TY - Generic T1 - High-Throughput DNA Sequencing To Profile Microbial Water Quality Of Potable Reuse Y1 - 2018 A1 - Menu B. Leddy A1 - Megan H. Plumlee A1 - Rose S. Kantor A1 - Kara L. Nelson A1 - Scott E. Miller A1 - Lauren C. Kennedy A1 - Blake W. Stamps A1 - John R. Spear A1 - Nur A. Hasan A1 - Rita R Colwell UR - https://www.wateronline.com/doc/high-throughput-dna-sequencing-to-profile-microbial-water-quality-of-potable-reuse-0001 ER - TY - JOUR T1 - Hydroclimatic sustainability assessment of changing climate on cholera in the Ganges-Brahmaputra basin JF - Advances in Water Resources Y1 - 2017 A1 - Nasr-Azadani, Fariborz A1 - Khan, Rakibul A1 - Rahimikollu, Javad A1 - Unnikrishnan, Avinash A1 - Akanda, Ali A1 - Alam, Munirul A1 - Huq, Anwar A1 - Jutla, Antarpreet A1 - Rita R Colwell AB - The association of cholera and climate has been extensively documented. However, determining the effects of changing climate on the occurrence of disease remains a challenge. Bimodal peaks of cholera in Bengal Delta are hypothesized to be linked to asymmetric flow of the Ganges and Brahmaputra rivers. Spring cholera is related to intrusion of bacteria-laden coastal seawater during low flow seasons, while autumn cholera results from cross-contamination of water resources when high flows in the rivers cause massive inundation. Coarse resolution of General Circulation Model (GCM) output (usually at 100 – 300 km)cannot be used to evaluate variability at the local scale(10–20 km),hence the goal of this study was to develop a framework that could be used to understand impacts of climate change on occurrence of cholera. Instead of a traditional approach of downscaling precipitation, streamflow of the two rivers was directly linked to GCM outputs, achieving reasonable accuracy (R2 = 0.89 for the Ganges and R2 = 0.91 for the Brahmaputra)using machine learning algorithms (Support Vector Regression-Particle Swarm Optimization). Copula methods were used to determine probabilistic risks of cholera under several discharge conditions. Key results, using model outputs from ECHAM5, GFDL, andHadCM3for A1B and A2 scenarios, suggest that the combined low flow of the two rivers may increase in the future, with high flows increasing for first half of this century, decreasing thereafter. Spring and autumn cholera, assuming societal conditions remain constant e.g., at the current rate, may decrease. However significant shifts were noted in the magnitude of river discharge suggesting that cholera dynamics of the delta may well demonstrate an uncertain predictable pattern of occurrence over the next century. VL - 108 UR - https://linkinghub.elsevier.com/retrieve/pii/S030917081630728X J1 - Advances in Water Resources M3 - 10.1016/j.advwatres.2016.11.018 ER - TY - JOUR T1 - Hybrid Vibrio cholerae El Tor Lacking SXT Identified as the Cause of a Cholera Outbreak in the Philippines JF - mBio Y1 - 2015 A1 - Klinzing, David C. A1 - Choi, Seon Young A1 - Hasan, Nur A. A1 - Matias, Ronald R. A1 - Tayag, Enrique A1 - Geronimo, Josefina A1 - Skowronski, Evan A1 - Rashed, Shah M. A1 - Kawashima, Kent A1 - Rosenzweig, C. Nicole A1 - Gibbons, Henry S. A1 - Torres, Brian C. A1 - Liles, Veni A1 - Alfon, Alicia C. A1 - Juan, Maria Luisa A1 - Natividad, Filipinas F. A1 - Cebula, Thomas A. A1 - Rita R Colwell AB - Cholera continues to be a global threat, with high rates of morbidity and mortality. In 2011, a cholera outbreak occurred in Palawan, Philippines, affecting more than 500 people, and 20 individuals died. Vibrio cholerae O1 was confirmed as the etiological agent. Source attribution is critical in cholera outbreaks for proper management of the disease, as well as to control spread. In this study, three V. cholerae O1 isolates from a Philippines cholera outbreak were sequenced and their genomes analyzed to determine phylogenetic relatedness to V. cholerae O1 isolates from recent outbreaks of cholera elsewhere. The Philippines V. cholerae O1 isolates were determined to be V. cholerae O1 hybrid El Tor belonging to the seventh-pandemic clade. They clustered tightly, forming a monophyletic clade closely related to V. cholerae O1 hybrid El Tor from Asia and Africa. The isolates possess a unique multilocus variable-number tandem repeat analysis (MLVA) genotype (12-7-9-18-25 and 12-7-10-14-21) and lack SXT. In addition, they possess a novel 15-kb genomic island (GI-119) containing a predicted type I restriction-modification system. The CTXΦ-RS1 array of the Philippines isolates was similar to that of V. cholerae O1 MG116926, a hybrid El Tor strain isolated in Bangladesh in 1991. Overall, the data indicate that the Philippines V. cholerae O1 isolates are unique, differing from recent V. cholerae O1 isolates from Asia, Africa, and Haiti. Furthermore, the results of this study support the hypothesis that the Philippines isolates of V. cholerae O1 are indigenous and exist locally in the aquatic ecosystem of the Philippines. UR - http://mbio.asm.org/lookup/doi/10.1128/mBio.00047-15 CP - 2 J1 - mBio M3 - 10.1128/mBio.00047-15 ER - TY - RPRT T1 - A Hybrid System for Error Detection in Electronic Dictionaries