TY - Generic
T1 - High-Throughput DNA Sequencing To Profile Microbial Water Quality Of Potable Reuse
Y1 - 2018
A1 - Menu B. Leddy
A1 - Megan H. Plumlee
A1 - Rose S. Kantor
A1 - Kara L. Nelson
A1 - Scott E. Miller
A1 - Lauren C. Kennedy
A1 - Blake W. Stamps
A1 - John R. Spear
A1 - Nur A. Hasan
A1 - Rita R Colwell
UR - https://www.wateronline.com/doc/high-throughput-dna-sequencing-to-profile-microbial-water-quality-of-potable-reuse-0001
ER -
TY - JOUR
T1 - Hydroclimatic sustainability assessment of changing climate on cholera in the Ganges-Brahmaputra basin
JF - Advances in Water Resources
Y1 - 2017
A1 - Nasr-Azadani, Fariborz
A1 - Khan, Rakibul
A1 - Rahimikollu, Javad
A1 - Unnikrishnan, Avinash
A1 - Akanda, Ali
A1 - Alam, Munirul
A1 - Huq, Anwar
A1 - Jutla, Antarpreet
A1 - Rita R Colwell
AB - The association of cholera and climate has been extensively documented. However, determining the effects of changing climate on the occurrence of disease remains a challenge. Bimodal peaks of cholera in Bengal Delta are hypothesized to be linked to asymmetric flow of the Ganges and Brahmaputra rivers. Spring cholera is related to intrusion of bacteria-laden coastal seawater during low flow seasons, while autumn cholera results from cross-contamination of water resources when high flows in the rivers cause massive inundation. Coarse resolution of General Circulation Model (GCM) output (usually at 100 – 300 km)cannot be used to evaluate variability at the local scale(10–20 km),hence the goal of this study was to develop a framework that could be used to understand impacts of climate change on occurrence of cholera. Instead of a traditional approach of downscaling precipitation, streamflow of the two rivers was directly linked to GCM outputs, achieving reasonable accuracy (R2 = 0.89 for the Ganges and R2 = 0.91 for the Brahmaputra)using machine learning algorithms (Support Vector Regression-Particle Swarm Optimization). Copula methods were used to determine probabilistic risks of cholera under several discharge conditions. Key results, using model outputs from ECHAM5, GFDL, andHadCM3for A1B and A2 scenarios, suggest that the combined low flow of the two rivers may increase in the future, with high flows increasing for first half of this century, decreasing thereafter. Spring and autumn cholera, assuming societal conditions remain constant e.g., at the current rate, may decrease. However significant shifts were noted in the magnitude of river discharge suggesting that cholera dynamics of the delta may well demonstrate an uncertain predictable pattern of occurrence over the next century.
VL - 108
UR - https://linkinghub.elsevier.com/retrieve/pii/S030917081630728X
J1 - Advances in Water Resources
M3 - 10.1016/j.advwatres.2016.11.018
ER -
TY - JOUR
T1 - Hybrid Vibrio cholerae El Tor Lacking SXT Identified as the Cause of a Cholera Outbreak in the Philippines
JF - mBio
Y1 - 2015
A1 - Klinzing, David C.
A1 - Choi, Seon Young
A1 - Hasan, Nur A.
A1 - Matias, Ronald R.
A1 - Tayag, Enrique
A1 - Geronimo, Josefina
A1 - Skowronski, Evan
A1 - Rashed, Shah M.
A1 - Kawashima, Kent
A1 - Rosenzweig, C. Nicole
A1 - Gibbons, Henry S.
A1 - Torres, Brian C.
A1 - Liles, Veni
A1 - Alfon, Alicia C.
A1 - Juan, Maria Luisa
A1 - Natividad, Filipinas F.
A1 - Cebula, Thomas A.
A1 - Rita R Colwell
AB - Cholera continues to be a global threat, with high rates of morbidity and mortality. In 2011, a cholera outbreak occurred in Palawan, Philippines, affecting more than 500 people, and 20 individuals died. Vibrio cholerae O1 was confirmed as the etiological agent. Source attribution is critical in cholera outbreaks for proper management of the disease, as well as to control spread. In this study, three V. cholerae O1 isolates from a Philippines cholera outbreak were sequenced and their genomes analyzed to determine phylogenetic relatedness to V. cholerae O1 isolates from recent outbreaks of cholera elsewhere. The Philippines V. cholerae O1 isolates were determined to be V. cholerae O1 hybrid El Tor belonging to the seventh-pandemic clade. They clustered tightly, forming a monophyletic clade closely related to V. cholerae O1 hybrid El Tor from Asia and Africa. The isolates possess a unique multilocus variable-number tandem repeat analysis (MLVA) genotype (12-7-9-18-25 and 12-7-10-14-21) and lack SXT. In addition, they possess a novel 15-kb genomic island (GI-119) containing a predicted type I restriction-modification system. The CTXΦ-RS1 array of the Philippines isolates was similar to that of V. cholerae O1 MG116926, a hybrid El Tor strain isolated in Bangladesh in 1991. Overall, the data indicate that the Philippines V. cholerae O1 isolates are unique, differing from recent V. cholerae O1 isolates from Asia, Africa, and Haiti. Furthermore, the results of this study support the hypothesis that the Philippines isolates of V. cholerae O1 are indigenous and exist locally in the aquatic ecosystem of the Philippines.
UR - http://mbio.asm.org/lookup/doi/10.1128/mBio.00047-15
CP - 2
J1 - mBio
M3 - 10.1128/mBio.00047-15
ER -
TY - RPRT
T1 - A Hybrid System for Error Detection in Electronic Dictionaries
Y1 - 2012
A1 - Zajic, David
A1 - David Doermann
A1 - Bloodgood,Michael
A1 - Rodrigues,Paul
A1 - Ye,Peng
A1 - Zotkina,Elena
AB - A progress report on CASL’s research on error detection in electronic dictionaries, including a hybrid system, application and evaluation on a second dictionary and a graphical user interface.
JA - Technical Reports of the Center for the Advanced Study of Language
ER -
TY - JOUR
T1 - Hawkeye and AMOS: Visualizing and Assessing the Quality of Genome Assemblies
JF - Briefings in Bioinformatics
Y1 - 2011
A1 - Schatz,Michael C
A1 - Phillippy,Adam M
A1 - Sommer,Daniel D
A1 - Delcher,Arthur L.
A1 - Puiu,Daniela
A1 - Narzisi,Giuseppe
A1 - Salzberg,Steven L.
A1 - Pop, Mihai
KW - assembly forensics
KW - DNA Sequencing
KW - genome assembly
KW - visual analytics
AB - Since its launch in 2004, the open-source AMOS project has released several innovative DNA sequence analysis applications including: Hawkeye, a visual analytics tool for inspecting the structure of genome assemblies; the Assembly Forensics and FRCurve pipelines for systematically evaluating the quality of a genome assembly; and AMOScmp, the first comparative genome assembler. These applications have been used to assemble and analyze dozens of genomes ranging in complexity from simple microbial species through mammalian genomes. Recent efforts have been focused on enhancing support for new data characteristics brought on by second- and now third-generation sequencing. This review describes the major components of AMOS in light of these challenges, with an emphasis on methods for assessing assembly quality and the visual analytics capabilities of Hawkeye. These interactive graphical aspects are essential for navigating and understanding the complexities of a genome assembly, from the overall genome structure down to individual bases. Hawkeye and AMOS are available open source at http://amos.sourceforge.net.
SN - 1467-5463, 1477-4054
UR - http://bib.oxfordjournals.org/content/early/2011/12/23/bib.bbr074
M3 - 10.1093/bib/bbr074
ER -
TY - CONF
T1 - HCI for peace: from idealism to concrete steps
T2 - PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems
Y1 - 2011
A1 - Hourcade,Juan Pablo
A1 - Bullock-Rest,Natasha E.
A1 - Friedman,Batya
A1 - Nelson,Mark
A1 - Shneiderman, Ben
A1 - Zaphiris,Panayiotis
KW - cyprus
KW - peace
KW - persuasive technology
KW - post-conflict reconciliation
KW - social media
KW - value sensitive design
KW - war
AB - This panel will contribute diverse perspectives on the use of computer technology to promote peace and prevent armed conflict. These perspectives include: the use of social media to promote democracy and citizen participation, the role of computers in helping people communicate across division lines in zones of conflict, how persuasive technology can promote peace, and how interaction design can play a role in post-conflict reconciliation.
JA - PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems
T3 - CHI EA '11
PB - ACM
CY - New York, NY, USA
UR - http://doi.acm.org/10.1145/1979482.1979493
M3 - 10.1145/1979482.1979493
ER -
TY - CONF
T1 - Helping Users Shop for ISPs with Internet Nutrition Labels
T2 - ACM SIGCOMM Workshop on Home Networks '11
Y1 - 2011
A1 - Sundaresan, Srikanth
A1 - Feamster, Nick
A1 - Teixeira, Renata
A1 - Tang, Anthony
A1 - Edwards, W. Keith
A1 - Grinter, Rebecca E.
A1 - Marshini Chetty
A1 - de Donato, Walter
KW - access networks
KW - benchmarking
KW - bismark
KW - broadband networks
KW - gateway measurements
AB - When purchasing home broadband access from Internet service providers (ISPs), users must decide which service plans are most appropriate for their needs. Today, ISPs advertise their available service plans using only generic upload and download speeds. Unfortunately, these metrics do not always accurately reflect the varying performance that home users will experience for a wide range of applications. In this paper, we propose that each ISP service plan carry a "nutrition label" that conveys more comprehensive information about network metrics along many dimensions, including various aspects of throughput, latency, loss rate, and jitter. We first justify why these metrics should form the basis of a network nutrition label. Then, we demonstrate that current plans that are superficially similar with respect to advertised download rates may have different performance according to the label metrics. We close with a discussion of the challenges involved in presenting a nutrition label to users in a way that is both accurate and easy to understand.
JA - ACM SIGCOMM Workshop on Home Networks '11
T3 - HomeNets '11
PB - ACM
SN - 978-1-4503-0798-7
UR - http://doi.acm.org/10.1145/2018567.2018571
ER -
TY - CHAP
T1 - Heterogeneous Design in Functional DIF
T2 - Transactions on High-Performance Embedded Architectures and Compilers IV
Y1 - 2011
A1 - Plishker,William
A1 - Sane, Nimish
A1 - Kiemb, Mary
A1 - Bhattacharyya, Shuvra S.
ED - Stenström, Per
KW - Arithmetic and Logic Structures
KW - Computer Communication Networks
KW - Dataflow
KW - heterogeneous
KW - Input/Output and Data Communications
KW - Logic Design
KW - Processor Architectures
KW - Programming Languages, Compilers, Interpreters
KW - Signal processing
AB - Dataflow formalisms have provided designers of digital signal processing (DSP) systems with analysis and optimizations for many years. As system complexity increases, designers are relying on more types of dataflow models to describe applications while retaining these implementation benefits. The semantic range of DSP-oriented dataflow models has expanded to cover heterogeneous models and dynamic applications, but efficient design, simulation, and scheduling of such applications has not. To facilitate implementing heterogeneous applications, we utilize a new dataflow model of computation and show how actors designed in other dataflow models are directly supported by this framework, allowing system designers to immediately compose and simulate actors from different models. Using examples, we show how this approach can be applied to quickly describe and functionally simulate a heterogeneous dataflow-based application such that a designer may analyze and tune trade-offs among different models and schedules for simulation time, memory consumption, and schedule size.
JA - Transactions on High-Performance Embedded Architectures and Compilers IV
T3 - Lecture Notes in Computer Science
PB - Springer Berlin Heidelberg
SN - 978-3-642-24567-1, 978-3-642-24568-8
UR - http://link.springer.com/chapter/10.1007/978-3-642-24568-8_20
ER -
TY - JOUR
T1 - A Hierarchical Algorithm for Fast Debye Summation with Applications to Small Angle Scattering
JF - Technical Reports from UMIACS
Y1 - 2011
A1 - Gumerov, Nail A.
A1 - Berlin,Konstantin
A1 - Fushman, David
A1 - Duraiswami, Ramani
KW - Technical Report
AB - Debye summation, which involves the summation of sinc functions of distances between all pair of atoms in three dimensional space, arises in computations performed in crystallography, small/wide angle X-ray scattering (SAXS/WAXS) and small angle neutron scattering (SANS). Direct evaluation of Debye summation has quadratic complexity, which results in computational bottleneck when determining crystal properties, or running structure refinement protocols that involve SAXS or SANS, even for moderately sized molecules. We present a fast approximation algorithm that efficiently computes the summation to any prescribed accuracy epsilon in linear time. The algorithm is similar to the fast multipole method (FMM), and is based on a hierarchical spatial decomposition of the molecule coupled with local harmonic expansions and translation of these expansions. An even more efficient implementation is possible when the scattering profile is all that is required, as in small angle scattering reconstruction (SAS) of macromolecules. We examine the relationship of the proposed algorithm to existing approximate methods for profile computations, and provide detailed description of the algorithm, including error bounds and algorithms for stable computation of the translation operators. Our theoretical and computational results show orders of magnitude improvement in computation complexity over existing methods, while maintaining prescribed accuracy.
UR - http://drum.lib.umd.edu/handle/1903/11857
ER -
TY - JOUR
T1 - Higher-Order Symbolic Execution via Contracts
JF - arXiv:1103.1362 [cs]
Y1 - 2011
A1 - Tobin-Hochstadt, Sam
A1 - David Van Horn
KW - Computer Science - Programming Languages
AB - We present a new approach to automated reasoning about higher-order programs by extending symbolic execution to use behavioral contracts as symbolic values, enabling symbolic approximation of higher-order behavior. Our approach is based on the idea of an abstract reduction semantics that gives an operational semantics to programs with both concrete and symbolic components. Symbolic components are approximated by their contract and our semantics gives an operational interpretation of contracts-as-values. The result is a executable semantics that soundly predicts program behavior, including contract failures, for all possible instantiations of symbolic components. We show that our approach scales to an expressive language of contracts including arbitrary programs embedded as predicates, dependent function contracts, and recursive contracts. Supporting this feature-rich language of specifications leads to powerful symbolic reasoning using existing program assertions. We then apply our approach to produce a verifier for contract correctness of components, including a sound and computable approximation to our semantics that facilitates fully automated contract verification. Our implementation is capable of verifying contracts expressed in existing programs, and of justifying valuable contract-elimination optimizations.
UR - http://arxiv.org/abs/1103.1362
ER -
TY - JOUR
T1 - Homage to Michael Gelfond on His 65 th Birthday
JF - Logic programming, knowledge representation, and nonmonotonic reasoning
Y1 - 2011
A1 - Minker, Jack
AB - Michael Gelfond is one of the world leading scientists in the field of logic programming and nonmonotonic reasoning. This essay covers several aspects of Michael’s personal life, starting from his birth in the USSR, through his experiences in the USSR up to the time he emigrated to the United States (U.S.). This is followed by his first experiences in the U.S.: how he became involved in logic programming and nonmonotonic reasoning and some of his major scientific achievements. Michael is a warm, generous person, and I discuss his impact on some colleagues and students. In the concluding section, I observe that starting his career with impediments in the FSU, he overcame them to become one of the top computer scientists in logic programming and nonmonotonic reasoning.
M3 - 10.1007/978-3-642-20832-4_1
ER -
TY - JOUR
T1 - How Many Tiers? Pricing in the Internet Transit Market
JF - SIGCOMM-Computer Communication Review
Y1 - 2011
A1 - Valancius,V.
A1 - Lumezanu,C.
A1 - Feamster, Nick
A1 - Johari,R.
A1 - Vazirani,V. V
AB - ISPs are increasingly selling “tiered” contracts, which offer Inter-net connectivity to wholesale customers in bundles, at rates based on the cost of the links that the traffic in the bundle is traversing. Although providers have already begun to implement and deploy tiered pricing contracts, little is known about how to structure them. Although contracts that sell connectivity on finer granularities im- prove market efficiency, they are also more costly for ISPs to im- plement and more difficult for customers to understand. Our goal is to analyze whether current tiered pricing practices in the whole- sale transit market yield optimal profits for ISPs and whether better bundling strategies might exist. In the process, we offer two contri- butions: (1) we develop a novel way of mapping traffic and topol- ogy data to a demand and cost model; and (2) we fit this model on three large real-world networks: an European transit ISP, a content distribution network, and an academic research network, and run counterfactuals to evaluate the effects of different bundling strate- gies. Our results show that the common ISP practice of structuring tiered contracts according to the cost of carrying the traffic flows (e.g., offering a discount for traffic that is local) can be suboptimal and that dividing contracts based on both traffic demand and the cost of carrying it into only three or four tiers yields near-optimal profit for the ISP.
VL - 41
CP - 4
ER -
TY - CONF
T1 - How secure are networked office devices?
Y1 - 2011
A1 - Condon,E.
A1 - Cummins,E.
A1 - Afoulki,Z.
A1 - Michel Cukier
KW - computer network security
KW - data privacy
KW - networked office device security
KW - privacy risk assessment
KW - Risk management
KW - security risk assessment
KW - STRIDE threat model
KW - university network
AB - Many office devices have a history of being networked (such as printers) and others without the same past are increasingly becoming networked (such as photocopiers). The modern networked versions of previously non-networked devices have much in common with traditional networked servers in terms of features and functions. While an organization may have policies and procedures for securing traditional network servers, securing networked office devices providing similar services can easily be overlooked. In this paper we present an evaluation of privacy and security risks found when examining over 1,800 networked office devices connected to a large university network. We use the STRIDE threat model to categorize threats and vulnerabilities and then we group the devices according to assessed risk from the perspective of the university. We found that while steps had been taken to secure some devices, many were using default or unsecured configurations.
M3 - 10.1109/DSN.2011.5958259
ER -
TY - BOOK
T1 - Handbook of Signal Processing Systems
Y1 - 2010
A1 - Bhattacharyya, Shuvra S.
A1 - Deprettere, Ed F.
KW - Computers / Information Theory
KW - Technology & Engineering / Electrical
KW - Technology & Engineering / Signals & Signal Processing
AB - The Handbook is organized in four parts. The first part motivates representative applications that drive and apply state-of-the art methods for design and implementation of signal processing systems; the second part discusses architectures for implementing these applications; the third part focuses on compilers and simulation tools; and the fourth part describes models of computation and their associated design tools and methodologies.
PB - Springer
SN - 9781441963451
ER -
TY - CONF
T1 - Handwritten Arabic text line segmentation using affinity propagation
T2 - Proceedings of the 9th IAPR International Workshop on Document Analysis Systems
Y1 - 2010
A1 - Kumar,Jayant
A1 - Abd-Almageed, Wael
A1 - Kang,Le
A1 - David Doermann
KW - affinity propagation
KW - arabic
KW - arabic documents
KW - breadth-first search
KW - clustering
KW - dijkstra's shortest path algorithm
KW - handwritten documents
KW - line detection
KW - text line segmentation
AB - In this paper, we present a novel graph-based method for extracting handwritten text lines in monochromatic Arabic document images. Our approach consists of two steps - Coarse text line estimation using primary components which define the line and assignment of diacritic components which are more difficult to associate with a given line. We first estimate local orientation at each primary component to build a sparse similarity graph. We then, use a shortest path algorithm to compute similarities between non-neighboring components. From this graph, we obtain coarse text lines using two estimates obtained from Affinity propagation and Breadth-first search. In the second step, we assign secondary components to each text line. The proposed method is very fast and robust to non-uniform skew and character size variations, normally present in handwritten text lines. We evaluate our method using a pixel-matching criteria, and report 96% accuracy on a dataset of 125 Arabic document images. We also present a proximity analysis on datasets generated by artificially decreasing the spacings between text lines to demonstrate the robustness of our approach.
JA - Proceedings of the 9th IAPR International Workshop on Document Analysis Systems
T3 - DAS '10
PB - ACM
CY - New York, NY, USA
SN - 978-1-60558-773-8
UR - http://doi.acm.org/10.1145/1815330.1815348
M3 - 10.1145/1815330.1815348
ER -
TY - JOUR
T1 - Higher-order graphical models for classification in social and affiliation networks
JF - NIPS 2010 Workshop on Networks Across Disciplines: Theory and Applications, Whistler BC, Canada
Y1 - 2010
A1 - Zheleva,E.
A1 - Getoor, Lise
A1 - Sarawagi,S.
