color and edge orientation histogram features. While the use of more features and samples can improve the robustness, the computational load required by the particle filter increases. To accelerate the algorithm while retaining robustness we adopt several enhancements in the algorithm. The first is the use of integral images for efficiently computing the color features and edge orientation histograms, which allows a large amount of particles and a better description of the targets. Next, the observation likelihood based on multiple features is computed in a coarse-to-fine manner, which allows the computation to quickly focus on the more promising regions. Quasi-random sampling of the particles allows the filter to achieve a higher convergence rate. The resulting tracking algorithm maintains multiple hypotheses and offers robustness against clutter or short period occlusions. Experimental results demonstrate the efficiency and effectiveness of the algorithm for single and multiple object tracking. JA - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on VL - 1 M3 - 10.1109/ICCV.2005.95 ER - TY - JOUR T1 - Gait-based human identification using appearance matching JF - Optical and Digital Techniques for Information Security Y1 - 2005 A1 - Kale, A. A1 - Cuntoor, N. A1 - Yegnanarayana,B. A1 - Rajagopalan, A. A1 - Chellapa, Rama AB - In this chapter, we present an appearance-based approach for recognizing human gait. Given the gait video of an individual, the images are binarized and the width of the outer contour of the silhouette of that individual is obtained for each image frame. Several gait features are derived from this basic width vector. Temporally ordered sequences of the feature vectors are then used to represent the gait of a person. While matching the feature templates for recognition, dynamic time-warping (DTW), which is a nonlinear time-normalization technique, is used to deal with naturally occurring changes in the walking speeds of individuals. The performance of the proposed method is tested on indoor as well as outdoor gait databases, and the efficacy of different gait features and their noise resilience is studied. The experiments also demonstrate the effect of change in the viewing angle and frame rate of data capture on the accuracy of gait recognition. ER - TY - JOUR T1 - Geometric algorithms for computing cutter engagement functions in 2.5D milling operations JF - Computer-Aided Design Y1 - 2005 A1 - Gupta, Satyandra K. A1 - Saini,Sunil K. A1 - Spranklin,Brent W. A1 - Yao,Zhiyang KW - Cutter engagement KW - Cutter path planning KW - Feed rate adjustments AB - Cutter engagement is a measure that describes what portion of the cutter is involved in machining at a given instant of time. During profile milling of complex geometries, cutter engagement varies significantly along the cutter path. Cutter engagement information helps in determining the efficiency of the cutter path and also helps in improving it by adjusting the feed rate. This paper describes geometric algorithms for computing piece-wise continuous closed-form cutter engagement functions for 2.5D milling operations. The results produced by our algorithm are compared with the results obtained by discrete simulations of the cutting process and appear to match very well. VL - 37 SN - 0010-4485 UR - http://www.sciencedirect.com/science/article/pii/S0010448505000801 CP - 14 M3 - 10.1016/j.cad.2005.03.001 ER - TY - CONF T1 - Going far, logically Y1 - 2005 A1 - Yaman,F. A1 - Nau, Dana S. A1 - V.S. Subrahmanian AB - There are numerous applications where we need toensure that multiple moving objects are sufficiently far apart. Furthermore, in many moving object do- mains, there is positional indeterminacy — we are not 100% sure exactly when a given moving object will be at a given location. [Yaman et al., 2004] provided a logic of motion but did not provide algo- rithms to ensure that moving objects are kept suf- ficiently far apart. In this paper, we extend their logic to include a “far” predicate. We develop the CheckFar algorithm that checks if any given two objects will always be sufficiently far apart at dur- ing a time interval. We have run a set of experi- ments showing that our CheckFar algorithm scales very well. VL - 19 UR - http://www.cs.umd.edu/~nau/papers/yaman2005going.pdf ER - TY - JOUR T1 - Interpretation of state sequences in HMM for activity representation JF - Proc. IEEE Conf. Acoustic Speech and Signal Processing Y1 - 2005 A1 - Cuntoor, N.P. A1 - Yegnanarayana,B. A1 - Chellapa, Rama AB - We propose a method for activity representation based on seman-tic events, using the HMM framework. For every time instant, the probability of event occurrence is computed by exploring a subset of state sequences. The idea is that while activity trajectories may have large variations at the data or the state levels, they may ex- hibit similarities at the event level. Our experiments show the ap- plication of these events to activity recognition in an office envi- ronment and to anomalous trajectory detection using surveillance video data. VL - 2 ER - TY - JOUR T1 - Johns Hopkins summer workshop final report on parsing and spoken structural event detection JF - Johns Hopkins University, Tech. Rep Y1 - 2005 A1 - Harper,MP A1 - Dorr, Bonnie J A1 - Hale,J. A1 - Roark,B. A1 - Shafran,I. A1 - Lease,M. A1 - Liu,Y. A1 - Snover,M. A1 - Yung,L. A1 - Krasnyanskaya,A. AB - This report describes research conducted by the Parsing and Spoken Structural Event Detection(PaSSED) team as part of the 2005 Johns Hopkins Summer Workshop on Language Engineering. This project investigated the interaction between parsing and the detection of structural metadata in conversational speech, including sentence boundaries, edits (the reparandum portion of speech repairs), and fillers. In terms of parsing, we explored alternative methods of exploiting metadata information in parsing models and measured how varying accuracy in transcription and metadata information affects parsing accuracy. In the other direction, we similarly considered how syntactic and prosodic knowledge could be leveraged in metadata detection, measuring how this knowledge impacts metadata detection accuracy. As part of this work, we investigated metrics for evaluating parse accuracy in the presence of tran- scription and metadata detection errors, and we report on our experience using these metrics with several parsers and across varying experimental conditions. A range of methods for handling edits during pars- ing were evaluated in this research (excision, addition of markups to the input string, and grammar modification). We also developed a ToBI (a prosodic structure annotation scheme [SBP+92]) prosodic event classifier and describe its evaluation. Finally, we present methods for effective n-best sentence boundary candidate generation and reranking using syntactic, prosodic, and other features. These stud- ies are complemented by a second set of reranking investigations wherein we optimize sentence boundary detection explicitly to improve parse accuracy. The PaSSED project has: • investigated various techniques to enhance parsing of speech given metadata detection on conver- sational speech; • defined metrics for evaluating speech parsing accuracy, implemented them in the publically avail- able SParseval software package, and evaluated them under a wide variety of conditions; • recast SU detection as an n-best reranking problem with a relatively small n. Using this approach, we demonstrated significant improvements over a very strong baseline SU detection system. • reported on the interaction between parsing and metadata detection and their synergy; • fostered new collaborations and identified a number of interesting avenues for future work. ER - TY - CONF T1 - Main effects screening T2 - Proceedings of the 27th international conference on Software engineering - ICSE '05 Y1 - 2005 A1 - Yilmaz,Cemal A1 - Krishna,Arvind S. A1 - Memon, Atif M. A1 - Porter, Adam A1 - Schmidt,Douglas C. A1 - Gokhale,Aniruddha A1 - Natarajan,Balachandran JA - Proceedings of the 27th international conference on Software engineering - ICSE '05 CY - St. Louis, MO, USA UR - http://dl.acm.org/citation.cfm?id=1062515 M3 - 10.1145/1062455.1062515 ER - TY - CONF T1 - Main effects screening: a distributed continuous quality assurance process for monitoring performance degradation in evolving software systems T2 - Proceedings of the 27th international conference on Software engineering Y1 - 2005 A1 - Yilmaz,Cemal A1 - Krishna,Arvind S. A1 - Memon, Atif M. A1 - Porter, Adam A1 - Schmidt,Douglas C. A1 - Gokhale,Aniruddha A1 - Natarajan,Balachandran KW - design of experiment theory KW - distributed continuous quality assurance KW - performance-oriented regression testing AB - Developers of highly configurable performance-intensive software systems often use a type of in-house performance-oriented "regression testing" to ensure that their modifications have not adversely affected their software's performance across its large configuration space. Unfortunately, time and resource constraints often limit developers to in-house testing of a small number of configurations and unreliable extrapolation from these results to the entire configuration space, which allows many performance bottlenecks and sources of QoS degradation to escape detection until systems are fielded. To improve performance assessment of evolving systems across large configuration spaces, we have developed a distributed continuous quality assurance (DCQA) process called main effects screening that uses in-the-field resources to execute formally designed experiments to help reduce the configuration space, thereby allowing developers to perform more targeted in-house QA. We have evaluated this process via several feasibility studies on several large, widely-used performance-intensive software systems. Our results indicate that main effects screening can detect key sources of performance degradation in large-scale systems with significantly less effort than conventional techniques. JA - Proceedings of the 27th international conference on Software engineering T3 - ICSE '05 PB - ACM CY - New York, NY, USA SN - 1-58113-963-2 UR - http://doi.acm.org/10.1145/1062455.1062515 M3 - 10.1145/1062455.1062515 ER - TY - PAT T1 - Method and system for providing physical security in an area of interest Y1 - 2005 A1 - Agrawala, Ashok K. A1 - Youssef,Moustafa Amin A1 - Shahamat,Layla AB - A system for detecting the presence of an intruder in a protected area utilizes a received signal strength indicator (RSSI) value of signals broadcast from transmitting stations deployed in the protected area. The system includes monitoring points for receiving broadcast signals, measuring the RSSI values of the received signals, and transmitting the measured RSSI values to a security system server. The security system server analyzes the RSSI values, and initiates security measures when the physical security of the protected area is violated which is detected when the measured RSSI values deviate from a predetermined strength of the broadcast signals. The security system also has the ability to track objects in the protected area and keep track of their movement in real time and report such movement. The system may be based on a Wi-Fi infrastructure in the protected area. VL - 10/916,545 UR - http://www.google.com/patents?id=VIaWAAAAEBAJ ER - TY - CONF T1 - Model of Object-Based Coding for Surveillance Video T2 - Proceedings in the ICASSP'04 IEEE International Conference on Computer Vision Y1 - 2005 A1 - Yu,Yang A1 - David Doermann AB - In this paper, we explore the model of potential savingsof object-based coding for surveillance video. Moving foreground objects in stationary camera surveillance video are detected by a background subtraction technique [3] and encoded with MPEG-4 object-based coding. Experiment results show that compared with frame-based coding, object-based coding can achieve significant savings which are dependent on the video content. We further model the relationship of compression efficiency and the number and size of video objects using statistical learning method. Simulations show that the model is representative. The model can be used to predict the savings of object-based coding and select the coding methods for surveillance video. JA - Proceedings in the ICASSP'04 IEEE International Conference on Computer Vision ER - TY - CONF T1 - A motion closed world asumption Y1 - 2005 A1 - Yaman,F. A1 - Nau, Dana S. A1 - V.S. Subrahmanian AB - Yaman et. al. [Yaman et al., 2004] introduce “gotheories” to reason about moving objects. In this paper, we show that this logic often does not allow us to infer that an object is not present at a given place or region, even though common sense would dictate that this is a reasonable inference to make. We define a class of models of go-theories called coherent models. We use this concept to define a motion closed world assumption (MCWA) and de- velop a notion of MCWA-entailment. We show that checking if a go-theory has a coherent model is NP-complete. An in atom checks if a given ob- ject is present in a given region sometime in a given time interval. We provide sound and complete al- gorithms to check if a ground in literal (positive or negative in atom) can be inferred from a go- theory using the MCWA. In our experiments our algorithms answer such queries in less than 1 sec- ond when there are up to 1,000 go-atoms per object. VL - 19 UR - http://ijcai.org/papers/1227.pdf ER - TY - CONF T1 - A picture is worth a thousand keywords: image-based object search on a mobile platform T2 - CHI '05 extended abstracts on Human factors in computing systems Y1 - 2005 A1 - Tom Yeh A1 - Grauman,Kristen A1 - Tollmar,Konrad A1 - Darrell,Trevor KW - content-based image retrieval KW - interactive segmentation KW - mobile interface KW - Object recognition AB - Finding information based on an object's visual appearance is useful when specific keywords for the object are not known. We have developed a mobile image-based search system that takes images of objects as queries and finds relevant web pages by matching them to similar images on the web. Image-based search works well when matching full scenes, such as images of buildings or landmarks, and for matching objects when the boundary of the object in the image is available. We demonstrate the effectiveness of a simple interactive paradigm for obtaining a segmented object boundary, and show how a shape-based image matching algorithm can use the object outline to find similar images on the web. JA - CHI '05 extended abstracts on Human factors in computing systems T3 - CHI EA '05 PB - ACM CY - New York, NY, USA SN - 1-59593-002-7 UR - http://doi.acm.org/10.1145/1056808.1057083 M3 - 10.1145/1056808.1057083 ER - TY - CHAP T1 - Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image T2 - Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures Y1 - 2005 A1 - Yue,Zhanfeng A1 - Zhao,Wenyi A1 - Chellapa, Rama ED - Zhao,Wenyi ED - Gong,Shaogang ED - Tang,Xiaoou AB - Face recognition under varying pose is a challenging problem, especially when illumination variations are also present. Under Lambertian model, spherical harmonics representation has proved to be effective in modelling illumination variations for a given pose. In this paper, we extend the spherical harmonics representation to encode pose information. More specifically, we show that 2D harmonic basis images at different poses are related by close-form linear combinations. This enables an analytic method for generating new basis images at a different pose which are typically required to handle illumination variations at that particular pose. Furthermore, the orthonormality of the linear combinations is utilized to propose an efficient method for robust face recognition where only one set of front-view basis images per subject is stored. In the method, we directly project a rotated testing image onto the space of front-view basis images after establishing the image correspondence. Very good recognition results have been demonstrated using this method. JA - Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 3723 SN - 978-3-540-29229-6 UR - http://dx.doi.org/10.1007/11564386_18 ER - TY - JOUR T1 - Pose-normalized view synthesis from silhouettes JF - IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP) Y1 - 2005 A1 - Yue, Z. A1 - Chellapa, Rama AB - In this paper, we introduce an active view synthesis approachfrom silhouettes. With the virtual camera moving on a properly se- lected circular trajectory around an object of interest, we achieve a collection of virtual views of the object, which is equivalent to the case that the object is on a rotating turntable and captured by a static camera whose optical axis is parallel to the turntable. We show how to derive the virtual camera’s extrinsic parameters at each position on the trajectory. Using the turning function dis- tance as the silhouette similarity measurement, this approach can be used to generate the desired pose-normalized images for recog- nition applications. ER - TY - CHAP T1 - Probabilistic Ontologies and Relational Databases T2 - On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE Y1 - 2005 A1 - Udrea,Octavian A1 - Yu,Deng A1 - Hung,Edward A1 - Subrahmanian,V. ED - Meersman,Robert ED - Tari,Zahir KW - Computer KW - Science AB - The relational algebra and calculus do not take the semantics of terms into account when answering queries. As a consequence, not all tuples that should be returned in response to a query are always returned, leading to low recall. In this paper, we propose the novel notion of a constrained probabilistic ontology (CPO). We developed the concept of a CPO-enhanced relation in which each attribute of a relation has an associated CPO. These CPOs describe relationships between terms occurring in the domain of that attribute. We show that the relational algebra can be extended to handle CPO-enhanced relations. This allows queries to yield sets of tuples, each of which has a probability of being correct. JA - On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 3760 SN - 978-3-540-29736-9 UR - http://dx.doi.org/10.1007/11575771_1 ER - TY - JOUR T1 - Processing of reverberant speech for time-delay estimation JF - IEEE Transactions on Speech and Audio Processing Y1 - 2005 A1 - Yegnanarayana,B. A1 - Prasanna,S. R.M A1 - Duraiswami, Ramani A1 - Zotkin,Dmitry N KW - Acoustic noise KW - acoustic signal processing KW - array signal processing KW - data mining KW - Degradation KW - delay estimation KW - Feature extraction KW - Hilbert envelope KW - localization algorithm KW - microphone arrays KW - microphone location KW - Microphones KW - Phase estimation KW - reverberation KW - short-time spectral information KW - Signal processing KW - source features KW - source information excitation KW - speech enhancement KW - Speech processing KW - speech production mechanism KW - speech signal KW - time-delay KW - time-delay estimation AB - In this paper, we present a method of extracting the time-delay between speech signals collected at two microphone locations. Time-delay estimation from microphone outputs is the first step for many sound localization algorithms, and also for enhancement of speech. For time-delay estimation, speech signals are normally processed using short-time spectral information (either magnitude or phase or both). The spectral features are affected by degradations in speech caused by noise and reverberation. Features corresponding to the excitation source of the speech production mechanism are robust to such degradations. We show that these source features can be extracted reliably from the speech signal. The time-delay estimate can be obtained using the features extracted even from short segments (50-100 ms) of speech from a pair of microphones. The proposed method for time-delay estimation is found to perform better than the generalized cross-correlation (GCC) approach. A method for enhancement of speech is also proposed using the knowledge of the time-delay and the information of the excitation source. VL - 13 SN - 1063-6676 CP - 6 M3 - 10.1109/TSA.2005.853005 ER - TY - JOUR T1 - Robust routing in malicious environment for ad hoc networks JF - Information Security Practice and Experience Y1 - 2005 A1 - Yu,Z. A1 - Seng,C. Y A1 - Jiang,T. A1 - Wu,X. A1 - Arbaugh, William A. ER - TY - JOUR T1 - ROMER: resilient opportunistic mesh routing for wireless mesh networks JF - Proc. of IEEE WiMesh Y1 - 2005 A1 - Yuan,Y. A1 - Yang,H. A1 - Wong,S. H.Y A1 - Lu,S. A1 - Arbaugh, William A. VL - 166 ER - TY - JOUR T1 - Speaker Localization Using Excitation Source Information in Speech JF - Speech and Audio Processing, IEEE Transactions on Y1 - 2005 A1 - Raykar,V.C. A1 - Yegnanarayana,B. A1 - Prasanna,S. R.M A1 - Duraiswami, Ramani KW - correlation KW - correlation; KW - cross KW - Delay KW - error KW - error; KW - estimation; KW - excitation KW - generalized KW - information; KW - localization; KW - mean KW - methods; KW - processing; KW - production; KW - root KW - source KW - speaker KW - speech KW - square KW - TIME AB - This paper presents the results of simulation and real room studies for localization of a moving speaker using information about the excitation source of speech production. The first step in localization is the estimation of time-delay from speech collected by a pair of microphones. Methods for time-delay estimation generally use spectral features that correspond mostly to the shape of vocal tract during speech production. Spectral features are affected by degradations due to noise and reverberation. This paper proposes a method for localizing a speaker using features that arise from the excitation source during speech production. Experiments were conducted by simulating different noise and reverberation conditions to compare the performance of the time-delay estimation and source localization using the proposed method with the results obtained using the spectrum-based generalized cross correlation (GCC) methods. The results show that the proposed method shows lower number of discrepancies in the estimated time-delays. The bias, variance and the root mean square error (RMSE) of the proposed method is consistently equal or less than the GCC methods. The location of a moving speaker estimated using the time-delays obtained by the proposed method are closer to the actual values, than those obtained by the GCC method. VL - 13 SN - 1063-6676 CP - 5 M3 - 10.1109/TSA.2005.851907 ER - TY - RPRT T1 - Structural metadata and parsing speech Y1 - 2005 A1 - Harper,M. A1 - Dorr, Bonnie J A1 - Hale,J. A1 - Roark,B. A1 - Shafran,I. A1 - Lease,M. A1 - Liu,Y. A1 - Snover,M. A1 - Yung,L. A1 - Krasnyanskaya,A. A1 - others PB - JHU Language Engineering Workshop ER - TY - JOUR T1 - Synthesis of novel views of moving objects in airborne video JF - Proc. British Machine Vision Conference Y1 - 2005 A1 - Yue, Z. A1 - Chellapa, Rama AB - This paper presents a method for synthesizing novel views of movingobjects in airborne video. The object of interest is tracked using an appear- ance based visual tracking method. The on-object point correspondence is then built and used to estimate the homography induced by the ground plane. With known camera focal length, the surface normal to the ground plane and the camera motion between two views are factored out from the homography. In order to assure robustness of surface normal estimation, a rank one con- straint is applied to decompose a matrix which contains the homographies from multiple frame pairs. Given a desired viewing direction, the novel im- age of the object is generated by warping the reference frame using the new homography between the desired viewpoint and the reference frame. Exper- imental results show that the method is robust and errors due to small depth variations of the object is negligible. ER - TY - CONF T1 - Toward resilient security in wireless sensor networks T2 - Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing Y1 - 2005 A1 - Yang,H. A1 - Ye,F. A1 - Yuan,Y. A1 - Lu,S. A1 - Arbaugh, William A. JA - Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing ER - TY - JOUR T1 - Using Non-random Associations for Predicting Latency in WANs JF - Web Information Systems Engineering – WISE 2005 Y1 - 2005 A1 - Raschid, Louiqa A1 - Ye,Q. A1 - Zadorozhny,V. A1 - Gal,A. A1 - Murthy,H. AB - In this paper, we propose a scalable performance management tool for Wide Area Applications. Our objective is to scalably identify non-random associations between pairs of individual Latency Profiles (iLPs) (i.e., latency distributions experienced by clients when connecting to a server) and exploit them in latency prediction. Our approach utilizes Relevance Networks (RNs) to manage tens of thousands of iLPs. Non-random associations between iLPs can be identified by topology-independent measures such as correlation and mutual information. We demonstrate that these non-random associations do indeed have a significant impact in improving the error of latency prediction. M3 - 10.1007/11581062_48 ER - TY - CONF T1 - Achieving packet-level quality of service through scheduling in multirate WLANs T2 - Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th Y1 - 2004 A1 - Yuan Yuan A1 - Daqing Gu A1 - Arbaugh, William A. A1 - Jinyun Zhang KW - Analytical models KW - channel conditions KW - channel errors KW - channel temporal fair share KW - compensation KW - Computer science KW - Delay KW - error-prone flow compensation KW - IEEE 802.11a/b/g physical layer KW - multirate wireless fair scheduling KW - multirate WLAN KW - packet radio networks KW - packet-level quality of service KW - Physical layer KW - Processor scheduling KW - QoS KW - quality of service KW - radio access networks KW - Scheduling algorithm KW - Throughput KW - throughput fairness KW - USA Councils KW - Wireless LAN KW - wireless packet scheduling KW - WMFS AB - Wireless packet scheduling has been a popular paradigm to achieve packet-level QoS in terms of fairness and throughput in the presence of channel errors. However, the current design does not anticipate the multi-rate capability offered by the IEEE 802.11a/b/g physical layer, thus suffering significant performance degradation in 802.11 WLANs. In this paper, we propose multirate wireless fair scheduling (WMFS). In MWFS, each flow is granted a temporal fair share of the channel, in contrast to the throughput fair share adopted by existing algorithms. Therefore, each flow receives services in proportion to its perceived transmission rate, and high-rate flows are able to opportunistically exploit their good channel conditions and receive more services. MWFS also renovates the compensation model in order to allow for error-prone flows to catch up, thus ensuring fairness for all flows over error-prone channels. We demonstrate the effectiveness of MWFS through both simulations and analysis. Especially, WMFS achieves system throughput 159% of state-of-the-art scheduling algorithms in simulated scenarios. JA - Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th PB - IEEE VL - 4 SN - 0-7803-8521-7 M3 - 10.1109/VETECF.2004.1400554 ER - TY - JOUR T1 - Applying Model-based Distributed Continuous Quality Assurance Processes to Enhance Persistent Software Attributes JF - IEEE Software Y1 - 2004 A1 - Krishna,A. S A1 - Yilmaz,C. A1 - Memon, Atif M. A1 - Porter, Adam A1 - Schmidt,D. C A1 - Gokhale,A. A1 - Natarajan,B. AB - Time and resource constraints often force developers of highlyconfigurable quality of service (QoS)-intensive software sys- tems to guarantee their system’s persistent software attributes (PSAs) (e.g., functional correctness, portability, efficiency, and QoS) on very few platform configurations and to extrapolate from these configurations to the entire configuration space, which allows many sources of degradation to escape detec- tion until systems are fielded. This article illustrates how distributed continuous quality assurance (DCQA) processes help improve the assessment of these PSAs across large QoS- intensive software system configuration spaces. We also il- lustrate how model-based DCQA processes enable developers to run formally-designed screening experiments that isolate the most significant configuration options, such as different workload parameters, operating system, compiler flags, fea- ture sets, and/or run-time optimization controls. Our empir- ical results show that DCQA processes can be used monitor, safeguard, and enforce PSAs at an acceptable level of cost and effort. VL - 21 CP - 6 ER - TY - CONF T1 - Automatic video summarization for wireless and mobile environments T2 - 2004 IEEE International Conference on Communications Y1 - 2004 A1 - Yong Rao A1 - Mundur, Padma A1 - Yesha,Y. KW - automatic video summarization KW - batch processing KW - batch processing (computers) KW - Clustering algorithms KW - Clustering methods KW - clustering scheme KW - Computer science KW - Delaunay diagram KW - graph theory KW - Gunshot detection systems KW - Image sequences KW - mesh generation KW - Mobile computing KW - mobile radio KW - multidimensional point data cluster KW - Multidimensional systems KW - Multimedia communication KW - video clip KW - video frame content KW - Video sequences KW - video signal processing KW - wireless mobile environment AB - In this paper, we propose a novel video summarization technique using which we can automatically generate high quality video summaries suitable for wireless and mobile environments. The significant contribution of this paper lies in the proposed clustering scheme. We use Delaunay diagrams to cluster multidimensional point data corresponding to the frame contents of the video. In contrast to the existing clustering techniques used for summarization, our clustering algorithm is fully automatic and well suited for batch processing. We illustrate the quality of our clustering and summarization scheme in an experiment using several video clips. JA - 2004 IEEE International Conference on Communications PB - IEEE VL - 3 SN - 0-7803-8533-0 M3 - 10.1109/ICC.2004.1312767 ER - TY - CONF T1 - Covering arrays for efficient fault characterization in complex configuration spaces T2 - ACM SIGSOFT Software Engineering Notes Y1 - 2004 A1 - Yilmaz,C. A1 - Cohen,M. B A1 - Porter, Adam JA - ACM SIGSOFT Software Engineering Notes VL - 29 ER - TY - JOUR T1 - Cutter path generation for 2.5D milling by combining multiple different cutter path patterns JF - International Journal of Production Research Y1 - 2004 A1 - Yao,Zhiyang A1 - Gupta, Satyandra K. AB - Different cutter path patterns have been shown to be efficient for different types of pocket geometries. However, for certain types of complex pockets, no single type of pattern produces efficient cutter paths throughout the pocket. In this paper, different cutter path patterns are systematically analysed, and several existing heuristics for selecting cutter path patterns are discussed. Based on observations, a new cutter path generation algorithm is described in this paper. This algorithm generates a cutter path by using different patterns in different regions of the geometry and seamlessly morphing them together. In case of complex pockets, it produces solutions superior to those generated by any single pattern. VL - 42 SN - 0020-7543 UR - http://www.tandfonline.com/doi/abs/10.1080/00207540310001652879 CP - 11 M3 - 10.1080/00207540310001652879 ER - TY - CONF T1 - A distributed continuous quality assurance process to manage variability in performance-intensive software T2 - 19th ACM OOPSLA Workshop on Component and Middleware Performance Y1 - 2004 A1 - Krishna,A. A1 - Yilmaz,C. A1 - Memon, Atif M. A1 - Porter, Adam A1 - Schmidt,D. C A1 - Gokhale,A. A1 - Natarajan,B. JA - 19th ACM OOPSLA Workshop on Component and Middleware Performance ER - TY - JOUR T1 - Extracting the frequencies of the pinna spectral notches from measured head-related impulse responses JF - The Journal of the Acoustical Society of America Y1 - 2004 A1 - Raykar,Vikas C. A1 - Duraiswami, Ramani A1 - Yegnanarayana,B. AB - Experimental data are available for the Head‐related impulse response (HRIR) for several azimuth and elevation angles, and for several subjects. The measured HRIR depends on several factors such as reflections from body parts (torso, shoulder, and knees), head diffraction, and reflection/diffraction effects due to the external ear (pinna). Due to the combined influence of these factors on the HRIR, it is difficult to isolate features thought to be perceptually important (such as the frequencies of pinna spectral notches) using standard signal‐processing techniques. Signal‐processing methods to extract the frequencies of the pinna spectral notches from the HRIR are presented. The techniques are applied to extracting the frequencies of the pinna spectral notches from the publicly available HRIR databases. A brief discussion relating the notch frequencies to the physical dimensions and the shape of the pinna is given. [The support of NSF Award ITR‐0086075 is gratefully acknowledged.] VL - 116 UR - http://link.aip.org/link/?JAS/116/2625/2 CP - 4 ER - TY - CONF T1 - A Framework for Conceptual Design of Multiple Interaction-State Mechatronic Systems Y1 - 2004 A1 - Gupta,S.K. A1 - Xu,C. A1 - Yao,Z. AB - Increasingly, complex mechatronic systems are beingdesigned to have higher levels of autonomy and intelligence. This requires them to operate in multiple interaction-states. To facilitate computer- aided conceptual design of complex mechatronic systems, this paper provides a framework for modeling design concepts behind mechatronic systems with multiple interaction-states. We introduce the primitives and operators used in the modeling framework, and illustrate the modeling process by an example. CY - Lausanne, Switzerland UR - http://www.glue.umd.edu/~skgupta/Publication/TMCE04_Xu.pdf ER - TY - JOUR T1 - A generic construction for intrusion-resilient public-key encryption JF - Topics in Cryptology–CT-RSA 2004 Y1 - 2004 A1 - Dodis,Y. A1 - Franklin,M. A1 - Katz, Jonathan A1 - Miyaji,A. A1 - Yung,M. AB - In an intrusion-resilient cryptosystem [10], two entities (a user and a base) jointly evolve a secret decryption key; this provides very strong protection against an active attacker who can break into the user and base repeatedly and even simultaneously. Recently, a construction of an intrusion-resilient public-key encryption scheme based on specific algebraic assumptions has been shown [6]. We generalize this previous work and present a more generic construction for intrusion-resilient public-key encryption from any forward-secure public-key encryption scheme satisfying a certain homomorphic property. M3 - 10.1007/978-3-540-24660-2_7 ER - TY - CONF T1 - High-performance MAC for high-capacity wireless LANs T2 - 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings Y1 - 2004 A1 - Yuan Yuan A1 - Daqing Gu A1 - Arbaugh, William A. A1 - Jinyun Zhang KW - 35 Mbit/s KW - access protocols KW - Aggregates KW - Bandwidth KW - batch transmission KW - Computer science KW - Educational institutions KW - high-capacity wireless LAN KW - high-performance MAC KW - Laboratories KW - Local area networks KW - Media Access Protocol KW - opportunistic selection KW - Physical layer KW - probability KW - Throughput KW - Wireless LAN AB - The next-generation wireless technologies, e.g., 802.11n and 802.15.3a, offer a physical-layer speed at least an-order-of-magnitude higher than the current standards. However, direct application of current MACs leads to high protocol overhead and significant throughput degradation. In this paper, we propose ADCA, a high-performance MAC that works with high-capacity physical layer. ADCA exploits two ideas of adaptive batch transmission and opportunistic selection of high-rate hosts to simultaneously reduce the overhead and improve the aggregate throughput. It opportunistically favors high-rate hosts by providing higher access probability and more access time, while ensuring each low-rate host certain minimum amount of channel access time. Simulations show that the ADCA design increases the throughput by 112% and reduces the average delay by 55% compared with the legacy DCF. It delivers more than 100 Mbps MAC-layer throughput as compared with 35 Mbps offered by the legacy MAC JA - 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings PB - IEEE SN - 0-7803-8814-3 M3 - 10.1109/ICCCN.2004.1401615 ER - TY - CONF T1 - IDeixis: image-based Deixis for finding location-based information T2 - CHI '04 extended abstracts on Human factors in computing systems Y1 - 2004 A1 - Tom Yeh A1 - Tollmar,Konrad A1 - Darrell,Trevor KW - content-based image retrieval KW - context-aware computing KW - location-awareness KW - Mobile computing AB - We demonstrate an image-based approach to specifying location and finding location-based information from camera-equipped mobile devices. We introduce a point-by-photograph paradigm, where users can specify a location simply by taking pictures. Our technique uses content-based image retrieval methods to search the web or other databases for matching images and their source pages to find relevant location-based information. In contrast to conventional approaches to location detection, our method can refer to distant locations and does not require any physical infrastructure beyond mobile internet service. We have developed a prototype on a camera phone and conducted user studies to demonstrate the efficacy of our approach compared to other alternatives. JA - CHI '04 extended abstracts on Human factors in computing systems T3 - CHI EA '04 PB - ACM CY - New York, NY, USA SN - 1-58113-703-6 UR - http://doi.acm.org/10.1145/985921.985933 M3 - 10.1145/985921.985933 ER - TY - JOUR T1 - Ideixis-image-based deixis for finding location-based information JF - Mobile HCI, Vienna, Austria, Pages Y1 - 2004 A1 - Tollmar,K. A1 - Tom Yeh A1 - Darrell,T. ER - TY - JOUR T1 - IDeixis–Searching the Web with Mobile Images for Location-Based Information JF - Mobile Human-Computer Interaction–MobileHCI 2004 Y1 - 2004 A1 - Tollmar,K. A1 - Tom Yeh A1 - Darrell,T. ER - TY - JOUR T1 - Improved Multiuser Detectors Employing Genetic Algorithms in a Space-Time Block Coded System, Yinggang Du and Kam Tai Chan JF - Signal Y1 - 2004 A1 - Self-Similarity,G.R.U.I. A1 - BenAbdelkader,C. A1 - Cutler,R.G. A1 - Davis, Larry S. A1 - Local,F.R.U. A1 - Global Features,J.H. A1 - Yuen, P.C. A1 - Lai,JH A1 - Li,C. VL - 2004 CP - 5 ER - TY - CONF T1 - A logic of motion Y1 - 2004 A1 - Yaman,F. A1 - Nau, Dana S. A1 - V.S. Subrahmanian AB - There are numerous applications such as air traffic manage- ment, cellular phone location tracking, and vehicle protection systems where there is a critical need to reason about moving objects. In this paper, we propose a formal logic of motion (LOM for short). We provide a formal syntax for LOM, as well as a model theory for LOM. In addition, we develop al- gorithms to check consistency of LOM theories, as well as to answer certain kinds of queries posed to LOM theories. We have implemented these algorithms in a prototype LOM sys- tem - we describe experiments showing that such queries can be efficiently executed in practice. UR - http://www.aaai.org/Papers/KR/2004/KR04-011.pdf ER - TY - JOUR T1 - A Model-based Distributed Continuous Quality Assurance Process to Enhance the Quality of Service of Evolving Performance-intensive Software Systems JF - Proceedings of the 2nd ICSE Workshop on Remote Analysis and Measurement of Software Systems (RAMSS), Edinburgh, Scotland, UK Y1 - 2004 A1 - Yilmaz,C. A1 - Krishna,A. S A1 - Memon, Atif M. A1 - Porter, Adam A1 - Schmidt,D. C A1 - Gokhale,A. A1 - Natarajan,B. AB - Performance-intensive software, such as that found in high-perfo-rmance computing systems and distributed real-time and embedded systems, increasingly executes on a multitude of platforms and user contexts. To ensure that performance-intensive software meets its quality of service (QoS) requirements, it must often be fine-tuned to specific platforms/contexts by adjusting many (in some cases hun- dreds of) configuration options. Developers who write these types of systems must therefore try to ensure that their additions and mod- ifications work across this large configuration space. In practice, however, time and resource constraints often force developers to assess performance on very few configurations and to extrapolate from these to the entire configuration space, which allows many performance bottlenecks and sources of QoS degradation to escape detection until systems are fielded. To improve the assessment of performance across large config- uration spaces, we present a model-based approach to develop- ing and deploying a new distributed continuous quality assurance (DCQA) process. Our approach builds upon and extends the Skoll environment, which is developing and validating novel software QA processes and tools that leverage the extensive computing resources of worldwide user communities in a distributed, continuous man- ner to significantly and rapidly improve software quality. This pa- per describes how our new DCQA performance assessment process enables developers to run formally-designed screening experiments that isolate the most significant options. After that, exhaustive ex- periments (on the now much smaller configuration space) are con- ducted. We implemented this process using model-based software tools and executed it in the Skoll environment to demonstrate its ef- fectiveness via two experiments on widely used QoS-enabled mid- dleware. Our results show that model-based DCQA processes im- proves developer insight into the effect of system changes on per- formance at an acceptable cost. ER - TY - JOUR T1 - Multi-cue exemplar-based nonparametric model for gesture recognition JF - Indian Conference on Computer Vision, Graphics and Image Processing Y1 - 2004 A1 - Shet,V. D A1 - Prasad,V. S.N A1 - Elgammal,A. A1 - Yacoob,Yaser A1 - Davis, Larry S. AB - This paper presents an approach for a multi-cue, view-based recognition of gestures. We describe an exemplar- based technique that combines two different forms of exem- plars - shape exemplars and motion exemplars - in a uni- fied probabilistic framework. Each gesture is represented as a sequence of learned body poses as well as a sequence of learned motion parameters. The shape exemplars are comprised of pose contours, and the motion exemplars are represented as affine motion parameters extracted using a robust estimation approach. The probabilistic framework learns by employing a nonparametric estimation technique to model the exemplar distributions. It imposes temporal constraints between different exemplars through a learned Hidden Markov Model (HMM) for each gesture. We use the proposed multi-cue approach to recognize a set of four- teen gestures and contrast it against a shape only, single- cue based system. ER - TY - JOUR T1 - A Note on Efficient Computation of Haplotypes via Perfect Phylogeny JF - Journal of Computational Biology Y1 - 2004 A1 - Bafna,Vineet A1 - Gusfield,Dan A1 - Hannenhalli, Sridhar A1 - Yooseph,Shibu AB - The problem of inferring haplotype phase from a population of genotypes has received a lot of attention recently. This is partly due to the observation that there are many regions on human genomic DNA where genetic recombination is rare (Helmuth, 2001; Daly et al., 2001; Stephens et al., 2001; Friss et al., 2001). A Haplotype Map project has been announced by NIH to identify and characterize populations in terms of these haplotypes. Recently, Gusfield introduced the perfect phylogeny haplotyping problem, as an algorithmic implication of the no-recombination in long blocks observation, together with the standard population-genetic assumption of infinite sites. Gusfield's solution based on matroid theory was followed by direct θ(nm2 ) solutions that use simpler techniques (Bafna et al., 2003; Eskin et al., 2003), and also bound the number of solutions to the PPH problem. In this short note, we address two questions that were left open. First, can the algorithms of Bafna et al. (2003) and Eskin et al. (2003) be sped-up to O(nm + m2 ) time, which would imply an O(nm) time-bound for the PPH problem? Second, if there are multiple solutions, can we find one that is most parsimonious in terms of the number of distinct haplotypes.We give reductions that suggests that the answer to both questions is "no." For the first problem, we show that computing the output of the first step (in either method) is equivalent to Boolean matrix multiplication. Therefore, the best bound we can presently achieve is O(nmω–1), where ω ≤ 2.52 is the exponent of matrix multiplication. Thus, any linear time solution to the PPH problem likely requires a different approach. For the second problem of computing a PPH solution that minimizes the number of distinct haplotypes, we show that the problem is NP-hard using a reduction from Vertex Cover (Garey and Johnson, 1979). VL - 11 SN - 1066-5277, 1557-8666 UR - http://www.liebertonline.com/doi/abs/10.1089/cmb.2004.11.858 CP - 5 M3 - 10.1089/cmb.2004.11.858 ER - TY - JOUR T1 - On-Line Kernel-Based Tracking in Joint Feature-Spatial Spaces JF - IEEE, 0-7695-2158-2164 Y1 - 2004 A1 - Yang,C. A1 - Duraiswami, Ramani A1 - Elgammal,A. A1 - Davis, Larry S. AB - We will demonstrate an object tracking algorithm thatuses a novel simple symmetric similarity function between spatially-smoothed kernel-density estimates of the model and target distributions. The similarity measure is based on the expectation of the density estimates over the model or target images. The density is estimated using radial-basis kernel functions which measure the affinity between points and provide a better outlier rejection property. The mean- shift algorithm is used to track objects by iteratively max- imizing this similarity function. To alleviate the