Y1 - 2012 A1 - Zajic, David A1 - David Doermann A1 - Bloodgood,Michael A1 - Rodrigues,Paul A1 - Ye,Peng A1 - Zotkina,Elena AB - A progress report on CASL’s research on error detection in electronic dictionaries, including a hybrid system, application and evaluation on a second dictionary and a graphical user interface. JA - Technical Reports of the Center for the Advanced Study of Language ER - TY - JOUR T1 - Hawkeye and AMOS: Visualizing and Assessing the Quality of Genome Assemblies JF - Briefings in Bioinformatics Y1 - 2011 A1 - Schatz,Michael C A1 - Phillippy,Adam M A1 - Sommer,Daniel D A1 - Delcher,Arthur L. A1 - Puiu,Daniela A1 - Narzisi,Giuseppe A1 - Salzberg,Steven L. A1 - Pop, Mihai KW - assembly forensics KW - DNA Sequencing KW - genome assembly KW - visual analytics AB - Since its launch in 2004, the open-source AMOS project has released several innovative DNA sequence analysis applications including: Hawkeye, a visual analytics tool for inspecting the structure of genome assemblies; the Assembly Forensics and FRCurve pipelines for systematically evaluating the quality of a genome assembly; and AMOScmp, the first comparative genome assembler. These applications have been used to assemble and analyze dozens of genomes ranging in complexity from simple microbial species through mammalian genomes. Recent efforts have been focused on enhancing support for new data characteristics brought on by second- and now third-generation sequencing. This review describes the major components of AMOS in light of these challenges, with an emphasis on methods for assessing assembly quality and the visual analytics capabilities of Hawkeye. These interactive graphical aspects are essential for navigating and understanding the complexities of a genome assembly, from the overall genome structure down to individual bases. Hawkeye and AMOS are available open source at http://amos.sourceforge.net. SN - 1467-5463, 1477-4054 UR - http://bib.oxfordjournals.org/content/early/2011/12/23/bib.bbr074 M3 - 10.1093/bib/bbr074 ER - TY - CONF T1 - HCI for peace: from idealism to concrete steps T2 - PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems Y1 - 2011 A1 - Hourcade,Juan Pablo A1 - Bullock-Rest,Natasha E. A1 - Friedman,Batya A1 - Nelson,Mark A1 - Shneiderman, Ben A1 - Zaphiris,Panayiotis KW - cyprus KW - peace KW - persuasive technology KW - post-conflict reconciliation KW - social media KW - value sensitive design KW - war AB - This panel will contribute diverse perspectives on the use of computer technology to promote peace and prevent armed conflict. These perspectives include: the use of social media to promote democracy and citizen participation, the role of computers in helping people communicate across division lines in zones of conflict, how persuasive technology can promote peace, and how interaction design can play a role in post-conflict reconciliation. JA - PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems T3 - CHI EA '11 PB - ACM CY - New York, NY, USA UR - http://doi.acm.org/10.1145/1979482.1979493 M3 - 10.1145/1979482.1979493 ER - TY - CONF T1 - Helping Users Shop for ISPs with Internet Nutrition Labels T2 - ACM SIGCOMM Workshop on Home Networks '11 Y1 - 2011 A1 - Sundaresan, Srikanth A1 - Feamster, Nick A1 - Teixeira, Renata A1 - Tang, Anthony A1 - Edwards, W. Keith A1 - Grinter, Rebecca E. A1 - Marshini Chetty A1 - de Donato, Walter KW - access networks KW - benchmarking KW - bismark KW - broadband networks KW - gateway measurements AB - When purchasing home broadband access from Internet service providers (ISPs), users must decide which service plans are most appropriate for their needs. Today, ISPs advertise their available service plans using only generic upload and download speeds. Unfortunately, these metrics do not always accurately reflect the varying performance that home users will experience for a wide range of applications. In this paper, we propose that each ISP service plan carry a "nutrition label" that conveys more comprehensive information about network metrics along many dimensions, including various aspects of throughput, latency, loss rate, and jitter. We first justify why these metrics should form the basis of a network nutrition label. Then, we demonstrate that current plans that are superficially similar with respect to advertised download rates may have different performance according to the label metrics. We close with a discussion of the challenges involved in presenting a nutrition label to users in a way that is both accurate and easy to understand. JA - ACM SIGCOMM Workshop on Home Networks '11 T3 - HomeNets '11 PB - ACM SN - 978-1-4503-0798-7 UR - http://doi.acm.org/10.1145/2018567.2018571 ER - TY - CHAP T1 - Heterogeneous Design in Functional DIF T2 - Transactions on High-Performance Embedded Architectures and Compilers IV Y1 - 2011 A1 - Plishker,William A1 - Sane, Nimish A1 - Kiemb, Mary A1 - Bhattacharyya, Shuvra S. ED - Stenström, Per KW - Arithmetic and Logic Structures KW - Computer Communication Networks KW - Dataflow KW - heterogeneous KW - Input/Output and Data Communications KW - Logic Design