AB - In this work we explore the application of higher-order Markov Random Fields(MRF) to classification in social and affiliation networks. We consider both friend- ship links and group membership for inferring hidden attributes in a collective inference framework. We explore different ways of using the social groups as ei- ther node features or to construct the graphical model structure. The bottleneck in applying higher-order MRFs to a domain with many overlapping large cliques is the complexity of inference which is exponential in the size of the largest clique. To circumvent the slow inference problem, we borrow recent advancements in the computer vision community to achieve fast approximate inference results. We provide preliminary results using a dataset from facebook which suggest that our higher-order MRF models are capturing the structural dependencies in the net- works and they yield higher accuracy than linear classifiers.
ER -
TY - CONF
T1 - Holistic sentiment analysis across languages: multilingual supervised latent Dirichlet allocation
T2 - Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing
Y1 - 2010
A1 - Jordan Boyd-Graber
A1 - Resnik, Philip
AB - In this paper, we develop multilingual supervised latent Dirichlet allocation (MlSLDA), a probabilistic generative model that allows insights gleaned from one language's data to inform how the model captures properties of other languages. MlSLDA accomplishes this by jointly modeling two aspects of text: how multilingual concepts are clustered into thematically coherent topics and how topics associated with text connect to an observed regression variable (such as ratings on a sentiment scale). Concepts are represented in a general hierarchical framework that is flexible enough to express semantic ontologies, dictionaries, clustering constraints, and, as a special, degenerate case, conventional topic models. Both the topics and the regression are discovered via posterior inference from corpora. We show MlSLDA can build topics that are consistent across languages, discover sensible bilingual lexical correspondences, and leverage multilingual corpora to better predict sentiment.
JA - Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing
T3 - EMNLP '10
PB - Association for Computational Linguistics
CY - Stroudsburg, PA, USA
UR - http://dl.acm.org/citation.cfm?id=1870658.1870663
ER -
TY - JOUR
T1 - Hopx and Hdac2 Interact to Modulate Gata4 Acetylation and Embryonic Cardiac Myocyte Proliferation
JF - Developmental Cell
Y1 - 2010
A1 - Trivedi,Chinmay M.
A1 - Zhu,Wenting
A1 - Wang,Qiaohong
A1 - Jia,Cheng
A1 - Kee,Hae Jin
A1 - Li,Li
A1 - Hannenhalli, Sridhar
A1 - Epstein,Jonathan A.
AB - SummaryRegulation of chromatin structure via histone modification has recently received intense attention. Here, we demonstrate that the chromatin-modifying enzyme histone deacetylase 2 (Hdac2) functions with a small homeodomain factor, Hopx, to mediate deacetylation of Gata4, which is expressed by cardiac progenitor cells and plays critical roles in the regulation of cardiogenesis. In the absence of Hopx and Hdac2 in mouse embryos, Gata4 hyperacetylation is associated with a marked increase in cardiac myocyte proliferation, upregulation of Gata4 target genes, and perinatal lethality. Hdac2 physically interacts with Gata4, and this interaction is stabilized by Hopx. The ability of Gata4 to transactivate cell cycle genes is impaired by Hopx/Hdac2-mediated deacetylation, and this effect is abrogated by loss of Hdac2-Gata4 interaction. These results suggest that Gata4 is a nonhistone target of Hdac2-mediated deacetylation and that Hdac2, Hopx, and Gata4 coordinately regulate cardiac myocyte proliferation during embryonic development.
VL - 19
SN - 1534-5807
UR - http://www.sciencedirect.com/science/article/pii/S1534580710003874
CP - 3
M3 - 10.1016/j.devcel.2010.08.012
ER -
TY - JOUR
T1 - Hat guessing games
JF - SIAM review
Y1 - 2009
A1 - Butler,S.
A1 - Hajiaghayi, Mohammad T.
A1 - Kleinberg,R. D
A1 - Leighton,T.
VL - 51
CP - 2
ER -
TY - JOUR
T1 - HEALTH AND WELLBEING
JF - The fourth paradigm: data-intensive scientific discovery
Y1 - 2009
A1 - Gillam,M.
A1 - Feied,C.
A1 - MOODY,E.
A1 - Shneiderman, Ben
A1 - Smith,M.
A1 - DICKASON,J.
ER -
TY - JOUR
T1 - High-Fidelity Data Embedding for Image Annotation
JF - Image Processing, IEEE Transactions on
Y1 - 2009
A1 - He,Shan
A1 - Kirovski,D.
A1 - M. Wu
KW - Automated;Product Labeling;Reproducibility of Results;Sensitivity and Specificity;Signal Processing
KW - Computer-Assisted;
KW - Computer-Assisted;Information Storage and Retrieval;Pattern Recognition
KW - JPEG compression;JPEG cropping;arbitrary imagery;data hiding;high-fidelity data embedding;image annotation;image watermarking;medical images;photographic images;data compression;image coding;watermarking;Algorithms;Computer Graphics;Documentation;Image En
AB - High fidelity is a demanding requirement for data hiding, especially for images with artistic or medical value. This correspondence proposes a high-fidelity image watermarking for annotation with robustness to moderate distortion. To achieve the high fidelity of the embedded image, we introduce a visual perception model that aims at quantifying the local tolerance to noise for arbitrary imagery. Based on this model, we embed two kinds of watermarks: a pilot watermark that indicates the existence of the watermark and an information watermark that conveys a payload of several dozen bits. The objective is to embed 32 bits of metadata into a single image in such a way that it is robust to JPEG compression and cropping. We demonstrate the effectiveness of the visual model and the application of the proposed annotation technology using a database of challenging photographic and medical images that contain a large amount of smooth regions.
VL - 18
SN - 1057-7149
CP - 2
M3 - 10.1109/TIP.2008.2008733
ER -
TY - BOOK
T1 - HotSWUp '09: Proceedings of the 2Nd International Workshop on Hot Topics in Software Upgrades
Y1 - 2009
PB - ACM
CY - New York, NY, USA
SN - 978-1-60558-723-3
ER -
TY - CONF
T1 - How children search the internet with keyword interfaces
T2 - Proceedings of the 8th International Conference on Interaction Design and Children
Y1 - 2009
A1 - Druin, Allison
A1 - Foss,E.
A1 - Hatley,L.
A1 - Golub,E.
A1 - Guha,M.L.
A1 - Fails,J.
A1 - Hutchinson,H.
JA - Proceedings of the 8th International Conference on Interaction Design and Children
ER -
TY - CONF
T1 - How would you look as you age ?
T2 - Image Processing (ICIP), 2009 16th IEEE International Conference on
Y1 - 2009
A1 - Ramanathan,N.
A1 - Chellapa, Rama
KW - age-separated
KW - appearances;facial
KW - database;face
KW - Face
KW - growth
KW - image
KW - model;face
KW - model;facial
KW - models;facial
KW - recognition;image
KW - SHAPE
KW - TEXTURE
KW - texture;
KW - transformation
KW - verification;facial
AB - Facial appearances change with increase in age. While generic growth patterns that are characteristic of different age groups can be identified, facial growth is also observed to be influenced by individual-specific attributes such as one's gender, ethnicity, life-style etc. In this paper, we propose a facial growth model that comprises of transformation models for facial shape and texture. We collected empirical data pertaining to facial growth from a database of age-separated face images of adults and used the same in developing the aforementioned transformation models. The proposed model finds applications in predicting one's appearance across ages and in performing face verification across ages.
JA - Image Processing (ICIP), 2009 16th IEEE International Conference on
M3 - 10.1109/ICIP.2009.5413998
ER -
TY - CONF
T1 - Human detection using partial least squares analysis
T2 - Computer Vision, 2009 IEEE 12th International Conference on
Y1 - 2009
A1 - Schwartz,William Robson
A1 - Kembhavi,Aniruddha
A1 - Harwood,David
A1 - Davis, Larry S.
AB - Significant research has been devoted to detecting people in images and videos. In this paper we describe a human detection method that augments widely used edge-based features with texture and color information, providing us with a much richer descriptor set. This augmentation results in an extremely high-dimensional feature space (more than 170,000 dimensions). In such high-dimensional spaces, classical machine learning algorithms such as SVMs are nearly intractable with respect to training. Furthermore, the number of training samples is much smaller than the dimensionality of the feature space, by at least an order of magnitude. Finally, the extraction of features from a densely sampled grid structure leads to a high degree of multicollinearity. To circumvent these data characteristics, we employ Partial Least Squares (PLS) analysis, an efficient dimensionality reduction technique, one which preserves significant discriminative information, to project the data onto a much lower dimensional subspace (20 dimensions, reduced from the original 170,000). Our human detection system, employing PLS analysis over the enriched descriptor set, is shown to outperform state-of-the-art techniques on three varied datasets including the popular INRIA pedestrian dataset, the low-resolution gray-scale DaimlerChrysler pedestrian dataset, and the ETHZ pedestrian dataset consisting of full-length videos of crowded scenes.
JA - Computer Vision, 2009 IEEE 12th International Conference on
M3 - 10.1109/ICCV.2009.5459205
ER -
TY - CONF
T1 - HydroSense: infrastructure-mediated single-point sensing of whole-home water activity
T2 - Proceedings of the 11th international conference on Ubiquitous computing, September
Y1 - 2009
A1 - Jon Froehlich
A1 - Larson,E.
A1 - Campbell,T.
A1 - Haggerty,C.
A1 - Fogarty,J.
A1 - Patel,S.N.
JA - Proceedings of the 11th international conference on Ubiquitous computing, September
ER -
TY - RPRT
T1 - H (div) preconditioning for a mixed finite element formulation of the stochastic diffusion problem
Y1 - 2008
A1 - Elman, Howard
A1 - Furnival, D. G
A1 - Powell, C. E
PB - Citeseer
ER -
TY - JOUR
T1 - Handling expected polynomial-time strategies in simulation-based security proofs
JF - Journal of Cryptology
Y1 - 2008
A1 - Katz, Jonathan
A1 - Lindell,Y.
AB - The standard class of adversaries considered in cryptography is that of strict polynomial-time probabilistic machines. However, expected polynomial-time machines are often also considered. For example, there are many zero-knowledge protocols for which the only known simulation techniques run in expected (and not strict) polynomial time. In addition, it has been shown that expected polynomial-time simulation is essential for achieving constant-round black-box zero-knowledge protocols. This reliance on expected polynomial-time simulation introduces a number of conceptual and technical difficulties. In this paper, we develop techniques for dealing with expected polynomial-time adversaries in simulation-based security proofs.
VL - 21
CP - 3
M3 - 10.1007/s00145-007-9004-8
ER -
TY - BOOK
T1 - Handwritten Document Image Processing
Y1 - 2008
A1 - Yefeng Zheng
A1 - David Doermann
A1 - Huiping Li
PB - VDMVerlang Dr. Muller
ER -
TY - JOUR
T1 - Hardware and Software Systems for Image and Video Processing-Algorithmic and Architectural Optimizations for Computationally Efficient Particle Filtering
JF - IEEE Transactions on Image Processing
Y1 - 2008
A1 - Sankaranarayanan,A. C
A1 - Srivastava, A.
A1 - Chellapa, Rama
VL - 17
CP - 5
ER -
TY - JOUR
T1 - Hardware monitors for dynamic page migration
JF - Journal of Parallel and Distributed Computing
Y1 - 2008
A1 - Tikir, Mustafa M.
A1 - Hollingsworth, Jeffrey K
KW - Address translation counters
KW - cc-NUMA systems
KW - Dynamic page migration
KW - Full system simulation
KW - Hardware performance monitors
KW - High performance computing
KW - Multiprocessor systems
KW - OpenMP applications
KW - Runtime optimization
AB - In this paper, we first introduce a profile-driven online page migration scheme and investigate its impact on the performance of multithreaded applications. We use centralized lightweight, inexpensive plug-in hardware monitors to profile the memory access behavior of an application, and then migrate pages to memory local to the most frequently accessing processor. We also investigate the use of several other potential sources of data gathered from hardware monitors and compare their effectiveness to using data from centralized hardware monitors. In particular, we investigate the effectiveness of using cache miss profiles, Translation Lookaside Buffer (TLB) miss profiles and the content of the on-chip TLBs using the valid bit information. Moreover, we also introduce a modest hardware feature, called Address Translation Counters (ATC), and compare its effectiveness with other sources of hardware profiles.Using the Dyninst runtime instrumentation combined with hardware monitors, we were able to add page migration capabilities to a Sun Fire 6800 server without having to modify the operating system kernel, or to re-compile application programs. Our dynamic page migration scheme reduced the total number of non-local memory accesses of applications by up to 90% and improved the execution times up to 16%. We also conducted a simulation based study and demonstrated that cache miss profiles gathered from on-chip CPU monitors, which are typically available in current microprocessors, can be effectively used to guide dynamic page migrations in applications.
VL - 68
SN - 0743-7315
UR - http://www.sciencedirect.com/science/article/pii/S0743731508001020
CP - 9
M3 - 16/j.jpdc.2008.05.006
ER -
TY - CONF
T1 - Hci for community and international development
T2 - SIGCHI EA '08
Y1 - 2008
A1 - Thomas, John
A1 - Dearden, Andy
A1 - Dray, Susan
A1 - Light, Ann
A1 - Best, Michael
A1 - Arkin, Nuray
A1 - Maunder, Andrew
A1 - Kam, Mathew
A1 - Marshini Chetty
A1 - Sambasivan, Nithya
A1 - Buckhalter, Celeste
A1 - Krishnan, Gaurishankar
KW - community design
KW - ict4d
KW - information and communication technology
KW - international development
KW - participatory design
KW - ucd4id
KW - User centered design
AB - This workshop explores the challenges in applying, extending and inventing appropriate methods and contributions of Human Computer Interaction (HCI) to International economic and community Development. We address interaction design for parts of the world that are often marginalized by the Global North as well as people in the Global North who are themselves similarly marginalized by poverty or other barriers. We hope to extend the boundaries of the field of Human Computer Interaction by spurring a discussion on how existing methods and practices can be adapted and modified, and how new practices can be developed, to deal with the unique challenges posed by these contexts.
JA - SIGCHI EA '08
T3 - CHI EA '08
PB - ACM
SN - 978-1-60558-012-8
UR - http://doi.acm.org/10.1145/1358628.1358954
ER -
TY - JOUR
T1 - Hierarchical infrastructure for internet mapping services
JF - Geospatial Services and Applications for the Internet
Y1 - 2008
A1 - Brabec,F.
A1 - Samet, Hanan
M3 - 10.1007/978-0-387-74674-6_1
ER -
TY - CONF
T1 - A hierarchical spatial index for triangulated surfaces
T2 - Int. Conf. on Computer Graphics Theory and Applications (GRAPP)
Y1 - 2008
A1 - De Floriani, Leila
A1 - Facinoli,M.
A1 - Magillo,P.
A1 - Dimitri,D.
AB - We present the PM2-Triangle quadtree (PM2T-quadtree), a new hierarchical spatial index for triangle mesheswhich has been designed for performing spatial queries on triangle-based terrain models. The PM2T-quadtree is based on a recursive space decomposition into square blocks. Here, we propose a highly compact data structure encoding a PM2T-quadtree, which decouples the spatial indexing structure from the combinatorial description of the mesh. We compare the PM2T-quadtree against other spatial indexes by considering the structure of the underlying domain subdivision, the storage costs of their data structures and the performance in geometric queries.
JA - Int. Conf. on Computer Graphics Theory and Applications (GRAPP)
ER -
TY - RPRT
T1 - High Performance Computing Algorithms for Land Cover
Y1 - 2008
A1 - Dynamics Using Remote
A1 - Satya Kalluri
A1 - Bader,David A.
A1 - John Townshend
A1 - JaJa, Joseph F.
A1 - Zengyan Zhang
A1 - Fallah-adl,Hassan
AB - Global and regional land cover studies require the ability to apply complex models on selected subsets of large amounts of multi-sensor and multi-temporal data sets that have been derived from raw instrument measurements using widely accepted pre-processing algorithms. The computational and storage requirements of most such studies far exceed what is possible on a single workstation environment. We have been pursuing a new approach that couples scalable and open distributed heterogeneous hardware with the development of high performance software for processing, indexing, and organizing remotely sensed data. Hierarchical data management tools are used to ingest raw data, create metadata, and organize the archived data so as to automatically achieve computational load balancing among the available nodes and minimize I/O overheads. We illustrate our approach with four specific examples. The first is the development of the first fast operational scheme for the atmospheric correction of Landsat TM scenes, while the second example focuses on image segmentation using a novel hierarchical connected components algorithm. Retrieval of global BRDF (Bidirectional Reflectance Distribution Function) in the red and near infrared wavelengths using four years (1983 to 1986) of Pathfinder AVHRR Land (PAL) data set is the focus of our third example. The fourth example is the development of a hierarchical data organization scheme that allows on-demand processing and retrieval of regional and global AVHRR data sets. Our results show that substantial improvements in computational times can be achieved by using the high performance computing technology.
PB - CiteSeerX
UR - http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.4213
ER -
TY - CONF
T1 - High-Dimensional Similarity Retrieval Using Dimensional Choice
T2 - Similarity Search and Applications, 2008. SISAP 2008. First International Workshop on
Y1 - 2008
A1 - Tahmoush,D.
A1 - Samet, Hanan
KW - data
KW - database
KW - function;high-dimensional
KW - management
KW - processing;
KW - processing;sequential
KW - reduction;database
KW - reduction;distance
KW - retrieval;query
KW - search;data
KW - search;similarity
KW - similarity
KW - system;dimension
KW - systems;query
AB - There are several pieces of information that can be utilized in order to improve the efficiency of similarity searches on high-dimensional data. The most commonly used information is the distribution of the data itself but the use of dimensional choice based on the information in the query as well as the parameters of the distribution can provide an effective improvement in the query processing speed and storage. The use of this method can produce dimension reduction by as much as a factor of n, the number of data points in the database, over sequential search. We demonstrate that the curse of dimensionality is not based on the dimension of the data itself, but primarily upon the effective dimension of the distance function. We also introduce a new distance function that utilizes fewer dimensions of the higher dimensional space to produce a maximal lower bound distance in order to approximate the full distance function. This work has demonstrated significant dimension reduction, up to 70% reduction with an improvement in accuracy or over 99% with only a 6% loss in accuracy on a prostate cancer data set.
JA - Similarity Search and Applications, 2008. SISAP 2008. First International Workshop on
M3 - 10.1109/SISAP.2008.20
ER -
TY - RPRT
T1 - Hosting virtual networks on commodity hardware
Y1 - 2008
A1 - Bhatia,S.
A1 - Motiwala,M.
A1 - Muhlbauer,W.
A1 - Valancius,V.
A1 - Bavier,A.
A1 - Feamster, Nick
A1 - Peterson,L.
A1 - Rexford,J.
AB - This paper describes Trellis, a software platform for hostingmultiple virtual networks on shared commodity hardware. Trellis allows each virtual network to define its own topol- ogy, control protocols, and forwarding tables, which low- ers the barrier for deploying custom services on an isolated, reconfigurable, and programmable network, while amor- tizing costs by sharing the physical infrastructure. Trellis synthesizes two container-based virtualization technologies, VServer and NetNS, as well as a new tunneling mechanism, EGRE, into a coherent platform that enables high-speed vir- tual networks. We describe the design and implementation, of Trellis, including kernel-level performance optimizations, and evaluate its supported packet-forwarding rates against other virtualization technologies. We are in the process of upgrading the VINI facility to use Trellis. We also plan to release Trellis as part of MyVINI, a standalone software dis- tribution that allows researchers and application developers to deploy their own virtual network hosting platforms.
PB - Georgia Institute of Technology
VL - GT-CS-07-10
ER -
TY - BOOK
T1 - HotSWUp '08: Proceedings of the 1st International Workshop on Hot Topics in Software Upgrades
Y1 - 2008
PB - ACM
CY - New York, NY, USA
SN - 978-1-60558-304-4
ER -
TY - RPRT
T1 - How Do Users Find Things with PubMed? Towards Automatic Utility Evaluation with User Simulations
Y1 - 2008
A1 - Jimmy Lin
A1 - Smucker,Mark D.
KW - *BIOMEDICAL INFORMATION SYSTEMS
KW - *BROWSING
KW - *INFORMATION RETRIEVAL
KW - *PUBMED
KW - *SIMILARITY
KW - *SIMULATION
KW - *USER NEEDS
KW - DOCUMENTS
KW - FIND-SIMILAR
KW - HUMAN FACTORS ENGINEERING & MAN MACHINE SYSTEM
KW - INFORMATION SCIENCE
KW - MAN COMPUTER INTERFACE
KW - QUALITY
KW - queries
KW - searching
KW - TEST AND EVALUATION
KW - UTILITY
AB - In the context of document retrieval in the biomedical domain, this paper explores the complex relationship between the quality of initial query results and the overall utility of an interactive system. We demonstrate that a content-similarity browsing tool can compensate for poor retrieval results, and that the relationship between retrieval performance and overall utility is non-linear. Arguments are advanced with user simulations, which characterize the relevance of documents that a user might encounter with different browsing strategies. With broader implications to IR, this work provides a case study of how user simulations can be exploited as a formative tool for automatic utility evaluation. Simulation-based studies provide researchers with an additional evaluation tool to complement interactive and Cranfield-style experiments.