quadratic complexity of the density estimation, we employ Gaussian kernels and the fast Gauss transform to reduce the compu- tations to linear order. This leads to a very efficient and robust nonparametric tracking algorithm. More details can be found in [2]. The system processes online video stream on a P4 1.4GHz and achieves 30 frames per second using an ordinary webcam. ER - TY - CHAP T1 - Plan Databases: Model and Algebra T2 - Foundations of Information and Knowledge Systems Y1 - 2004 A1 - Yaman,Fusun A1 - Adali,Sibel A1 - Nau, Dana S. A1 - Sapino,Maria A1 - Subrahmanian,V. ED - Seipel,Dietmar ED - Turull-Torres,José KW - Computer science AB - Despite the fact that thousands of applications manipulate plans, there has been no work to date on managing large databases of plans. In this paper, we first propose a formal model of plan databases. We describe important notions of consistency and coherence for such databases. We then propose a set of operators similar to the relational algebra to query such databases of plans. JA - Foundations of Information and Knowledge Systems T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 2942 SN - 978-3-540-20965-2 UR - http://www.springerlink.com/content/yqhlqtu4te18q2e1/abstract/ ER - TY - JOUR T1 - Pose-normailzed view synthesis of a symmetric object using a single image JF - Proceedings of the 6th Asian Conference on Computer Vision (ACCV'04) Y1 - 2004 A1 - Yue, Z. A1 - Chellapa, Rama AB - Object recognition under varying pose is a challenging prob-lem, especially when illumination variations are also present. In this paper, we propose a pose-normalized view synthe- sis method under varying illuminations for symmetric ob- jects. For a given non-frontal view of a symmetric object under non-frontal illumination, the mirror image of the orig- inal view is equivalent to the view when the object rotates around the Y -axis by the same angle as the original view but in the opposite direction, and under opposite illumina- tion condition in the X direction. Exploiting the bilateral symmetry of the object, we generate the mirror view of the object under the same illumination condition as the original view on a pixel-by-pixel basis. The frontal view under the same illumination is then easily obtained using view mor- phing techniques. ER - TY - JOUR T1 - Preserving distributed systems critical properties: a model-driven approach JF - Software, IEEE Y1 - 2004 A1 - Yilmaz,C. A1 - Memon, Atif M. A1 - Porter, Adam A1 - Krishna,A. S A1 - Schmidt,D. C A1 - Gokhale,A. A1 - Natarajan,B. KW - configuration management KW - formal verification KW - Middleware KW - middleware suite KW - model-driven approach KW - persistent software attributes KW - QoS requirements KW - Quality assurance KW - quality of service KW - quality-of-service KW - Skoll distributed computing resources KW - software configuration KW - Software maintenance KW - Software quality KW - software quality assurance process KW - system dependability AB - The need for creating predictability in distributed systems is most often specified in terms of quality-of-service (QoS) requirements, which help define the acceptable levels of dependability with which capabilities such as processing capacity, data throughput, or service availability reach users. For longer-term properties such as scalability, maintainability, adaptability, and system security, we can similarly use persistent software attributes (PSAs) to specify how and to what degree such properties must remain intact as a network expands and evolves over time. The Skoll distributed continuous software quality assurance process helps to identify viable system and software configurations for meeting stringent QOS and PSA requirements by coordinating the use of distributed computing resources. The authors tested their process using the large, rapidly evolving ACE+TAO middleware suite. VL - 21 SN - 0740-7459 CP - 6 M3 - 10.1109/MS.2004.50 ER - TY - RPRT T1 - Real-Time Kernel-Based Tracking in Joint Feature-Spatial Spaces Y1 - 2004 A1 - Yang,Changjiang A1 - Duraiswami, Ramani A1 - Elgammal,Ahmed A1 - Davis, Larry S. KW - Technical Report AB - An object tracking algorithm that uses a novel simple symmetric similarityfunction between spatially-smoothed kernel-density estimates of the model and target distributions is proposed and tested. The similarity measure is based on the expectation of the density estimates over the model or target images. The density is estimated using radial-basis kernel functions which measure the affinity between points and provide a better outlier rejection property. The mean-shift algorithm is used to track objects by iteratively maximizing this similarity function. To alleviate the quadratic complexity of the density estimation, we employ Gaussian kernels and the fast Gauss transform to reduce the computations to linear order. This leads to a very efficient and robust nonparametric tracking algorithm. The proposed algorithm is tested with several image sequences and shown to achieve robust and reliable real-time tracking. (UMIACS-TR-2004-12) JA - Technical Reports from UMIACS UR - http://drum.lib.umd.edu/handle/1903/1341 ER - TY - JOUR T1 - Reducing storage requirements for biological sequence comparison JF - BioinformaticsBioinformatics Y1 - 2004 A1 - Roberts,Michael A1 - Hayes,Wayne A1 - Hunt,Brian R. A1 - Mount, Stephen M. A1 - Yorke,James A. AB - Motivation: Comparison of nucleic acid and protein sequences is a fundamental tool of modern bioinformatics. A dominant method of such string matching is the ‘seed-and-extend’ approach, in which occurrences of short subsequences called ‘seeds’ are used to search for potentially longer matches in a large database of sequences. Each such potential match is then checked to see if it extends beyond the seed. To be effective, the seed-and-extend approach needs to catalogue seeds from virtually every substring in the database of search strings. Projects such as mammalian genome assemblies and large-scale protein matching, however, have such large sequence databases that the resulting list of seeds cannot be stored in RAM on a single computer. This significantly slows the matching process.Results: We present a simple and elegant method in which only a small fraction of seeds, called ‘minimizers’, needs to be stored. Using minimizers can speed up string-matching computations by a large factor while missing only a small fraction of the matches found using all seeds. VL - 20 SN - 1367-4803, 1460-2059 UR - http://bioinformatics.oxfordjournals.org/content/20/18/3363 CP - 18 M3 - 10.1093/bioinformatics/bth408 ER - TY - CONF T1 - Robust two-camera tracking using homography T2 - Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on Y1 - 2004 A1 - Yue,Zhanfeng A1 - Zhou,S. K A1 - Chellapa, Rama KW - Carlo KW - filter; KW - filters; KW - frame KW - framework; KW - homography; KW - image KW - method; KW - methods; KW - Monte KW - nonlinear KW - occlusions; KW - optical KW - particle KW - processing; KW - robust KW - sequences; KW - sequential KW - signal KW - statistics; KW - tracking KW - tracking; KW - two KW - two-camera KW - video KW - view KW - visual AB - The paper introduces a two view tracking method which uses the homography relation between the two views to handle occlusions. An adaptive appearance-based model is incorporated in a particle filter to realize robust visual tracking. Occlusion is detected using robust statistics. When there is occlusion in one view, the homography from this view to other views is estimated from previous tracking results and used to infer the correct transformation for the occluded view. Experimental results show the robustness of the two view tracker. JA - Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on VL - 3 M3 - 10.1109/ICASSP.2004.1326466 ER - TY - CONF T1 - Searching the web with mobile images for location recognition T2 - Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on Y1 - 2004 A1 - Tom Yeh A1 - Tollmar,K. A1 - Darrell,T. AB - We describe an approach to recognizing location from mobile devices using image-based Web search. We demonstrate the usefulness of common image search metrics applied on images captured with a camera-equipped mobile device to find matching images on the World Wide Web or other general-purpose databases. Searching the entire Web can be computationally overwhelming, so we devise a hybrid image-and-keyword searching technique. First, image-search is performed over images and links to their source Web pages in a database that indexes only a small fraction of the Web. Then, relevant keywords on these Web pages are automatically identified and submitted to an existing text-based search engine (e.g. Google) that indexes a much larger portion of the Web. Finally, the resulting image set is filtered to retain images close to the original query. It is thus possible to efficiently search hundreds of millions of images that are not only textually related but also visually relevant. We demonstrate our approach on an application allowing users to browse Web pages matching the image of a nearby location. JA - Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on PB - IEEE VL - 2 SN - 0-7695-2158-4 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1315147 M3 - 10.1109/CVPR.2004.1315147 ER - TY - JOUR T1 - Similarity measure for nonparametric kernel density based object tracking JF - Eighteenth Annual Conference on Neural Information Processing Systems, Vancouver Y1 - 2004 A1 - Yang,C. A1 - Duraiswami, Ramani A1 - Davis, Larry S. AB - An object tracking algorithm using a novel simple symmetric similar-ity function between spatially-smoothed kernel-density estimates of the model and target distributions is proposed and tested. The similarity measure is based on the expectation of the density estimates over the model or target images. The density is estimated using radial-basis ker- nel functions that measure the affinity between points and provide a bet- ter outlier rejection property. The mean-shift algorithm is used to track objects by iteratively maximizing this similarity function. To alleviate the quadratic complexity of the density estimation, we employ Gaussian kernels and the fast Gauss transform to reduce the computations to linear order. This leads to a very efficient and robust nonparametric tracking al- gorithm. The proposed algorithm is tested with several image sequences and shown to achieve robust and reliable real-time tracking. Several se- quences are placed at http://www.cs.umd.edu/users/yangcj/node3.html. ER - TY - CONF T1 - Skoll: distributed continuous quality assurance T2 - Software Engineering, 2004. ICSE 2004. Proceedings. 26th International Conference on Y1 - 2004 A1 - Memon, Atif M. A1 - Porter, Adam A1 - Yilmaz,C. A1 - Nagarajan,A. A1 - Schmidt,D. A1 - Natarajan,B. KW - 1MLOC+ software package KW - ACE+TAO KW - around-the-clock QA process KW - around-the-world QA process KW - distributed continuous QA KW - distributed continuous quality assurance KW - distributed programming KW - program verification KW - Quality assurance KW - Skoll KW - software performance evaluation KW - software profiling KW - Software quality KW - Software testing AB - Quality assurance (QA) tasks, such as testing, profiling, and performance evaluation, have historically been done in-house on developer-generated workloads and regression suites. Since this approach is inadequate for many systems, tools and processes are being developed to improve software quality by increasing user participation in the QA process. A limitation of these approaches is that they focus on isolated mechanisms, not on the coordination and control policies and tools needed to make the global QA process efficient, effective, and scalable. To address these issues, we have initiated the Skoll project, which is developing and validating novel software QA processes and tools that leverage the extensive computing resources of worldwide user communities in a distributed, continuous manner to significantly and rapidly improve software quality. This paper provides several contributions to the study of distributed continuous QA. First, it illustrates the structure and functionality of a generic around-the-world, around-the-clock QA process and describes several sophisticated tools that support this process. Second, it describes several QA scenarios built using these tools and process. Finally, it presents a feasibility study applying these scenarios to a 1MLOC+ software package called ACE+TAO. While much work remains to be done, the study suggests that the Skoll process and tools effectively manage and control distributed, continuous QA processes. Using Skoll we rapidly identified problems that had taken the ACE+TAO developers substantially longer to find and several of which had previously not been found. Moreover, automatic analysis of QA task results often provided developers information that quickly led them to the root cause of the problems. JA - Software Engineering, 2004. ICSE 2004. Proceedings. 26th International Conference on M3 - 10.1109/ICSE.2004.1317468 ER - TY - JOUR T1 - A study of the pinna anthropometry and the spectral notch frequencies JF - The Journal of the Acoustical Society of America Y1 - 2004 A1 - Raykar,Vikas C. A1 - Duraiswami, Ramani A1 - Yegnanarayana,B. AB - The head‐related transfer function (HRTF) varies significantly between individuals due to the different sizes and shapes of different anatomical parts like the pinnae, head, and torso. Applications in the creation of virtual auditory displays require individual HRTFs for perceptual fidelity. A generic HRTF would not work satisfactorily, since it has been shown that nonindividual HRTFs result in poor elevation perception. While good geometrical models exist for the effects of head, torso, and shoulders, a simple model for the pinna that connects the anthropometry to the features in the HRTF does not exist. One of the prominent cues contributed by the pinna are the sharp spectral notches, which encode the elevation of the sound source. Recently, we proposed a method to extract the frequencies of the pinna spectral notches from the HRTF. In this paper we study the relationship between the extracted notch frequency and pinna anthropometry. Based on these observations new approaches for HRTF customization can be developed. [The support of NSF Award ITR‐0086075 is gratefully acknowledged.] VL - 116 UR - http://link.aip.org/link/?JAS/116/2625/3 CP - 4 ER - TY - JOUR T1 - Variation of toxigenic Vibrio cholerae O1 in the aquatic environment of Bangladesh and its correlation with the clinical strains JF - Microbiology and immunology Y1 - 2004 A1 - Islam,M. S. A1 - Talukder,K. A. A1 - Khan,N. H. A1 - Mahmud,Z. H. A1 - Rahman,M. Z. A1 - Nair,G. B. A1 - Siddique,A. K. M. A1 - Yunus,M. A1 - Sack,D. A. A1 - Sack,R. B. A1 - Rita R Colwell VL - 48 CP - 10 ER - TY - JOUR T1 - Wide area performance monitoring using aggregate latency profiles JF - Web Engineering Y1 - 2004 A1 - Zadorozhny,V. A1 - Gal,A. A1 - Raschid, Louiqa A1 - Ye,Q. ER - TY - JOUR T1 - A 4-Year Study of the Epidemiology of Vibrio Cholerae in Four Rural Areas of Bangladesh JF - Journal of Infectious DiseasesJ Infect Dis. Y1 - 2003 A1 - Sack,R. Bradley A1 - Siddique,A. Kasem A1 - Longini,Ira M. A1 - Nizam,Azhar A1 - Yunus,Md A1 - M. Sirajul Islam A1 - Morris,Jr A1 - Ali,Afsar A1 - Huq,Anwar A1 - Nair,G. Balakrish A1 - Qadri,Firdausi A1 - Faruque,Shah M. A1 - Sack,David A. A1 - Rita R Colwell AB - How Vibrio cholerae spreads around the world and what determines its seasonal peaks in endemic areas are not known. These features of cholera have been hypothesized to be primarily the result of environmental factors associated with aquatic habitats that can now be identified. Since 1997, fortnightly surveillance in 4 widely separated geographic locations in Bangladesh has been performed to identify patients with cholera and to collect environmental data. A total of 5670 patients (53% <5 years of age) have been studied; 14.3% had cholera (10.4% due to V. cholerae O1 El Tor, 3.8% due to O139). Both serogroups were found in all locations; outbreaks were seasonal and often occurred simultaneously. Water-use patterns showed that bathing and washing clothes in tube-well water was significantly protective in two of the sites. These data will be correlated with environmental factors, to develop a model for prediction of cholera outbreaks VL - 187 SN - 0022-1899, 1537-6613 UR - http://jid.oxfordjournals.org/content/187/1/96 CP - 1 M3 - 10.1086/345865 ER - TY - JOUR T1 - Algorithms for selecting cutters in multi-part milling problems JF - Computer-Aided Design Y1 - 2003 A1 - Yao,Zhiyang A1 - Gupta, Satyandra K. A1 - Nau, Dana S. KW - 2.5-D Milling KW - cutter selection KW - Geometric Algorithms AB - This paper describes geometric algorithms for automatically selecting an optimal sequence of cutters for machining a set of 2.5-D parts. In milling operations, cutter size affects the machining time significantly. Meanwhile, if the batch size is small, it is also important to shorten the time spent on loading tools into the tool magazine and establishing z-length compensation values. Therefore, in small-batch manufacturing, if we can select a set of milling tools that will produce good machining time on more than one type of parts, then several unnecessary machine-tool reconfiguration operations can be eliminated. In selecting milling cutters we consider both the tool loading time and the machining time and generate solutions that allow us to minimize the total machining time. In this paper we first present algorithms for finding the area that can be cut by a given cutter. Then we describe a graph search formulation for the tool selection problem. Finally, the optimal sequence of cutters is selected by using Dijkstra's shortest path planning algorithm. VL - 35 SN - 0010-4485 UR - http://www.sciencedirect.com/science/article/pii/S0010448502001100 CP - 9 M3 - 10.1016/S0010-4485(02)00110-0 ER - TY - JOUR T1 - Data hiding in image and video .II. Designs and applications JF - Image Processing, IEEE Transactions on Y1 - 2003 A1 - M. Wu A1 - Yu,H. A1 - Liu,Bede KW - access KW - annotation; KW - authentication; KW - capacity; KW - conditions; KW - content-based KW - CONTROL KW - control; KW - copy KW - data KW - distortions; KW - EMBEDDING KW - embedding; KW - encapsulation; KW - extraction; KW - frame KW - hiding; KW - image KW - information; KW - jitter; KW - message KW - multilevel KW - NOISE KW - noise; KW - payload KW - processing; KW - robust KW - signal KW - uneven KW - user KW - video AB - For pt. I see ibid., vol.12, no.6, p.685-95 (2003). This paper applies the solutions to the fundamental issues addressed in Part I to specific design problems of embedding data in image and video. We apply multilevel embedding to allow the amount of embedded information that can be reliably extracted to be adaptive with respect to the actual noise conditions. When extending the multilevel embedding to video, we propose strategies for handling uneven embedding capacity from region to region within a frame as well as from frame to frame. We also embed control information to facilitate the accurate extraction of the user data payload and to combat such distortions as frame jitter. The proposed algorithm can be used for a variety of applications such as copy control, access control, robust annotation, and content-based authentication. VL - 12 SN - 1057-7149 CP - 6 M3 - 10.1109/TIP.2003.810589 ER - TY - JOUR T1 - Desparately seeking cebuano JF - Third Conference on Human Language Technologies Y1 - 2003 A1 - Oard, Douglas A1 - David Doermann A1 - Dorr, Bonnie J A1 - He,D. A1 - Resnik, Philip A1 - Weinberg, Amy A1 - Byrne,W. A1 - Khudanpur,S. A1 - Yarowsky,D. A1 - Leuski,A. A1 - others AB - This paper describes an effort to rapidly de-velop language resources and component tech- nology to support searching Cebuano news sto- ries using English queries. Results from the first 60 hours of the exercise are presented. ER - TY - CONF T1 - Distributed continuous quality assurance: The Skoll project T2 - Workshop on Remote Analysis and Measurement of Software Systems (RAMSS) Y1 - 2003 A1 - Yilmaz,C. A1 - Porter, Adam A1 - Schmidt,D. C JA - Workshop on Remote Analysis and Measurement of Software Systems (RAMSS) ER - TY - CONF T1 - Energy-efficient broadcast and multicast trees for reliable wireless communication T2 - Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE Y1 - 2003 A1 - Banerjee,S. A1 - Misra,A. A1 - Yeo,Jihwang A1 - Agrawala, Ashok K. KW - broadcast KW - channels;multicast KW - communication;broadcast KW - communication;network KW - data KW - delivery KW - energy-efficient KW - layer;multicast KW - network KW - networks;network KW - networks;telecommunication KW - paths;multicast KW - rates;link KW - reliability; KW - topologies;wireless KW - topology;radio KW - trees;error KW - trees;multihop KW - wireless AB - We define energy-efficient broadband and multicast schemes for reliable communication in multi-hop wireless networks. Unlike previous techniques, the choice of neighbors in the broadband and multicast trees in these schemes, are based not only on the link distance, but also on the error rates associated with the link. Our schemes can be implemented using both positive and negative acknowledgement based reliable broadcast techniques in the link layer. Through simulations, we show that our scheme achieves up to 45% improvement over previous schemes on realistic 100-node network topologies. A positive acknowledgment based implementation is preferred. Our simulations show that the additional benefits of a positive acknowledgement based implementation is marginal (1-2%). Therefore a negative acknowledgement based implementation of our schemes is equally applicable in constructing energy-efficient reliable and multicast data delivery paths. JA - Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE VL - 1 M3 - 10.1109/WCNC.2003.1200429 ER - TY - CONF T1 - Exemplar-based tracking and recognition of arm gestures T2 - Image and Signal Processing and Analysis, 2003. ISPA 2003. Proceedings of the 3rd International Symposium on Y1 - 2003 A1 - Elgammal,A. A1 - Shet,V. A1 - Yacoob,Yaser A1 - Davis, Larry S. KW - arm KW - constrains; KW - correspondence-free KW - edge KW - exemplar-based KW - framework; KW - gesture KW - hidden KW - HMM; KW - image KW - logic; KW - Markov KW - MATCHING KW - matching; KW - model; KW - models; KW - probabilistic KW - recognition; KW - scheme; KW - segmentation; KW - temporal KW - tracking; KW - weighted AB - This paper presents a probabilistic exemplar-based framework for recognizing gestures. The approach is based on representing each gesture as a sequence of learned body poses. The gestures are recognized through a probabilistic framework for matching these body poses and for imposing temporal constrains between different poses. Matching individual poses to image data is performed using a