KW - Processor Architectures KW - Programming Languages, Compilers, Interpreters KW - Signal processing AB - Dataflow formalisms have provided designers of digital signal processing (DSP) systems with analysis and optimizations for many years. As system complexity increases, designers are relying on more types of dataflow models to describe applications while retaining these implementation benefits. The semantic range of DSP-oriented dataflow models has expanded to cover heterogeneous models and dynamic applications, but efficient design, simulation, and scheduling of such applications has not. To facilitate implementing heterogeneous applications, we utilize a new dataflow model of computation and show how actors designed in other dataflow models are directly supported by this framework, allowing system designers to immediately compose and simulate actors from different models. Using examples, we show how this approach can be applied to quickly describe and functionally simulate a heterogeneous dataflow-based application such that a designer may analyze and tune trade-offs among different models and schedules for simulation time, memory consumption, and schedule size. JA - Transactions on High-Performance Embedded Architectures and Compilers IV T3 - Lecture Notes in Computer Science PB - Springer Berlin Heidelberg SN - 978-3-642-24567-1, 978-3-642-24568-8 UR - http://link.springer.com/chapter/10.1007/978-3-642-24568-8_20 ER - TY - JOUR T1 - A Hierarchical Algorithm for Fast Debye Summation with Applications to Small Angle Scattering JF - Technical Reports from UMIACS Y1 - 2011 A1 - Gumerov, Nail A. A1 - Berlin,Konstantin A1 - Fushman, David A1 - Duraiswami, Ramani KW - Technical Report AB - Debye summation, which involves the summation of sinc functions of distances between all pair of atoms in three dimensional space, arises in computations performed in crystallography, small/wide angle X-ray scattering (SAXS/WAXS) and small angle neutron scattering (SANS). Direct evaluation of Debye summation has quadratic complexity, which results in computational bottleneck when determining crystal properties, or running structure refinement protocols that involve SAXS or SANS, even for moderately sized molecules. We present a fast approximation algorithm that efficiently computes the summation to any prescribed accuracy epsilon in linear time. The algorithm is similar to the fast multipole method (FMM), and is based on a hierarchical spatial decomposition of the molecule coupled with local harmonic expansions and translation of these expansions. An even more efficient implementation is possible when the scattering profile is all that is required, as in small angle scattering reconstruction (SAS) of macromolecules. We examine the relationship of the proposed algorithm to existing approximate methods for profile computations, and provide detailed description of the algorithm, including error bounds and algorithms for stable computation of the translation operators. Our theoretical and computational results show orders of magnitude improvement in computation complexity over existing methods, while maintaining prescribed accuracy. UR - http://drum.lib.umd.edu/handle/1903/11857 ER - TY - JOUR T1 - Higher-Order Symbolic Execution via Contracts JF - arXiv:1103.1362 [cs] Y1 - 2011 A1 - Tobin-Hochstadt, Sam A1 - David Van Horn KW - Computer Science - Programming Languages AB - We present a new approach to automated reasoning about higher-order programs by extending symbolic execution to use behavioral contracts as symbolic values, enabling symbolic approximation of higher-order behavior. Our approach is based on the idea of an abstract reduction semantics that gives an operational semantics to programs with both concrete and symbolic components. Symbolic components are approximated by their contract and our semantics gives an operational interpretation of contracts-as-values. The result is a executable semantics that soundly predicts program behavior, including contract failures, for all possible instantiations of symbolic components. We show that our approach scales to an expressive language of contracts including arbitrary programs embedded as predicates, dependent function contracts, and recursive contracts. Supporting this feature-rich language of specifications leads to powerful symbolic reasoning using existing program assertions. We then apply our approach to produce a verifier for contract correctness of components, including a sound and computable approximation to our semantics that facilitates fully automated contract verification. Our implementation is capable of verifying contracts expressed in existing programs, and of justifying valuable contract-elimination optimizations. UR - http://arxiv.org/abs/1103.1362 ER - TY - JOUR T1 - Homage to Michael Gelfond on His 65 th Birthday JF - Logic programming, knowledge representation, and nonmonotonic reasoning Y1 - 2011 A1 - Minker, Jack AB - Michael Gelfond is one of the world leading scientists in the field of logic programming and nonmonotonic reasoning. This essay covers several aspects of Michael’s