PB - Human-Computer Interaction Lab, University of Maryland, College Park
UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA478703
ER -
TY - RPRT
T1 - How friendship links and group memberships affect the privacy of individuals in social networks
Y1 - 2008
A1 - Zheleva,Elena
A1 - Getoor, Lise
KW - Technical Report
AB - In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit a social network with a mixture of public and private user profiles to predict the private attributes of users. We map this problem to a relational classification problem and we propose a simple yet powerful model that uses group features and group memberships of users to perform multi-value classification. We compare its efficacy against several other classification approaches. Our results show that even in the case when there is an option for making profile attributes private, if links and group affiliations are known, users' privacy in social networks may be compromised. On a dataset from a well-known social-media website, we could easily recover the sensitive attributes for half of the private-profile users with a high accuracy when as much as half of the profiles are private. To the best of our knowledge, this is the first work that uses link-based and group-based classification to study privacy implications in social networks. We conclude with a discussion of our findings and the broader applicability of our proposed model.
PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park
VL - UMIACS-TR-2008-16
UR - http://drum.lib.umd.edu/handle/1903/8691
ER -
TY - JOUR
T1 - How to encrypt with a malicious random number generator
JF - Fast Software Encryption
Y1 - 2008
A1 - Kamara,S.
A1 - Katz, Jonathan
AB - Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that are generated uniformly at random and independently of anything else. This leaves open the possibility of attacks in case the random coins are poorly generated (e.g., using a faulty random number generator), or are under partial adversarial control (e.g., when encryption is done by lightweight devices that may be captured and tampered with).We introduce new notions of security modeling such attacks, propose two concrete schemes meeting our definitions, and show generic transformations for achieving security in this context.
M3 - 10.1007/978-3-540-71039-4_19
ER -
TY - JOUR
T1 - How to succeed in graduate school: a guide for students and advisors
JF - Crossroads
Y1 - 2008
A1 - desJardins, Marie
VL - 14
SN - 1528-4972
UR - http://doi.acm.org/10.1145/1375972.1375975
CP - 4
M3 - 10.1145/1375972.1375975
ER -
TY - CONF
T1 - Human detection using iterative feature selection and logistic principal component analysis
T2 - Robotics and Automation, 2008. ICRA 2008. IEEE International Conference on
Y1 - 2008
A1 - Abd-Almageed, Wael
A1 - Davis, Larry S.
KW - algorithm;logistic
KW - analysis;edge
KW - analysis;probability;
KW - applications;principal
KW - belongness
KW - component
KW - DETECTION
KW - detection;feature
KW - detection;iterative
KW - detection;principal
KW - extraction;filtering
KW - feature
KW - filtering;human
KW - MAP
KW - methods;object
KW - PCA;object
KW - probability;edge
KW - selection
KW - theory;iterative
AB - We present a fast feature selection algorithm suitable for object detection applications where the image being tested must be scanned repeatedly to detected the object of interest at different locations and scales. The algorithm iteratively estimates the belongness probability of image pixels to foreground of the image. To prove the validity of the algorithm, we apply it to a human detection problem. The edge map is filtered using a feature selection algorithm. The filtered edge map is then projected onto an eigen space of human shapes to determine if the image contains a human. Since the edge maps are binary in nature, Logistic Principal Component Analysis is used to obtain the eigen human shape space. Experimental results illustrate the accuracy of the human detector.
JA - Robotics and Automation, 2008. ICRA 2008. IEEE International Conference on
M3 - 10.1109/ROBOT.2008.4543444
ER -
TY - JOUR
T1 - Hawkeye: an interactive visual analytics tool for genome assemblies
JF - Genome Biology
Y1 - 2007
A1 - Schatz,Michael C
A1 - Phillippy,Adam M
A1 - Shneiderman, Ben
A1 - Salzberg,Steven L.
AB - Genome sequencing remains an inexact science, and genome sequences can contain significant errors if they are not carefully examined. Hawkeye is our new visual analytics tool for genome assemblies, designed to aid in identifying and correcting assembly errors. Users can analyze all levels of an assembly along with summary statistics and assembly metrics, and are guided by a ranking component towards likely mis-assemblies. Hawkeye is freely available and released as part of the open source AMOS project http://amos.sourceforge.net/hawkeye.
VL - 8
SN - 1465-6906
UR - http://genomebiology.com/2007/8/3/R34
CP - 3
M3 - 10.1186/gb-2007-8-3-r34
ER -
TY - CONF
T1 - HCI4D: hci challenges in the global south
T2 - SIGCHI EA '07
Y1 - 2007
A1 - Marshini Chetty
A1 - Grinter, Rebecca E.
KW - global south
KW - hci
KW - methodologies
AB - While researchers have designed user-centered systems for the Global South, fewer have discussed the unique challenges facing HCI projects. In this paper, we describe methodological and practical challenges for HCI research and practice in the Global South.
JA - SIGCHI EA '07
T3 - CHI EA '07
PB - ACM
SN - 978-1-59593-642-4
UR - http://doi.acm.org/10.1145/1240866.1241002
ER -
TY - JOUR
T1 - Heuristic Search and Information Visualization Methods for School Redistricting
JF - AI Magazine
Y1 - 2007
A1 - desJardins, Marie
A1 - Bulka,Blazej
A1 - Carr,Ryan
A1 - Jordan,Eric
A1 - Rheingans,Penny
AB - We describe an application of AI search and information visualization techniques to the problem of school redistricting, in which students are assigned to home schools within a county or school district. This is a multicriteria optimization problem in which competing objectives, such as school capacity, busing costs, and socioeconomic distribution, must be considered. Because of the complexity of the decision-making problem, tools are needed to help end users generate, evaluate, and compare alternative school assignment plans. A key goal of our research is to aid users in finding multiple qualitatively different redistricting plans that represent different trade-offs in the decision space. We present heuristic search methods that can be used to find a set of qualitatively different plans, and give empirical results of these search methods on population data from the school district of Howard County, Maryland. We show the resulting plans using novel visualization methods that we have developed for summarizing and comparing alternative plans.
VL - 28
SN - 0738-4602
UR - https://www.aaai.org/ojs/index.php/aimagazine/article/viewArticle/2055
CP - 3
M3 - 10.1609/aimag.v28i3.2055
ER -
TY - CONF
T1 - Hierarchical Part-Template Matching for Human Detection and Segmentation
T2 - Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on
Y1 - 2007
A1 - Zhe Lin
A1 - Davis, Larry S.
A1 - David Doermann
A1 - DeMenthon,D.
KW - analysis;global
KW - approach;background
KW - articulations;video
KW - Bayesian
KW - detection;human
KW - detectors;hierarchical
KW - detectors;partial
KW - framework;Bayesian
KW - human
KW - likelihood
KW - MAP
KW - matching;human
KW - matching;image
KW - methods;image
KW - occlusion
KW - occlusions;shape
KW - part-based
KW - part-template
KW - re-evaluation;global
KW - segmentation;image
KW - segmentation;local
KW - sequences;
KW - sequences;Bayes
KW - SHAPE
KW - subtraction;fine
KW - template-based
AB - Local part-based human detectors are capable of handling partial occlusions efficiently and modeling shape articulations flexibly, while global shape template-based human detectors are capable of detecting and segmenting human shapes simultaneously. We describe a Bayesian approach to human detection and segmentation combining local part-based and global template-based schemes. The approach relies on the key ideas of matching a part-template tree to images hierarchically to generate a reliable set of detection hypotheses and optimizing it under a Bayesian MAP framework through global likelihood re-evaluation and fine occlusion analysis. In addition to detection, our approach is able to obtain human shapes and poses simultaneously. We applied the approach to human detection and segmentation in crowded scenes with and without background subtraction. Experimental results show that our approach achieves good performance on images and video sequences with severe occlusion.
JA - Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on
M3 - 10.1109/ICCV.2007.4408975
ER -
TY - JOUR
T1 - High frequency acoustic simulations via FMM accelerated BEM
JF - 19th Internal congress on acoustics
Y1 - 2007
A1 - Gumerov, Nail A.
A1 - Duraiswami, Ramani
AB - High frequency simulations of acoustics are among the most expensive problems to simulate. Inpractice 6 to 10 points per wavelength are required. Since the wavenumber k is inversely proportional to wavelength, if a numerical method is a surface based method (such as the BEM), then problem size scales as O(k2D2), where D is the size of the domain. Dense matrices appear and typical iter- ative solution can be achieved for O(k4D4) memory and O(k4D4) per iteration cost. We employ an algorithm based on the fast multipole method (FMM) using coaxial and diagonal translation operators based on the frequency of simulation to reduce the memory requirements and per iteration cost to O(k2D2 log kD) for larger kD (kD ~250). The number of iterations needed depend upon the condition of the matrix, and preconditioning chosen. Preconditioned Krylov methods such as the flexible gen- eralized minimum residual method (FGMRES), with preconditioning based upon a lower accuracy FMM, usually ensure a convergent iteration. Example calculations are presented.
VL - 159
ER -
TY - JOUR
T1 - High-throughput sequence alignment using Graphics Processing Units
JF - BMC Bioinformatics
Y1 - 2007
A1 - Schatz,Michael C
A1 - Trapnell,Cole
A1 - Delcher,Arthur L.
A1 - Varshney, Amitabh
VL - 8
SN - 1471-2105
UR - http://www.biomedcentral.com/1471-2105/8/474
CP - 1
M3 - 10.1186/1471-2105-8-474
ER -
TY - JOUR
T1 - HIV risk behaviors among female IDUs in developing and transitional countries
JF - BMC Public Health
Y1 - 2007
A1 - Charles,C.
A1 - Des Jarlais Don,P. T
A1 - Gerry,S.
VL - 7
ER -
TY - CONF
T1 - Holding the Internet Accountable
T2 - Proc. 6th ACM Workshop on Hot Topics in Networks (Hotnets-VI)
Y1 - 2007
A1 - Andersen,David
A1 - Balakrishnan,Hari
A1 - Feamster, Nick
A1 - Koponen,Teemu
A1 - Moon,Daekyong
A1 - Shenker,Scott
AB - Today’s IP network layer provides little to no protection against misconfiguration or malice. Despite some progress in improving the robustness and security of the IP layer, misconfigurations and attacks still occur frequently. We show how a network layer that provides accountability, i.e., the ability to associate each action with the responsible entity, provides a firm foundation for defenses against misconfiguration and malice. We present the design of a network layer that incorporates accountability called AIP (Accountable Internet Protocol) and show how its features—notably, its use of self-certifying addresses— can improve both source accountability (the ability to trace actions to a particular end host and stop that host from misbehaving) and control-plane accountability (the ability to pinpoint and prevent attacks on routing).
JA - Proc. 6th ACM Workshop on Hot Topics in Networks (Hotnets-VI)
UR - http://repository.cmu.edu/compsci/66
ER -
TY - CONF
T1 - Hood College, Master of Business Administration, 2005 Hood College, Master of Science (Computer Science), 2001 Hood College, Bachelor of Science (Computer Science), 1998 Frederick Community College, Associate in Arts (Business Administration), 1993
T2 - Proceedings of the Workshop on Metareasoning in Agent-Based Systems
Y1 - 2007
A1 - Anderson,M. L
A1 - Schmill,M.
A1 - Oates,T.
A1 - Perlis, Don
A1 - Josyula,D.
A1 - Wright,D.
A1 - Human,S. W.T.D.N
A1 - Metacognition,L.
A1 - Fults,S.
A1 - Josyula,D. P
JA - Proceedings of the Workshop on Metareasoning in Agent-Based Systems
ER -
TY - CHAP
T1 - How Smart Homes Learn: The Evolution of the Networked Home and Household
T2 - UbiComp 2007: Ubiquitous Computing
Y1 - 2007
A1 - Marshini Chetty
A1 - Sung, Ja-Young
A1 - Grinter, Rebecca E.
ED - Krumm, John
ED - Abowd, Gregory D.
ED - Seneviratne, Aruna
ED - Strang, Thomas
KW - Computer Communication Networks
KW - computers and society
KW - home networking
KW - Information Systems Applications (incl.Internet)
KW - infrastructure
KW - smart home
KW - software engineering
KW - Systems and Data Security
KW - User Interfaces and Human Computer Interaction
AB - Despite a growing desire to create smart homes, we know little about how networked technologies interact with a house’s infrastructure. In this paper, we begin to close this gap by presenting findings from a study that examined the relationship between home networking and the house itself—and the work that results for householders as a consequence of this interaction. We discuss four themes that emerged: an ambiguity in understanding the virtual boundaries created by wireless networks, the home network control paradox, a new home network access paradox, and the relationship between increased responsibilities and the possibilities of wireless networking.
JA - UbiComp 2007: Ubiquitous Computing
T3 - Lecture Notes in Computer Science
PB - Springer Berlin Heidelberg
SN - 978-3-540-74852-6, 978-3-540-74853-3
UR - http://link.springer.com/chapter/10.1007/978-3-540-74853-3_8
ER -
TY - JOUR
T1 - How to lease the internet in your spare time
JF - SIGCOMM Comput. Commun. Rev.
Y1 - 2007
A1 - Feamster, Nick
A1 - Gao,Lixin
A1 - Rexford,Jennifer
AB - Today's Internet Service Providers (ISPs) serve two roles: managing their network infrastructure and providing (arguably limited) services to end users. We argue that coupling these roles impedes the deployment of new protocols and architectures, and that the future Internet should support two separate entities: infrastructure providers (who manage the physical infrastructure) and service providers (who deploy network protocols and offer end-to-end services). We present a high-level design for Cabo, an architecture that enables this separation; we also describe challenges associated with realizing this architecture.
VL - 37
SN - 0146-4833
UR - http://doi.acm.org/10.1145/1198255.1198265
CP - 1
M3 - 10.1145/1198255.1198265
ER -
TY - JOUR
T1 - Human activity understanding using visibility context
JF - IEEE/RSJ IROS Workshop: From sensors to human spatial concepts (FS2HSC)
Y1 - 2007
A1 - Morariu,V.I.
A1 - Prasad,V. S.N
A1 - Davis, Larry S.
AB - Visibility in architectural layouts affects humannavigation, so a suitable representation of visibility context is useful in understanding human activity. Motivated by studies of spatial behavior, we use a set of features from visibility analysis to represent spatial context in the interpretation of human activity. An agent’s goal, belief about the world, trajectory and visible layout are considered to be random variables that evolve with time during the agent’s movement, and are modeled in a Bayesian framework. We design a search-based task in a sprite-world, and compare the results of our framework to those of human subject experiments. Our findings confirm that knowledge of spatial layout improves human interpretations of the trajectories (implying that visibility context is useful in this task). Since our framework demonstrates performance close to that of human subjects with knowledge of spatial layout, our findings confirm that our model makes adequate use of visibility context. In addition, the representation we use for visibility context allows our model to generalize well when presented with new scenes.
ER -
TY - CONF
T1 - Human Appearance Change Detection
T2 - Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on
Y1 - 2007
A1 - Ghanem,N.M.
A1 - Davis, Larry S.
KW - (artificial
KW - appearance
KW - approach;occupancy
KW - change
KW - changes
KW - classification;support
KW - classifier;vector
KW - detection;image
KW - detection;machine
KW - difference
KW - Frequency
KW - intelligence);pattern
KW - intersection
KW - learning
KW - machine
KW - machines;vector
KW - map;histogram
KW - map;human
KW - map;support
KW - package
KW - quantisation;video
KW - quantization;video
KW - recognition;boosting
KW - recognition;image
KW - sequence;left
KW - sequences;image
KW - sequences;learning
KW - surveillance;
KW - technique;codeword
KW - vector
AB - We present a machine learning approach to detect changes in human appearance between instances of the same person that may be taken with different cameras, but over short periods of time. For each video sequence of the person, we approximately align each frame in the sequence and then generate a set of features that captures the differences between the two sequences. The features are the occupancy difference map, the codeword frequency difference map (based on a vector quantization of the set of colors and frequencies) at each aligned pixel and the histogram intersection map. A boosting technique is then applied to learn the most discriminative set of features, and these features are then used to train a support vector machine classifier to recognize significant appearance changes. We apply our approach to the problem of left package detection. We train the classifiers on a laboratory database of videos in which people are seen with and without common articles that people carry - backpacks and suitcases. We test the approach on some real airport video sequences. Moving to the real world videos requires addressing additional problems, including the view selection problem and the frame selection problem.
JA - Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on
M3 - 10.1109/ICIAP.2007.4362833
ER -
TY - JOUR
T1 - Human appearance modeling for matching across video sequences
JF - Machine Vision and Applications
Y1 - 2007
A1 - Yu,Y.
A1 - Harwood,D.
A1 - Yoon,K.
A1 - Davis, Larry S.
AB - We present an appearance model for establishing correspondence between tracks of people which may be taken at different places, at different times or across different cameras. The appearance model is constructed by kernel density estimation. To incorporate structural information and to achieve invariance to motion and pose, besides color features, an additional feature of path-length is used. To achieve illumination invariance, two types of illumination insensitive color features are discussed: brightness color feature and RGB rank feature. The similarity between a test image and an appearance model is measured by the information gain or Kullback–Leibler distance. To thoroughly represent the information contained in a video sequence with as little data as possible, a key frame selection and matching scheme is proposed. Experimental results demonstrate the important role of the path-length feature in the appearance model and the effectiveness of the proposed appearance model and matching method.
VL - 18
CP - 3
ER -
TY - CONF
T1 - Human Identification using Gait and Face
T2 - Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on
Y1 - 2007
A1 - Chellapa, Rama
A1 - Roy-Chowdhury, A.K.
A1 - Kale, A.
KW - algorithm;visual-hull
KW - analysis;image
KW - approach;cameras;face
KW - approximation;probabilistic
KW - database;camera;face
KW - databases;
KW - fusion;face
KW - fusion;human
KW - fusion;probability;video
KW - Gait
KW - identification;planar
KW - NIST
KW - processing;visual
KW - recognition
KW - recognition;gait
KW - recognition;view-invariant
KW - signal
AB - In general the visual-hull approach for performing integrated face and gait recognition requires at least two cameras. In this paper we present experimental results for fusion of face and gait for the single camera case. We considered the NIST database which contains outdoor face and gait data for 30 subjects. In the NIST database, subjects walk along an inverted Sigma pattern. In (A. Kale, et al., 2003), we presented a view-invariant gait recognition algorithm for the single camera case along with some experimental evaluations. In this chapter we present the results of our view-invariant gait recognition algorithm in (A. Kale, et al., 2003) on the NIST database. The algorithm is based on the planar approximation of the person which is valid when the person walks far away from the camera. In (S. Zhou et al., 2003), an algorithm for probabilistic recognition of human faces from video was proposed and the results were demonstrated on the NIST database. Details of these methods can be found in the respective papers. We give an outline of the fusion strategy here.
JA - Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on
M3 - 10.1109/CVPR.2007.383523
ER -
TY - JOUR
T1 - Human Responsibility for Autonomous Agents
JF - IEEE Intelligent Systems
Y1 - 2007
A1 - Shneiderman, Ben
KW - Automatic control
KW - Autonomous agents
KW - autonomous systems
KW - Bandwidth
KW - Computer bugs
KW - Computer errors
KW - Control systems
KW - data privacy
KW - Human-computer interaction
KW - HUMANS
KW - Robots
KW - Safety
KW - Software design
AB - Automated or autonomous systems can sometimes fail harmlessly, but they can also destroy data, compromise privacy, and consume resources, such as bandwidth or server capacity. What's more troubling is that automated systems embedded in vital systems can cause financial losses, destruction of property, and loss of life. Controlling these dangers will increase trust while enabling broader use of these systems with higher degrees of safety. Obvious threats stem from design errors and software bugs, but we can't overlook mistaken assumptions by designers, unanticipated actions by humans, and interference from other computerized systems. This article is part of a special issue on Interacting with Autonomy.