probabilistic formulation for edge matching to obtain a likelihood measurement for each individual pose. The paper introduces a correspondence-free weighted matching scheme for edge templates that emphasize discriminating features in the matching. The weighting does not require establishing correspondences between the different pose models. The probabilistic framework also imposes temporal constrains between different pose through a learned hidden Markov model (HMM) of each gesture. JA - Image and Signal Processing and Analysis, 2003. ISPA 2003. Proceedings of the 3rd International Symposium on VL - 2 M3 - 10.1109/ISPA.2003.1296358 ER - TY - JOUR T1 - Extracting significant features from the hrtf JF - Proceedings of the 2003 International Conference on Auditory Display Y1 - 2003 A1 - Raykar,V.C. A1 - Duraiswami, Ramani A1 - Davis, Larry S. A1 - Yegnanarayana,B. AB - The Head Related Transfer Function (HRTF) characterizes the au-ditory cues created by scattering of sound off a person’s anatomy. While it is known that features in the HRTF can be associated with various phenomena, such as head diffraction, head and torso re- flection, knee reflection and pinna resonances and anti resonances, identification of these phenomena are usually qualitative and/or heuristic. The objective of this paper is to attempt to decompose the HRTF and extract significant features that are perceptually im- portant for source localization. Some of the significant features that have been identified are the pinna resonances and the notches in the spectrum caused by various parts of the body. We develop signal processing algorithms to decompose the HRTF into compo- nents, and extract the features corresponding to each component. The support of NSF award ITR-0086075 is gratefully acknowl- edged ER - TY - JOUR T1 - Extracting significant features from the HRTF JF - Proceedings of the 2003 International Conference on Auditory Display Y1 - 2003 A1 - Raykar,V.C. A1 - Duraiswami, Ramani A1 - Davis, Larry S. A1 - Yegnanarayana,B. AB - The Head Related Transfer Function (HRTF) characterizes the au-ditory cues created by scattering of sound off a person’s anatomy. While it is known that features in the HRTF can be associated with various phenomena, such as head diffraction, head and torso re- flection, knee reflection and pinna resonances and anti resonances, identification of these phenomena are usually qualitative and/or heuristic. The objective of this paper is to attempt to decompose the HRTF and extract significant features that are perceptually im- portant for source localization. Some of the significant features that have been identified are the pinna resonances and the notches in the spectrum caused by various parts of the body. We develop signal processing algorithms to decompose the HRTF into compo- nents, and extract the features corresponding to each component. The support of NSF award ITR-0086075 is gratefully acknowl- edged ER - TY - CONF T1 - Footloose: a case for physical eventual consistency and selective conflict resolution T2 - Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on Y1 - 2003 A1 - Paluska A1 - Saff A1 - Yeh A1 - Chen AB - Users are increasingly inundated with small devices with communication and storage capabilities. Unfortunately, the user is still responsible for reconciling all of the devices whenever a change is made. We present Footloose, a user-centered data store that can share data and reconcile conflicts across diverse devices. Footloose is an optimistic system based on physical eventual consistency: consistency based on the movement of devices, and selective conflict resolution, which allows conflicts to flow through devices that cannot resolve the conflict to devices that can. Using these techniques, Footloose can present consistent views of data on the devices closest to the user without user interaction. JA - Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on PB - IEEE SN - 0-7695-1995-4 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1240778 M3 - 10.1109/MCSA.2003.1240778 ER - TY - CONF T1 - Forward secrecy in password-only key exchange protocols T2 - Proceedings of the 3rd international conference on Security in communication networks Y1 - 2003 A1 - Katz, Jonathan A1 - Ostrovsky,Rafail A1 - Yung,Moti AB - Password-only authenticated key exchange (PAKE) protocols are designed to be secure even when users choose short, easily-guessed passwords. Security requires, in particular, that the protocol cannot be broken by an off-line dictionary attack in which an adversary enumerates all possible passwords in an attempt to determine the correct one based on previously-viewed transcripts. Recently, provably-secure protocols for PAKE were given in the idealized random oracle/ideal cipher models [2,8,19] and in the standard model based on general assumptions [11] or the DDH assumption [14]. The latter protocol (the KOY protocol) is currently the only known practical solution based on standard assumptions. However, only a proof of basic security for this protocol has appeared. In the basic setting the adversary is assumed not to corrupt clients (thereby learning their passwords) or servers (thereby modifying the value of stored passwords). Simplifying and unifying previous work, we present a natural definition of security which incorporates the more challenging requirement of forward secrecy. We then demonstrate via an explicit attack that the KOY protocol as originally presented is not secure under this definition. This provides the first natural example showing that forward secrecy is a strictly stronger requirement for PAKE protocols. Finally, we present a slight modification of the KOY protocol which prevents the attack and - as the main technical contribution of this paper - rigorously prove that the modified protocol achieves forward secrecy. JA - Proceedings of the 3rd international conference on Security in communication networks T3 - SCN'02 PB - Springer-Verlag CY - Berlin, Heidelberg SN - 3-540-00420-3 UR - http://dl.acm.org/citation.cfm?id=1766811.1766816 ER - TY - CHAP T1 - Gait Analysis for Human Identification T2 - Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication Y1 - 2003 A1 - Kale, A. A1 - Cuntoor, N. A1 - Yegnanarayana,B. A1 - Rajagopalan, AN A1 - Chellapa, Rama ED - Kittler,Josef ED - Nixon,Mark AB - Human gait is an attractive modality for recognizing people at a distance. In this paper we adopt an appearance-based approach to the problem of gait recognition. The width of the outer contour of the binarized silhouette of a walking person is chosen as the basic image feature. Different gait features are extracted from the width vector such as the dowsampled, smoothed width vectors, the velocity profile etc. and sequences of such temporally ordered feature vectors are used for representing a person’s gait. We use the dynamic time-warping (DTW) approach for matching so that non-linear time normalization may be used to deal with the naturally-occuring changes in walking speed. The performance of the proposed method is tested using different gait databases. JA - Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 2688 SN - 978-3-540-40302-9 UR - http://dx.doi.org/10.1007/3-540-44887-X_82 ER - TY - PAT T1 - Human visual model for data hiding Y1 - 2003 A1 - M. Wu A1 - Yu,Hong Heather ED - Matsushita Electric Industrial Co., Ltd. AB - A method and apparatus of hiding identification data in visual media. When image or video data is received, frequency masking is performed to divide the image or video data into blocks of smooth regions and blocks of non-smooth regions and to obtain preliminary just-noticeable-difference. Edge detection is performed to divide the non-smooth region of the image or video data into texture blocks and edge blocks. Then blocks of regions that are substantially proximate to blocks of smooth regions of the image or video data are determined. The image or video data is then adjusted by applying different strength of watermark in association with the type of each block. VL - : 09/691,544 UR - http://www.google.com/patents?id=aNgOAAAAEBAJ CP - 6611608 ER - TY - CONF T1 - Improved fast gauss transform and efficient kernel density estimation T2 - Computer Vision, 2003. Proceedings. Ninth IEEE International Conference on Y1 - 2003 A1 - Yang,C. A1 - Duraiswami, Ramani A1 - Gumerov, Nail A. A1 - Davis, Larry S. KW - adaptive KW - algorithm;multivariate KW - complexity;computer KW - complexity;Gaussian KW - computational KW - density KW - estimation;mean KW - expansion KW - Gauss KW - processes;computational KW - recognition;quadratic KW - scheme;pattern KW - shift KW - space KW - subdivision KW - technique;computer KW - theory; KW - transform;kernel KW - vision;estimation KW - vision;fast AB - Evaluating sums of multivariate Gaussians is a common computational task in computer vision and pattern recognition, including in the general and powerful kernel density estimation technique. The quadratic computational complexity of the summation is a significant barrier to the scalability of this algorithm to practical applications. The fast Gauss transform (FGT) has successfully accelerated the kernel density estimation to linear running time for low-dimensional problems. Unfortunately, the cost of a direct extension of the FGT to higher-dimensional problems grows exponentially with dimension, making it impractical for dimensions above 3. We develop an improved fast Gauss transform to efficiently estimate sums of Gaussians in higher dimensions, where a new multivariate expansion scheme and an adaptive space subdivision technique dramatically improve the performance. The improved FGT has been applied to the mean shift algorithm achieving linear computational complexity. Experimental results demonstrate the efficiency and effectiveness of our algorithm. JA - Computer Vision, 2003. Proceedings. Ninth IEEE International Conference on M3 - 10.1109/ICCV.2003.1238383 ER - TY - JOUR T1 - Intrusion-resilient public-key encryption JF - Topics in Cryptology—CT-RSA 2003 Y1 - 2003 A1 - Dodis,Y. A1 - Franklin,M. A1 - Katz, Jonathan A1 - Miyaji,A. A1 - Yung,M. AB - Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilience [17] (which extends both the notions of forward security [3], [5] and key insulation [11]) was proposed as a means of mitigating the harmful effects that key exposure can have. In this model, time is divided into distinct periods; the public key remains fixed throughout the lifetime of the protocol but the secret key is periodically updated. Secret information is stored by both a user and a base; the user performs all cryptographic operations during a given time period, while the base helps the user periodically update his key. Intrusion-resilient schemes remain secure in the face of multiple compromises of both the user and the base, as long as they are not both compromised simultaneously. Furthermore, in case the user and base are compromised simultaneously, prior time periods remain secure (as in forward-secure schemes). Intrusion-resilient signature schemes have been previously constructed [17], [15]. Here, we give the first construction of an intrusion-resilient publickey encryption scheme, based on the recently-constructed forwardsecure encryption scheme of [8]. We also consider generic transformations for securing intrusion-resilient encryption schemes against chosenciphertext attacks. M3 - 10.1007/3-540-36563-X_2 ER - TY - CONF T1 - Learning dynamics for exemplar-based gesture recognition T2 - Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on Y1 - 2003 A1 - Elgammal,A. A1 - Shet,V. A1 - Yacoob,Yaser A1 - Davis, Larry S. KW - arbitrary KW - body KW - by KW - Computer KW - constraint; KW - detection; KW - discrete KW - distribution KW - dynamics; KW - edge KW - estimation; KW - example; KW - exemplar KW - exemplar-based KW - extraction; KW - feature KW - framework; KW - gesture KW - gesture; KW - hidden KW - HMM; KW - human KW - image KW - learning KW - Markov KW - matching; KW - model; KW - models; KW - motion; KW - nonparametric KW - pose KW - probabilistic KW - recognition; KW - sequence; KW - space; KW - state; KW - statistics; KW - system KW - temporal KW - tool; KW - view-based KW - vision; AB - This paper addresses the problem of capturing the dynamics for exemplar-based recognition systems. Traditional HMM provides a probabilistic tool to capture system dynamics and in exemplar paradigm, HMM states are typically coupled with the exemplars. Alternatively, we propose a non-parametric HMM approach that uses a discrete HMM with arbitrary states (decoupled from exemplars) to capture the dynamics over a large exemplar space where a nonparametric estimation approach is used to model the exemplar distribution. This reduces the need for lengthy and non-optimal training of the HMM observation model. We used the proposed approach for view-based recognition of gestures. The approach is based on representing each gesture as a sequence of learned body poses (exemplars). The gestures are recognized through a probabilistic framework for matching these body poses and for imposing temporal constraints between different poses using the proposed non-parametric HMM. JA - Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on VL - 1 M3 - 10.1109/CVPR.2003.1211405 ER - TY - CONF T1 - Mean-shift analysis using quasiNewton methods T2 - Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on Y1 - 2003 A1 - Yang,C. A1 - Duraiswami, Ramani A1 - DeMenthon,D. A1 - Davis, Larry S. KW - analysis; KW - classification; KW - clustering KW - clustering; KW - Convergence KW - density KW - estimation; KW - feature-space KW - image KW - irregular KW - iterative KW - Mean-shift KW - method; KW - methods; KW - Newton KW - nonparametric KW - pattern KW - procedure; KW - quasiNewton KW - rates; KW - segmentation; KW - technique; KW - topography; AB - Mean-shift analysis is a general nonparametric clustering technique based on density estimation for the analysis of complex feature spaces. The algorithm consists of a simple iterative procedure that shifts each of the feature points to the nearest stationary point along the gradient directions of the estimated density function. It has been successfully applied to many applications such as segmentation and tracking. However, despite its promising performance, there are applications for which the algorithm converges too slowly to be practical. We propose and implement an improved version of the mean-shift algorithm using quasiNewton methods to achieve higher convergence rates. Another benefit of our algorithm is its ability to achieve clustering even for very complex and irregular feature-space topography. Experimental results demonstrate the efficiency and effectiveness of our algorithm. JA - Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on VL - 2 M3 - 10.1109/ICIP.2003.1246713 ER - TY - JOUR T1 - Reduction of Cholera in Bangladeshi Villages by Simple Filtration JF - Proceedings of the National Academy of SciencesPNAS Y1 - 2003 A1 - Rita R Colwell A1 - Huq,Anwar A1 - M. Sirajul Islam A1 - K. M. A. Aziz A1 - Yunus,M. A1 - N. Huda Khan A1 - A. Mahmud A1 - Sack,R. Bradley A1 - Nair,G. B. A1 - J. Chakraborty A1 - Sack,David A. A1 - E. Russek-Cohen AB - Based on results of ecological studies demonstrating that Vibrio cholerae, the etiological agent of epidemic cholera, is commensal to zooplankton, notably copepods, a simple filtration procedure was developed whereby zooplankton, most phytoplankton, and particulates >20 μm were removed from water before use. Effective deployment of this filtration procedure, from September 1999 through July 2002 in 65 villages of rural Bangladesh, of which the total population for the entire study comprised ≈133,000 individuals, yielded a 48% reduction in cholera (P < 0.005) compared with the control. VL - 100 SN - 0027-8424, 1091-6490 UR - http://www.pnas.org/content/100/3/1051 CP - 3 M3 - 10.1073/pnas.0237386100 ER - TY - JOUR T1 - Scalable protocols for authenticated group key exchange JF - Advances in Cryptology-CRYPTO 2003 Y1 - 2003 A1 - Katz, Jonathan A1 - Yung,M. AB - We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have been proposed; however, all provably-secure solutions thus far are not scalable and, in particular, require n rounds. Our main contribution is the first scalable protocol for this problem along with a rigorous proof of security in the standard model under the DDH assumption; our protocol uses a constant number of rounds and requires only O(1) modular exponentiations per user (for key derivation). Toward this goal and of independent interest, we first present a scalable compiler that transforms any group key-exchange protocol secure against a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls all communication in the network. This compiler adds only one round and O(1) communication (per user) to the original scheme. We then prove secure — against a passive adversary — a variant of the two-round group key-exchange protocol of Burmester and Desmedt. Applying our compiler to this protocol results in a provably-secure three-round protocol for authenticated group key exchange which also achieves forward secrecy. M3 - 10.1007/978-3-540-45146-4_7 ER - TY - CONF T1 - A secure service discovery protocol for MANET T2 - 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003 Y1 - 2003 A1 - Yuan Yuan A1 - Arbaugh, William A. KW - ad hoc networks KW - centralized administration KW - Computer architecture KW - Computer science KW - dynamic service discovery infrastructure KW - Educational institutions KW - MANET KW - Manuals KW - mobile ad hoc network KW - Mobile ad hoc networks KW - Mobile computing KW - mobile radio KW - noninfrastructure network KW - Pervasive computing KW - Protocols KW - routing protocols KW - secure service discovery protocol KW - Security KW - service discovery techniques KW - service discovery technologies KW - telecommunication computing KW - telecommunication services KW - XML AB - Service discovery technologies are exploited to enable services to advertise their existence in a dynamic way, and can be discovered, configured and used by other devices with minimum manual efforts. It plays an essential role in future network scenarios especially with development of mobile ad hoc network (MANET) and emergence of pervasive computing. Because MANET allows these devices to communicate dynamically without fixed infrastructure and centralized administration, it gives rise to the challenges of the service discovery techniques. In this paper, we present a dynamic service discovery infrastructure that uses XML to describe services and match using the semantic content of service descriptions for MANET. We believe that the architecture we have designed is a necessary component of service discovery in non-infrastructure network by further exploring the secure and performance issues of this infrastructure. JA - 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003 PB - IEEE VL - 1 SN - 0-7803-7822-9 M3 - 10.1109/PIMRC.2003.1264322 ER - TY - CONF T1 - Shape and motion driven particle filtering for human body tracking T2 - Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on Y1 - 2003 A1 - Yamamoto, T. A1 - Chellapa, Rama KW - 3D KW - body KW - broadcast KW - camera; KW - cameras; KW - estimation; KW - Filtering KW - framework; KW - human KW - image KW - MOTION KW - motion; KW - particle KW - processing; KW - rotational KW - sequence; KW - sequences; KW - signal KW - single KW - static KW - theory; KW - tracking; KW - TV KW - video AB - In this paper, we propose a method to recover 3D human body motion from a video acquired by a single static camera. In order to estimate the complex state distribution of a human body, we adopt the particle filtering framework. We present the human body using several layers of representation and compose the whole body step by step. In this way, more effective particles are generated and ineffective particles are removed as we process each layer. In order to deal with the rotational motion, the frequency of rotation is obtained using a preprocessing operation. In the preprocessing step, the variance of the motion field at each image is computed, and the frequency of rotation is estimated. The estimated frequency is used for the state update in the algorithm. We successfully track the movement of figure skaters in TV broadcast image sequence, and recover the 3D shape and motion of the skater. JA - Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on VL - 3 M3 - 10.1109/ICME.2003.1221248 ER - TY - JOUR T1 - SHOP2: An HTN planning system JF - J. Artif. Intell. Res. (JAIR) Y1 - 2003 A1 - Nau, Dana S. A1 - Au,T. C A1 - Ilghami,O. A1 - Kuter,U. A1 - Murdock,J. W. A1 - Wu,D. A1 - Yaman,F. AB - The SHOP2 planning system received one of the awards for distinguished performance in the 2002 International Planning Competition. This paper describes the features of SHOP2 which enabled it to excel in the competition, especially those aspects of SHOP2 that deal with temporal and metric planning domains. VL - 20 UR - https://www.aaai.org/Papers/JAIR/Vol20/JAIR-2013.pdf ER - TY - CONF T1 - Tracking a moving speaker using excitation source information T2 - Eighth European Conference on Speech Communication and Technology Y1 - 2003 A1 - Raykar,V.C. A1 - Duraiswami, Ramani A1 - Yegnanarayana,B. A1 - Prasanna,S. R.M AB - Microphone arrays are widely used to detect, locate, and track a stationary or moving speaker. The first step is to estimate the time delay, between the speech signals received by a pair of microphones. Conventional methods like generalized cross-correlation are based on the spectral content of the vocal tract system in the speech signal. The spectral content of the speech signal is affected due to degradations in the speech signal caused by noise and reverberation. However, features corresponding to the excitation source of speech are less affected by such degradations. This paper proposes a novel method to estimate the time delays using the excitation source information in speech. The estimated delays are used to get the position of the moving speaker. The proposed method is compared with the spectrum-based approach using real data from a microphone array setup. JA - Eighth European Conference on Speech Communication and Technology ER - TY - CONF T1 - VASCO: visualizing and animating spatial constructs and operations T2 - Proceedings of the nineteenth annual symposium on Computational geometry Y1 - 2003 A1 - Brabec,Frantivsek A1 - Samet, Hanan A1 - Yilmaz,Cemal KW - k-d trees KW - Nearest neighbor algorithms KW - quadtrees KW - R-trees KW - Visualization AB - A video is used to demonstrate a set of spatial index JAVA applets that enable users on the worldwide web to experiment with a number of variants of the quadtree spatial data structure for different spatial data types, and, most importantly, enable them to see in an animated manner how a number of basic search operations are executed