personal life, starting from his birth in the USSR, through his experiences in the USSR up to the time he emigrated to the United States (U.S.). This is followed by his first experiences in the U.S.: how he became involved in logic programming and nonmonotonic reasoning and some of his major scientific achievements. Michael is a warm, generous person, and I discuss his impact on some colleagues and students. In the concluding section, I observe that starting his career with impediments in the FSU, he overcame them to become one of the top computer scientists in logic programming and nonmonotonic reasoning. M3 - 10.1007/978-3-642-20832-4_1 ER - TY - JOUR T1 - How Many Tiers? Pricing in the Internet Transit Market JF - SIGCOMM-Computer Communication Review Y1 - 2011 A1 - Valancius,V. A1 - Lumezanu,C. A1 - Feamster, Nick A1 - Johari,R. A1 - Vazirani,V. V AB - ISPs are increasingly selling “tiered” contracts, which offer Inter-net connectivity to wholesale customers in bundles, at rates based on the cost of the links that the traffic in the bundle is traversing. Although providers have already begun to implement and deploy tiered pricing contracts, little is known about how to structure them. Although contracts that sell connectivity on finer granularities im- prove market efficiency, they are also more costly for ISPs to im- plement and more difficult for customers to understand. Our goal is to analyze whether current tiered pricing practices in the whole- sale transit market yield optimal profits for ISPs and whether better bundling strategies might exist. In the process, we offer two contri- butions: (1) we develop a novel way of mapping traffic and topol- ogy data to a demand and cost model; and (2) we fit this model on three large real-world networks: an European transit ISP, a content distribution network, and an academic research network, and run counterfactuals to evaluate the effects of different bundling strate- gies. Our results show that the common ISP practice of structuring tiered contracts according to the cost of carrying the traffic flows (e.g., offering a discount for traffic that is local) can be suboptimal and that dividing contracts based on both traffic demand and the cost of carrying it into only three or four tiers yields near-optimal profit for the ISP. VL - 41 CP - 4 ER - TY - CONF T1 - How secure are networked office devices? Y1 - 2011 A1 - Condon,E. A1 - Cummins,E. A1 - Afoulki,Z. A1 - Michel Cukier KW - computer network security KW - data privacy KW - networked office device security KW - privacy risk assessment KW - Risk management KW - security risk assessment KW - STRIDE threat model KW - university network AB - Many office devices have a history of being networked (such as printers) and others without the same past are increasingly becoming networked (such as photocopiers). The modern networked versions of previously non-networked devices have much in common with traditional networked servers in terms of features and functions. While an organization may have policies and procedures for securing traditional network servers, securing networked office devices providing similar services can easily be overlooked. In this paper we present an evaluation of privacy and security risks found when examining over 1,800 networked office devices connected to a large university network. We use the STRIDE threat model to categorize threats and vulnerabilities and then we group the devices according to assessed risk from the perspective of the university. We found that while steps had been taken to secure some devices, many were using default or unsecured configurations. M3 - 10.1109/DSN.2011.5958259 ER - TY - BOOK T1 - Handbook of Signal Processing Systems Y1 - 2010 A1 - Bhattacharyya, Shuvra S. A1 - Deprettere, Ed F. KW - Computers / Information Theory KW - Technology & Engineering / Electrical KW - Technology & Engineering / Signals & Signal Processing AB - The Handbook is organized in four parts. The first part motivates representative applications that drive and apply state-of-the art methods for design and implementation of signal processing systems; the second part discusses architectures for implementing these applications; the third part focuses on compilers and simulation tools; and the fourth part describes models of computation and their associated design tools and methodologies. PB - Springer SN - 9781441963451 ER - TY - CONF T1 - Handwritten Arabic text line segmentation using affinity propagation T2 - Proceedings of the 9th IAPR International Workshop on Document Analysis Systems Y1 - 2010 A1 - Kumar,Jayant A1 - Abd-Almageed, Wael A1 - Kang,Le A1 - David Doermann KW - affinity propagation KW - arabic KW - arabic documents KW - breadth-first search KW - clustering KW - dijkstra's shortest path algorithm KW - handwritten documents KW - line detection KW - text line segmentation AB - In this paper, we present a novel graph-based method for extracting handwritten text lines in monochromatic Arabic document images. Our approach consists of two steps - Coarse text line estimation using primary components which define the line