VL - 22
SN - 1541-1672
CP - 2
M3 - 10.1109/MIS.2007.32
ER -
TY - CHAP
T1 - Human Values for Shaping the Made World
T2 - Human-Computer Interaction – INTERACT 2007Human-Computer Interaction – INTERACT 2007
Y1 - 2007
A1 - Shneiderman, Ben
ED - Baranauskas,Cécilia
ED - Palanque,Philippe
ED - Abascal,Julio
ED - Barbosa,Simone
AB - Interface design principles have been effective in shaping new desktop applications, web-based resources, and mobile devices. Usability and sociability promote successful online communities and social network services. The contributions of human-computer interaction researchers have been effective in raising the quality of design of many products and services. As our influence grows, we can play an even more profound role in guaranteeing that enduring human values are embedded in the next generation of technology. This talk identifies which goals are realistic, such as universality, responsibility, trust, empathy, and privacy, and how we might ensure that they become part of future services and systems.
JA - Human-Computer Interaction – INTERACT 2007Human-Computer Interaction – INTERACT 2007
T3 - Lecture Notes in Computer Science
PB - Springer Berlin / Heidelberg
VL - 4662
SN - 978-3-540-74794-9
UR - http://dx.doi.org/10.1007/978-3-540-74796-3_1
ER -
TY - JOUR
T1 - Hybrid Detectors for Subpixel Targets
JF - Pattern Analysis and Machine Intelligence, IEEE Transactions on
Y1 - 2007
A1 - Broadwater, J.
A1 - Chellapa, Rama
KW - ACE subpixel algorithm;AMSD subpixel algorithm;hybrid detectors;hyperspectral imagery analysis;physics;statistics;subpixel target detection;subspace detection;object detection;spectral analysis;statistical analysis;target tracking;Algorithms;Artificial In
KW - Automated;Reproducibility of Results;Sensitivity and Specificity;Signal Processing
KW - Computer-Assisted;
KW - Computer-Assisted;Models
KW - Computer-Assisted;Pattern Recognition
KW - Statistical;Image Enhancement;Image Interpretation
KW - Statistical;Numerical Analysis
AB - Subpixel detection is a challenging problem in hyperspectral imagery analysis. Since the target size is smaller than the size of a pixel, detection algorithms must rely solely on spectral information. A number of different algorithms have been developed over the years to accomplish this task, but most detectors have taken either a purely statistical or a physics-based approach to the problem. We present two new hybrid detectors that take advantage of these approaches by modeling the background using both physics and statistics. Results demonstrate improved performance over the well-known AMSD and ACE subpixel algorithms in experiments that include multiple targets, images, and area types - especially when dealing with weak targets in complex backgrounds.
VL - 29
SN - 0162-8828
CP - 11
M3 - 10.1109/TPAMI.2007.1104
ER -
TY - JOUR
T1 - Hyperstereo algorithms for the perception of terrain drop-offs
JF - Proceedings of SPIE
Y1 - 2007
A1 - Mohananchettiar,Arunkumar
A1 - Cevher,Volkan
A1 - CuQlock-Knopp,Grayson
A1 - Chellapa, Rama
A1 - Merritt,John
AB - The timely detection of terrain drop-offs is critical for safe and efficient off-road mobility, whether with human drivers or with terrain navigation systems that use autonomous machine-vision. In this paper, we propose a joint tracking and detection machine-vision approach for accurate and efficient terrain drop-off detection and localization. We formulate the problem using a hyperstereo camera system and build an elevation map using the range map obtained from a stereo algorithm. A terrain drop-off is then detected with the use of optimal drop-off detection filters applied to the range map. For more robust results, a method based on multi-frame fusion of terrain drop-off evidence is proposed. Also presented is a fast, direct method that does not employ stereo disparity mapping. We compared our algorithm's detection of terrain drop-offs with time-code data from human observers viewing the same video clips in stereoscopic 3D. The algorithm detected terrain drop-offs an average of 9 seconds sooner, or 12m farther, than the human observers. This suggests that passive image-based hyperstereo machine-vision may be useful as an early warning system for off-road mobility.
VL - 6557
SN - 0277786X
UR - http://spiedigitallibrary.org/proceedings/resource/2/psisdg/6557/1/65570L_1?isAuthorized=no
CP - 1
M3 - doi:10.1117/12.721066
ER -
TY - CONF
T1 - Headphone-Based Reproduction of 3D Auditory Scenes Captured by Spherical/Hemispherical Microphone Arrays
T2 - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on
Y1 - 2006
A1 - Zhiyun Li
A1 - Duraiswami, Ramani
KW - 3D
KW - analysis;headphones;microphone
KW - arrays;orthogonal
KW - arrays;spatial
KW - auditory
KW - beam-space;spatial
KW - filter;spherical
KW - filters;
KW - function;headphone-based
KW - harmonics;array
KW - microphone
KW - processing;audio
KW - processing;harmonic
KW - related
KW - reproduction;hemispherical
KW - scenes;head
KW - signal
KW - transfer
AB - We propose a method to reproduce 3D auditory scenes captured by spherical microphone arrays over headphones. This algorithm employs expansions of the captured sound and the head related transfer function over the sphere and uses the orthonormality of the spherical harmonics. Using a spherical microphone array, we first record the 3D auditory scene, then the recordings are spatially filtered and reproduced through headphones in the orthogonal beam-space of the head related transfer functions (HRTFs). We use the KEMAR HRTF measurements to verify our algorithm
JA - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on
VL - 5
M3 - 10.1109/ICASSP.2006.1661281
ER -
TY - JOUR
T1 - Head-related transfer functions via the fast multipole accelerated boundary element method
JF - The Journal of the Acoustical Society of America
Y1 - 2006
A1 - Gumerov, Nail A.
A1 - Duraiswami, Ramani
A1 - Zotkin,Dmitry N
AB - Computation of head‐related transfer functions (HRTF) via geometrical meshes and numerical methods has been suggested by a number of authors. An issue facing this approach is the large computational time needed for high frequencies, where the discretization must include hundreds of thousands of elements. Conventional computational methods are unable to achieve such computations without excessive time or memory. We use a newly developed fast multipole accelerated boundary element method (FMM/BEM) that scales linearly both in time and memory. The method is applied to the mesh of the widely used KEMAR manikin and its HRTF computed up to 20 kHz. The results are compared with available experimental measurements.
VL - 120
UR - http://link.aip.org/link/?JAS/120/3342/6
CP - 5
ER -
TY - CONF
T1 - Heuristic search and information visualization methods for school redistricting
T2 - Proceedings of the 18th conference on Innovative applications of artificial intelligence - Volume 2
Y1 - 2006
A1 - desJardins, Marie
A1 - Bulka,Blazej
A1 - Carr,Ryan
A1 - Hunt,Andrew
A1 - Rathod,Priyang
A1 - Rheingans,Penny
AB - We describe an application of AI search and information visualization techniques to the problem of school redistricting, in which students are assigned to home schools within a county or school district. This is a multicriteria optimization problem in which competing objectives must be considered, such as school capacity, busing costs, and socioeconomic distribution. Because of the complexity of the decision-making problem, tools are needed to help end users generate, evaluate, and compare alternative school assignment plans. A key goal of our research is to aid users in finding multiple qualitatively different redistricting plans that represent different tradeoffs in the decision space.We present heuristic search methods that can be used to find a set of qualitatively different plans, and give empirical results of these search methods on population data from the school district of Howard County, Maryland. We show the resulting plans using novel visualization methods that we have developed for summarizing and comparing alternative plans.
JA - Proceedings of the 18th conference on Innovative applications of artificial intelligence - Volume 2
T3 - IAAI'06
PB - AAAI Press
SN - 978-1-57735-281-5
UR - http://dl.acm.org/citation.cfm?id=1597122.1597136
ER -
TY - JOUR
T1 - Hierarchical Layouts for Photo Libraries
JF - IEEE Multimedia
Y1 - 2006
A1 - Kustanowitz,J.
A1 - Shneiderman, Ben
KW - annotated digital photo collection
KW - auto-layout technique
KW - bi-level hierarchies
KW - Computer science
KW - data visualisation
KW - digital libraries
KW - document image processing
KW - Information Visualization
KW - interactive algorithms
KW - interactive displays
KW - Libraries
KW - Lifting equipment
KW - Organization Charts
KW - photo collections
KW - photo layouts
KW - photo library
KW - Photography
KW - quantum content
KW - Silver
KW - Springs
KW - User interfaces
KW - Web pages
AB - We use an annotated digital photo collection to demonstrate a two-level auto-layout technique consisting of a central primary region with secondary regions surrounding it. Because the object sizes within regions can only be changed in discrete units, we refer to them as quantum content. Our real-time algorithms enable a compelling interactive display as users resize the canvas, or move and resize the primary region
VL - 13
SN - 1070-986X
CP - 4
M3 - 10.1109/MMUL.2006.83
ER -
TY - JOUR
T1 - High-confidence medical device software and systems
JF - Computer
Y1 - 2006
A1 - Lee,I.
A1 - Pappas,G. J
A1 - Cleaveland, Rance
A1 - Hatcliff,J.
A1 - Krogh,B. H
A1 - Lee,P.
A1 - Rubin,H.
A1 - Sha,L.
KW - Aging
KW - biomedical equipment
KW - Clinical software engineering
KW - Costs
KW - FDA device
KW - Food and Drug Administration device
KW - health and safety
KW - health care
KW - health information system
KW - health safety
KW - healthcare delivery
KW - Healthcare technology
KW - Information systems
KW - medical computing
KW - medical device manufacturing
KW - medical device software development
KW - medical device systems development
KW - medical information systems
KW - Medical services
KW - Medical software
KW - Medical tests
KW - networked medical devices
KW - Production systems
KW - Software design
KW - Software safety
KW - Software systems
KW - Software testing
KW - US healthcare quality
AB - Given the shortage of caregivers and the increase in an aging US population, the future of US healthcare quality does not look promising and definitely is unlikely to be cheaper. Advances in health information systems and healthcare technology offer a tremendous opportunity for improving the quality of care while reducing costs. The development and production of medical device software and systems is a crucial issue, both for the US economy and for ensuring safe advances in healthcare delivery. As devices become increasingly smaller in physical terms but larger in software terms, the design, testing, and eventual Food and Drug Administration (FDA) device approval is becoming much more expensive for medical device manufacturers both in terms of time and cost. Furthermore, the number of devices that have recently been recalled due to software and hardware problems is increasing at an alarming rate. As medical devices are becoming increasingly networked, ensuring even the same level of health safety seems a challenge.
VL - 39
SN - 0018-9162
CP - 4
M3 - 10.1109/MC.2006.127
ER -
TY - THES
T1 - A holistic approach to structure from motion
Y1 - 2006
A1 - Hui Ji
AB - This dissertation investigates the general structure from motion problem. That is, how to compute in an unconstrained environment 3D scene structure, camera motion and moving objects from video sequences. We present a framework which uses concatenated feed-back loops to overcome the main difficulty in the structure from motion problem: the chicken-and-egg dilemma between scene segmentation and structure recovery. The idea is that we compute structure and motion in stages by gradually computing 3D scene information of increasing complexity and using processes which operate on increasingly large spatial image areas. Within this framework, we developed three modules. First, we introduce a new constraint for the estimation of shape using image features from multiple views. We analyze this constraint and show that noise leads to unavoidable mis-estimation of the shape, which also predicts the erroneous shape perception in human. This insight provides a clear argument for the need for feed-back loops. Second, a novel constraint on shape is developed which allows us to connect multiple frames in the estimation of camera motion by matching only small image patches. Third, we present a texture descriptor for matching areas of extended sizes. The advantage of this texture descriptor, which is based on fractal geometry, lies in its invariance to any smooth mapping (Bi-Lipschitz transform) including changes of viewpoint, illumination and surface distortion. Finally, we apply our framework to the problem of super-resolution imaging. We use the 3D motion estimation together with a novel wavelet-based reconstruction scheme to reconstruct a high-resolution image from a sequence of low-resolution images.
PB - University of Maryland at College Park
CY - College Park, MD, USA
ER -
TY - JOUR
T1 - How Multirobot Systems Research will Accelerate our Understanding of Social Animal Behavior
JF - Proceedings of the IEEE
Y1 - 2006
A1 - Balch, T.
A1 - Dellaert, F.
A1 - Feldman, A.
A1 - Guillory, A.
A1 - Isbell, C.L.
A1 - Zia Khan
A1 - Pratt, S.C.
A1 - Stein, A.N.
A1 - Wilde, H.
KW - Acceleration
KW - Animal behavior
KW - ant movement tracking
KW - Artificial intelligence
KW - biology computing
KW - Computer vision
KW - control engineering computing
KW - Insects
KW - Intelligent robots
KW - Labeling
KW - monkey movement tracking
KW - multi-robot systems
KW - multirobot systems
KW - robotics algorithms
KW - Robotics and automation
KW - social animal behavior
KW - social animals
KW - social insect behavior
KW - Speech recognition
KW - tracking
AB - Our understanding of social insect behavior has significantly influenced artificial intelligence (AI) and multirobot systems' research (e.g., ant algorithms and swarm robotics). In this work, however, we focus on the opposite question: "How can multirobot systems research contribute to the understanding of social animal behavior?" As we show, we are able to contribute at several levels. First, using algorithms that originated in the robotics community, we can track animals under observation to provide essential quantitative data for animal behavior research. Second, by developing and applying algorithms originating in speech recognition and computer vision, we can automatically label the behavior of animals under observation. In some cases the automatic labeling is more accurate and consistent than manual behavior identification. Our ultimate goal, however, is to automatically create, from observation, executable models of behavior. An executable model is a control program for an agent that can run in simulation (or on a robot). The representation for these executable models is drawn from research in multirobot systems programming. In this paper we present the algorithms we have developed for tracking, recognizing, and learning models of social animal behavior, details of their implementation, and quantitative experimental results using them to study social insects
VL - 94
SN - 0018-9219
CP - 7
ER -
TY - JOUR
T1 - Human activity language: Grounding concepts with a linguistic framework
JF - Semantic Multimedia
Y1 - 2006
A1 - Guerra-Filho,G.
A1 - Aloimonos, J.
ER -
TY - BOOK
T1 - Human identification based on gait
Y1 - 2006
A1 - Nixon,Mark S.
A1 - Tan,Tieniu
A1 - Chellapa, Rama
KW - Biometric identification
KW - Computers / Computer Graphics
KW - Computers / Computer Science
KW - Computers / Computer Vision & Pattern Recognition
KW - Computers / General
KW - Computers / Information Technology
KW - Computers / Programming / Software Development
KW - Computers / Software Development & Engineering / Systems Analysis & Design
KW - Gait in humans
KW - Medical / Physiology
KW - Social Science / Anthropology / Physical
AB - Biometrics now affect many people's lives, and is the focus of much academic research and commercial development. Gait is one of the most recent biometrics, with its own unique advantages. Gait recognizes people by the way they walk and run, analyzes movement, which in turn implies analyzing sequences of images. This professional book introduces developments from the laboratories of very distinguished researchers within this relatively new area of biometrics and clearly establishes human gait as a biometric. Human Identification Based on Gait provides a snapshot of all the biometric work in human identification by gait (all major centers for research are indicated in this book). To complete the picture, studies are included from medicine, psychology and other areas wherein we find not only justification for the use of gait as a biometric, but also pointers to techniques and to analysis. Human Identification Based on Gait is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science.
PB - Springer Science & Business
SN - 9780387244242
ER -
TY - CONF
T1 - The half-edge tree: a compact data structure for level-of-detail tetrahedral meshes
T2 - Shape Modeling and Applications, 2005 International Conference
Y1 - 2005
A1 - Danovaro,E.
A1 - De Floriani, Leila
A1 - Magillo,P.
A1 - Puppo,E.
A1 - Sobrero,D.
A1 - Sokolovsky,N.
KW - application;
KW - compact
KW - computational
KW - data
KW - detection;
KW - edge
KW - encoding;
KW - generation;
KW - geometry;
KW - half-edge
KW - iterative
KW - level-of-detail
KW - mesh
KW - meshes;
KW - methods;
KW - model;
KW - structure;
KW - structures;
KW - tetrahedral
KW - tree
KW - tree;
AB - We propose a new data structure for the compact encoding of a level-of detail (LOD) model of a three-dimensional scalar field based on unstructured tetrahedral meshes. Such data structure, called a half-edge tree (HET), is built through the iterative application of a half-edge collapse, i.e. by contracting an edge to one of its endpoints. We also show that selective refined meshes extracted from an HET contain on average about 34% and up to 75% less tetrahedra than those extracted from an LOD model built through a general edge collapse.
JA - Shape Modeling and Applications, 2005 International Conference
M3 - 10.1109/SMI.2005.47
ER -
TY - JOUR
T1 - Handling uneven embedding capacity in binary images: a revisit
JF - Proceedings of SPIE
Y1 - 2005
A1 - M. Wu
A1 - Fridrich,Jessica
A1 - Goljan,Miroslav
A1 - Gou,Hongmei
AB - Hiding data in binary images can facilitate the authentication and annotation of important document images in digital domain. A representative approach is to first identify pixels whose binary color can be flipped without introducing noticeable artifacts, and then embed one bit in each non-overlapping block by adjusting the flippable pixel values to obtain the desired block parity. The distribution of these flippable pixels is highly uneven across the image, which is handled by random shuffling in the literature. In this paper, we revisit the problem of data embedding for binary images and investigate the incorporation of a most recent steganography framework known as the wet paper coding to improve the embedding capacity. The wet paper codes naturally handle the uneven embedding capacity through randomized projections. In contrast to the previous approach, where only a small portion of the flippable pixels are actually utilized in the embedding, the wet paper codes allow for a high utilization of pixels that have high flippability score for embedding, thus giving a significantly improved embedding capacity than the previous approach. The performance of the proposed technique is demonstrated on several representative images. We also analyze the perceptual impact and capacity-robustness relation of the new approach.
VL - 5681
SN - 0277786X
UR - http://spiedigitallibrary.org/proceedings/resource/2/psisdg/5681/1/194_1?isAuthorized=no
CP - 1
M3 - doi:10.1117/12.587379
ER -
TY - CONF
T1 - Handwriting matching and its application to handwriting synthesis
T2 - Document Analysis and Recognition, 2005. Proceedings. Eighth International Conference on
Y1 - 2005
A1 - Yefeng Zheng
A1 - David Doermann
KW - (artificial
KW - deformation
KW - deformation;
KW - handwriting
KW - image
KW - intelligence);
KW - learning
KW - learning;
KW - matching;
KW - point
KW - recognition;
KW - sampling;
KW - SHAPE
KW - synthesis;
AB - Since it is extremely expensive to collect a large volume of handwriting samples, synthesized data are often used to enlarge the training set. We argue that, in order to generate good handwriting samples, a synthesis algorithm should learn the shape deformation characteristics of handwriting from real samples. In this paper, we present a point matching algorithm to learn the deformation, and apply it to handwriting synthesis. Preliminary experiments show the advantages of our approach.
JA - Document Analysis and Recognition, 2005. Proceedings. Eighth International Conference on
M3 - 10.1109/ICDAR.2005.122
ER -
TY - RPRT
T1 - Headline Generation for Written and Broadcast News
Y1 - 2005
A1 - Zajic, David
A1 - Dorr, Bonnie J
A1 - Schwartz,Richard
KW - *INFORMATION RETRIEVAL
KW - *RADIO BROADCASTING
KW - AUTOMATIC
KW - AUTOMATIC SUMMARIZATION
KW - HEDGE TRIMMER
KW - INFORMATION SCIENCE
KW - RADIO COMMUNICATIONS
KW - STATISTICAL PROCESSES
KW - TEST AND EVALUATION
KW - WORDS(LANGUAGE)
AB - This technical report is an overview of work done on Headline Generation for written and broadcast news. The report covers HMM Hedge, a statistical approach based on the noisy channel model, Hedge Trimmer, a parse-and-trim approach using linguistically motivated trimming rules, and Topiary, a combination of Trimmer and Unsupervised Topic Discovery. Automatic evaluation of summaries using ROUGE and BLEU is described and used to evaluate the Headline Generation systems.
PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park
UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA454198
ER -
TY - JOUR
T1 - Help! I'm Lost: User Frustration in Web Navigation (2003)
JF - Institute for Systems Research Technical Reports
Y1 - 2005
A1 - Lazar,Jonathan
A1 - Bessiere,Katie
A1 - Ceaparu,Irina
A1 - Robinson,John
A1 - Shneiderman, Ben
KW - Technical Report
AB - Computers can be valuable tools, and networked resources via the Internet can be beneficial to many different populations and communities. Unfortunately, when people are unable to reach their task goals due to frustrating experiences, this can hinder the effectiveness of technology. This research summary provides information about the user frustration research that has been performed at the University of Maryland and Towson University. Causes of user frustration are discussed in this research summary, along with the surprising finding that nearly one-third to one-half of the time spent in front of the computer is wasted due to frustrating experiences. Furthermore, when interfaces are planned to be deceptive and confusing, this
UR - http://drum.lib.umd.edu/handle/1903/6508
ER -
TY - CONF
T1 - A hierarchical task-network planner based on symbolic model checking
Y1 - 2005
A1 - Kuter,U.