for them. The spatial data types are points, line segments, rectangles, and regions. The search operations are the window query (i.e., a spatial range query) and a nearest neighbor query that enables ranking spatial objects in the order of their distance from a given query object. The representations and algorithms are visualized and animated in a consistent manner using the same primitives and colors so that the differences between the effects of the representations can be easily understood. The video demonstrates the PR quadtree, PM1 quadtree, and R-tree. The applets can be found at: www.cs.umd.edu/~hjs/quadtree/. JA - Proceedings of the nineteenth annual symposium on Computational geometry T3 - SCG '03 PB - ACM CY - New York, NY, USA SN - 1-58113-663-3 UR - http://doi.acm.org/10.1145/777792.777849 M3 - 10.1145/777792.777849 ER - TY - CONF T1 - View synthesis of articulating humans using visual hull T2 - Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on Y1 - 2003 A1 - Yue,Zhanfeng A1 - Liang Zhao A1 - Chellapa, Rama KW - analysis; KW - body KW - convex KW - gesture KW - hull; KW - human KW - image KW - image-based KW - image; KW - mapping; KW - MOTION KW - part KW - parts; KW - postures; KW - recognition; KW - reconstruction; KW - segmentation; KW - silhouette KW - synthesis; KW - TEXTURE KW - texture; KW - view KW - virtual KW - visual AB - In this paper, we present a method, which combines image-based visual hull and human body part segmentation for overcoming the inability of the visual hull method to reconstruct concave regions. The virtual silhouette image corresponding to the given viewing direction is first produced with image-based visual hull. Human body part localization technique is used to segment the input images and the rendered virtual silhouette image into convex body parts. The body parts in the virtual view are generated separately from the corresponding body parts in the input views and then assembled together. The previously rendered silhouette image is used to locate the corresponding body parts in input views and avoid the unconnected or squeezed regions in the assembled final view. Experiments show that this method can improve the reconstruction of concave regions for human postures and texture mapping. JA - Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on VL - 1 M3 - 10.1109/ICME.2003.1220961 ER - TY - JOUR T1 - Embedded grammar tags: advancing natural language interaction on the Web JF - Intelligent Systems, IEEE Y1 - 2002 A1 - Dorai,G. K A1 - Yacoob,Yaser KW - embedded grammar tags KW - grammars KW - information content KW - information resources KW - intelligent agents KW - Internet KW - natural language interaction KW - natural language queries KW - natural languages KW - Search engines KW - semantic Web page representation KW - software agents KW - speech output generation KW - Speech recognition KW - speech recognition engines KW - Web page content AB - Embedded grammar tags (EGTs) reflect Web page content by anticipating queries users might launch to retrieve that content. The grammars provide a unifying component for speech recognition engines, semantic Web page representation, and speech output generation. We propose a new framework that lets intelligent agents discover accurate, concise responses to natural language queries. This framework's backbone consists of embedded grammar tags that capture natural language queries. EGTs reflect information content in Web pages by anticipating the queries that users might launch to retrieve particular content. VL - 17 SN - 1541-1672 CP - 1 M3 - 10.1109/5254.988450 ER - TY - JOUR T1 - Genome sequence and comparative analysis of the model rodent malaria parasite Plasmodium yoelii yoelii JF - Nature Y1 - 2002 A1 - Carlton,Jane M. A1 - Angiuoli,Samuel V A1 - Suh,Bernard B. A1 - Kooij,Taco W. A1 - Pertea,Mihaela A1 - Silva,Joana C. A1 - Ermolaeva,Maria D. A1 - Allen,Jonathan E A1 - Jeremy D Selengut A1 - Koo,Hean L. A1 - Peterson,Jeremy D. A1 - Pop, Mihai A1 - Kosack,Daniel S. A1 - Shumway,Martin F. A1 - Bidwell,Shelby L. A1 - Shallom,Shamira J. A1 - Aken,Susan E. van A1 - Riedmuller,Steven B. A1 - Feldblyum,Tamara V. A1 - Cho,Jennifer K. A1 - Quackenbush,John A1 - Sedegah,Martha A1 - Shoaibi,Azadeh A1 - Cummings,Leda M. A1 - Florens,Laurence A1 - Yates,John R. A1 - Raine,J. Dale A1 - Sinden,Robert E. A1 - Harris,Michael A. A1 - Cunningham,Deirdre A. A1 - Preiser,Peter R. A1 - Bergman,Lawrence W. A1 - Vaidya,Akhil B. A1 - Lin,Leo H. van A1 - Janse,Chris J. A1 - Waters,Andrew P. A1 - Smith,Hamilton O. A1 - White,Owen R. A1 - Salzberg,Steven L. A1 - Venter,J. Craig A1 - Fraser,Claire M. A1 - Hoffman,Stephen L. A1 - Gardner,Malcolm J. A1 - Carucci,Daniel J. AB - Species of malaria parasite that infect rodents have long been used as models for malaria disease research. Here we report the whole-genome shotgun sequence of one species, Plasmodium yoelii yoelii, and comparative studies with the genome of the human malaria parasite Plasmodium falciparum clone 3D7. A synteny map of 2,212 P. y. yoelii contiguous DNA sequences (contigs) aligned to 14 P. falciparum chromosomes reveals marked conservation of gene synteny within the body of each chromosome. Of about 5,300 P. falciparum genes, more than 3,300 P. y. yoelii orthologues of predominantly metabolic function were identified. Over 800 copies of a variant antigen gene located in subtelomeric regions were found. This is the first genome sequence of a model eukaryotic parasite, and it provides insight into the use of such systems in the modelling of Plasmodium biology and disease. VL - 419 SN - 0028-0836 UR - http://www.nature.com/nature/journal/v419/n6906/full/nature01099.html CP - 6906 M3 - 10.1038/nature01099 ER - TY - JOUR T1 - Genomic profiles of clinical and environmental isolates of Vibrio cholerae O1 in cholera-endemic areas of Bangladesh JF - Proceedings of the National Academy of Sciences Y1 - 2002 A1 - Zo,Y. G. A1 - Rivera,I. N. G. A1 - E. Russek-Cohen A1 - Islam,M. S. A1 - Siddique,A. K. A1 - Yunus,M. A1 - Sack,R. B. A1 - Huq,A. A1 - Rita R Colwell AB - Diversity, relatedness, and ecological interactions of toxigenic Vibrio cholerae O1 populations in two distinctive habitats, the human intestine and the aquatic environment, were analyzed. Twenty environmental isolates and 42 clinical isolates were selected for study by matching serotype, geographic location of isolation in Bangladesh, and season of isolation. Genetic profiling was done by enterobacterial repetitive intergenic consensus sequence–PCR, optimized for profiling by using the fully sequenced V. cholerae El Tor N16961 genome. Five significant clonal clusters of haplotypes were found from 57 electrophoretic types. Isolates from different areas or habitats intermingled in two of the five significant clusters. Frequencies of haplotypes differed significantly only between the environmental populations (exact test; P < 0.05). Analysis of molecular variance yielded a population genetic structure reflecting the differentiating effects of geographic area, habitat, and sampling time. Although a parameter confounding the latter differences explained 9% of the total molecular variance in the entire population (P < 0.01), the net effect of habitat and time could not be separated because of the small number of environmental isolates included in the study. Five subpopulations from a single area were determined, and from these we were able to estimate a relative differentiating effect of habitat, which was small compared with the effect of temporal change. In conclusion, the resulting population structure supports the hypothesis that spatial and temporal fluctuations in the composition of toxigenic V. cholerae populations in the aquatic environment can cause shifts in the dynamics of the disease. VL - 99 SN - 0027-8424, 1091-6490 UR - http://www.pnas.org/content/99/19/12409 CP - 19 M3 - 10.1073/pnas.192426499 ER - TY - CONF T1 - The importance of lexicalized syntax models for natural language generation tasks T2 - Proc. of INLG Y1 - 2002 A1 - Daumé, Hal A1 - Knight,K. A1 - Langkilde-Geary,I. A1 - Marcu,D. A1 - Yamada,K. JA - Proc. of INLG ER - TY - JOUR T1 - Incremental unforgeable encryption JF - Fast Software Encryption Y1 - 2002 A1 - Buonanno,E. A1 - Katz, Jonathan A1 - Yung,M. AB - The recent selection of the AES block cipher to replace DES has generated interest in developing new modes of operation to supplement the modes defined as part of the DES standard [1,16,23]. We initiate the study of modes of encryption which are both incremental and unforgeable, and point out a number of applications for modes meeting these requirements. We also propose three specific modes achieving these goals, and discuss the strengths and weaknesses of each. M3 - 10.1007/3-540-45473-X_9 ER - TY - JOUR T1 - Key-insulated public key cryptosystems JF - Advances in Cryptology—Eurocrypt 2002 Y1 - 2002 A1 - Dodis,Y. A1 - Katz, Jonathan A1 - Xu,S. A1 - Yung,M. AB - Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret key(s) stored on the insecure device are refreshed at discrete time periods via inter-action with a physically-secure - but computationally-limited - device which stores a “master key”. All cryptographic computations are still done on the insecure device, and the public key remains unchanged. In a (t, N)-key-insulated scheme, an adversary who compromises the insecure device and obtains secret keys for up to t periods of his choice is unable to violate the security of the cryptosystem for any of the remaining N - t periods. Furthermore, the scheme remains secure (for all time periods) against an adversary who compromises only the physically-secure device. We focus primarily on key-insulated public-key encryption. We construct a (t, N)-key-insulated encryption scheme based on any (standard) public-key encryption scheme, and give a more efficient construction based on the DDH assumption. The latter construction is then extended to achieve chosen-ciphertext security. M3 - 10.1007/3-540-46035-7_5 ER - TY - JOUR T1 - Media Conversion from Visual to Audio: Voice Browsers JF - Technical Reports of the Computer Science Department Y1 - 2002 A1 - Youssef,Adel A1 - Shneiderman, Ben KW - Technical Report AB - There is a large amount of information on the World Wide Web that is atthe fingertips of anyone with access to the internet. However, so far this information has primarily been used by people who connect to the web via traditional computer. This is about to change. Recent advances in wireless communication, speech recognition, and speech synthesis technologies have made it possible to access this information from any place, and at any time. In this paper, we discuss voice browsers as compared to current web browsers. Some of the primary techniques of universal accessible design are listed with their relation to voice browsers and some ideas are offered to help authors implementing these considerations when designing web pages. The new voice markup language is briefly discussed. UR - http://drum.lib.umd.edu/handle/1903/534 ER - TY - PAT T1 - Methods and apparatus for multi-layer data hiding Y1 - 2002 A1 - Yu,Hong Heather A1 - M. Wu A1 - Li,Xin A1 - Gelman,Alexander D. ED - Matsushita Electric Industrial Co., Ltd. AB - A data hiding system and method for providing a method of embedding multiple layers of hidden data into multimedia data. First, a media unit of the multimedia data is evaluated to determine an appropriate embedding procedure. Next during a first embedding pass, a ruling layer of primary hidden data is embedded into the media unit. In another embedding pass, a governing layer of secondary hidden data is embedded on top of the ruling layer. The secondary hidden data provides control information for controlling the primary hidden data and the host data. Control information such as error correction data, synchronization data, decoding data, and authentication data is embedded in the governing layer. Embedding schemes such as base domain and spectrum domain embedding are employed. VL - : 09/427,321 UR - http://www.google.com/patents?id=1KYLAAAAEBAJ CP - 6456726 ER - TY - JOUR T1 - Omnibase: Uniform access to heterogeneous data for question answering JF - Natural Language Processing and Information Systems Y1 - 2002 A1 - Katz,B. A1 - Felshin,S. A1 - Yuret,D. A1 - Ibrahim,A. A1 - Jimmy Lin A1 - Marton,G. A1 - Jerome McFarland,A. A1 - Temelkuran,B. AB - Although the World Wide Web contains a tremendous amount of information, the lack of uniform structure makes finding the right knowledge difficult. A solution is to turn the Web into a “virtual database” and to access it through natural language.We built Omnibase, a system that integrates heterogeneous data sources using an object- property-value model. With the help of Omnibase, our Start natural language system can now access numerous heterogeneous data sources on the Web in a uniform manner, and answers millions of user questions with high precision. M3 - 10.1007/3-540-36271-1_23 ER - TY - JOUR T1 - A Probabilistic Clustering-Based Indoor Location Determination System JF - Technical Reports from UMIACS, UMIACS-TR-2002-30 Y1 - 2002 A1 - Youssef,Moustafa A A1 - Agrawala, Ashok K. A1 - A. Udaya Shankar A1 - Noh,Sam H KW - Technical Report AB - We present an indoor location determination system based on signalstrength probability distributions for tackling the noisy wireless channel and clustering to reduce computation requirements. We provide two implementation techniques, namely, Joint Clustering and Incremental Triangulation and describe their tradeoffs in terms of location determination accuracy and computation requirement. Both techniques have been incorporated in two implemented context-aware systems: User Positioning System and the Rover System, both running on Compaq iPAQ Pocket PC's with Familiar distribution of Linux for PDA's. The results obtained show that both techniques give the user location with over 90% accuracy to within 7 feet with very low computation requirements, hence enabling a set of context-aware applications. Also UMIACS-TR-2002-30 UR - http://drum.lib.umd.edu/handle/1903/1192 ER - TY - JOUR T1 - A robust error resilient approach for MPEG video transmission over internet JF - Visual Communication and Image Processing, SPIE Y1 - 2002 A1 - Yin,P. A1 - Wu,M. A1 - Liu,B. AB - In network delivery of compressed video, packets may be lost if the channel is unreliable. Such losses tend to occur inburst. In this paper, we develop an error resilient video encoding approach to help error concealment at the decoder. We introduce a new block shuffling scheme to isolate erroneous blocks caused by packet losses. And we apply data hiding to add additional protection for motion vectors. The incorporation of these scheme adds little complexity to the standard encoder. Experimental results suggest that our approach can achieve a reasonable quality for packet loss up to 30% over a wide range of video materials. VL - 4671 ER - TY - JOUR T1 - Rover: scalable location-aware computing JF - Computer Y1 - 2002 A1 - Banerjee,S. A1 - Agarwal,S. A1 - Kamel,K. A1 - Kochut, A. A1 - Kommareddy,C. A1 - Nadeem,T. A1 - Thakkar,P. A1 - Trinh,Bao A1 - Youssef,A. A1 - Youssef, M. A1 - Larsen,R.L. A1 - Udaya Shankar,A. A1 - Agrawala, Ashok K. KW - amusement KW - application-specific KW - architecture; KW - automation; KW - business KW - business; KW - computing; KW - data KW - entertainment; KW - handheld KW - humanities; KW - integration KW - LAN; KW - location-aware KW - malls; KW - mobile KW - museums; KW - office KW - parks; KW - processing; KW - resource KW - Rover; KW - scalability; KW - scalable KW - scheduling; KW - shopping KW - software KW - system KW - theme KW - units; KW - user; KW - wireless AB - All the components necessary for realizing location-aware computing are available in the marketplace today. What has hindered the widespread deployment of location-based systems is the lack of an integration architecture that scales with user populations. The authors have completed the initial implementation of Rover, a system designed to achieve this sort of integration and to automatically tailor information and services to a mobile user's location. Their studies have validated Rover's underlying software architecture, which achieves system scalability through high-resolution, application-specific resource scheduling at the servers and network. The authors believe that this technology will greatly enhance the user experience in many places, including museums, amusement and theme parks, shopping malls, game fields, offices, and business centers. They designed the system specifically to scale to large user populations and expect its benefits to increase with them. VL - 35 SN - 0018-9162 CP - 10 M3 - 10.1109/MC.2002.1039517 ER - TY - CONF T1 - Smiling faces are better for face recognition T2 - Fifth IEEE International Conference on Automatic Face and Gesture Recognition, 2002. Proceedings Y1 - 2002 A1 - Yacoob,Yaser A1 - Davis, Larry S. KW - between-class scatter matrices KW - Databases KW - discrimination power measure KW - dynamic scenarios KW - expressive faces KW - face recognition KW - facial expressions KW - performance KW - performance differences KW - smiling faces KW - software performance evaluation KW - Training KW - visual databases KW - within-class scatter matrices AB - This paper investigates face recognition during facial expressions. While face expressions have been treated as an adverse factor in standard face recognition approaches, our research suggests that, if a system has a choice in the selection of faces to use in training and recognition, its best performance would be obtained on faces displaying expressions. Naturally, smiling faces are the most prevalent (among expressive faces) for both training and recognition in dynamic scenarios. We employ a measure of discrimination power that is computed from between-class and within-class scatter matrices. Two databases are used to show the performance differences on different sets of faces JA - Fifth IEEE International Conference on Automatic Face and Gesture Recognition, 2002. Proceedings PB - IEEE SN - 0-7695-1602-5 M3 - 10.1109/AFGR.2002.1004132 ER - TY - JOUR T1 - Strong key-insulated signature schemes JF - Public Key Cryptography—PKC 2003 Y1 - 2002 A1 - Dodis,Y. A1 - Katz, Jonathan A1 - Xu,S. A1 - Yung,M. AB - Signature computation is frequently performed on insecure devices—e.g., mobile phones — operating in an environment where the private (signing)k ey is likely to be exposed. Strong key-insulated signature schemes are one way to mitigate the damage done when this occurs. In the key-insulated model [6], the secret key stored on an insecure device is refreshed at discrete time periods via interaction with a physically-secure device which stores a “master key”. All signing is still done by the insecure device, and the public key remains fixed throughout the lifetime of the protocol. In a strong (t,N)-key-insulated scheme, an adversary who compromises the insecure device and obtains secret keys for up to t periods is unable to forge signatures for any of the remaining N-t periods. Furthermore, the physically-secure device (or an adversary who compromises only this device)is unable to forge signatures for any time period.We present here constructions of strong key-insulated signature schemes based on a variety of assumptions. First, we demonstrate a generic construction of a strong (N— 1,N)-key-insulated signature scheme using any standard signature scheme. We then give a construction of a strong (t,N)-signature scheme whose security may be based on the discrete logarithm assumption in the random oracle model. This construction offers faster signing and verification than the generic construction, at the expense of O(t)k ey update time and key length. Finally, we construct strong (N —1,N)-key-insulated schemes based on any “trapdoor signature scheme” (a notion we introduce here); our resulting construction in fact serves as an identity-based signature scheme as well. This leads to very efficient solutions based on, e.g., the RSA assumption in the random oracle model. Work done in part while at DIMACS. M3 - 10.1007/3-540-36288-6_10 ER - TY - PAT T1 - System and method for entering text in a virtual environment Y1 - 2002 A1 - Evans,Francine A1 - Skiena,Steven A1 - Varshney, Amitabh ED - The Research Foundation of the State University of New York AB - A system and method for entering text in a virtual environment by sensory gloves. The user enters a key that represents one or more letters by simulating a press of a keyboard in the gloves. The user calibrates the gloves by entering text, during which time the system establishes threshold values that represent simulated presses for each finger. After the initial calibration of the sensory gloves, the user enters text with simulated finger presses. The system distinguishes which movements are intended as simulated finger presses by examining the relative motions of fingers and maintaining dynamic thresholds. Errors are alleviated by providing feedback to the user, such as beeps and a visual display of the fingers and the current text. Because keys may represent more than one character, the system determines the intended text by probabilistic analysis and the Viterbi algorithm. VL - : 09/364,433 UR - http://www.google.com/patents?id=w0QJAAAAEBAJ CP - 6407679 ER - TY - JOUR T1 - Threshold cryptosystems based on factoring JF - Advances in Cryptology—ASIACRYPT 2002 Y1 - 2002 A1 - Katz, Jonathan A1 - Yung,M. AB - We consider threshold cryptosystems over a composite modulus N where the factors of N are shared among the participants as the secret key. This is a new paradigm for threshold cryptosystems based on a composite modulus, differing from the typical treatment of RSA-based systems where a “decryption exponent” is shared among the participants. Our approach yields solutions to some open problems in threshold cryptography; in particular, we obtain the following:1 Threshold Homomorphic Encryption. A number of applications (e.g., electronic voting or efficient multi-party computation) require threshold homomorphic encryption schemes. We present a protocol for threshold decryption of the homomorphic Goldwasser-Micali encryption scheme [34], answering an open question of [21]. 2 Threshold Cryptosystems as Secure as Factoring. We describe a threshold version of a variant of the signature standards ISO 9796-2 and PKCS#1 v1.5 (cf. [39, Section 11.3.4]), thus giving the first threshold signature scheme whose security (in the random oracle model) is equivalent to the hardness of factoring [12]. Our techniques may be adapted to distribute the Rabin encryption scheme [44] whose semantic security may be reduced to the hardness of factoring. 