and assignment of diacritic components which are more difficult to associate with a given line. We first estimate local orientation at each primary component to build a sparse similarity graph. We then, use a shortest path algorithm to compute similarities between non-neighboring components. From this graph, we obtain coarse text lines using two estimates obtained from Affinity propagation and Breadth-first search. In the second step, we assign secondary components to each text line. The proposed method is very fast and robust to non-uniform skew and character size variations, normally present in handwritten text lines. We evaluate our method using a pixel-matching criteria, and report 96% accuracy on a dataset of 125 Arabic document images. We also present a proximity analysis on datasets generated by artificially decreasing the spacings between text lines to demonstrate the robustness of our approach. JA - Proceedings of the 9th IAPR International Workshop on Document Analysis Systems T3 - DAS '10 PB - ACM CY - New York, NY, USA SN - 978-1-60558-773-8 UR - http://doi.acm.org/10.1145/1815330.1815348 M3 - 10.1145/1815330.1815348 ER - TY - JOUR T1 - Higher-order graphical models for classification in social and affiliation networks JF - NIPS 2010 Workshop on Networks Across Disciplines: Theory and Applications, Whistler BC, Canada Y1 - 2010 A1 - Zheleva,E. A1 - Getoor, Lise A1 - Sarawagi,S. AB - In this work we explore the application of higher-order Markov Random Fields(MRF) to classification in social and affiliation networks. We consider both friend- ship links and group membership for inferring hidden attributes in a collective inference framework. We explore different ways of using the social groups as ei- ther node features or to construct the graphical model structure. The bottleneck in applying higher-order MRFs to a domain with many overlapping large cliques is the complexity of inference which is exponential in the size of the largest clique. To circumvent the slow inference problem, we borrow recent advancements in the computer vision community to achieve fast approximate inference results. We provide preliminary results using a dataset from facebook which suggest that our higher-order MRF models are capturing the structural dependencies in the net- works and they yield higher accuracy than linear classifiers. ER - TY - CONF T1 - Holistic sentiment analysis across languages: multilingual supervised latent Dirichlet allocation T2 - Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing Y1 - 2010 A1 - Jordan Boyd-Graber A1 - Resnik, Philip AB - In this paper, we develop multilingual supervised latent Dirichlet allocation (MlSLDA), a probabilistic generative model that allows insights gleaned from one language's data to inform how the model captures properties of other languages. MlSLDA accomplishes this by jointly modeling two aspects of text: how multilingual concepts are clustered into thematically coherent topics and how topics associated with text connect to an observed regression variable (such as ratings on a sentiment scale). Concepts are represented in a general hierarchical framework that is flexible enough to express semantic ontologies, dictionaries, clustering constraints, and, as a special, degenerate case, conventional topic models. Both the topics and the regression are discovered via posterior inference from corpora. We show MlSLDA can build topics that are consistent across languages, discover sensible bilingual lexical correspondences, and leverage multilingual corpora to better predict sentiment. JA - Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing T3 - EMNLP '10 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dl.acm.org/citation.cfm?id=1870658.1870663 ER - TY - JOUR T1 - Hopx and Hdac2 Interact to Modulate Gata4 Acetylation and Embryonic Cardiac Myocyte Proliferation JF - Developmental Cell Y1 - 2010 A1 - Trivedi,Chinmay M. A1 - Zhu,Wenting A1 - Wang,Qiaohong A1 - Jia,Cheng A1 - Kee,Hae Jin A1 - Li,Li A1 - Hannenhalli, Sridhar A1 - Epstein,Jonathan A. AB - SummaryRegulation of chromatin structure via histone modification has recently received intense attention. Here, we demonstrate that the chromatin-modifying enzyme histone deacetylase 2 (Hdac2) functions with a small homeodomain factor, Hopx, to mediate deacetylation of Gata4, which is expressed by cardiac progenitor cells and plays critical roles in the regulation of cardiogenesis. In the absence of Hopx and Hdac2 in mouse embryos, Gata4 hyperacetylation is associated with a marked increase in cardiac myocyte proliferation, upregulation of Gata4 target genes, and perinatal lethality. Hdac2 physically interacts with Gata4, and this interaction is stabilized by Hopx. The ability of Gata4 to transactivate cell cycle genes is impaired by Hopx/Hdac2-mediated deacetylation, and this effect is abrogated by loss of Hdac2-Gata4 interaction. These results suggest that Gata4 is a nonhistone target of Hdac2-mediated deacetylation and that Hdac2, Hopx, and Gata4 coordinately regulate cardiac myocyte proliferation during embryonic development. VL - 19 SN - 