A1 - Nau, Dana S.
A1 - Pistore,M.
A1 - Traverso,P.
AB - Although several approaches have been developed for planning in nondeterministic domains, solving large planning problems is still quite difficult. In this work, we present a novel algorithm, called YoYo, for planning in nondeterministic domains under the assumption of full observability. This algorithm enables us to combine the power of search-control strategies as in Planning with Hierarchical Task Networks (HTNs) with tech- niques from the Planning via Symbolic Model-Checking (SMC). Our experimental evaluation confirms the po- tentialities of our approach, demonstrating that it com- bines the advantages of these paradigms.
UR - https://www.aaai.org/Papers/ICAPS/2005/ICAPS05-031.pdf
ER -
TY - CONF
T1 - The Hiero machine translation system: Extensions, evaluation, and analysis
T2 - Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing
Y1 - 2005
A1 - Chiang,D.
A1 - Lopez,A.
A1 - Madnani,N.
A1 - Monz,C.
A1 - Resnik, Philip
A1 - Subotin,M.
JA - Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing
ER -
TY - JOUR
T1 - High Order Spatial Audio Capture and Binaural Head-Tracked Playback over Headphones with HRTF Cues
JF - Proceedings 119th convention of AES
Y1 - 2005
A1 - Duraiswami, Ramani
A1 - Zotkin,Dmitry N
A1 - Li,Z.
A1 - Grassi,E.
A1 - Gumerov, Nail A.
A1 - Davis, Larry S.
AB - A theory and a system for capturing an audio scene and then rendering it remotely are developed andpresented. The sound capture is performed with a spherical microphone array. The sound field at the location of the array is deduced from the captured sound and is represented using either spherical wave-functions or plane-wave expansions. The sound field representation is then transmitted to a remote location for immediate rendering or stored for later use. The sound renderer, coupled with the head tracker, reconstructs the acoustic field using individualized head-related transfer functions to preserve the perceptual spatial structure of the audio scene. Rigorous error bounds and Nyquist-like sampling criterion for the representation of the sound field are presented and verified.
ER -
TY - CONF
T1 - High Order Spatial Audio Capture and Its Binaural Head-Tracked Playback Over Headphones with HRTF Cues
T2 - Audio Engineering Society Convention 119
Y1 - 2005
A1 - Davis, Larry S.
A1 - Duraiswami, Ramani
A1 - Grassi,E.
A1 - Gumerov, Nail A.
A1 - Li,Z.
A1 - Zotkin,Dmitry N
AB - A theory and a system for capturing an audio scene and then rendering it remotely are developed and presented. The sound capture is performed with a spherical microphone array. The sound field at the location, and in a region of space in the neighborhood, of the array is deduced from the captured sound and represented using either spherical wave-functions or plane-wave expansions. The representation is then transmitted to a remote location for immediate rendering or stored for later reproduction. The sound renderer, coupled with the head tracker, reconstructs the acoustic field using individualized head-related transfer functions to preserve the perceptual spatial structure of the audio scene. Rigorous error bounds and a Nyquist-like sampling criterion for the representation of the sound field are presented and verified.
JA - Audio Engineering Society Convention 119
ER -
TY - CONF
T1 - High Order Spatial Audio Capture and Its Binaural Head-Tracked Playback Over Headphones with HRTF Cues
T2 - Audio Engineering Society Convention 119
Y1 - 2005
A1 - Zotkin,Dmitry N
A1 - Davis, Larry S.
A1 - Duraiswami, Ramani
A1 - Grassi,Elena
A1 - Gumerov, Nail A.
A1 - Zhiyun,Li
JA - Audio Engineering Society Convention 119
UR - http://www.aes.org/e-lib/browse.cfm?elib=13369
ER -
TY - CONF
T1 - High Order Spatial Audio Capture and Its Binaural Head-Tracked Playback Over Headphones with HRTF Cues
T2 - Audio Engineering Society Convention 119
Y1 - 2005
A1 - Zotkin,Dmitry N
JA - Audio Engineering Society Convention 119
UR - http://www.aes.org/e-lib/browse.cfm?elib=13369
ER -
TY - CONF
T1 - High Performance Communication between Parallel Programs
T2 - Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International
Y1 - 2005
A1 - Jae-Yong Lee
A1 - Sussman, Alan
KW - Adaptive arrays
KW - Analytical models
KW - Chaotic communication
KW - Computational modeling
KW - Computer science
KW - Data analysis
KW - data distribution
KW - Educational institutions
KW - high performance communication
KW - image data analysis
KW - image resolution
KW - inter-program communication patterns
KW - InterComm
KW - Libraries
KW - Message passing
KW - parallel languages
KW - parallel libraries
KW - parallel programming
KW - parallel programs
KW - performance evaluation
KW - Wind
AB - We present algorithms for high performance communication between message-passing parallel programs, and evaluate the algorithms as implemented in InterComm. InterComm is a framework to couple parallel programs in the presence of complex data distributions within a coupled application. Multiple parallel libraries and languages may be used in the different programs of a single coupled application. The ability to couple such programs is required in many emerging application areas, such as complex simulations that model physical phenomena at multiple scales and resolutions, and image data analysis applications. We describe the new algorithms we have developed for computing inter-program communication patterns. We present experimental results showing the performance of various algorithmic tradeoffs, and also compare performance against an earlier system.
JA - Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International
PB - IEEE
SN - 0-7695-2312-9
M3 - 10.1109/IPDPS.2005.243
ER -
TY - JOUR
T1 - HOPE: A Homotopy Optimization Method for Protein Structure Prediction
JF - Journal of Computational Biology
Y1 - 2005
A1 - Dunlavy,Daniel M.
A1 - O'Leary, Dianne P.
A1 - Klimov,Dmitri
A1 - Thirumalai,D.
AB - We use a homotopy optimization method, HOPE, to minimize the potential energy associated with a protein model. The method uses the minimum energy conformation of one protein as a template to predict the lowest energy structure of a query sequence. This objective is achieved by following a path of conformations determined by a homotopy between the potential energy functions for the two proteins. Ensembles of solutions are produced by perturbing conformations along the path, increasing the likelihood of predicting correct structures. Successful results are presented for pairs of homologous proteins, where HOPE is compared to a variant of Newton's method and to simulated annealing.
VL - 12
SN - 1066-5277, 1557-8666
UR - http://www.liebertonline.com/doi/abs/10.1089/cmb.2005.12.1275
CP - 10
M3 - 10.1089/cmb.2005.12.1275
ER -
TY - JOUR
T1 - How do I find blue books about dogs? The errors and frustrations of young digital library users
JF - Proceedings of HCII 2005
Y1 - 2005
A1 - Hutchinson,H.
A1 - Druin, Allison
A1 - Bederson, Benjamin B.
A1 - Reuter,K.
A1 - Rose,A.
A1 - Weeks,A. C
ER -
TY - JOUR
T1 - Human action-recognition using mutual invariants
JF - Computer Vision and Image Understanding
Y1 - 2005
A1 - Parameswaran,Vasu
A1 - Chellapa, Rama
KW - Human action-recognition
KW - Model based invariants
KW - Mutual invariants
KW - View invariance
AB - Static and temporally varying 3D invariants are proposed for capturing the spatio-temporal dynamics of a general human action to enable its representation in a compact, view-invariant manner. Two variants of the representation are presented and studied: (1) a restricted-3D version, whose theory and implementation are simple and efficient but which can be applied only to a restricted class of human action, and (2) a full-3D version, whose theory and implementation are more complex but which can be applied to any general human action. A detailed analysis of the two representations is presented. We show why a straightforward implementation of the key ideas does not work well in the general case, and present strategies designed to overcome inherent weaknesses in the approach. What results is an approach for human action modeling and recognition that is not only invariant to viewpoint, but is also robust enough to handle different people, different speeds of action (and hence, frame rate) and minor variabilities in a given action, while encoding sufficient distinction among actions. Results on 2D projections of human motion capture and on manually segmented real image sequences demonstrate the effectiveness of the approach.
VL - 98
SN - 1077-3142
UR - http://www.sciencedirect.com/science/article/pii/S107731420400147X
CP - 2
M3 - 10.1016/j.cviu.2004.09.002
ER -
TY - CONF
T1 - Human-computer interaction themes in digital government: web site comprehension and statistics visualization
T2 - Proceedings of the 2005 national conference on Digital government research
Y1 - 2005
A1 - Shneiderman, Ben
AB - Digital government applications often involve web sites to provide information for citizens and visitors from essential services such as passport application or motor vehicle registration to discretionary, but highly popular applications such as recreation and parks information. Another aspect of government web sites is the delivery of statistical reports with summary tables, aggregated data resources, and extensive raw data files. This review focuses on human-computer interaction themes to improve designs of web sites and statistics visualization, ??? specifically as they relate to digital government sites. It also addresses research methods that are appropriate for digital government interfaces.
JA - Proceedings of the 2005 national conference on Digital government research
T3 - dg.o '05
PB - Digital Government Society of North America
UR - http://dl.acm.org/citation.cfm?id=1065226.1065230
ER -
TY - THES
T1 - Handling estimation errors in database query processing
Y1 - 2004
A1 - Deshpande, Amol
AB - A query optimizer is among the core pieces of a modern database management system, responsible for choosing a query execution plan for a user-provided declarative query. Query optimizers typically employ a cost estimation procedure to compare costs of different execution plans. Errors in this estimation process are quite common and arise due to reasons such as incomplete and insufficient statistical information about the data, and highly variable runtime environments that can affect the plan costs in unpredictable manners. Two approaches have been previously proposed for handling such estimation errors: (1) building sophisticated synopsis techniques that succintly summarize the data in the database and thus provide more statistical information to the query optimizer, and (2) aggressive reoptimization schemes that attempt to change the execution plans chosen to execute queries, on-the-fly. In the first part of this dissertation, we focus on building and using sophisticated synopsis techniques in the context of a traditional query optimizer. We propose a class of synopsis techniques called DEPENDENCY-B ASED Histograms that use statistical interaction models to exploit the correlations in the data, and to estimate selectivities efficiently. We also develop an efficient algorithm to search through the class of statistical models that we employ. Using sophisticated synopsis techniques such as these in the context of a traditional query optimizer poses interesting computational challenges; a naive approach to doing this could make the query optimization process so expensive as to be ineffective. This naturally leads to an “estimation planning” problem that asks for the best strategy to compute all the estimates required by an optimizer using the synopses at its disposal. We analyze this problem, its solution space, and propose algorithms to efficiently find good estimation plans. There are many scenarios where sophisticated synopsis techniques may not be applicable; examples include wide area and web based data sources, data streams and complex data domains. In the second part of this dissertation, we explore a highly-adaptive query processing technique called eddies that treats query processing as routing of tuples through operators, and adapts to changing data and runtime characteristics by continuously changing the order in which tuples are routed. We analyze the eddies architecture and identify a fundamental flaw in the basic design of the architecture: the burden of history in routing. (Abstract shortened by UMI.)
PB - University of California at Berkeley
CY - Berkeley, CA, USA
ER -
TY - RPRT
T1 - Headline evaluation experiment results
Y1 - 2004
A1 - Zajic, David
A1 - Dorr, Bonnie J
A1 - Schwartz,R.
A1 - President,S.
AB - This technical report describes an experiment intending to show that different summarizationtechniques have an effect on human performance of an extrinsic task. The task is document selection in the context of information retrieval. We conclude that the task was too difficult and ambiguous for subjects to perform at the level required in order to make statistically significant claims about the relationship between summarization techniques and human performance. An alternate interpretation of the experimental results is described and plans for future experiments are discussed.
PB - University of Maryland, College Park, MD. UMIACS-TR-2004-18
ER -
TY - JOUR
T1 - Hierarchical in-network data aggregation with quality guarantees
JF - Advances in Database Technology-EDBT 2004
Y1 - 2004
A1 - Deligiannakis,A.
A1 - Kotidis,Y.
A1 - Roussopoulos, Nick
ER -
TY - CONF
T1 - Hierarchical routing with soft-state replicas in TerraDir
T2 - Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International
Y1 - 2004
A1 - Silaghi,B.
A1 - Gopalakrishnan,Vijay
A1 - Bhattacharjee, Bobby
A1 - Kelcher,P.
KW - ad-hoc
KW - adaptive
KW - allocation;
KW - asymmetrical
KW - balancing;
KW - bottlenecks;
KW - consistency
KW - constraints;
KW - delivering;
KW - demand
KW - distribution;
KW - guarantees;
KW - hierarchical
KW - latency
KW - load
KW - low
KW - namespaces;
KW - peer-to-peer
KW - protocol;
KW - protocols;
KW - replica
KW - replicas;
KW - replication
KW - resource
KW - routing;
KW - soft-state
KW - systems;
KW - TerraDir;
KW - topological
AB - Summary form only given. Recent work on peer-to-peer systems has demonstrated the ability to deliver low latencies and good load balance when demand for data is relatively uniform. We describe an adaptive replication protocol that delivers low latencies, good load balance even when demand is heavily skewed. The protocol can withstand arbitrary and instantaneous changes in demand distribution. Our approach also addresses classical concerns related to topological constraints of asymmetrical namespaces, such as hierarchical bottlenecks in the context of hierarchical namespaces. The protocol replicates routing state in an ad-hoc manner based on profiled information, is lightweight, scalable, and requires no replica consistency guarantees.
JA - Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International
M3 - 10.1109/IPDPS.2004.1302967
ER -
TY - JOUR
T1 - Hierarchical Scaffolding With Bambus
JF - Genome Research
Y1 - 2004
A1 - Pop, Mihai
A1 - Kosack,Daniel S.
A1 - Salzberg,Steven L.
AB - The output of a genome assembler generally comprises a collection of contiguous DNA sequences (contigs) whose relative placement along the genome is not defined. A procedure called scaffolding is commonly used to order and orient these contigs using paired read information. This ordering of contigs is an essential step when finishing and analyzing the data from a whole-genome shotgun project. Most recent assemblers include a scaffolding module; however, users have little control over the scaffolding algorithm or the information produced. We thus developed a general-purpose scaffolder, called Bambus, which affords users significant flexibility in controlling the scaffolding parameters. Bambus was used recently to scaffold the low-coverage draft dog genome data. Most significantly, Bambus enables the use of linking data other than that inferred from mate-pair information. For example, the sequence of a completed genome can be used to guide the scaffolding of a related organism. We present several applications of Bambus: support for finishing, comparative genomics, analysis of the haplotype structure of genomes, and scaffolding of a mammalian genome at low coverage. Bambus is available as an open-source package from our Web site.
VL - 14
UR - http://genome.cshlp.org/content/14/1/149.abstract
CP - 1
M3 - 10.1101/gr.1536204
ER -
TY - JOUR
T1 - A hierarchy of cameras for 3D photography
JF - Computer Vision and Image Understanding
Y1 - 2004
A1 - Neumann, Jan
A1 - Fermüller, Cornelia
A1 - Aloimonos, J.
KW - Camera design
KW - Multi-view geometry
KW - Polydioptric cameras
KW - Spatio-temporal image analysis
KW - structure from motion
AB - The view-independent visualization of 3D scenes is most often based on rendering accurate 3D models or utilizes image-based rendering techniques. To compute the 3D structure of a scene from a moving vision sensor or to use image-based rendering approaches, we need to be able to estimate the motion of the sensor from the recorded image information with high accuracy, a problem that has been well-studied. In this work, we investigate the relationship between camera design and our ability to perform accurate 3D photography, by examining the influence of camera design on the estimation of the motion and structure of a scene from video data. By relating the differential structure of the time varying plenoptic function to different known and new camera designs, we can establish a hierarchy of cameras based upon the stability and complexity of the computations necessary to estimate structure and motion. At the low end of this hierarchy is the standard planar pinhole camera for which the structure from motion problem is non-linear and ill-posed. At the high end is a camera, which we call the full field of view polydioptric camera, for which the motion estimation problem can be solved independently of the depth of the scene which leads to fast and robust algorithms for 3D Photography. In between are multiple view cameras with a large field of view which we have built, as well as omni-directional sensors.
VL - 96
SN - 1077-3142
UR - http://www.sciencedirect.com/science/article/pii/S1077314204000505
CP - 3
M3 - 10.1016/j.cviu.2004.03.013
ER -
TY - CONF
T1 - High-performance MAC for high-capacity wireless LANs
T2 - 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings
Y1 - 2004
A1 - Yuan Yuan
A1 - Daqing Gu
A1 - Arbaugh, William A.
A1 - Jinyun Zhang
KW - 35 Mbit/s
KW - access protocols
KW - Aggregates
KW - Bandwidth
KW - batch transmission
KW - Computer science
KW - Educational institutions
KW - high-capacity wireless LAN
KW - high-performance MAC
KW - Laboratories
KW - Local area networks
KW - Media Access Protocol
KW - opportunistic selection
KW - Physical layer
KW - probability
KW - Throughput
KW - Wireless LAN
AB - The next-generation wireless technologies, e.g., 802.11n and 802.15.3a, offer a physical-layer speed at least an-order-of-magnitude higher than the current standards. However, direct application of current MACs leads to high protocol overhead and significant throughput degradation. In this paper, we propose ADCA, a high-performance MAC that works with high-capacity physical layer. ADCA exploits two ideas of adaptive batch transmission and opportunistic selection of high-rate hosts to simultaneously reduce the overhead and improve the aggregate throughput. It opportunistically favors high-rate hosts by providing higher access probability and more access time, while ensuring each low-rate host certain minimum amount of channel access time. Simulations show that the ADCA design increases the throughput by 112% and reduces the average delay by 55% compared with the legacy DCF. It delivers more than 100 Mbps MAC-layer throughput as compared with 35 Mbps offered by the legacy MAC
JA - 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings
PB - IEEE
SN - 0-7803-8814-3
M3 - 10.1109/ICCCN.2004.1401615
ER -
TY - JOUR
T1 - HTN planning for Web Service composition using SHOP2
JF - Web Semantics: Science, Services and Agents on the World Wide Web
Y1 - 2004
A1 - Sirin,Evren
A1 - Parsia,Bijan
A1 - Wu,Dan
A1 - Hendler,James
A1 - Nau, Dana S.
KW - HTN planning
KW - OWL-S
KW - SHOP2
KW - Web Service composition
KW - Web services
AB - Automated composition of Web Services can be achieved by using AI planning techniques. Hierarchical Task Network (HTN) planning is especially well-suited for this task. In this paper, we describe how HTN planning system SHOP2 can be used with OWL-S Web Service descriptions. We provide a sound and complete algorithm to translate OWL-S service descriptions to a SHOP2 domain. We prove the correctness of the algorithm by showing the correspondence to the situation calculus semantics of OWL-S. We implemented a system that plans over sets of OWL-S descriptions using SHOP2 and then executes the resulting plans over the Web. The system is also capable of executing information-providing Web Services during the planning process. We discuss the challenges and difficulties of using planning in the information-rich and human-oriented context of Web Services.
VL - 1
SN - 1570-8268
UR - http://www.sciencedirect.com/science/article/pii/S1570826804000113
CP - 4
M3 - 10.1016/j.websem.2004.06.005
ER -
TY - CONF
T1 - Human needs and mobile technologies: small, fast, and fun
T2 - Proceedings of the 2nd international conference on Mobile systems, applications, and services
Y1 - 2004
A1 - Shneiderman, Ben
AB - The central thesis of "Leonardo's Laptop" (MIT Press, 2002) is that designers who are sensitive to human needs are more likely to make the breakthroughs that yield new technologies successes. Therefore, a theory of mobile devices would focus on compact devices that support human relationships, provide salient information, and enable creative expression. The foundations are not only the megahertz of connectivity, but also the usability and universality of interfaces. Demonstrations include digital photo applications, personal info, healthcare, and e-commerce.
JA - Proceedings of the 2nd international conference on Mobile systems, applications, and services
T3 - MobiSys '04
PB - ACM
CY - New York, NY, USA
SN - 1-58113-793-1
UR - http://doi.acm.org/10.1145/990064.990065
M3 - 10.1145/990064.990065
ER -
TY - CONF
T1 - A hybrid algorithm for subpixel detection in hyperspectral imagery
T2 - Geoscience and Remote Sensing Symposium, 2004. IGARSS '04. Proceedings. 2004 IEEE International
Y1 - 2004
A1 - Broadwater, J.