3 Efficient Threshold Schemes without a Trusted Dealer. Because our schemes only require sharing of N - which furthermore need not be a product of strong primes - our schemes are very efficient (compared to previous schemes) when a trusted dealer is not assumed and key generation is done in a distributed manner. Extensions to achieve robustness and proactivation are also possible with our schemes. Work done while at Columbia University and Telcordia Technologies M3 - 10.1007/3-540-36178-2_12 ER - TY - JOUR T1 - Virtual Telescopes in Education JF - Journal of Digital Information Y1 - 2002 A1 - Hoban,S. A1 - desJardins, Marie A1 - Farrell,N. A1 - Rathod,P. A1 - Sachs,J. A1 - Sansare,S. A1 - Yesha,Y. A1 - Keating,J. A1 - Busschots,B. A1 - Means,J. A1 - others AB - Virtual Telescopes in Education is providing the services required to operate a virtual observatory comprising distributed telescopes, including an interactive, constraint-based scheduling service, data and resource archive, proposal preparation and review environment, and a VTIE Journal. A major goal of VTIE is to elicit from learners questions about the nature of celestial objects and the physical processes that give rise to the spectacular imagery that catches their imaginations. Generation of constrained science questions will assist learners in the science process. To achieve interoperability with other NSDL resources, our approach follows the Open Archives Initiative and the W3C Semantic Web activity. VL - 2 CP - 4 ER - TY - CONF T1 - Attentive toys T2 - International Conference on Multimedia and Expo Y1 - 2001 A1 - Haritaoglu,I. A1 - Cozzi,A. A1 - Koons,D. A1 - Flickner,M. A1 - Zotkin,Dmitry N A1 - Yacoob,Yaser JA - International Conference on Multimedia and Expo VL - 22 ER - TY - JOUR T1 - Efficient password-authenticated key exchange using human-memorable passwords JF - Advances in Cryptology—EUROCRYPT 2001 Y1 - 2001 A1 - Katz, Jonathan A1 - Ostrovsky,R. A1 - Yung,M. AB - There has been much interest in password-authenticated keyexchange protocols which remain secure even when users choose passwords from a very small space of possible passwords (say, a dictionary of English words). Under this assumption, one must be careful to design protocols which cannot be broken using off-line dictionary attacks in which an adversary enumerates all possible passwords in an attempt to determine the correct one. Many heuristic protocols have been proposed to solve this important problem. Only recently have formal validations of security (namely, proofs in the idealized random oracle and ideal cipher models) been given for specific constructions [3,10,22].Very recently, a construction based on general assumptions, secure in the standard model with human-memorable passwords, has been proposed by Goldreich and Lindell [17]. Their protocol requires no public parameters; unfortunately, it requires techniques from general multi-party computation which make it impractical. Thus, [17] only proves that solutions are possible “in principal”. The main question left open by their work was finding an efficient solution to this fundamental problem. We showan efficient, 3-round, password-authenticated key exchange protocol with human-memorable passwords which is provably secure under the Decisional Diffie-Hellman assumption, yet requires only (roughly) 8 times more computation than “standard” Diffie-Hellman key exchange [14] (which provides no authentication at all). We assume public parameters available to all parties. We stress that we work in the standard model only, and do not require a “random oracle” assumption. M3 - 10.1007/3-540-44987-6_29 ER - TY - CONF T1 - Facilitating semantic web search with embedded grammar tags T2 - IJCAI Workshop on E-Business and Intelligent Web Y1 - 2001 A1 - Dorai,G. K A1 - Yacoob,Yaser JA - IJCAI Workshop on E-Business and Intelligent Web ER - TY - CONF T1 - A geometric algorithm for selecting optimal set of cutters for multi-part milling Y1 - 2001 A1 - Yao,Zhiyang A1 - Gupta, Satyandra K. A1 - Nau, Dana S. KW - computer-aided process planning KW - milling cutter selection AB - For the manufacture of milled parts, it is well known that the size of the cutter significantly affects the machining time. However, for small-batch manufacturing, the time spent on loading tools into the tool magazine and establishing z-length compensation values is just as important. If we can select a set of milling tools that will produce good machining time on more than one type of parts, then several unnecessary machine-tool reconfiguration operations can be eliminated. This paper describes a geometric algorithm for finding an optimal set of cutters for machining a set of 2½D parts. In selecting milling cutters we consider both the tool loading time and the machining time and generate solutions that allow us to minimize the total machining time. Our problem formulation addresses the general problem of how to cover a target region to be milled with a cylindrical cutter without intersecting with the obstruction region; this definition allows us to handle both open and closed edges in the target region. Our algorithm improves upon previous work in the tool selection area in following ways: (1) in selecting cutters, it accounts for the tool loading time, and (2) it can simultaneously consider multiple different parts and select the optimal set of cutters to minimize the total manufacturing time. T3 - SMA '01 PB - ACM CY - New York, NY, USA SN - 1-58113-366-9 UR - http://doi.acm.org/10.1145/376957.376973 M3 - 10.1145/376957.376973 ER - TY - JOUR T1 - Gesture-Driven Control of Spaces and Objects in Collaborative Augmented Reality JF - GMD–Forschungszentrum Informationstechnik GmbH Y1 - 2001 A1 - Yacoob,Yaser A1 - Davis, Larry S. ER - TY - JOUR T1 - The role of a natural language conversational interface in online sales: A case study JF - International Journal of Speech Technology Y1 - 2001 A1 - Chai,J. A1 - Jimmy Lin A1 - Zadrozny,W. A1 - Ye,Y. A1 - Stys-Budzikowska,M. A1 - Horvath,V. A1 - Kambhatla,N. A1 - Wolf,C. AB - This paper describes the evaluation of a natural language dialog-based navigation system (HappyAssistant) that helps users access e-commerce sites to find relevant information about products and services. The prototype system leverages technologies in natural language processing and human-computer interaction to create a faster and more intuitive way of interacting with websites, especially for less experienced users. The result of a comparative study shows that users prefer the natural language-enabled navigation two to one over the menu driven navigation. In addition, the study confirmed the efficiency of using natural language dialog in terms of the number of clicks and the amount of time required to obtain the relevant information. In the case study, as compared to the menu driven system, the average number of clicks used in the natural language system was reduced by 63.2% and the average time was reduced by 33.3%. VL - 4 CP - 3 M3 - 10.1023/A:1011316909641 ER - TY - JOUR T1 - Unforgeable encryption and chosen ciphertext secure modes of operation JF - Fast Software Encryption Y1 - 2001 A1 - Katz, Jonathan A1 - Yung,M. AB - We find certain neglected issues in the study of private-key encryption schemes. For one, private-key encryption is generally held to the same standard of security as public-key encryption (i.e., indistinguishability) even though usage of the two is very different. Secondly, though the importance of secure encryption of single blocks is well known, the security of modes of encryption (used to encrypt multiple blocks) is often ignored. With this in mind, we present definitions of a new notion of security for private-key encryption called encryption unforgeability which captures an adversary’s inability to generate valid ciphertexts. We show applications of this definition to authentication protocols and adaptive chosen ciphertext security.Additionally, we present and analyze a new mode of encryption, RPC (for Related Plaintext Chaining), which is unforgeable in the strongest sense of the above definition. This gives the first mode provably secure against chosen ciphertext attacks. Although RPC is slightly less efficient than, say, CBC mode (requiring about 33% more block cipher applications and having ciphertext expansion of the same amount when using a block cipher with 128-bit blocksize), it has highly parallelizable encryption and decryption operations. M3 - 10.1007/3-540-44706-7_20 ER - TY - CHAP T1 - Active Networking Means Evolution (or Enhanced Extensibility Required) T2 - Active NetworksActive Networks Y1 - 2000 A1 - Hicks, Michael W. A1 - Nettles,Scott ED - Yasuda,Hiroshi AB - A primary goal of active networking is to increase the pace of network evolution. Evolution is typically achieved via extensibility; that is, typical active network implementations provide an interface to extend network nodes withdyna mically loaded code. Most implementations employ plug-in extensibility , a technique for loading code characterized by a concrete, pre-defined abstraction of future change. While flexible and convenient, we argue that plug-in extensibility alone is not sufficient for true network evolution. Instead, we propose dynamic software updating , a technique that reduces the a priori assumptions of plug-in extensibility, improving flexibility and eliminating the need to pre-plan extensions. However, this additional flexibility creates issues involving validity and security. We discuss these issues, and describe the state-of-the-art in systems that support dynamic software updating, thus framing the problem for researchers developing next-generation active networks. JA - Active NetworksActive Networks T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1942 SN - 978-3-540-41179-6 UR - http://dx.doi.org/10.1007/3-540-40057-5_2 ER - TY - CONF T1 - An assumptive logic programming methodology for parsing T2 - Tools with Artificial Intelligence, 2000. ICTAI 2000. Proceedings. 12th IEEE International Conference on Y1 - 2000 A1 - Voll,K. A1 - Tom Yeh A1 - Dahl,V. AB - We show how several novel tools in logic programming for AI (namely, continuation based linear and timeless assumptions, and datalog grammars) can assist us in producing terse treatments of difficult language processing phenomena. As a proof of concept, we present a concise parser for datalog grammars (logic grammars where strings are represented with numbered word boundaries rather than as lists of words), that uses assumptions and a combination of left-corner parsing and charting. We then study two test cases of this parser's application: complete constituent coordination, and error diagnosis and correction JA - Tools with Artificial Intelligence, 2000. ICTAI 2000. Proceedings. 12th IEEE International Conference on PB - IEEE Comput. Soc SN - 0-7695-0909-6 UR - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=889840 M3 - 10.1109/TAI.2000.889840 ER - TY - CONF T1 - Comparative Evaluation of a Natural Language Dialog Based System and a Menu-Driven System for Information Access: A Case Study T2 - In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000) Y1 - 2000 A1 - Chai,J. A1 - Jimmy Lin A1 - Zadrozny,W. A1 - Ye,Y. A1 - Budzikowska,M. A1 - Horvath,V. A1 - Kambhatla,N. A1 - Wolf,C. AB - This paper describes the evaluation of a natural language dialog based navigation system (HappyAssistant) thathelps users access e-commerce sites to find relevant information about products and services. The prototype system leverages technologies in natural language processing and human computer interaction to create a faster and more intuitive way of interacting with websites, especially for the less experienced users. The result of a comparative study shows that users prefer the natural language enabled navigation two to one over the menu driven navigation. In addition, the study confirmed the efficiency of using natural language dialog in terms of the number of clicks and the amount of time required to obtain the relevant information. In the case study, comparing to the menu driven system, the average number of clicks used in the natural language system was reduced by 63.2% and the average time was reduced by 33.3%. JA - In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000) ER - TY - CONF T1 - A comparison of voice controlled and mouse controlled web browsing T2 - Proceedings of the fourth international ACM conference on Assistive technologies Y1 - 2000 A1 - Christian,Kevin A1 - Kules,Bill A1 - Shneiderman, Ben A1 - Youssef,Adel KW - human-computer KW - interaction KW - User interfaces KW - voice browsers KW - voice recognition KW - web browsing JA - Proceedings of the fourth international ACM conference on Assistive technologies T3 - Assets '00 PB - ACM CY - New York, NY, USA SN - 1-58113-313-8 UR - http://doi.acm.org/10.1145/354324.354345 M3 - 10.1145/354324.354345 ER - TY - CONF T1 - Complete characterization of security notions for probabilistic private-key encryption T2 - Proceedings of the thirty-second annual ACM symposium on Theory of computing Y1 - 2000 A1 - Katz, Jonathan A1 - Yung,Moti JA - Proceedings of the thirty-second annual ACM symposium on Theory of computing T3 - STOC '00 PB - ACM CY - New York, NY, USA SN - 1-58113-184-4 UR - http://doi.acm.org/10.1145/335305.335335 M3 - 10.1145/335305.335335 ER - TY - JOUR T1 - Design and use of linear models for image motion analysis JF - International Journal of Computer Vision Y1 - 2000 A1 - Fleet,D. J A1 - Black,M. J A1 - Yacoob,Yaser A1 - Jepson,A. D VL - 36 CP - 3 ER - TY - CONF T1 - Event Detection from MPEGVideo in the Compressed Domain T2 - ICPR Y1 - 2000 A1 - Yoon,K. A1 - DeMenthon,D. A1 - David Doermann AB - The use of information in the compressed domain allows for the rapid analysis of video content using standard hardware. This paper describes two techniques for detecting dynamic events using the motion vectors obtained from the MPEG video encoding. In the first technique, feature vectors from motion information form a high dimensional curve for a video clip and curve simplication allows us to browse the clip along portions where interesting events are likely to happen. In the second technique, the camera motion, pan, tilt, and zoom are computed from the motion vectors, and the residual vectors which are not explained by the camera motion are regarded as generated by moving blobs. Events are detected from these moving blobs. JA - ICPR ER - TY - CONF T1 - Finding the maximal cutter for 2-D milling operations Y1 - 2000 A1 - Yao,Z. A1 - Gupta,S.K. A1 - Nau, Dana S. AB - In this paper, we describe a new geometricalgorithm to determine the biggest feasible cutter size for 2-D milling operations to be performed using a single cutter. In particular: • We give a general definition of the problem as the task of covering a target region without interfering with an obstruction region. This definition encompasses the task of milling a general 2-D profile that includes both open and closed edges. • We discuss three alternative definitions of what it means for a cutter to be feasible, and explain which of these definitions is most appropriate for the above problem. • We present a geometric algorithm for finding the maximal cutter for 2-D milling operations, and we give an outline of a proof that our algorithm is correct. UR - http://www.cs.umd.edu/~nau/papers/yao2000finding.pdf ER - TY - RPRT T1 - A Geometric Algorithm for Finding the Largest Milling Cutter Y1 - 2000 A1 - Yao,Zhiyang A1 - Gupta, Satyandra K. A1 - Nau, Dana S. KW - algorithms KW - computational geometry KW - computer aided manufacturing CAM KW - cutter selection KW - Manufacturing KW - Next-Generation Product Realization Systems KW - path planning AB - In this paper, we describe a new geometric algorithm to determine the largest feasible cutter size for2-D milling operations to be performed using a single cutter. In particular:

1. We give a general definition of the problem as the task of covering a target region without interfering with anobstruction region. This definition encompasses the task of milling a general 2-D profile that includes bothopen and closed edges.

2. We discuss three alternative definitions of what it means for a cutter to be feasible, and explain which of thesedefinitions is most appropriate for the above problem.

3. We present a geometric algorithm for finding the maximal cutter for 2-D milling operations, and we show thatour algorithm is correct. PB - Institute for Systems Research, University of Maryland, College Park VL - ISR; TR 2000-40 UR - http://drum.lib.umd.edu//handle/1903/6137 ER - TY - CONF T1 - A geometric algorithm for finding the maximal cutter for 2-D milling operations Y1 - 2000 A1 - Yao,Z. A1 - Gupta,S.K. A1 - Nau, Dana S. AB - In this paper, we present a geometric algorithm of finding the maximal cutter for 2-Dmilling operations. Our algorithm works not only for the common closed pocket problem, but also for the general 2-D milling problems with open edges. We define the general 2-D milling process in terms of a “target region” to be machined and an “obstruction region” that should not intersect with the cutter during machining. Our algorithm finds the largest cutter that can cover the target region without interfering with the obstruction region. Finding the biggest cutter is expected to help in the selection of the right sets of tools and the right type of cutter trajectories, and thereby ensure high production rate and meet the required quality level. UR - http://www.cs.umd.edu/~nau/papers/yao2000geometric.pdf ER - TY - RPRT T1 - A Geometric Algorithm for Multi-Part Milling Cutter Selection Y1 - 2000 A1 - Yao,Zhiyang A1 - Gupta, Satyandra K. A1 - Nau, Dana S. KW - algorithms KW - computer aided manufacturing CAM KW - cutter selection KW - Manufacturing KW - multi-part process planning KW - Next-Generation Product Realization Systems KW - OPTIMIZATION AB - Mass customization results in smaller batch sizes in manufacturing that require large numbers of setup and tool changes. The traditional process planning that generates plans for one part at a time is no longer applicable.

In this paper, we propose the idea of process planning for small batch manufacturing, i.e., we simultaneously consider multiple parts and exploit opportunities for sharing manufacturing resources such that the process plan will be optimized over the entire set of parts. In particular, we discuss a geometric algorithm for multiple part cutter selection in 2-1/2D milling operations.

We define the 2-1/2D milling operations as covering the target region without intersecting with the obstruction region. This definition allows us to handle the open edge problem. Based on this definition, we first discuss the lower and upper bond of cutter sizes that are feasible for given parts. Then we introduce the geometric algorithm to find the coverable area for a given cutter. Following that, we discuss the approach of considering cutter loading time and changing time in multiple cutter selection for multiple parts. We represent the cutter selection problem as shortest path problem and use Dijkstra's algorithm to solve it. By using this algorithm, a set of cutters is selected to achieve the optimum machining cost for multiple parts.

Our research illustrates the multiple parts process planning approach that is suitable for small batch manufacturing. At the same time, the algorithm given in this paper clarifies the 2-1/2D milling problem and can also help in cutter path planning problem. PB - Institute for Systems Research, University of Maryland, College Park VL - ISR; TR 2000-42 UR - http://drum.lib.umd.edu//handle/1903/6139 ER - TY - JOUR T1 - Learned models for estimation of rigid and articulated human motion from stationary or moving camera JF - International Journal of Computer Vision Y1 - 2000 A1 - Yacoob,Yaser A1 - Davis, Larry S. VL - 36 CP - 1 ER - TY - CONF T1 - A probabilistic framework for rigid and non-rigid appearance based tracking and recognition T2 - Automatic Face and Gesture Recognition, 2000. Proceedings. Fourth IEEE International Conference on Y1 - 2000 A1 - De la Torre,F. A1 - Yacoob,Yaser A1 - Davis, Larry S. JA - Automatic Face and Gesture Recognition, 2000. Proceedings. Fourth IEEE International Conference on ER - TY - JOUR T1 - Robustly estimating changes in image appearance JF - Computer Vision and Image Understanding Y1 - 2000 A1 - Black,M. J A1 - Fleet,D. J A1 - Yacoob,Yaser VL - 78 CP - 1 ER - TY - CHAP T1 - Scalable Resource Control in Active Networks T2 - Active NetworksActive Networks Y1 - 2000 A1 - Anagnostakis,Kostas A1 - Hicks, Michael W. A1 - Ioannidis,Sotiris A1 - Keromytis,Angelos A1 - Smith,Jonathan ED - Yasuda,Hiroshi AB - The increased complexity of the service model relative to store-and-forward routers has made resource management one of the paramount concerns in active networking research and engineering. In this paper,we address two major challenges in scaling resource management-to-many-node active networks. The first is the use of market mechanisms and trading amongst nodes and programs with varying degrees of competition and cooperation to provide a scalable approach to managing active network resources. The second is the use of a trust-management architecture to ensure that the participants in the resource management marketplace have a policy-driven “rule of law” in which marketplace decisions can be made and relied upon. We have used lottery scheduling and the Keynote trust-management system for our implementation, for which we provide some initial performance indications. JA - Active NetworksActive Networks T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1942 SN - 978-3-540-41179-6 UR - http://dx.doi.org/10.1007/3-540-40057-5_25 ER - TY - RPRT T1 - Selecting Flat End Mills for 2-1/2D Milling Operations Y1 - 2000 A1 - Yao,Zhiyang A1 - Gupta, Satyandra K. A1 - Nau, Dana S. KW - algorithms KW - computer aided manufacturing CAM KW - cutter selection KW - Manufacturing KW - Next-Generation Product Realization Systems AB - The size of milling cutter significantly affects the machining time. Therefore, in order to perform milling operations efficiently, we need to select a set of milling cutters with optimal sizes. It is difficult for human process planners to select the optimal or near optimal set of milling cutters due to complex geometric interactions among tools size, part shapes, and tool trajectories.

In this paper, we give a geometric algorithm to find the optimal cutters for 2-1/2D milling operations. We define the 2-1/2D milling operations as covering the target region without intersecting with the obstruction region. This definition allows us to handle the open edge problem. Based on this definition, we introduced the offsetting and inverse-offsetting algorithm to find the coverable area for a given cutter. Following that, we represent the cutter selection problem as shortest path problem and discuss the lower and upper bond of cutter sizes that are feasible for given parts. The Dijkstra's algorithm is used to solve the problem and thus a set of cutters is selected in order to achieve the optimum machining cost.