1534-5807 UR - http://www.sciencedirect.com/science/article/pii/S1534580710003874 CP - 3 M3 - 10.1016/j.devcel.2010.08.012 ER - TY - JOUR T1 - Hat guessing games JF - SIAM review Y1 - 2009 A1 - Butler,S. A1 - Hajiaghayi, Mohammad T. A1 - Kleinberg,R. D A1 - Leighton,T. VL - 51 CP - 2 ER - TY - JOUR T1 - HEALTH AND WELLBEING JF - The fourth paradigm: data-intensive scientific discovery Y1 - 2009 A1 - Gillam,M. A1 - Feied,C. A1 - MOODY,E. A1 - Shneiderman, Ben A1 - Smith,M. A1 - DICKASON,J. ER - TY - JOUR T1 - High-Fidelity Data Embedding for Image Annotation JF - Image Processing, IEEE Transactions on Y1 - 2009 A1 - He,Shan A1 - Kirovski,D. A1 - M. Wu KW - Automated;Product Labeling;Reproducibility of Results;Sensitivity and Specificity;Signal Processing KW - Computer-Assisted; KW - Computer-Assisted;Information Storage and Retrieval;Pattern Recognition KW - JPEG compression;JPEG cropping;arbitrary imagery;data hiding;high-fidelity data embedding;image annotation;image watermarking;medical images;photographic images;data compression;image coding;watermarking;Algorithms;Computer Graphics;Documentation;Image En AB - High fidelity is a demanding requirement for data hiding, especially for images with artistic or medical value. This correspondence proposes a high-fidelity image watermarking for annotation with robustness to moderate distortion. To achieve the high fidelity of the embedded image, we introduce a visual perception model that aims at quantifying the local tolerance to noise for arbitrary imagery. Based on this model, we embed two kinds of watermarks: a pilot watermark that indicates the existence of the watermark and an information watermark that conveys a payload of several dozen bits. The objective is to embed 32 bits of metadata into a single image in such a way that it is robust to JPEG compression and cropping. We demonstrate the effectiveness of the visual model and the application of the proposed annotation technology using a database of challenging photographic and medical images that contain a large amount of smooth regions. VL - 18 SN - 1057-7149 CP - 2 M3 - 10.1109/TIP.2008.2008733 ER - TY - BOOK T1 - HotSWUp '09: Proceedings of the 2Nd International Workshop on Hot Topics in Software Upgrades Y1 - 2009 PB - ACM CY - New York, NY, USA SN - 978-1-60558-723-3 ER - TY - CONF T1 - How children search the internet with keyword interfaces T2 - Proceedings of the 8th International Conference on Interaction Design and Children Y1 - 2009 A1 - Druin, Allison A1 - Foss,E. A1 - Hatley,L. A1 - Golub,E. A1 - Guha,M.L. A1 - Fails,J. A1 - Hutchinson,H. JA - Proceedings of the 8th International Conference on Interaction Design and Children ER - TY - CONF T1 - How would you look as you age ? T2 - Image Processing (ICIP), 2009 16th IEEE International Conference on Y1 - 2009 A1 - Ramanathan,N. A1 - Chellapa, Rama KW - age-separated KW - appearances;facial KW - database;face KW - Face KW - growth KW - image KW - model;face KW - model;facial KW - models;facial KW - recognition;image KW - SHAPE KW - TEXTURE KW - texture; KW - transformation KW - verification;facial AB - Facial appearances change with increase in age. While generic growth patterns that are characteristic of different age groups can be identified, facial growth is also observed to be influenced by individual-specific attributes such as one's gender, ethnicity, life-style etc. In this paper, we propose a facial growth model that comprises of transformation models for facial shape and texture. We collected empirical data pertaining to facial growth from a database of age-separated face images of adults and used the same in developing the aforementioned transformation models. The proposed model finds applications in predicting one's appearance across ages and in performing face verification across ages. JA - Image Processing (ICIP), 2009 16th IEEE International Conference on M3 - 10.1109/ICIP.2009.5413998 ER - TY - CONF T1 - Human detection using partial least squares analysis T2 - Computer Vision, 2009 IEEE 12th International Conference on Y1 - 2009 A1 - Schwartz,William Robson A1 - Kembhavi,Aniruddha A1 - Harwood,David A1 - Davis, Larry S. AB - Significant research has been devoted to detecting people in images and videos. In this paper we describe a human detection method that augments widely used edge-based features with texture and color information, providing us with a much richer descriptor set. This augmentation results in an extremely high-dimensional feature space (more than 170,000 dimensions). In such high-dimensional spaces, classical machine learning algorithms such as SVMs are nearly intractable with respect to training. Furthermore, the number of training samples is much smaller than the dimensionality of the feature space, by at least an order of magnitude. Finally, the extraction of features from a densely sampled grid structure leads to a high degree of multicollinearity. To circumvent these data characteristics, we employ Partial Least Squares (PLS) analysis, an efficient dimensionality reduction technique, one which preserves significant discriminative information, to