A1 - Meth, R.
A1 - Chellapa, Rama
KW - alarm
KW - algorithm;abundance
KW - algorithm;Fully
KW - algorithm;hybrid
KW - algorithm;statistical
KW - AMSD;Adaptive
KW - analysis;structured
KW - approximations;maximum
KW - backgrounds;subpixel
KW - constrained
KW - detection;alarm
KW - detection;target
KW - Detector;FCLS
KW - detector;hyperspectral
KW - estimation;
KW - estimation;emittance
KW - identification;adaptive
KW - imagery;reflectance
KW - least
KW - likelihood
KW - Matched
KW - matching;least
KW - processing;geophysical
KW - rate;generalized
KW - ratio
KW - signal
KW - signatures;spectral
KW - spectra;false
KW - spectra;spectral
KW - squares
KW - subspace
KW - systems;geophysical
KW - techniques;image
KW - tests;hybrid
KW - unmixing
AB - Numerous subpixel detection algorithms utilizing structured backgrounds have been developed over the past few years. These range from detection schemes based on spectral unmixing to generalized likelihood ratio tests. Spectral unmixing algorithms such as the Fully Constrained Least Squares (FCLS) algorithm have the advantage of physically modeling the interactions of spectral signatures based on reflectance/emittance spectroscopy. Generalized likelihood ratio tests like the Adaptive Matched Subspace Detector (AMSD) have the advantage of identifying targets that are statistically different from the background. Therefore, a hybrid detector based on both AMSD and FCLS was developed to take advantage of each detector's strengths. Results demonstrate that the hybrid detector achieved the lowest false alarm rates while also producing meaningful abundance estimates
JA - Geoscience and Remote Sensing Symposium, 2004. IGARSS '04. Proceedings. 2004 IEEE International
VL - 3
M3 - 10.1109/IGARSS.2004.1370633
ER -
TY - JOUR
T1 - HCIL Technical Report Listing (1993-2002)
JF - The craft of information visualization: readings and reflections
Y1 - 2003
A1 - Ceaparu,I.
A1 - Druin, Allison
A1 - Guimbretiere,F.
A1 - Manipulation,D.
A1 - Shneiderman, Ben
A1 - Westerlurid,B.
A1 - Keogh,E.
A1 - Hochheiser,H.
A1 - Shrieidemian,B.
A1 - Shneidemiari,B.
A1 - others
VL - 27
CP - 29
ER -
TY - CONF
T1 - Hedge Trimmer: a parse-and-trim approach to headline generation
T2 - Proceedings of the HLT-NAACL 03 on Text summarization workshop - Volume 5
Y1 - 2003
A1 - Dorr, Bonnie J
A1 - Zajic, David
A1 - Schwartz,Richard
AB - This paper presents Hedge Trimmer, a HEaDline GEneration system that creates a headline for a newspaper story using linguistically-motivated heuristics to guide the choice of a potential headline. We present feasibility tests used to establish the validity of an approach that constructs a headline by selecting words in order from a story. In addition, we describe experimental results that demonstrate the effectiveness of our linguistically-motivated approach over a HMM-based model, using both human evaluation and automatic metrics for comparing the two approaches.
JA - Proceedings of the HLT-NAACL 03 on Text summarization workshop - Volume 5
T3 - HLT-NAACL-DUC '03
PB - Association for Computational Linguistics
CY - Stroudsburg, PA, USA
UR - http://dx.doi.org/10.3115/1119467.1119468
M3 - 10.3115/1119467.1119468
ER -
TY - JOUR
T1 - Help! I’m lost: User frustration in web navigation
JF - IT & Society
Y1 - 2003
A1 - Lazar,J.
A1 - Bessiere,K.
A1 - Ceaparu,I.
A1 - Robinson,J.
A1 - Shneiderman, Ben
AB - Computers can be valuable tools, and networked resources via the Internet can be beneficial to many different populations and communities. Unfortunately, when people are unable to reach their task goals due to frustrating experiences, this can hinder the effectiveness of technology. This research summary provides information about the user frustration research that has been performed at the University of Maryland and Towson University. Causes of user frustration are discussed in this research summary, along with the surprising finding that nearly one-third to one-half of the time spent in front of the computer is wasted due to frustrating experiences. Furthermore, when interfaces are planned to be deceptive and confusing, this can lead to increased frustration. Implications for designers and users are discussed.
VL - 1
CP - 3
ER -
TY - CONF
T1 - Helping users get started with visual interfaces: multi-layered interfaces, integrated initial guidance and video demonstrations
T2 - Proceedings of the 2003 annual national conference on Digital government research
Y1 - 2003
A1 - Kang,Hyunmo
A1 - Plaisant, Catherine
A1 - Shneiderman, Ben
AB - We are investigating new ways to help users learn to use public access interactive tools, in particular for the visual exploration of government statistics. Our work led to a series of interfaces using multi-layered design, a new help method called Integrated Initial Guidance, and video demonstrations. Multi-layer designs structure an interface so that a simpler interface is available for users to get started and more complex features are accessed as users move through the more advanced layers. Integrated Initial Guidance provides help within the working interface, right at the start of the application. Using the metaphor of "sticky notes" overlaid on top of the functional interface locates the main widgets, demonstrates their manipulation, and explains the resulting actions using preset activations of the interface.
JA - Proceedings of the 2003 annual national conference on Digital government research
T3 - dg.o '03
PB - Digital Government Society of North America
UR - http://dl.acm.org/citation.cfm?id=1123196.1123257
ER -
TY - CONF
T1 - A hidden Markov model based framework for recognition of humans from gait sequences
T2 - Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on
Y1 - 2003
A1 - Sundaresan,Aravind
A1 - RoyChowdhury,Amit
A1 - Chellapa, Rama
KW - analysis;
KW - background-subtracted
KW - binarized
KW - discrete
KW - distance
KW - feature
KW - Gait
KW - hidden
KW - human
KW - image
KW - image;
KW - Markov
KW - metrics;
KW - model;
KW - models;
KW - postures;
KW - recognition;
KW - sequences;
KW - vector;
AB - In this paper we propose a generic framework based on hidden Markov models (HMMs) for recognition of individuals from their gait. The HMM framework is suitable, because the gait of an individual can be visualized as his adopting postures from a set, in a sequence which has an underlying structured probabilistic nature. The postures that the individual adopts can be regarded as the states of the HMM and are typical to that individual and provide a means of discrimination. The framework assumes that, during gait, the individual transitions between N discrete postures or states but it is not dependent on the particular feature vector used to represent the gait information contained in the postures. The framework, thus, provides flexibility in the selection of the feature vector. The statistical nature of the HMM lends robustness to the model. In this paper we use the binarized background-subtracted image as the feature vector and use different distance metrics, such as those based on the L1 and L2 norms of the vector difference, and the normalized inner product of the vectors, to measure the similarity between feature vectors. The results we obtain are better than the baseline recognition rates reported before.
JA - Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on
VL - 2
M3 - 10.1109/ICIP.2003.1246624
ER -
TY - CONF
T1 - Hierarchical dwarfs for the rollup cube
T2 - Proceedings of the 6th ACM international workshop on Data warehousing and OLAP - DOLAP '03
Y1 - 2003
A1 - Sismanis,Yannis
A1 - Deligiannakis,Antonios
A1 - Kotidis,Yannis
A1 - Roussopoulos, Nick
JA - Proceedings of the 6th ACM international workshop on Data warehousing and OLAP - DOLAP '03
CY - New Orleans, Louisiana, USA
UR - http://dl.acm.org/citation.cfm?id=956064
M3 - 10.1145/956060.956064
ER -
TY - CONF
T1 - A high performance multi-perspective vision studio
T2 - Proceedings of the 17th annual international conference on Supercomputing
Y1 - 2003
A1 - Borovikov,Eugene
A1 - Sussman, Alan
KW - database
KW - distributed system
KW - high-performance
KW - IMAGE PROCESSING
KW - multi-perspective
KW - VISION
KW - volumetric reconstruction
AB - We describe a multi-perspective vision studio as a flexible high performance framework for solving complex image processing and machine vision problems on multi-view image sequences. The studio abstracts multi-view image data from image sequence acquisition facilities, stores and catalogs sequences in a high performance distributed database, allows customization of back-end processing services, and can serve custom client applications, thus helping make multi-view video sequence processing efficient and generic. To illustrate our approach, we describe two multi-perspective studio applications, and discuss performance and scalability results.
JA - Proceedings of the 17th annual international conference on Supercomputing
T3 - ICS '03
PB - ACM
CY - New York, NY, USA
SN - 1-58113-733-8
UR - http://doi.acm.org/10.1145/782814.782862
M3 - 10.1145/782814.782862
ER -
TY - CONF
T1 - HRTF personalization using anthropometric measurements
T2 - Applications of Signal Processing to Audio and Acoustics, 2003 IEEE Workshop on.
Y1 - 2003
A1 - Zotkin,Dmitry N
A1 - Hwang,J.
A1 - Duraiswami, Ramani
A1 - Davis, Larry S.
KW - acoustic
KW - anthropometric
KW - audio
KW - audio;
KW - auditory
KW - Ear
KW - functions;
KW - Head
KW - head-and-torso
KW - HRTF
KW - individualized
KW - localization;
KW - measurements;
KW - model;
KW - models;
KW - parameters;
KW - perception;
KW - personalization;
KW - physiological
KW - processing;
KW - related
KW - scattering;
KW - scene;
KW - signal
KW - sound
KW - spatial
KW - subjective
KW - transfer
KW - virtual
KW - wave
AB - Individualized head related transfer functions (HRTFs) are needed for accurate rendering of spatial audio, which is important in many applications. Since these are relatively tedious to acquire, they may not be acceptable for some applications. A number of studies have sought to perform simple customization of the HRTF. We propose and test a strategy for HRTF personalization, based on matching certain anthropometric ear parameters with the HRTF database, and the incorporation of a low-frequency "head-and-torso" model. We present preliminary tests aimed at evaluation of this customization. Results show that the approach improves both the accuracy of the localization and subjective perception of the virtual auditory scene.
JA - Applications of Signal Processing to Audio and Acoustics, 2003 IEEE Workshop on.
M3 - 10.1109/ASPAA.2003.1285855
ER -
TY - CONF
T1 - Human body pose estimation using silhouette shape analysis
T2 - Proceedings. IEEE Conference on Advanced Video and Signal Based Surveillance, 2003.
Y1 - 2003
A1 - Mittal,A.
A1 - Liang Zhao
A1 - Davis, Larry S.
KW - 3D
KW - analysis;
KW - body
KW - classification;
KW - clutter;
KW - detection;
KW - estimation;
KW - extraction;
KW - feature
KW - function;
KW - human
KW - image
KW - likelihood
KW - multiple
KW - object
KW - parameter
KW - parameters;
KW - Pixel
KW - pose
KW - probability;
KW - segmentation;
KW - segmentations;
KW - SHAPE
KW - silhouette
KW - structure;
KW - surveillance;
KW - views;
AB - We describe a system for human body pose estimation from multiple views that is fast and completely automatic. The algorithm works in the presence of multiple people by decoupling the problems of pose estimation of different people. The pose is estimated based on a likelihood function that integrates information from multiple views and thus obtains a globally optimal solution. Other characteristics that make our method more general than previous work include: (1) no manual initialization; (2) no specification of the dimensions of the 3D structure; (3) no reliance on some learned poses or patterns of activity; (4) insensitivity to edges and clutter in the background and within the foreground. The algorithm has applications in surveillance and promising results have been obtained.
JA - Proceedings. IEEE Conference on Advanced Video and Signal Based Surveillance, 2003.
M3 - 10.1109/AVSS.2003.1217930
ER -
TY - PAT
T1 - Human visual model for data hiding
Y1 - 2003
A1 - M. Wu
A1 - Yu,Hong Heather
ED - Matsushita Electric Industrial Co., Ltd.
AB - A method and apparatus of hiding identification data in visual media. When image or video data is received, frequency masking is performed to divide the image or video data into blocks of smooth regions and blocks of non-smooth regions and to obtain preliminary just-noticeable-difference. Edge detection is performed to divide the non-smooth region of the image or video data into texture blocks and edge blocks. Then blocks of regions that are substantially proximate to blocks of smooth regions of the image or video data are determined. The image or video data is then adjusted by applying different strength of watermark in association with the type of each block.
VL - : 09/691,544
UR - http://www.google.com/patents?id=aNgOAAAAEBAJ
CP - 6611608
ER -
TY - JOUR
T1 - Hybrid Natural Language Generation from Lexical Conceptual Structures
JF - Machine Translation
Y1 - 2003
A1 - Habash,Nizar
A1 - Dorr, Bonnie J
A1 - Traum,David
AB - This paper describes Lexogen, a system for generating natural-languagesentences from Lexical Conceptual Structure, an interlingualrepresentation. The system has been developed as part of aChinese–English Machine Translation (MT) system; however, it isdesigned to be used for many other MT language pairs and naturallanguage applications. The contributions of this work include: (1)development of a large-scale Hybrid Natural Language Generation system withlanguage-independent components; (2) enhancements to an interlingualrepresentation and associated algorithm forgeneration from ambiguous input; (3) development of an efficientreusable language-independent linearization module with a grammardescription language that can be used with other systems; (4)improvements to an earlier algorithm forhierarchically mapping thematic roles to surface positions; and (5)development of a diagnostic tool for lexicon coverage and correctnessand use of the tool for verification of English, Spanish, and Chineselexicons. An evaluation of Chinese–English translation quality showscomparable performance with a commercial translation system. Thegeneration system can also be extended to other languages and this isdemonstrated and evaluated for Spanish.
VL - 18
SN - 0922-6567
UR - http://dx.doi.org/10.1023/B:COAT.0000020960.27186.18
CP - 2
ER -
TY - CONF
T1 - Half-edge Multi-Tessellation: a compact representations for multiresolution tetrahedral meshes
T2 - Proceedings 1st International Symposium on 3D Data Processing Visualization and Transmission
Y1 - 2002
A1 - Danovaro,E.
A1 - De Floriani, Leila
AB - This paper deals with the problem of analyzing and vi-sualizing volume data sets of large size. To this aim, we define a three-dimensional multi-resolution model based on unstructured tetrahedral meshes, and built through a half- edge-collapse simplification strategy, that we call a Half- Edge Multi-Tessellation (MT). We propose a new compact data structure for a half-edge MT, and we analyze it with respect to both its space requirements and its efficiency in supporting Level-Of-Detail (LOD) queries based on selec- tive refinement.
JA - Proceedings 1st International Symposium on 3D Data Processing Visualization and Transmission
ER -
TY - CHAP
T1 - Handling Translation Divergences: Combining Statistical and Symbolic Techniques in Generation-Heavy Machine Translation
T2 - Machine Translation: From Research to Real UsersMachine Translation: From Research to Real Users
Y1 - 2002
A1 - Habash,Nizar
A1 - Dorr, Bonnie J
ED - Richardson,Stephen
AB - This paper describes a novel approach to handling translation divergences in a Generation-Heavy Hybrid Machine Translation (GHMT) system. The translation divergence problem is usually reserved for Transfer and Interlingual MT because it requires a large combination of complex lexical and structural mappings. A major requirement of these approaches is the accessibility of large amounts of explicit symmetric knowledge for both source and target languages. This limitation renders Transfer and Interlingual approaches ineffective in the face of structurally-divergent language pairs with asymmetric resources. GHMT addresses the more common form of this problem, source-poor/targetrich, by fully exploiting symbolic and statistical target-language resources. This non-interlingual non-transfer approach is accomplished by using target-language lexical semantics, categorial variations and subcategorization frames to overgenerate multiple lexico-structural variations from a target-glossed syntactic dependency of the source-language sentence. The symbolic overgeneration, which accounts for different possible translation divergences, is constrained by a statistical target-language model.
JA - Machine Translation: From Research to Real UsersMachine Translation: From Research to Real Users
T3 - Lecture Notes in Computer Science
PB - Springer Berlin / Heidelberg
VL - 2499
SN - 978-3-540-44282-0
UR - http://dx.doi.org/10.1007/3-540-45820-4_9
ER -
TY - CONF
T1 - Hidden loop recovery for handwriting recognition
T2 - Frontiers in Handwriting Recognition, 2002. Proceedings. Eighth International Workshop on
Y1 - 2002
A1 - David Doermann
A1 - Intrator,N.
A1 - Rivin,E.
A1 - Steinherz,T.
KW - analysis;
KW - character
KW - contour
KW - cursive
KW - detection;
KW - distance
KW - edge
KW - ellipses;
KW - form
KW - handwritten
KW - hidden
KW - loop
KW - measurements;
KW - mutual
KW - partitioning;
KW - recognition;
KW - recovery;
KW - SHAPE
KW - shape;
KW - sophisticated
KW - strokes;
KW - symmetric
KW - truncated
KW - word
AB - One significant challenge in the recognition of off-line handwriting is in the interpretation of loop structures. Although this information is readily available in online representation, close proximity of strokes often merges their centers making them difficult to identify. In this paper a novel approach to the recovery of hidden loops in off-line scanned document images is presented. The proposed algorithm seeks blobs that resemble truncated ellipses. We use a sophisticated form analysis method based on mutual distance measurements between the two sides of a symmetric shape. The experimental results are compared with the ground truth of the online representations of each off-line word image. More than 86% percent of the meaningful loops are handled correctly.
JA - Frontiers in Handwriting Recognition, 2002. Proceedings. Eighth International Workshop on
M3 - 10.1109/IWFHR.2002.1030939
ER -
TY - CONF
T1 - Hidden Markov models for silhouette classification
T2 - Automation Congress, 2002 Proceedings of the 5th Biannual World
Y1 - 2002
A1 - Abd-Almageed, Wael
A1 - Smith,C.
KW - Computer vision
KW - Feature extraction
KW - Fourier transforms
KW - hidden Markov models
KW - HMM
KW - image classification
KW - Neural networks
KW - object classification
KW - Object recognition
KW - parameter estimation
KW - pattern recognition
KW - Probability distribution
KW - Shape measurement
KW - silhouette classification
KW - Wavelet transforms
AB - In this paper, a new technique for object classification from silhouettes is presented. Hidden Markov models are used as a classification mechanism. Through a set of experiments, we show the validity of our approach and show its invariance under severe rotation conditions. Also, a comparison with other techniques that use hidden Markov models for object classification from silhouettes is presented.
JA - Automation Congress, 2002 Proceedings of the 5th Biannual World
PB - IEEE
VL - 13
SN - 1-889335-18-5
M3 - 10.1109/WAC.2002.1049575
ER -
TY - CONF
T1 - A hierarchical approach for obtaining structure from two-frame optical flow
T2 - Motion and Video Computing, 2002. Proceedings. Workshop on
Y1 - 2002
A1 - Liu,Haiying
A1 - Chellapa, Rama
A1 - Rosenfeld, A.
KW - algorithm;
KW - aliasing;
KW - analysis;
KW - computer-rendered
KW - depth
KW - depth;
KW - error
KW - estimation;
KW - extraction;
KW - Face
KW - feature
KW - flow;
KW - gesture
KW - hierarchical
KW - image
KW - images;
KW - inverse
KW - iterative
KW - methods;
KW - MOTION
KW - nonlinear
KW - optical
KW - parameter
KW - processing;
KW - real
KW - recognition;
KW - sequences;
KW - signal
KW - structure-from-motion;
KW - system;
KW - systems;
KW - TIME
KW - two-frame
KW - variation;
KW - video
AB - A hierarchical iterative algorithm is proposed for extracting structure from two-frame optical flow. The algorithm exploits two facts: one is that in many applications, such as face and gesture recognition, the depth variation of the visible surface of an object in a scene is small compared to the distance between the optical center and the object; the other is that the time aliasing problem is alleviated at the coarse level for any two-frame optical flow estimate so that the estimate tends to be more accurate. A hierarchical representation for the relationship between the optical flow, depth, and the motion parameters is derived, and the resulting non-linear system is iteratively solved through two linear subsystems. At the coarsest level, the surface of the object tends to be flat, so that the inverse depth tends to be a constant, which is used as the initial depth map. Inverse depth and motion parameters are estimated by the two linear subsystems at each level and the results are propagated to finer levels. Error analysis and experiments using both computer-rendered images and real images demonstrate the correctness and effectiveness of our algorithm.
JA - Motion and Video Computing, 2002. Proceedings. Workshop on
M3 - 10.1109/MOTION.2002.1182239
ER -
TY - JOUR
T1 - High-level synthesis of DSP applications using adaptive negative cycle detection
JF - EURASIP J. Appl. Signal Process.