We believe the selection of optimum cutter combination can not only save manufacturing time but also help automatic process planning. PB - Institute for Systems Research, University of Maryland, College Park VL - ISR; TR 2000-41 UR - http://drum.lib.umd.edu//handle/1903/6138 ER - TY - CONF T1 - Video access control via multi-level data hiding T2 - Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on Y1 - 2000 A1 - M. Wu A1 - Yu,Hong Heather KW - access KW - adaptive KW - algorithms;hidden KW - bits;high KW - conditions;robustness;robustness-capacity KW - control;adaptive KW - data KW - data;video KW - design;user KW - digital KW - embedding;noise KW - encapsulation;multimedia KW - hiding KW - hiding;multi-level KW - information;data KW - processing; KW - QUALITY KW - signal KW - systems;authorisation;data KW - systems;video KW - technique;control KW - tradeoff;system KW - user KW - video;multi-level AB - The paper proposes novel data hiding algorithms and system design for high quality digital video. Instead of targeting on a single degree of robustness, which results in overestimation and/or underestimation of the noise conditions, we apply multi-level embedding to digital video to achieve more than one level of robustness-capacity tradeoff. In addition, an adaptive technique is proposed to determine how many bits are embedded in each part of the video. Besides user data, control information such as synchronization and the number of hidden user bits are embedded as well. The algorithm can be used for applications such as access control JA - Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on VL - 1 M3 - 10.1109/ICME.2000.869620 ER - TY - CONF T1 - Video transcoding by reducing spatial resolution T2 - Image Processing, 2000. Proceedings. 2000 International Conference on Y1 - 2000 A1 - Yin,Peng A1 - M. Wu A1 - Liu,Bede KW - approach;computational KW - coding; KW - coding;video KW - complexity;data KW - compression;data KW - cosine KW - DCT KW - delivery;open-loop KW - domain KW - encapsulation;discrete KW - estimation;network KW - estimation;transform KW - hiding;digital KW - method;spatial KW - quality;motion KW - reduction;video KW - residues;MPEG KW - resolution KW - resolution;motion KW - stream;compressed KW - transcoding;computational KW - transforms;image KW - vectors KW - video;downsized KW - video;image AB - In network delivery of digital video, if the bandwidth required for a video is not available, the video has to be recoded at a reduced bit rate. It is highly desirable that the transcoding is carried out in real time while maintaining reasonable image quality. In this paper, we propose a fast approach to derive from an MPEG stream a new MPEG stream with half the spatial resolution. For the downsized video, we first generate from the original compressed video an improved estimate of the motion vectors. We then propose a compressed domain approach with data hiding to produce DCT residues by an open-loop method. The computational complexity is significantly lower than a number of previous approaches. Simulation suggests that our approach produces reasonable image quality JA - Image Processing, 2000. Proceedings. 2000 International Conference on VL - 1 M3 - 10.1109/ICIP.2000.901123 ER - TY - JOUR T1 - Distinguishing systems and distinguishing senses: New evaluation methods for word sense disambiguation JF - Natural language engineering Y1 - 1999 A1 - Resnik, Philip A1 - Yarowsky,D. VL - 5 CP - 2 ER - TY - CONF T1 - Estimation of composite object and camera image motion T2 - The Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999 Y1 - 1999 A1 - Yacoob,Yaser A1 - Davis, Larry S. KW - articulated bodies KW - camera image motion KW - camera image motions KW - CAMERAS KW - composite independent object KW - composite object estimation KW - Computer vision KW - Educational institutions KW - Image sequences KW - instantaneous flow measurements KW - Laboratories KW - Layout KW - Motion analysis KW - Motion estimation KW - motion trajectories KW - orthogonal flow bases KW - Principal component analysis KW - spatio-temporal flow models KW - tracking KW - Vehicles AB - An approach for estimating composite independent object and camera image motions is proposed. The approach employs spatio-temporal flow models learned through observing typical movements of the object, to decompose image motion into independent object and camera motions. The spatio-temporal flow models of the object motion are represented as a set of orthogonal flow bases that are learned using principal component analysis of instantaneous flow measurements from a stationary camera. These models are then employed in scenes with a moving camera to extract motion trajectories relative to those learned. The performance of the algorithm is demonstrated on several image sequences of rigid and articulated bodies in motion JA - The Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999 PB - IEEE VL - 1 SN - 0-7695-0164-8 M3 - 10.1109/ICCV.1999.791217 ER - TY - CONF T1 - Gate leakage current simulation by Boltzmann transport equation and its dependence on the gate oxide thickness T2 - Simulation of Semiconductor Processes and Devices, 1999. SISPAD '99. 1999 International Conference on Y1 - 1999 A1 - Han,Zhiyi A1 - Lin,Chung-Kai A1 - Goldsman,N. A1 - Mayergoyz, Issak D A1 - Yu,S. A1 - Stettler,M. KW - 30 KW - angstrom;60 KW - angstrom;Boltzmann KW - Bias KW - calculations;leakage KW - charges;spherical KW - component;tunneling KW - current KW - currents;semiconductor KW - dependence;method KW - dependence;MOSFET;barrier KW - device KW - effect;distribution KW - equation;DC KW - equation;MOSFET;WKB KW - function;first KW - harmonic KW - image KW - leakage KW - lowering KW - method KW - method;gate KW - model;thermionic KW - models;tunnelling; KW - of KW - oxide KW - principle KW - probability;Boltzmann KW - simulation;gate KW - thickness KW - transport KW - WKB AB - As device dimensions shrink toward 0.1 mu;m, gate oxides are becoming so thin that MOSFET gate leakage current and oxide degradation are becoming limiting issues. We provide a more rigorous way to calculate gate leakage current. To achieve this we build upon the Spherical Harmonic Method of modeling, which deterministically solves the Boltzmann equation for an entire device. The method gives the distribution function and is 1000 times faster than MC. Once the distribution function is calculated, the tunneling probability is derived from the first principle WKB method. The barrier lowering effect is accounted for by the method of image charges. We calculate gate leakage current as a function of DC bias. The thermionic and tunneling components are compared at different DC bias points. The dependence of gate leakage current on gate oxide thickness is simulated JA - Simulation of Semiconductor Processes and Devices, 1999. SISPAD '99. 1999 International Conference on M3 - 10.1109/SISPAD.1999.799307 ER - TY - JOUR T1 - Multi-level data hiding for digital image and video JF - SPIE Photonics East’99 Y1 - 1999 A1 - Wu,M. A1 - Yu,H. A1 - Gelman,A. AB - Previous works on data hiding generally targeted on a specific tradeoff between capacity and robustness. This results inoverestimation of the processing noise under some situations and/or underestimation under some other situations, hence limits the overall performance. In this paper, we propose a multi-level data hiding scheme which is able to convey secondary data in high rate when noise is not severe and can also convey some data reliably under heavy distortion. The proposed scheme is motivated by a two-category classification of embedding schemes and by a study on detection performance of spread spectrum watermarking. The multi-level data hiding has been successfully applied to both digital image and video, and can be used for applications such as copy control. ER - TY - JOUR T1 - Temporal multi-scale models for flow and acceleration JF - International Journal of Computer Vision Y1 - 1999 A1 - Yacoob,Yaser A1 - Davis, Larry S. VL - 32 CP - 2 ER - TY - CONF T1 - Tracking rigid motion using a compact-structure constraint T2 - Computer Vision, 1999. The Proceedings of the Seventh IEEE International Conference on Y1 - 1999 A1 - Yacoob,Yaser A1 - Davis, Larry S. KW - compact-structure constraint KW - image motion KW - Image sequences KW - Motion estimation KW - parameterized flow models KW - polynomial parameterized flow models KW - Polynomials KW - rigid motion tracking KW - rigid object KW - rigidly moving objects KW - structure-compactness constraint KW - tracking AB - An approach for tracking the motion of a rigid object using parameterized flow models and a compact-structure constraint is proposed. While polynomial parameterized flow models have been shown to be effective in tracking the rigid motion of planar objects, these models are inappropriate for tracking moving objects that change appearance revealing their 3D structure. We extend these models by adding a structure-compactness constraint that accounts for image motion that deviates from a planar structure. The constraint is based on the assumption that object structure variations are limited with respect to planar object projection onto the image plane and therefore can be expressed as a direct constraint on the image motion. The performance of the algorithm is demonstrated on several long image sequences of rigidly moving objects JA - Computer Vision, 1999. The Proceedings of the Seventh IEEE International Conference on VL - 1 M3 - 10.1109/ICCV.1999.791218 ER - TY - CONF T1 - A framework for modeling appearance change in image sequences T2 - Computer Vision, 1998. Sixth International Conference on Y1 - 1998 A1 - Black,M. J A1 - Fleet,D. J A1 - Yacoob,Yaser KW - appearance change KW - camera motion KW - complex occlusion events KW - generic photometric events KW - iconic changes KW - illumination KW - image motion KW - Image sequences KW - Motion estimation KW - optical flow AB - Image ldquo;appearance rdquo; may change over time due to a variety of causes such as: 1) object or camera motion; 2) generic photometric events including variations in illumination (e.g. shadows) and specular reflections; and 3) ldquo;iconic changes rdquo; which are specific to the objects being viewed and include complex occlusion events and changes in the material properties of the objects. We propose a general framework for representing and recovering these ldquo;appearance changes rdquo; in an image sequence as a ldquo;mixture rdquo; of different causes. The approach generalizes previous work on optical flow to provide a richer description of image events and more reliable estimates of image motion JA - Computer Vision, 1998. Sixth International Conference on M3 - 10.1109/ICCV.1998.710788 ER - TY - RPRT T1 - Low Degree Spanning Trees of Small Weight Y1 - 1998 A1 - Khuller, Samir A1 - Raghavachari,Balaji A1 - Young,Neal KW - Technical Report AB - Given n points in the plane, the degree-K spanning tree problemasks for a spanning tree of minimum weight in which the degree of each vertex is at most K. This paper addresses the problem of computing low-weight degree-K spanning trees for K>2. It is shown that for an arbitrary collection of n points in the plane, there exists a spanning tree of degree three whose weight is at most 1.5 times the weight of a minimum spanning tree. It is shown that there exists a spanning tree of degree four whose weight is at most 1.25 times the weight of a minimum spanning tree. These results solve open problems posed by Papadimitriou and Vazirani. Moreover, if a minimum spanning tree is given as part of the input, the trees can be computed in O(n) time. The results are generalized to points in higher dimensions. It is shown that for any d [greater than or equal to] 3, an arbitrary collection of points in DimD contains a spanning tree of degree three, whose weight is at most 5/3 times the weight of a minimum spanning tree. This is the first paper that achieves factors better than two for these problems. (Also cross-referenced as UMIACS-TR-94-1) PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-94-1 UR - http://drum.lib.umd.edu//handle/1903/611 ER - TY - CONF T1 - Parameterized modeling and recognition of activities T2 - Computer Vision, 1998. Sixth International Conference on Y1 - 1998 A1 - Yacoob,Yaser A1 - Black,M. J KW - activities recognition KW - admissible transformations KW - articulated object motion KW - deformable object motion KW - exemplar activities KW - image motion parameters KW - Image sequences KW - Motion estimation KW - parameterized modeling KW - recognition KW - spatio-temporal variants AB - A framework for modeling and recognition of temporal activities is proposed. The modeling of sets of exemplar activities is achieved by parameterizing their representation in the form of principal components. Recognition of spatio-temporal variants of modeled activities is achieved by parameterizing the search in the space of admissible transformations that the activities can undergo. Experiments on recognition of articulated and deformable object motion from image motion parameters are presented JA - Computer Vision, 1998. Sixth International Conference on M3 - 10.1109/ICCV.1998.710709 ER - TY - CONF T1 - Learning parameterized models of image motion T2 - Computer Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE Computer Society Conference on Y1 - 1997 A1 - Black,M. J A1 - Yacoob,Yaser A1 - Jepson,A. D A1 - Fleet,D. J KW - image motion KW - Image sequences KW - learning KW - learning (artificial intelligence) KW - model-based recognition KW - Motion estimation KW - multi-resolution scheme KW - non-rigid motion KW - optical flow KW - optical flow estimation KW - parameterized models KW - Principal component analysis KW - training set AB - A framework for learning parameterized models of optical flow from image sequences is presented. A class of motions is represented by a set of orthogonal basis flow fields that are computed from a training set using principal component analysis. Many complex image motions can be represented by a linear combination of a small number of these basis flows. The learned motion models may be used for optical flow estimation and for model-based recognition. For optical flow estimation we describe a robust, multi-resolution scheme for directly computing the parameters of the learned flow models from image derivatives. As examples we consider learning motion discontinuities, non-rigid motion of human mouths, and articulated human motion JA - Computer Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE Computer Society Conference on M3 - 10.1109/CVPR.1997.609381 ER - TY - JOUR T1 - A Network-Flow Technique for Finding Low-Weight Bounded-Degree Spanning Trees JF - Journal of Algorithms Y1 - 1997 A1 - Fekete,Sándor P A1 - Khuller, Samir A1 - Klemmstein,Monika A1 - Raghavachari,Balaji A1 - Young,Neal AB - Given a graph with edge weights satisfying the triangle inequality, and a degree bound for each vertex, the problem of computing a low-weight spanning tree such that the degree of each vertex is at most its specified bound is considered. In particular, modifying a given spanning treeTusingadoptionsto meet the degree constraints is considered. A novel network-flow-based algorithm for finding a good sequence of adoptions is introduced. The method yields a better performance guarantee than any previous algorithm. If the degree constraintd(v) for eachvis at least 2, the algorithm is guaranteed to find a tree whose weight is at most the weight of the given tree times 2 − min{(d(v) − 2)/(degT(v) − 2) : degT(v) > 2}, where degT(v) is the initial degree ofv. Equally importantly, it takes this approach to the limit in the following sense: if any performance guarantee that is solely a function of the topology and edge weights of a given tree holds foranyalgorithm at all, then it also holds for the given algorithm. Examples are provided in which no lighter tree meeting the degree constraint exists. Linear-time algorithms are provided with the same worst-case performance guarantee. ChoosingTto be a minimum spanning tree yields approximation algorithms with factors less than 2 for the general problem on geometric graphs with distances induced by variousLpnorms. Finally, examples of Euclidean graphs are provided in which the ratio of the lengths of an optimal Traveling Salesman path and a minimum spanning tree can be arbitrarily close to 2. VL - 24 SN - 0196-6774 UR - http://www.sciencedirect.com/science/article/pii/S0196677497908622 CP - 2 M3 - 10.1006/jagm.1997.0862 ER - TY - CONF T1 - A perspective on word sense disambiguation methods and their evaluation T2 - Proceedings of the ACL SIGLEX workshop on tagging text with lexical semantics: Why, what, and how Y1 - 1997 A1 - Resnik, Philip A1 - Yarowsky,D. JA - Proceedings of the ACL SIGLEX workshop on tagging text with lexical semantics: Why, what, and how VL - 86 ER - TY - CONF T1 - Temporal Multi-scale Models for Image Motion Estimation T2 - Image Understanding Workshop: proceedings of a workshop held in New Orleans, Louisiana, May 11-14, 1997 Y1 - 1997 A1 - Yacoob,Yaser A1 - Davis, Larry S. JA - Image Understanding Workshop: proceedings of a workshop held in New Orleans, Louisiana, May 11-14, 1997 VL - 1 ER - TY - JOUR T1 - Visual surveillance of human activity JF - Computer Vision—ACCV'98 Y1 - 1997 A1 - Davis, Larry S. A1 - Fejes,S. A1 - Harwood,D. A1 - Yacoob,Yaser A1 - Hariatoglu,I. A1 - Black,M. ER - TY - CONF T1 - Computing 3-D head orientation from a monocular image sequence T2 - Automatic Face and Gesture Recognition, 1996., Proceedings of the Second International Conference on Y1 - 1996 A1 - Horprasert,T. A1 - Yacoob,Yaser A1 - Davis, Larry S. KW - 3D head orientation computation KW - anthropometric statistics KW - camera plane KW - coarse structure KW - eye KW - eye boundary KW - eye corners KW - face features KW - face recognition KW - Feature extraction KW - head pitch KW - head roll KW - head yaw KW - Image sequences KW - image-based parameterized tracking KW - monocular image sequence KW - projective cross-ratio invariance KW - sub-pixel parameterized shape estimation KW - tracking AB - An approach for estimating 3D head orientation in a monocular image sequence is proposed. The approach employs recently developed image-based parameterized tracking for face and face features to locate the area in which a sub-pixel parameterized shape estimation of the eye's boundary is performed. This involves tracking of five points (four at the eye corners and the fifth is the lip of the nose). The authors describe an approach that relies on the coarse structure of the face to compute orientation relative to the camera plane. Our approach employs projective invariance of the cross-ratios of the eye corners and anthropometric statistics to estimate the head yaw, roll and pitch. Analytical and experimental results are reported JA - Automatic Face and Gesture Recognition, 1996., Proceedings of the Second International Conference on M3 - 10.1109/AFGR.1996.557271 ER - TY - JOUR T1 - Feature discovery and classification of Doppler umbilical artery blood flow velocity waveforms JF - Computers in Biology and Medicine Y1 - 1996 A1 - Baykal,Nazife A1 - Reogia,James A. A1 - Yalabik,Nese A1 - Erkmen,Aydan A1 - Beksac,M.Sinan KW - Doppler umbilical artery blood flow velocity waveforms KW - Feature extraction KW - IMAGE PROCESSING KW - Pattern classification AB - Doppler umbilical artery blood flow velocity waveform measurements are used in perinatal surveillance for the evaluation of fetal condition. There is an ongoing debate on the predictive value of Doppler measurements concerning the critical effect of the selection of parameters for the interpretation of Doppler waveforms. In this paper, we describe how neural network methods can be used both to discover relevant classification features and subsequently to classify Doppler umbilical artery blood flow velocity waveforms. Results obtained from 199 normal and high risk patients' umbilical artery waveforms highlighted a classification concordance varying from 90 to 98% accuracy. VL - 26 SN - 0010-4825 UR - http://www.sciencedirect.com/science/article/pii/S0010482596000182 CP - 6 M3 - 10.1016/S0010-4825(96)00018-2 ER - TY - CONF T1 - Recognition of head gestures using hidden markov models T2 - Pattern Recognition, 1996., Proceedings of the 13th International Conference on Y1 - 1996 A1 - Morimoto,C. A1 - Yacoob,Yaser A1 - Davis, Larry S. JA - Pattern Recognition, 1996., Proceedings of the 13th International Conference on VL - 3 ER - TY - JOUR T1 - Recognizing human facial expressions from long image sequences using optical flow JF - IEEE Transactions on Pattern Analysis and Machine Intelligence Y1 - 1996 A1 - Yacoob,Yaser A1 - Davis, Larry S. KW - Computer vision KW - Eyebrows KW - face recognition KW - facial dynamics KW - Facial features KW - human facial expression recognition KW - HUMANS KW - Image motion analysis KW - image recognition KW - image representation KW - Image sequences KW - Motion analysis KW - Motion estimation KW - Optical computing KW - optical flow KW - symbolic representation KW - tracking AB - An approach to the analysis and representation of facial dynamics for recognition of facial expressions from image sequences is presented. The algorithms utilize optical flow computation to identify the direction of rigid and nonrigid motions that are caused by human facial expressions. A mid-level symbolic representation motivated by psychological considerations is developed. Recognition of six facial expressions, as well as eye blinking, is demonstrated on a large set of image sequences VL - 18 SN - 0162-8828 CP - 6 M3 - 10.1109/34.506414 ER - TY - JOUR T1 - On strongly connected digraphs with bounded cycle length JF - Discrete Applied Mathematics Y1 - 1996 A1 - Khuller, Samir A1 - Raghavachari,Balaji A1 - Young,Neal AB - Given a directed graph G = (V, E), a natural problem is to choose a minimum number of the edges in E such that, for any two vertices u and v, if there is a path from u to v in E, then there is a path from u to v among the chosen edges. We show that in graphs having no directed cycle with more than three edges, this problem is equivalent to Maximum Bipartite Matching. This leads to a small improvement in the performance guarantee of the previous best approximation algorithm for the general problem. VL - 69 SN - 0166-218X UR - http://www.sciencedirect.com/science/article/pii/0166218X9500105Z CP - 3 M3 - 10.1016/0166-218X(95)00105-Z ER - TY - JOUR T1 - Approximating the minimum equivalent digraph JF - SIAM Journal on Computing (SICOMP) Y1 - 1995 A1 - Khuller, Samir A1 - Raghavachari,B. A1 - Young,N. VL - 24 CP - 4 ER - TY - JOUR T1 - Balancing minimum spanning trees and shortest-path trees JF - Algorithmica Y1 - 1995 A1 - Khuller, Samir A1 - Raghavachari,B. A1 - Young,N. AB - We give a simple algorithm to find a spanning tree that simultaneously approximates a shortest-path tree and a minimum spanning tree. The algorithm provides a continuous tradeoff: given the two trees and agamma>0, the algorithm returns a spanning tree in which the distance between any vertex and the root of the shortest-path tree is at most 1+radic2gamma times the shortest-path distance, and yet the total weight of the tree is at most 1+radic2/gamma times the weight of a minimum spanning tree. Our algorithm runs in linear time and obtains the best-possible tradeoff. It can be implemented on a CREW PRAM to run a logarithmic time using one processor per vertex. VL - 14 CP - 4 M3 - 10.1007/BF01294129 ER - TY - CONF T1 - Generating Synthetic Data for Text Analysis Systems T2 - SDAIR Y1 - 1995 A1 - David Doermann A1 - Yao,S. AB - In this paper we describe work on a sys-tem for modeling errors in the output of OCR systems. The project is motivated by the desire to evaluate the performance of various text analysis systems under varying, yet controlled conditions. We describe a set of symbol and page models which are used to degrade an ideal text by introducing er- rors which typically occur during scanning, decomposition and recognition of document images. A rst generation of the software is described which implements the page mod- els and allows the use of transition proba- bilities, either extracted from real data or generated synthetically, to corrupt text. JA - SDAIR ER - TY - JOUR T1 - Optimality in abstractions of model checking JF - Static Analysis Y1 - 1995 A1 - Cleaveland, Rance A1 - Iyer,P. A1 - Yankelevich,D. ER - TY - CONF T1 - Tracking and recognizing rigid and non-rigid facial motions using local parametric models of image motion T2 - Computer Vision, 1995. Proceedings., Fifth International Conference on Y1 - 1995 A1 - Black,M. J A1 - Yacoob,Yaser JA - Computer Vision, 1995. Proceedings., Fifth International Conference on ER - TY - JOUR T1 - Fully abstract characterizations of testing preorders for probabilistic processes JF - CONCUR'94: Concurrency Theory Y1 - 1994 A1 - Yuen,S. A1 - Cleaveland, Rance A1 - Dayar,Z. A1 - Smolka,S. ER - TY - JOUR T1 - Human Emotion Recognition From Motion Using A Radial Basis Function Network Architecture JF - University Of Maryland Y1 - 1994 A1 - Mark,R. A1 - Yaser,Y. A1 - Larry,D. ER - TY - CONF T1 - Interpretation of Doppler blood flow velocity waveforms using neural networks. T2 - Proceedings of the Annual Symposium on Computer Application in Medical Care Y1 - 1994 A1 - Baykal,N. A1 - Reggia, James A. A1 - Yalabik,N. A1 - Erkmen,A. A1 - Beksac,M. S. JA - Proceedings of the Annual Symposium on Computer Application in Medical Care ER - TY - JOUR T1 - Labeling of Human Face Components from Range Data JF - CVGIP: Image Understanding Y1 - 1994 A1 - Yacoob,Yaser A1 - Davis, Larry S. AB - An approach to labeling the components of human faces from range images is proposed. The components of interest are those humans usually find significant for recognition. To cope with the nonrigidity of faces, an entirely qualitative approach is used. The preprocessing stage employs a multistage diffusion process to identify convexity and concavity points. These points are grouped into components and qualitative reasoning about possible interpretations of the components is performed. Consistency of hypothesized interpretations is carried out using context-based reasoning. Experimental results on real range images of several faces are provided. VL - 60 SN - 1049-9660 UR - http://www.sciencedirect.com/science/article/pii/S104996608471045X CP - 2 M3 - 10.1006/ciun.1994.1045 ER - TY - JOUR T1 - The linear algebra of block quasi-newton algorithms JF - Linear Algebra and its Applications Y1 - 1994 A1 - O'Leary, Dianne P. A1 - Yeremin,A. AB - The quasi-Newton family of algorithms for minimizing functions and solving systems of nonlinear equations has achieved a great deal of computational success and forms the core of many software libraries for solving these problems. In this work we extend the theory of the quasi-Newton algorithms to the block case, in which we minimize a collection of functions having a common Hessian matrix, or we solve a collection of nonlinear equations having a common Jacobian matrix. This paper focuses on the linear algebra: update formulas, positive definiteness, least-change secant properties, relation to block conjugate gradient algorithms, finite termination for quadratic function minimization or solving linear systems, and the use of the quasi-Newton matrices as preconditioners. VL - 212–213 SN - 0024-3795 UR - http://www.sciencedirect.com/science/article/pii/0024379594904014 M3 - 10.1016/0024-3795(94)90401-4 ER - TY - CONF T1 - An operational framework for value-passing processes T2 - Proceedings of the 21st ACM SIGPLAN-SIGACT symposium on Principles of programming languages Y1 - 1994 A1 - Cleaveland, Rance A1 - Yankelevich,Daniel AB - This paper develops a semantic framework for concurrent languages with value passing. An operation analogous to substitution in the &lgr;-calculus is given, and a semantics is given for a value-passing version of Milner's Calculus of Communicating Systems (CCS). An operational equivalence is then defined and shown to coincide with Milner's (early) bisimulation equivalence. We also show how semantics maybe given for languages with asynchronous communication primitives. In contrast with existing approaches to value passing, this semantics does not reduce data exchange to pure synchronization over (potentially infinite) families of ports indexed by data, and it avoids variable renamings that are not local to processes engaged in communication. JA - Proceedings of the 21st ACM SIGPLAN-SIGACT symposium on Principles of programming languages T3 - POPL '94 PB - ACM CY - New York, NY, USA SN - 0-89791-636-0 UR - http://doi.acm.org/10.1145/174675.177941 M3 - 10.1145/174675.177941 ER - TY - JOUR T1 - A primal-dual parallel approximation technique applied to weighted set and vertex covers JF - Journal Algorithms Y1 - 1994 A1 - Khuller, Samir A1 - Vishkin, Uzi A1 - Young,N. VL - 17 CP - 2 ER - TY - CONF T1 - Early vision processing using a multi-stage diffusion process T2 - 1993 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1993. Proceedings CVPR '93 Y1 - 1993 A1 - Yacoob,Yaser A1 - Davis, Larry S. KW - 3-D space KW - Computational modeling KW - Computer vision KW - Diffusion processes KW - discontinuity detection KW - early vision processing KW - Educational institutions KW - Image edge detection KW - Image segmentation KW - Laboratories KW - multistage diffusion process KW - Noise shaping KW - noise-free edges KW - noisy edges KW - Performance analysis KW - roof edges KW - segmentation KW - SHAPE KW - shape homogeneous regions KW - step edges KW - valley edges AB - The use of a multistage diffusion process in the early processing of range data is examined. The input range data are interpreted as occupying a volume in 3-D space. Each diffusion stage simulates the process of diffusing part of the boundary of the volume into the volume. The outcome of the process can be used for both discontinuity detection and segmentation into shape homogeneous regions. The process is applied to synthetic noise-free and noisy step, roof, and valley edges as well as to real range images JA - 1993 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1993. Proceedings CVPR '93 PB - IEEE SN - 0-8186-3880-X M3 - 10.1109/CVPR.1993.341003 ER - TY - JOUR T1 - An Experimental Study of Three Dataflow Paradigms in Multithreaded Database Transitive Closure Algorithms on Shared Memory Multiprocessors JF - Journal of Parallel and Distributed Computing Y1 - 1993 A1 - Youngmyers,H. A1 - Raschid, Louiqa AB - This paper describes an experimental study of three dataflow paradigms, namely, no dataflow, pipelined dataflow, and network dataflow, in multithreaded database transitive closure algorithms on shared memory multiprocessors. This study shows that dataflow paradigm directly influences performance parameters such as the amount of interthread communication, how data are partitioned among the threads, whether access to each page of data is exclusive or shared, whether locks are needed for concurrency control, and how calculation termination is detected. The algorithm designed with no dataflow outperforms the algorithms with dataflow. Approximately linear speedup is achieved by the no dataflow algorithm with sufficient workload and primary memory. An exclusive access working set model and a shared access working set model describe the interactions between two or more threads′ working sets when access to each page of data is exclusive or shared among the threads, respectively. These models are experimentally verified. VL - 18 SN - 0743-7315 UR - http://www.sciencedirect.com/science/article/pii/S0743731583710713 CP - 3 M3 - 10.1006/jpdc.1993.1071 ER - TY - JOUR T1 - A graphical filter/flow representation of Boolean queries: A prototype implementation and evaluation JF - Journal of the American Society for Information Science Y1 - 1993 A1 - Young,Degi A1 - Shneiderman, Ben AB - One of the powerful applications of Boolean expression is to allow users to extract relevant information from a database. Unfortunately, previous research has shown that users have difficulty specifying Boolean queries. In an attempt to overcome this limitation, a graphical Filter/Flow representation of Boolean queries was designed to provide users with an interface that visually conveys the meaning of the Boolean operators (AND, OR, and NOT). This was accomplished by implementing a graphical interface prototype that uses the metaphor of water flowing through filters. Twenty subjects having no experience with Boolean logic participated in an experiment comparing the Boolean operations represented in the Filter/Flow interface with a text-only SQL interface. The subjects independently performed five comprehension tasks and five composition tasks in each of the interfaces. A significant difference (p < 0.05) in the total number of correct queries in each of the comprehension and composition tasks was found favoring Filter/Flow. © 1993 John Wiley & Sons, Inc. VL - 44 SN - 1097-4571 UR - http://onlinelibrary.wiley.com/doi/10.1002/(SICI)1097-4571(199307)44:6%3C327::AID-ASI3%3E3.0.CO;2-J/abstract;jsessionid=76B714851135D8044D4E03335B4D39A0.d01t04 CP - 6 M3 - 10.1002/(SICI)1097-4571(199307)44:6<327::AID-ASI3>3.0.CO;2-J ER - TY - JOUR T1 - Systolic architectures for finite-state vector quantization JF - The Journal of VLSI Signal Processing Y1 - 1993 A1 - Kolagotla,R. K. A1 - Yu,S. S. A1 - JaJa, Joseph F. AB - We present a new systolic architecture for implementing Finite State Vector Quantization in real-time for both speech and image data. This architecture is modular and has a very simple control flow. Only one processor is needed for speech compression. A linear array of processors is used for image compression; the number of processors needed is independent of the size of the image. We also present a simple architecture for converting line-scanned image data into the format required by this systolic architecture. Image data is processed at a rate of 1 pixel per clock cycle. An implementation at 31.5 MHz can quantize 1024×1024 pixel images at 30 frames/sec in real-time. We describe a VLSI implementation of these processors. VL - 5 CP - 2 M3 - 10.1007/BF01581299 ER - TY - CONF T1 - Transitive closure: an experimental case study of three multithreaded database algorithms on a shared memory multiprocessor T2 - Parallel and Distributed Information Systems, 1993., Proceedings of the Second International Conference on Y1 - 1993 A1 - Young-Myers,H. A1 - Raschid, Louiqa JA - Parallel and Distributed Information Systems, 1993., Proceedings of the Second International Conference on ER - TY - JOUR T1 - VLSI implementation of a tree searched vector quantizer JF - Signal Processing, IEEE Transactions on Y1 - 1993 A1 - Kolagotla,R. K. A1 - Yu,S.-S. A1 - JaJa, Joseph F. KW - (mathematics); KW - 2 KW - 20 KW - chips; KW - coding; KW - compression; KW - data KW - design; KW - digital KW - image KW - implementation; KW - MHz; KW - micron; KW - PROCESSING KW - quantisation; KW - quantizer; KW - searched KW - signal KW - tree KW - TREES KW - vector KW - VLSI KW - VLSI; AB - The VLSI design and implementation of a tree-searched vector quantizer is presented. The number of processors needed is equal to the depth of the tree. All processors are identical, and data flow between processors is regular. No global control signals are needed. The processors have been fabricated using 2 mu;m N-well process on a 7.9 times;9.2 mm die. Each processor chip contains 25000 transistors and has 84 pins. The processors have been thoroughly tested at a clock frequency of 20 MHz VL - 41 SN - 1053-587X CP - 2 M3 - 10.1109/78.193225 ER - TY - BOOK T1 - A Graphical Filter/flow Representation of Boolean Queries: A Prototype Implementation Y1 - 1992 A1 - Young,D. A1 - Shneiderman, Ben PB - University of Maryland, Center for Automation Research, Computer Vision Laboratory ER - TY - CONF T1 - Ground and airborne localization over rough terrain using random environmental range-measurements T2 - Pattern Recognition, 1992. Vol. I. Conference A: Computer Vision and Applications, Proceedings., 11th IAPR International Conference on Y1 - 1992 A1 - Yacoob,Yaser A1 - Davis, Larry S. JA - Pattern Recognition, 1992. Vol. I. Conference A: Computer Vision and Applications, Proceedings., 11th IAPR International Conference on ER - TY - RPRT T1 - Six Generations of Building Walkthrough: Final Technical Report to the National Science Foundation Y1 - 1992 A1 - Brooks,Frederick P. A1 - Airey,John A1 - Alspaugh,John A1 - Bell,Andrew A1 - Brown,Randolph A1 - Hill,Curtis A1 - Nimscheck,Uwe A1 - Rheingans,Penny A1 - Rohlf,John A1 - Smith,Dana A1 - Turner,Douglass A1 - Varshney, Amitabh A1 - Wang,Yulan A1 - Weber,Hans A1 - Yuan,Xialin PB - University of North Carolina at Chapel Hill CY - Chapel Hill, NC, USA ER - TY - RPRT T1 - VLSI Architectures and Implementation of Predictive Tree- Searched Vector Quantizers for Real-Time Video Compression Y1 - 1992 A1 - Yu,S.-S. A1 - Kolagotla,Ravi K. A1 - JaJa, Joseph F. KW - data compression KW - IMAGE PROCESSING KW - Signal processing KW - Speech processing KW - Systems Integration KW - systolic architecture KW - Vector quantization KW - VLSI architectures AB - We describe a pipelined systolic architecture for implementing predictive Tree-Searched Vector Quantization (PTSVQ) for real- time image and speech coding applications. This architecture uses identical processors for both the encoding and decoding processes. the overall design is regular and the control is simple. Input data is processed at a rate of 1 pixel per clock cycle, which allows real-time processing of images at video rates. We implemented these processors using 1.2um CMOS technology. Spice simulations indicate correct operation at 40 MHz. Prototype version of these chips fabricated using 2um CMOS technology work at 20 MHz. PB - Institute for Systems Research, University of Maryland, College Park VL - ISR-TR-1992-48 UR - http://drum.lib.umd.edu/handle/1903/5230 ER - TY - BOOK T1 - Abductive Inference Models for Diagnostic Problem-Solving Y1 - 1990 A1 - Yun,P. A1 - Reggia, James A. PB - Springer-Verlag, New York ER - TY - CONF T1 - Displaying voxel-based objects according to their qualitative shape synthesis T2 - Proceedings of the 1st conference on Visualization'90 Y1 - 1990 A1 - Yacoob,Yaser JA - Proceedings of the 1st conference on Visualization'90 ER - TY - CONF T1 - 3D object recognition via simulated particles diffusion T2 - IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1989. Proceedings CVPR '89 Y1 - 1989 A1 - Yacoob,Yaser A1 - Gold,Y. I KW - 3D object recognition KW - alignment strategy KW - Computational modeling KW - Computer science KW - data mining KW - Gold KW - Layout KW - Noise shaping KW - Object detection KW - Object recognition KW - parallel projection KW - pattern recognition KW - point features KW - radio access networks KW - scene acquisition KW - shape characterisation KW - Shape measurement KW - simulated particles diffusion KW - transformation detection AB - A novel approach for 3D object recognition is presented. This approach is model-based, and assumes either 3D or 21/2 D scene acquisition. Transformation detection is accomplished along with an object identification (six degrees of freedom, three rotational and three translational, are assumed). The diffusion-like simulation recently introduced as a means for characterization of shape is used in the extraction of point features. The point features represent regions on the object's surface that are extreme in curvature (i.e. concavities and convexities). Object matching is carried out by examining the correspondence between the object's set of point features and the model's set of point features, using an alignment strategy. Triangles are constructed between all possible triples of object's point features, and then are aligned to candidate corresponding triangles of the model's point features. 21/2 range images are transformed into a volumetric representation through a parallel projection onto the 3-D space. The resultant volume is suitable for processing by the diffusion-like simulation JA - IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1989. Proceedings CVPR '89 PB - IEEE SN - 0-8186-1952-x M3 - 10.1109/CVPR.1989.37886 ER - TY - JOUR T1 - Functional and psychosocial effects of multimodality limb-sparing therapy in patients with soft tissue sarcomas JF - Journal of Clinical Oncology Y1 - 1989 A1 - Chang,A. E A1 - Steinberg,S. M A1 - Culnane,M. A1 - Lampert,M. H A1 - Reggia, James A. A1 - Simpson,C. G A1 - Hicks,J. E A1 - White,D. E A1 - Yang,J. J A1 - Glatstein,E. VL - 7 CP - 9 ER - TY - CONF T1 - Lessons learned from the ACM hypertext on hypertext project T2 - Proceedings of the second annual ACM conference on Hypertext Y1 - 1989 A1 - Rous,B. A1 - Shneiderman, Ben A1 - Yankelovich,N. A1 - Yoder,E. JA - Proceedings of the second annual ACM conference on Hypertext T3 - HYPERTEXT '89 PB - ACM CY - New York, NY, USA SN - 0-89791-339-6 UR - http://doi.acm.org/10.1145/74224.74255 M3 - 10.1145/74224.74255 ER - TY - RPRT T1 - Research in Programming Languages and Software Engineering. Y1 - 1985 A1 - Gannon,John A1 - Basili, Victor R. A1 - Zelkowitz, Marvin V A1 - Yeh,Raymond KW - *BEARINGS KW - *COMPUTER PROGRAMS KW - *ESTIMATES KW - *GUIDANCE KW - *KALMAN FILTERING KW - *LINEAR SYSTEMS KW - *STOCHASTIC PROCESSES KW - COMPUTER PROGRAMMING AND SOFTWARE KW - GAIN KW - identification KW - measurement KW - programming languages KW - STATISTICS AND PROBABILITY KW - SYSTEMS ENGINEERING. KW - TARGET DIRECTION, RANGE AND POSITION FINDING AB - During the past year three research papers were written and two published conference presentations were given. Titles of the published research articles are: A Stochastic Analysis of a Modified Gain Extended Kalman Filter with Applications to Estimation with Bearings only Measurements; The Modified Gain Extended Kalman Kilter and Parameter Identification in Linear Systems and Maximum Information Guidance for Homing Missiles. PB - Department of Computer Science, University of Maryland, College Park UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA186269 ER - TY - JOUR T1 - SEES—A Software testing Environment Support System JF - IEEE Transactions on Software Engineering Y1 - 1985 A1 - Roussopoulos, Nick A1 - Yeh,R. T KW - Computer architecture KW - Database systems KW - Error correction KW - Program processors KW - Programming profession KW - Relational databases KW - Software testing KW - software tools KW - Workstations KW - Writing AB - SEES is a database system to support program testing. The program database is automatically created during the compilation of the program by a compiler built using the YACC compiler-compiler. VL - SE-11 SN - 0098-5589 CP - 4 M3 - 10.1109/TSE.1985.232225 ER - TY - CONF T1 - A Programming Environment Framework Based on Reusability T2 - Proceedings of the First International Conference on Data Engineering Y1 - 1984 A1 - Yeh,Raymond T. A1 - Mittermeir,Roland A1 - Roussopoulos, Nick A1 - Reed,Joylyn JA - Proceedings of the First International Conference on Data Engineering PB - IEEE Computer Society CY - Washington, DC, USA SN - 0-8186-0533-2 UR - http://dl.acm.org/citation.cfm?id=645470.655219 ER - TY - JOUR T1 - Software Engineering Practices in the US and Japan JF - Computer Y1 - 1984 A1 - Zelkowitz, Marvin V A1 - Yeh,R. T A1 - Hamlet,R.G. A1 - Gannon,J. D A1 - Basili, Victor R. VL - 17 SN - 0018-9162 CP - 6 M3 - 10.1109/MC.1984.1659162 ER - TY - JOUR T1 - The Software Industry: A State of the Art Survey JF - Foundations of Empirical Software Engineering: The Legacy of Victor R. Basili Y1 - 1983 A1 - Zelkowitz, Marvin V A1 - Yeh,R. A1 - Hamlet,R.G. A1 - Gannon,J. D A1 - Basili, Victor R. VL - 1 ER - TY - CONF T1 - Systematic Derivation of Software Requirements T2 - Proceedings of the 1st International Conference on the Entity-Relationship Approach to Systems Analysis and Design Y1 - 1980 A1 - Yeh,R. Y A1 - Roussopoulos, Nick A1 - Chang,P. JA - Proceedings of the 1st International Conference on the Entity-Relationship Approach to Systems Analysis and Design ER - TY - JOUR T1 - Elastoplastic torsion by quadratic programming JF - Computer Methods in Applied Mechanics and Engineering Y1 - 1978 A1 - O'Leary, Dianne P. A1 - Yang,Wei H. AB - A finite element scheme (together with a conjugate gradient algorithm) is demonstrated to be a very effective method for analyzing general elastoplastic torsion of prismatic bars posed as quadratic programming problems. Solutions for bars with elliptical and Sokolovsky's oval cross-sections are presented. The solutions for the elliptical bars agree with the existing elastic and limit plastic solutions at the two extremes of the elastic-plastic range. The algorithm also reproduces accurately the Sokolovsky solution and extends it beyond its limitations. VL - 16 SN - 0045-7825 UR - http://www.sciencedirect.com/science/article/pii/004578257890107X CP - 3 M3 - 10.1016/0045-7825(78)90107-X ER -