Y1 - 2002
A1 - Chandrachoodan,Nitin
A1 - Bhattacharyya, Shuvra S.
A1 - Liu,K. J.R
KW - adaptive performance estimation
KW - dynamic graphs
KW - maximum cycle mean
KW - negative cycle detection
AB - The problem of detecting negative weight cycles in a graph is examined in the context of the dynamic graph structures that arise in the process of high level synthesis (HLS). The concept of adaptive negative cycle detection is introduced, in which a graph changes over time and negative cycle detection needs to be done periodically, but not necessarily after every individual change. We present an algorithm for this problem, based on a novel extension of the well-known Bellman-Ford algorithm that allows us to adapt existing cycle information to the modified graph, and show by experiments that our algorithm significantly outperforms previous incremental approaches for dynamic graphs. In terms of applications, the adaptive technique leads to a very fast implementation of Lawlers algorithm for the computation of the maximum cycle mean (MCM) of a graph, especially for a certain form of sparse graph. Such sparseness often occurs in practical circuits and systems, as demonstrated, for example, by the ISCAS 89/93 benchmarks. The application of the adaptive technique to design-space exploration (synthesis) is also demonstrated by developing automated search techniques for scheduling iterative data-flow graphs.
VL - 2002
SN - 1110-8657
UR - http://dl.acm.org/citation.cfm?id=1283100.1283192
CP - 1
ER -
TY - CONF
T1 - A history-based test prioritization technique for regression testing in resource constrained environments
T2 - Proceedings of the 24th international conference on Software engineering - ICSE '02
Y1 - 2002
A1 - Kim,Jung-Min
A1 - Porter, Adam
JA - Proceedings of the 24th international conference on Software engineering - ICSE '02
CY - Orlando, Florida
UR - http://dl.acm.org/citation.cfm?id=581357
M3 - 10.1145/581339.581357
ER -
TY - CONF
T1 - How young can our design partners be
T2 - Proceedings of the Participatory Design Conference
Y1 - 2002
A1 - Farber,A.
A1 - Druin, Allison
A1 - Chipman,G.
A1 - Julian,D.
A1 - Somashekhar,S.
JA - Proceedings of the Participatory Design Conference
ER -
TY - RPRT
T1 - HTN Planning in Answer Set Programming
Y1 - 2002
A1 - Dix,Jurgen
A1 - Kuter,Ugur
A1 - Nau, Dana S.
KW - Technical Report
AB - In this paper we introduce a formalism for solving Hierarchical Task NEtwork(HTN) Planning using Answer Set Programming (ASP). The ASP paradigm evolved out of the stable semantics for logic programs in recent years and is strongly related to nonmonotonic logics. We consider the formulation of HTM planning as described in the SHOP planning system and define a systematic translation method from SHOP's representation of the planning problems into logic programs with negation. We show that our translation is sound and complete: answer sets of the logic programs obtained by our translation correspond exactly to the solutions of the planning problems. Our approach does not rly on a particular system for computing answer sets. It can therefore serve as a means to evaluate ASP systems by using well-established benchmarks from the planning community. We tested our method on various such benchmarks and used smodels and DLV for computing answer sets. We compared our method to (1) similar approaches based on non-HTN planning and (2) SHOP, a dedicated planning system. We show that our approach outperforms non-HTN methods and that its performance is closer to that of SHOP, when we are using ASP systems which allow for nonground programs. (Also UMIACS-TR-2002-18)
PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park
VL - UMIACS-TR-2002-18
UR - http://drum.lib.umd.edu//handle/1903/1182
ER -
TY - CONF
T1 - Handling uncertainty with active logic
T2 - In Proceedings, AAAI Fall Symposium on Uncertainty in Computation
Y1 - 2001
A1 - Bhatia,M.
A1 - Chi,P.
A1 - Chong,W.
A1 - Josyula,D. P
A1 - Okamoto,Y.
A1 - Perlis, Don
A1 - Purang,K.
JA - In Proceedings, AAAI Fall Symposium on Uncertainty in Computation
ER -
TY - JOUR
T1 - Haptic and aural rendering of a virtual milling process
JF - ASME 2001 Design Engineering Technical Conference and Computers and Information in Engineering Conference, Pittsburgh, PA
Y1 - 2001
A1 - Chang,C. F
A1 - Varshney, Amitabh
A1 - Ge,Q. J
ER -
TY - CONF
T1 - Hashing moving objects
T2 - Mobile Data Management
Y1 - 2001
A1 - Song,Z.
A1 - Roussopoulos, Nick
JA - Mobile Data Management
ER -
TY - JOUR
T1 - Hierarchical GUI test case generation using automated planning
JF - Software Engineering, IEEE Transactions on
Y1 - 2001
A1 - Memon, Atif M.
A1 - Pollack,M. E
A1 - Soffa,M. L
KW - Artificial intelligence
KW - automated planning
KW - automatic test case generation
KW - Automatic testing
KW - correctness testing
KW - goal state
KW - Graphical user interfaces
KW - hierarchical GUI test case generation
KW - initial state
KW - Microsoft WordPad
KW - operators
KW - plan-generation system
KW - planning (artificial intelligence)
KW - Planning Assisted Tester for Graphical User Interface Systems
KW - program testing
KW - software
AB - The widespread use of GUIs for interacting with software is leading to the construction of more and more complex GUIs. With the growing complexity come challenges in testing the correctness of a GUI and its underlying software. We present a new technique to automatically generate test cases for GUIs that exploits planning, a well-developed and used technique in artificial intelligence. Given a set of operators, an initial state, and a goal state, a planner produces a sequence of the operators that will transform the initial state to the goal state. Our test case generation technique enables efficient application of planning by first creating a hierarchical model of a GUI based on its structure. The GUI model consists of hierarchical planning operators representing the possible events in the GUI. The test designer defines the preconditions and effects of the hierarchical operators, which are input into a plan-generation system. The test designer also creates scenarios that represent typical initial and goal states for a GUI user. The planner then generates plans representing sequences of GUI interactions that a user might employ to reach the goal state from the initial state. We implemented our test case generation system, called Planning Assisted Tester for Graphical User Interface Systems (PATHS) and experimentally evaluated its practicality and effectiveness. We describe a prototype implementation of PATHS and report on the results of controlled experiments to generate test cases for Microsoft's WordPad
VL - 27
SN - 0098-5589
CP - 2
M3 - 10.1109/32.908959
ER -
TY - CHAP
T1 - Hierarchical image-based and polygon-based rendering for large-scale visualizations
T2 - Hierarchical and Geometrical Methods in Scientific VisualizationHierarchical and Geometrical Methods in Scientific Visualization
Y1 - 2001
A1 - Chang,C. F
A1 - Varshney, Amitabh
A1 - Ge,Q. J
JA - Hierarchical and Geometrical Methods in Scientific VisualizationHierarchical and Geometrical Methods in Scientific Visualization
PB - Springer
SN - 9783540433132
ER -
TY - CONF
T1 - Hybrid global/local search strategies for dynamic voltage scaling in embedded multiprocessors
T2 - Hardware/Software Codesign, 2001. CODES 2001. Proceedings of the Ninth International Symposium on
Y1 - 2001
A1 - Bambha,N. K
A1 - Bhattacharyya, Shuvra S.
A1 - Teich,J.
A1 - Zitzler,E.
JA - Hardware/Software Codesign, 2001. CODES 2001. Proceedings of the Ninth International Symposium on
ER -
TY - CONF
T1 - A hypergraph-based workload partitioning strategy for parallel data aggregation
T2 - Proceedings of the Eleventh SIAM Conference on Parallel Processing for Scientific Computing
Y1 - 2001
A1 - Chang,C.
A1 - Kurc, T.
A1 - Sussman, Alan
A1 - Catalyurek,U.
A1 - Saltz, J.
JA - Proceedings of the Eleventh SIAM Conference on Parallel Processing for Scientific Computing
ER -
TY - CONF
T1 - Hidden Markov Models for Images
T2 - ICPR
Y1 - 2000
A1 - DeMenthon,D.
A1 - Stuckelberg,M. Vuilleumier
A1 - David Doermann
AB - In this paper we investigate how speech recognition techniques can be extended to image processing. We describe a method for learning statistical models of images using a second order hidden Markov mesh model. First, an image can be segmented in a way that best matches its statistical model by an approach related to the dynamic programming used for segmenting Markov chains. Second, given an image segmentation a statistical model (3D state transition matrix and observation distributions within states) can be estimated. These two steps are repeated until convergence to provide both a segmentation and a statistical model of the image. We also describe a semi-Markov modeling technique in which the distributions of widths and heights of segmented regions are modeled explicitly by gamma distributions in a way related to explicit duration modeling in HMMs. Finally, we propose a statistical distance measure between images based on the similarity of their statistical models for classication and retrieval tasks.
JA - ICPR
ER -
TY - JOUR
T1 - High performance computing algorithms for land cover dynamics using remote sensing data
JF - International Journal of Remote Sensing
Y1 - 2000
A1 - Kalluri, SNV
A1 - JaJa, Joseph F.
A1 - Bader, D.A.
A1 - Zhang,Z.
A1 - Townshend,J.R.G.
A1 - Fallah-Adl,H.
AB - Global and regional land cover studies need to apply complex models on selected subsets of large volumes of multi-sensor and multi-temporal data sets that have been derived from raw instrument measurements using widely accepted pre-processing algorithms. The computational and storage requirements of most of these studies far exceed what is possible on a single workstation environment. We have been pursuing a new approach that couples scalable and open distributed heterogeneous hardware with the development of high performance software for processing, indexing and organizing remotely sensed data. Hierarchical data management tools are used to ingest raw data, create metadata and organize the archived data so as to automatically achieve computational load balancing among the available nodes and minimize input/output overheads. We illustrate our approach with four specific examples. The first is the development of the first fast operational scheme for the atmospheric correction of Landsat Thematic Mapper scenes, while the second example focuses on image segmentation using a novel hierarchical connected components algorithm. Retrieval of the global Bidirectional Reflectance Distribution Function in the red and near-infrared wavelengths using four years (1983 to 1986) of Pathfinder Advanced Very High Resolution Radiometer (AVHRR) Land data is the focus of our third example. The fourth example is the development of a hierarchical data organization scheme that allows on-demand processing and retrieval of regional and global AVHRR data sets. Our results show that substantial reductions in computational times can be achieved by the high performance computing technology.
VL - 21
SN - 0143-1161
UR - http://www.tandfonline.com/doi/abs/10.1080/014311600210290
CP - 6-7
M3 - 10.1080/014311600210290
ER -
TY - CONF
T1 - A hierarchical data archiving and processing system to generate custom tailored products from AVHRR data
T2 - Geoscience and Remote Sensing Symposium, 1999. IGARSS '99 Proceedings. IEEE 1999 International
Y1 - 1999
A1 - Kalluri, SNV
A1 - Zhang,Z.
A1 - JaJa, Joseph F.
A1 - Bader, D.A.
A1 - Song,H.
A1 - El Saleous,N.
A1 - Vermote,E.
A1 - Townshend,J.R.G.
KW - archiving;image
KW - AVHRR;GIS;PACS;custom
KW - data
KW - image;land
KW - image;remote
KW - mapping;
KW - mapping;PACS;geophysical
KW - measurement
KW - PROCESSING
KW - processing;geophysical
KW - product;data
KW - remote
KW - scheme;infrared
KW - sensing;optical
KW - sensing;terrain
KW - signal
KW - surface;multispectral
KW - system;indexing
KW - tailored
KW - technique;hierarchical
KW - techniques;remote
AB - A novel indexing scheme is described to catalogue satellite data on a pixel basis. The objective of this research is to develop an efficient methodology to archive, retrieve and process satellite data, so that data products can be generated to meet the specific needs of individual scientists. When requesting data, users can specify the spatial and temporal resolution, geographic projection, choice of atmospheric correction, and the data selection methodology. The data processing is done in two stages. Satellite data is calibrated, navigated and quality flags are appended in the initial processing. This processed data is then indexed and stored. Secondary processing such as atmospheric correction and projection are done after a user requests the data to create custom made products. By dividing the processing in to two stages saves time, since the basic processing tasks such as navigation and calibration which are common to all requests are not repeated when different users request satellite data. The indexing scheme described can be extended to allow fusion of data sets from different sensors
JA - Geoscience and Remote Sensing Symposium, 1999. IGARSS '99 Proceedings. IEEE 1999 International
VL - 5
M3 - 10.1109/IGARSS.1999.771514
ER -
TY - JOUR
T1 - Human values and the future of technology: a declaration of responsibility
JF - ACM SIGCAS Computers and Society
Y1 - 1999
A1 - Shneiderman, Ben
AB - We can make a difference in shaping the future by ensuring that computers "serve human needs (Mumford, 1934)." By making explicit the enduring values that we hold dear we can guide computer system designers and developers for the next decade, century, and thereafter. After setting our high-level goals we can pursue the components and seek the process for fulfilling them. High-level goals might include peace, excellent health care, adequate nutrition, accessible education, communication, freedom of expression, support for creative exploration, safety, and socially constructive entertainment. Computer technology can help attain these high-level goals if we clearly state measurable objectives, obtain participation of professionals, and design effective human-computer interfaces. Design considerations include adequate attention to individual differences among users, support of social and organizational structures, design for reliability and safety, provision of access by the elderly, handicapped, or illiterate, and appropriate user controlled adaptation. With suitable theories and empirical research we can achieve ease of learning, rapid performance, low error rates, and good retention over time, while preserving high subjective satisfaction. To raise the consciousness of designers and achieve these goals, we must generate an international debate, stimulate discussions within organizations, and interact with other intellectual communities. This paper calls for a focus on the "you" and "I" in developing improved user interface (UI) research and systems, offers a Declaration of Responsibility, and proposes a Social Impact Statement for major computing projects.
VL - 29
SN - 0095-2737
UR - http://doi.acm.org/10.1145/572183.572185
CP - 3
M3 - 10.1145/572183.572185
ER -
TY - JOUR
T1 - Human-centered computing, online communities, and virtual environments
JF - IEEE Computer Graphics and Applications
Y1 - 1999
A1 - Brown,J. R
A1 - van Dam,A.
A1 - Earnshaw,R.
A1 - Encarnacao,J.
A1 - Guedj,R.
A1 - Preece,J.
A1 - Shneiderman, Ben
A1 - Vince,J.
KW - Books
KW - Collaboration
KW - Collaborative work
KW - Conferences
KW - EC/NSF joint Advanced Research Workshop
KW - Feeds
KW - Human computer interaction
KW - human-centered computing
KW - Internet
KW - Joining materials
KW - Laboratories
KW - Online communities
KW - Research initiatives
KW - USA Councils
KW - User interfaces
KW - Virtual environment
KW - virtual environments
KW - Virtual reality
AB - This report summarizes results of the first EC/NSF joint Advanced Research Workshop, which identified key research challenges and opportunities in information technology. The group agreed that the first joint research workshop should concentrate on the themes of human-centered computing and VEs. Human-centered computing is perceived as an area of strategic importance because of the move towards greater decentralization and decomposition in the location and provision of computation. The area of VEs is one where increased collaboration should speed progress in solving some of the more intractable problems in building effective applications
VL - 19
SN - 0272-1716
CP - 6
M3 - 10.1109/38.799742
ER -
TY - JOUR
T1 - Hybrid planning: An approach to integrating generative and case-based planning
JF - Working Notes of the AAAI-98 Workshop on Case-Based Reasoning Integrations
Y1 - 1998
A1 - desJardins, Marie
A1 - Francis,A.
A1 - Wolverton,M.
ER -
TY - JOUR
T1 - Hydrodynamic Device Simulation with New State Variables Specially Chosen a Block Gummel Iterative Approach
JF - VLSI DESIGN
Y1 - 1998
A1 - Liang,W.
A1 - Kerr,D. C.
A1 - Goldsman,N.
A1 - Mayergoyz, Issak D
AB - A new numerical formulation for solving the hydrodynamic model of semiconductor devicesis presented. Themethod is based on using new variables to transform the conventional hydrodynamic equations into forms which facilitatenumerical evaluation with a block Gum- mel approach. To demonstrate the new method, we apply it to model a 0.35 wn 2-D LDD MOSFET, where robust convergence properties are observed.
VL - 6
CP - 1-4
ER -
TY - JOUR
T1 - On hyperbolic triangularization: Stability and pivoting
JF - SIAM journal on matrix analysis and applications
Y1 - 1998
A1 - Stewart,M.
A1 - Stewart, G.W.
AB - This paper treats the problem of triangularizing a matrix by hyperbolic Householdertransformations. The stability of this method, which finds application in block updating and fast algorithms for Toeplitz-like matrices, has been analyzed only in special cases. Here we give a gen- eral analysis which shows that two distinct implementations of the individual transformations are relationally stable. The analysis also shows that pivoting is required for the entire triangularization algorithm to be stable.
VL - 19
CP - 4
ER -
TY - JOUR
T1 - Hardness of flip-cut problems from optical mapping
JF - Journal of Computational Biology
Y1 - 1997
A1 - DANČÍK,V.
A1 - Hannenhalli, Sridhar
A1 - Muthukrishnan,S.
VL - 4
CP - 2
ER -
TY - CONF
T1 - Hardness of flip-cut problems from optical mapping [DNA molecules application]
T2 - Compression and Complexity of Sequences 1997. Proceedings
Y1 - 1997
A1 - Dancik,V.
A1 - Hannenhalli, Sridhar
A1 - Muthukrishnan,S.
KW - binary shift cut
KW - Biochemistry
KW - Bioinformatics
KW - biological techniques
KW - Biology
KW - biomedical optical imaging
KW - combinatorial mathematics
KW - combinatorial problem
KW - computational complexity
KW - computational problems
KW - DNA
KW - DNA molecule
KW - exclusive binary flip cut
KW - flip-cut problem hardness
KW - Genetic engineering
KW - Genomics
KW - MATHEMATICS
KW - molecular biology
KW - molecular biophysics
KW - molecule orientation
KW - multiple partial restriction maps
KW - NP-complete problem
KW - optical mapping
KW - polynomial time solutions
KW - Polynomials
KW - sequences
AB - Optical mapping is a new technology for constructing restriction maps. Associated computational problems include aligning multiple partial restriction maps into a single “consensus” restriction map, and determining the correct orientation of each molecule, which was formalized as the exclusive binary flip cut (EBFC) problem by Muthukrishnan and Parida (see Proc. of the First ACM Conference on Computational Molecular Biology (RECOMB), Santa Fe, p.209-19, 1997). Here, the authors prove that the EBFC problem, as well as a number of its variants, are NP-complete. They also identify another problem formalized as binary shift cut (BSC) problem motivated by the fact that there might be missing fragments at the beginnings and/or the ends of the molecules, and prove it to be NP-complete. Therefore, they do not have efficient, that is, polynomial time solutions unless P=NP
JA - Compression and Complexity of Sequences 1997. Proceedings
PB - IEEE
SN - 0-8186-8132-2
M3 - 10.1109/SEQUEN.1997.666922
ER -
TY - JOUR
T1 - How to (plan to) meet a deadline between now and then
JF - Journal of Logic and Computation
Y1 - 1997
A1 - Nirkhe,M.
A1 - Kraus,S.
A1 - Miller,M.
A1 - Perlis, Don
VL - 7
CP - 1
ER -
TY - CONF
T1 - A high performance image database system for remotely sensed imagery
T2 - Euro-Par'96 Parallel Processing
Y1 - 1996
A1 - Shock,C.
A1 - Chang,C.
A1 - Davis, Larry S.
A1 - Goward,S.
A1 - Saltz, J.
A1 - Sussman, Alan
JA - Euro-Par'96 Parallel Processing
ER -
TY - JOUR
T1 - Hybrid network management (communication systems)
JF - 16th AIAA International Communications Satellite Systems Conference
Y1 - 1996
A1 - Baras,J. S
A1 - Ball,M.
A1 - Karne,R. K
A1 - Kelley,S.
A1 - Jang,K.D.
A1 - Plaisant, Catherine
A1 - Roussopoulos, Nick
A1 - Stathatos,K.
A1 - Vakhutinsky,A.
A1 - Valluri,J.
AB - We describe our collaborative efforts towards the design and implementation of a next-generation integrated network management system for hybrid networks (INMS/HN). We describe the overall software architecture of the system at its current stage of development. This NMS is specifically designed to address issues relevant to complex heterogeneous networks consisting of seamlessly interoperable terrestrial and satellite networks. NMSs are a key element for interoperability in such networks. We describe the integration of configuration management and performance management. The next step in this integration is fault management. In particular, we describe the object model, issues concerning the graphical user interface, browsing tools, performance data graphical widget displays, and management information database organization issues.
ER -
TY - JOUR
T1 - How to succeed in graduate school: a guide for students and advisors: part II of II
JF - Crossroads
Y1 - 1995
A1 - desJardins, Marie
VL - 1
SN - 1528-4972
UR - http://doi.acm.org/10.1145/197892.197895
CP - 3
M3 - 10.1145/197892.197895
ER -
TY - JOUR
T1 - How to succeed in graduate school: A guide for students and advisors
JF - International Amateur-Professional Photoelectric Photometry Communications
Y1 - 1995
A1 - desJardins, Marie
VL - 58
ER -
TY - JOUR
T1 - HUMAN VALUE AND THE FUTURE OF TECHNOLOGY
JF - Human factors in information systems: emerging theoretical bases
Y1 - 1995
A1 - Shneiderman, Ben
ER -
TY - BOOK
T1 - Human-Computer Interaction Laboratory 1995 Video Reports
Y1 - 1995
A1 - Plaisant, Catherine
A1 - Morrison,S.
A1 - Skokowski,C.
A1 - Reesch,J.
A1 - Shneiderman, Ben
A1 - Laboratory,University of Maryland at College Park. Human/Computer Interaction
A1 - Channel,F.
PB - University of Maryland at College Park, Human/Computer Interaction Laboratory
ER -
TY - CONF
T1 - Hybrid thinning through reconstruction
T2 - Document Analysis and Recognition, 1995., Proceedings of the Third International Conference on
Y1 - 1995
A1 - David Doermann
A1 - Kia,O.
KW - algorithms;edge
KW - ambiguous
KW - detection;automatic
KW - detection;contextual
KW - detection;image
KW - information;contour
KW - methods;nonlocal
KW - methods;pixel-wise
KW - noise;hybrid
KW - Pixel
KW - points;local
KW - reconstruction;image
KW - region
KW - segmentation;noise;
KW - stroke;junction
KW - thinning
KW - thinning;image
AB - One difficulty with many pixel-wise thinning algorithms is that they produce unacceptable results at junction points, or in the presence of contour noise. The authors present a novel approach to detecting ambiguous regions in a thinned image. The method uses the reconstructability properties of appropriate thinning algorithms to reverse the thinning process and automatically detect those pixels which may have resulted from more then one stroke in the image. The ambiguous regions are then interpreted and reconstructed using domain specific or derived contextual information. The approach has the advantage of using local methods to rapidly identify strokes (or regions) which have been thinned correctly and allowing more detailed analysis based on non-local methods in the remaining regions
JA - Document Analysis and Recognition, 1995., Proceedings of the Third International Conference on
VL - 2
M3 - 10.1109/ICDAR.1995.601975
ER -
TY - CONF
T1 - High performance computing for land cover dynamics
T2 - Pattern Recognition, 1994. Vol. 3-Conference C: Signal Processing, Proceedings of the 12th IAPR International Conference on
Y1 - 1994
A1 - Parulekar,R.
A1 - Davis, Larry S.
A1 - Chellapa, Rama
A1 - Saltz, J.
A1 - Sussman, Alan
A1 - Townshend,J.
JA - Pattern Recognition, 1994. Vol. 3-Conference C: Signal Processing, Proceedings of the 12th IAPR International Conference on
ER -
TY - JOUR
T1 - High-specificity neurological localization using a connectionist model
JF - Artificial Intelligence in Medicine
Y1 - 1994
A1 - Tuhrim,S.
A1 - Reggia, James A.
A1 - Peng,Y.
VL - 6
CP - 6
ER -
TY - JOUR
T1 - How normal flow constrains relative depth for an active observer
JF - Image and vision computing
Y1 - 1994
A1 - Huang, L.
A1 - Aloimonos, J.
VL - 12
CP - 7
ER -
TY - JOUR
T1 - How to succeed in graduate school: a guide for students and advisors: part I of II
JF - Crossroads
Y1 - 1994
A1 - desJardins, Marie
AB - This paper attempts to raise some issues that are important for graduate students to be successful and to get as much out of the process as possible, and for advisors who wish to help their students be successful. The intent is not to provide prescriptive advice -- no formulas for finishing a thesis or twelve-step programs for becoming a better advisor are given -- but to raise awareness on both sides of the advisor-student relationship as to what the expectations are and should be for this relationship, what a graduate student should expect to accomplish, common problems, and where to go if the advisor is not forthcoming.
VL - 1
SN - 1528-4972
UR - http://doi.acm.org/10.1145/197149.197154
CP - 2
M3 - 10.1145/197149.197154
ER -
TY - JOUR
T1 - Human Emotion Recognition From Motion Using A Radial Basis Function Network Architecture
JF - University Of Maryland
Y1 - 1994
A1 - Mark,R.
A1 - Yaser,Y.
A1 - Larry,D.
ER -
TY - CONF
T1 - Hierarchical curve representation
T2 - , 11th IAPR International Conference on Pattern Recognition, 1992. Vol.III. Conference C: Image, Speech and Signal Analysis, Proceedings
Y1 - 1992
A1 - Fermüller, Cornelia
A1 - Kropatsch,W.
KW - Automation
KW - continuous curves
KW - curvature
KW - data mining
KW - digital images
KW - Educational institutions
KW - Feature extraction
KW - hierarchical curve representation
KW - IMAGE PROCESSING
KW - image recognition
KW - image resolution
KW - Image segmentation
KW - multiresolution structure
KW - Object recognition
KW - planar curves
KW - pyramid
KW - Robustness
KW - Sampling methods
KW - Smoothing methods
AB - Presents a robust method for describing planar curves in multiple resolution using curvature information. The method is developed by taking into account the discrete nature of digital images as well as the discrete aspect of a multiresolution structure (pyramid). The authors deal with the robustness of the technique, which is due to the additional information that is extracted from observing the behavior of corners in the pyramid. Furthermore the resulting algorithm is conceptually simple and easily parallelizable. They develop theoretical results, analyzing the curvature of continuous curves in scale-space, which show the behavior of curvature extrema under varying scale. These results are used to eliminate any ambiguities that might arise from sampling problems due to the discreteness of the representation. Finally, experimental results demonstrate the potential of the method
JA - , 11th IAPR International Conference on Pattern Recognition, 1992. Vol.III. Conference C: Image, Speech and Signal Analysis, Proceedings
PB - IEEE
SN - 0-8186-2920-7
M3 - 10.1109/ICPR.1992.201947
ER -
TY - JOUR
T1 - High precision touchscreens: design strategies and comparisons with a mouse
JF - International Journal of Man-Machine Studies
Y1 - 1991
A1 - Sears,Andrew
A1 - Shneiderman, Ben
AB - Three studies were conducted comparing speed of performance, error rates and user preference ratings for three selection devices. The devices tested were a touchscreen, a touchscreen with stabilization (stabilization software filters and smooths raw data from hardware), and a mouse. The task was the selection of rectangular targets 1, 4, 16 and 32 pixels per side (0·4 × 0·6, 1·7 × 2·2, 6·9 × 9·0, 13·8 × 17·9 mm respectively). Touchscreen users were able to point at single pixel targets, thereby countering widespread expectations of poor touchscreen resolution. The results show no difference in performance between the mouse and touchscreen for targets ranging from 32 to 4 pixels per side. In addition, stabilization significantly reduced the error rates for the touchscreen when selecting small targets. These results imply that touchscreens, when properly used, have attractive advantages in selecting targets as small as 4 pixels per size (approximately one-quarter of the size of a single character). A variant of Fitts' Law is proposed to predict touchscreen pointing times. Ideas for future research are also presented.
VL - 34
SN - 0020-7373
UR - http://www.sciencedirect.com/science/article/pii/0020737391900378
CP - 4
M3 - 10.1016/0020-7373(91)90037-8
ER -
TY - JOUR
T1 - Human values and the future of technology: a declaration of responsibility
JF - ACM SIGCHI Bulletin
Y1 - 1991
A1 - Shneiderman, Ben
AB - "We must learn to balance the material wonders of technology with the spiritual demands of our human nature."---John Naisbitt (1982).We can make a difference in shaping the future by ensurin g that computers "serve human needs (Mumford, 1934)." By making explicit the enduring values that we hold dear we can guide computer system designers and developers for the next decade, century, and thereafter. After setting our high-level goals we can pursue the components and seek the process for fulfilling them.High-level goals might include peace, excellent health care, adequate nutrition, accessible education, communication, freedom of expression, support for creative exploration, safety, and socially constructive entertainment. Computer technology can help attain these high-level goals if we clearly state measurable objectives, obtain participation of professionals, and design effective human-computer interfaces. Design considerations include adequate attention to individual differences among users, support of social and organizational structures, design for reliability and safety, provision of access by the elderly, handicapped, or illiterate, and appropriate user controlled adaptation. With suitable theories and empirical research we can achieve ease of learning, rapid performance, low error rates, and good retention over time, while preserving high subjective satisfaction.To raise the consciousness of designers and achieve these goals, we must generate an international debate, stimulate discussions within organizations, and interact with other intellectual communities. This paper calls for a focus on the "you" and "I" in developing improved user interface (UI) research and systems, offers a Declaration of Responsibility, and proposes a Social Impact Statement for major computing projects.
VL - 23
SN - 0736-6906
UR - http://doi.acm.org/10.1145/122672.122674
CP - 1
M3 - 10.1145/122672.122674
ER -
TY - CONF
T1 - Human values and the future of technology: a declaration of empowerment
T2 - Proceedings of the conference on Computers and the quality of life
Y1 - 1990
A1 - Shneiderman, Ben
JA - Proceedings of the conference on Computers and the quality of life
T3 - CQL '90
PB - ACM
CY - New York, NY, USA
SN - 0-89791-403-1
UR - http://doi.acm.org/10.1145/97344.97360
M3 - 10.1145/97344.97360
ER -
TY - CONF
T1 - Human-computer interaction lab, University of Maryland
T2 - Proceedings of the SIGCHI conference on Human factors in computing systems: Wings for the mind
Y1 - 1989
A1 - Shneiderman, Ben
JA - Proceedings of the SIGCHI conference on Human factors in computing systems: Wings for the mind
T3 - CHI '89
PB - ACM
CY - New York, NY, USA
SN - 0-89791-301-9
UR - http://doi.acm.org/10.1145/67449.67509
M3 - 10.1145/67449.67509
ER -
TY - JOUR
T1 - Human-Computer Interaction Laboratory, University of Maryland, Center for Automation Research
JF - CHI
Y1 - 1989
A1 - Shneiderman, Ben
VL - 89
ER -
TY - CONF
T1 - Hypertext and software engineering
T2 - Proceedings of the second annual ACM conference on Hypertext
Y1 - 1989
A1 - Balzer,R.
A1 - Begeman,M.
A1 - Garg,P. K.
A1 - Schwartz,M.
A1 - Shneiderman, Ben
AB - The purpose of this panel is to bring together researchers in software engineering and hypertext and help identify the major issues in the application of hypertext technology and concepts to software engineering and vice versa.
JA - Proceedings of the second annual ACM conference on Hypertext
T3 - HYPERTEXT '89
PB - ACM
CY - New York, NY, USA
SN - 0-89791-339-6
UR - http://doi.acm.org/10.1145/74224.74259
M3 - 10.1145/74224.74259
ER -
TY - JOUR
T1 - Hypertext hands-on!
JF - Tech Report HCIL-89-06
Y1 - 1989
A1 - Shneiderman, Ben
A1 - Kearsley,G.
AB - This innovative book/software package provides the first hands-on nontechnical introduction to hypertext. Hypertext is a computer technology for manipulating information; in a grander sense, it is a new way of reading and writing. With the IBM-PC disket tes provided in this package, you will learn about hypertext by experiencing it. You will discover what it is like to read interactively, to find information according to your own needs and interests. Both the book and the software versions cover the basic concepts of hypertext, typical hypertext applications, and currently available authoring systems. They also raise important design and implementations issues. The book is self-contained an can be read from beginning to end without a computer. The software is also self-contained and, presenting hypertext in hypertext form, can be read in any order you choose. Since the two versions contain largely similar material, they provide an interesting basis for comparison between conventional text presentation and hypertext.
ER -
TY - BOOK
T1 - Hypertext on hypertext: IBM PC & compatibles
Y1 - 1988
ED - Shneiderman, Ben
PB - ACM
CY - New York, NY, USA
SN - 0-89791-280-2
ER -
TY - CONF
T1 - How can a program mean
T2 - Proceedings of the 10th Int'l Joint Conference on Artificial Intelligence
Y1 - 1987
A1 - Perlis, Don
JA - Proceedings of the 10th Int'l Joint Conference on Artificial Intelligence
ER -
TY - JOUR
T1 - Human-computer interaction research at the University of Maryland
JF - ACM SIGCHI Bulletin
Y1 - 1986
A1 - Shneiderman, Ben
AB - The Human-Computer Interaction Laboratory (HCIL) is a unit of the Center for Automation Research at the Univesity of Maryland. HCIL is an interdisciplinary research group whose participants are faculty in the Departments of Computer Science and Psychology and the Colleges of Library and Information Services, Business, and Education. In addition, staff scienctists, graduate students, and undergraduates contribute to this small, but lively community that pursues empirical studies of people using computers.Our support comes from industrial research projects, government grants, the State of Maryland, and the University of Maryland. Projects often become interrelated in surprising ways enabling individuals to cooperate constructively. Some of our efforts during the past year are described below.
VL - 17
SN - 0736-6906
UR - http://doi.acm.org/10.1145/15671.15673
CP - 3
M3 - 10.1145/15671.15673
ER -
TY - JOUR
T1 - A Hybrid Chebyshev Krylov Subspace Algorithm for Solving Nonsymmetric Systems of Linear Equations
JF - SIAM Journal on Scientific and Statistical ComputingSIAM J. Sci. and Stat. Comput.
Y1 - 1986
A1 - Elman, Howard
A1 - Saad, Youcef
A1 - Saylor, Paul E.
VL - 7
SN - 01965204
UR - http://link.aip.org/link/SJOCE3/v7/i3/p840/s1&Agg=doi
CP - 3
M3 - 10.1137/0907057
ER -
TY - RPRT
T1 - A High-Level Interactive System for Designing VLSI Signal Processors
Y1 - 1985
A1 - Owens,R. M.
A1 - JaJa, Joseph F.
KW - Technical Report
AB - This paper describes a high-level interactive system that can be used to generate VLSI designs for various operations in signal processing such as filtering, convolution and computing the discrete Fourier transform. The overall process is fully automated and requires that the user specifies only a few parameters such as operation, precision, size and architecture type. The built-in architectures are new digit-on-line bit-serial architectures that are based on recently derived fast algorithms for the above operations. The basic elements are compact and have a very small gate delay. We feel that our system will offer a flexible and easy to use tool that can produce practical designs which are easy to test, efficient and fast.
PB - Institute for Systems Research, University of Maryland, College Park
VL - ISR-TR-1985-7
UR - http://drum.lib.umd.edu/handle/1903/4383
ER -
TY - JOUR
T1 - Human factors issues of manuals, online help, and tutorials
JF - Empirical foundations of information and software science
Y1 - 1985
A1 - Shneiderman, Ben
VL - 1984
ER -
TY - JOUR
T1 - Human Factors in Interactive Medical Systems
JF - Proceedings of the Annual Symposium on Computer Application in Medical CareProc Annu Symp Comput Appl Med Care
Y1 - 1984
A1 - Shneiderman, Ben
SN - 0195-4210
ER -
TY - JOUR
T1 - High-tech can stimulate creative action: the increased ease-of-use of computers supports individual competence and productive work
JF - SIGCHI Bull.
Y1 - 1983
A1 - Shneiderman, Ben
AB - Jokes about the complexity and error-prone use of computer systems reflect the experience of many people. Computer anxiety, terminal terror, and network neurosis are modern maladies - but help is on the way!
VL - 14
SN - 0736-6906
UR - http://doi.acm.org/10.1145/1044188.1044189
CP - 4
M3 - 10.1145/1044188.1044189
ER -
TY - JOUR
T1 - Human engineering management plan for interactive systems
JF - Proceedings COMPCON
Y1 - 1983
A1 - Shneiderman, Ben
VL - 83
ER -
TY - CHAP
T1 - Human factors of interactive software
T2 - Enduser Systems and Their Human FactorsEnduser Systems and Their Human Factors
Y1 - 1983
A1 - Shneiderman, Ben
ED - Blaser,Albrecht
ED - Zoeppritz,Magdalena
AB - There is intense interest about human factors issues in interactive computer systems for life-critical applications, industrial/commercial uses, and personal computing in the office or home. Primary design goals include proper functionality, adequate reliability, suitable cost, and adherence to schedule. Measurable human factors issues include time to learn, speed of performance, rate of errors, subjective satisfaction, and retention over time. Specific human factors acceptance tests are described as a natural complement to hardware and software acceptance tests. Project management ideas, information resources, and potential research directions are presented.
JA - Enduser Systems and Their Human FactorsEnduser Systems and Their Human Factors
T3 - Lecture Notes in Computer Science
PB - Springer Berlin / Heidelberg
VL - 150
SN - 978-3-540-12273-9
UR - http://dx.doi.org/10.1007/3-540-12273-7_16
ER -
TY - JOUR
T1 - Human Aspects of Computing Editor Control Flow and Data Structure Documentation: Two Experiments
JF - Human factors in software development
Y1 - 1981
A1 - Shneiderman, Ben
ER -
TY - JOUR
T1 - HUMAN FACTORS ISSUES IN DESIGNING INTERACTIVE SYSTEMS
JF - Proceedings-Compcon
Y1 - 1981
A1 - Shneiderman, Ben
VL - 25
ER -
TY - JOUR
T1 - Human factors studies with system message styles (abstract only)
JF - ACM SIGSOC Bulletin
Y1 - 1981
A1 - Shneiderman, Ben
AB - Computer systems often contain messages which are imprecise ('SYNTAX ERROR'), hostile ('FATAL ERROR, RUN ABORTED'), cryptic ('IEH291H'), or obscure ('CTL DAMAGE, TRANS ERR'). Such messages may be acceptable to computer professionals who regularly use a specific system, but they lead to frustration for novices and for professionals who are using new features or facilities.We have conducted five studies using COBOL compiler syntax errors and text editor command errors to measure the impact of improving the wording of system messages. The results indicate that increased specificity, more positive tone, and greater clarity can improve correction rates and user satisfaction.An overview of the experimental results will be presented along with guidelines for writing system messages.
VL - 13
SN - 0163-5794
UR - http://doi.acm.org/10.1145/1015579.810979
CP - 2-3
M3 - 10.1145/1015579.810979
ER -
TY - JOUR
T1 - Hardware options, evaluation metrics, and a design sequence for interactive information systems
JF - Information & Management
Y1 - 1980
A1 - Shneiderman, Ben
KW - casual users
KW - design sequence
KW - evaluation metrics
KW - ferminal design
KW - human factor
KW - Interactive information systems
AB - Interactive information systems must satisfy a wide variety of users, serve a broad range of tasks, and be suited to diverse hardware environments. This paper concentrates on three aspects of interactive information systems design: hardware options, evaluation metrics, and a possible design sequence. Rigorous pilot studies are emphasized, and supporting experimental evidence is offered.
VL - 3
SN - 0378-7206
UR - http://www.sciencedirect.com/science/article/pii/0378720680900269
CP - 1
M3 - 10.1016/0378-7206(80)90026-9
ER -
TY - JOUR
T1 - HUMAN FACTORS EXPERIMENTS FOR REFINING INTERACTIVE SYSTEM DESIGNS
JF - Proceedings-Compcon
Y1 - 1980
A1 - Shneiderman, Ben
VL - 21
ER -
TY - JOUR
T1 - Human Factors of Software Design and Development
JF - Software Configuration Management
Y1 - 1980
A1 - Weiser,M.
A1 - Shneiderman, Ben
ER -
TY - JOUR
T1 - Human Factors Experiments in Designing Interactive Systems
JF - Computer
Y1 - 1979
A1 - Shneiderman, Ben
KW - Application software
KW - Computer languages
KW - Design engineering
KW - Home computing
KW - human factors
KW - interactive systems
KW - Process design
KW - Testing
AB - Successful industrial design gracefully unites esthetics and function at minimum cost. However, designers face special problems when they apply their skills to interactive computer systems.
VL - 12
SN - 0018-9162
CP - 12
M3 - 10.1109/MC.1979.1658571
ER -