project the data onto a much lower dimensional subspace (20 dimensions, reduced from the original 170,000). Our human detection system, employing PLS analysis over the enriched descriptor set, is shown to outperform state-of-the-art techniques on three varied datasets including the popular INRIA pedestrian dataset, the low-resolution gray-scale DaimlerChrysler pedestrian dataset, and the ETHZ pedestrian dataset consisting of full-length videos of crowded scenes. JA - Computer Vision, 2009 IEEE 12th International Conference on M3 - 10.1109/ICCV.2009.5459205 ER - TY - CONF T1 - HydroSense: infrastructure-mediated single-point sensing of whole-home water activity T2 - Proceedings of the 11th international conference on Ubiquitous computing, September Y1 - 2009 A1 - Jon Froehlich A1 - Larson,E. A1 - Campbell,T. A1 - Haggerty,C. A1 - Fogarty,J. A1 - Patel,S.N. JA - Proceedings of the 11th international conference on Ubiquitous computing, September ER - TY - RPRT T1 - H (div) preconditioning for a mixed finite element formulation of the stochastic diffusion problem Y1 - 2008 A1 - Elman, Howard A1 - Furnival, D. G A1 - Powell, C. E PB - Citeseer ER - TY - JOUR T1 - Handling expected polynomial-time strategies in simulation-based security proofs JF - Journal of Cryptology Y1 - 2008 A1 - Katz, Jonathan A1 - Lindell,Y. AB - The standard class of adversaries considered in cryptography is that of strict polynomial-time probabilistic machines. However, expected polynomial-time machines are often also considered. For example, there are many zero-knowledge protocols for which the only known simulation techniques run in expected (and not strict) polynomial time. In addition, it has been shown that expected polynomial-time simulation is essential for achieving constant-round black-box zero-knowledge protocols. This reliance on expected polynomial-time simulation introduces a number of conceptual and technical difficulties. In this paper, we develop techniques for dealing with expected polynomial-time adversaries in simulation-based security proofs. VL - 21 CP - 3 M3 - 10.1007/s00145-007-9004-8 ER - TY - BOOK T1 - Handwritten Document Image Processing Y1 - 2008 A1 - Yefeng Zheng A1 - David Doermann A1 - Huiping Li PB - VDMVerlang Dr. Muller ER - TY - JOUR T1 - Hardware and Software Systems for Image and Video Processing-Algorithmic and Architectural Optimizations for Computationally Efficient Particle Filtering JF - IEEE Transactions on Image Processing Y1 - 2008 A1 - Sankaranarayanan,A. C A1 - Srivastava, A. A1 - Chellapa, Rama VL - 17 CP - 5 ER - TY - JOUR T1 - Hardware monitors for dynamic page migration JF - Journal of Parallel and Distributed Computing Y1 - 2008 A1 - Tikir, Mustafa M. A1 - Hollingsworth, Jeffrey K KW - Address translation counters KW - cc-NUMA systems KW - Dynamic page migration KW - Full system simulation KW - Hardware performance monitors KW - High performance computing KW - Multiprocessor systems KW - OpenMP applications KW - Runtime optimization AB - In this paper, we first introduce a profile-driven online page migration scheme and investigate its impact on the performance of multithreaded applications. We use centralized lightweight, inexpensive plug-in hardware monitors to profile the memory access behavior of an application, and then migrate pages to memory local to the most frequently accessing processor. We also investigate the use of several other potential sources of data gathered from hardware monitors and compare their effectiveness to using data from centralized hardware monitors. In particular, we investigate the effectiveness of using cache miss profiles, Translation Lookaside Buffer (TLB) miss profiles and the content of the on-chip TLBs using the valid bit information. Moreover, we also introduce a modest hardware feature, called Address Translation Counters (ATC), and compare its effectiveness with other sources of hardware profiles.Using the Dyninst runtime instrumentation combined with hardware monitors, we were able to add page migration capabilities to a Sun Fire 6800 server without having to modify the operating system kernel, or to re-compile application programs. Our dynamic page migration scheme reduced the total number of non-local memory accesses of applications by up to 90% and improved the execution times up to 16%. We also conducted a simulation based study and demonstrated that cache miss profiles gathered from on-chip CPU monitors, which are typically available in current microprocessors, can be effectively used to guide dynamic page migrations in applications. VL - 68 SN - 0743-7315 UR - http://www.sciencedirect.com/science/article/pii/S0743731508001020 CP - 9 M3 - 16/j.jpdc.2008.05.006 ER - TY - CONF T1 - Hci for community and international development T2 - SIGCHI EA '08 Y1 - 2008 A1 - Thomas, John A1 - Dearden, Andy A1 - Dray, Susan A1 - Light, Ann A1 - Best, Michael A1 - Arkin, Nuray A1 - Maunder, Andrew A1 - Kam, Mathew A1 - Marshini Chetty A1 - Sambasivan, Nithya A1 - Buckhalter, Celeste A1 - Krishnan, Gaurishankar KW - community design KW - ict4d KW - information and communication technology KW - international development KW - participatory design KW - ucd4id KW - User centered design AB - This workshop explores the challenges in applying, extending and inventing appropriate methods and contributions of Human Computer Interaction (HCI) to International economic and community Development. We address interaction design for parts of the world that are often marginalized by the Global North as well as people in the Global North who are themselves similarly marginalized by poverty or other barriers. We hope to extend the boundaries of the field of Human Computer Interaction by spurring a discussion on how existing methods and practices can be adapted and modified, and how new practices can be developed, to deal with the unique challenges posed by these contexts. JA - SIGCHI EA '08 T3 - CHI EA '08 PB - ACM SN - 978-1-60558-012-8 UR - http://doi.acm.org/10.1145/1358628.1358954 ER - TY - JOUR T1 - Hierarchical infrastructure for internet mapping services JF - Geospatial Services and Applications for the Internet Y1 - 2008 A1 - Brabec,F. A1 - Samet, Hanan M3 - 10.1007/978-0-387-74674-6_1 ER - TY - CONF T1 - A hierarchical spatial index for triangulated surfaces T2 - Int. Conf. on Computer Graphics Theory and Applications (GRAPP) Y1 - 2008 A1 - De Floriani, Leila A1 - Facinoli,M. A1 - Magillo,P. A1 - Dimitri,D. AB - We present the PM2-Triangle quadtree (PM2T-quadtree), a new hierarchical spatial index for triangle mesheswhich has been designed for performing spatial queries on triangle-based terrain models. The PM2T-quadtree is based on a recursive space decomposition into square blocks. Here, we propose a highly compact data structure encoding a PM2T-quadtree, which decouples the spatial indexing structure from the combinatorial description of the mesh. We compare the PM2T-quadtree against other spatial indexes by considering the structure of the underlying domain subdivision, the storage costs of their data structures and the performance in geometric queries. JA - Int. Conf. on Computer Graphics Theory and Applications (GRAPP) ER - TY - RPRT T1 - High Performance Computing Algorithms for Land Cover Y1 - 2008 A1 - Dynamics Using Remote A1 - Satya Kalluri A1 - Bader,David A. A1 - John Townshend A1 - JaJa, Joseph F. A1 - Zengyan Zhang A1 - Fallah-adl,Hassan AB - Global and regional land cover studies require the ability to apply complex models on selected subsets of large amounts of multi-sensor and multi-temporal data sets that have been derived from raw instrument measurements using widely accepted pre-processing algorithms. The computational and storage requirements of most such studies far exceed what is possible on a single workstation environment. We have been pursuing a new approach that couples scalable and open distributed heterogeneous hardware with the development of high performance software for processing, indexing, and organizing remotely sensed data. Hierarchical data management tools are used to ingest raw data, create metadata, and organize the archived data so as to automatically achieve computational load balancing among the available nodes and minimize I/O overheads. We illustrate our approach with four specific examples. The first is the development of the first fast operational scheme for the atmospheric correction of Landsat TM scenes, while the second example focuses on image segmentation using a novel hierarchical connected components algorithm. Retrieval of global BRDF (Bidirectional Reflectance Distribution Function) in the red and near infrared wavelengths using four years (1983 to 1986) of Pathfinder AVHRR Land (PAL) data set is the focus of our third example. The fourth example is the development of a hierarchical data organization scheme that allows on-demand processing and retrieval of regional and global AVHRR data sets. Our results show that substantial improvements in computational times can be achieved by using the high performance computing technology. PB - CiteSeerX UR - http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.4213 ER - TY - CONF T1 - High-Dimensional Similarity Retrieval Using Dimensional Choice T2 - Similarity Search and Applications, 2008. SISAP 2008. First International Workshop on Y1 - 2008 A1 - Tahmoush,D. A1 - Samet, Hanan KW - data KW - database KW - function;high-dimensional KW - management KW - processing; KW - processing;sequential KW - reduction;database KW - reduction;distance KW - retrieval;query KW - search;data KW - search;similarity KW - similarity KW - system;dimension KW - systems;query AB - There are several pieces of information that can be utilized in order to improve the efficiency of similarity searches on high-dimensional data. The most commonly used information is the distribution of the data itself but the use of dimensional choice based on the information in the query as well as the parameters of the distribution can provide an effective improvement in the query processing speed and storage. The use of this method can produce dimension reduction by as much as a factor of n, the number of data points in the database, over sequential search. We demonstrate that the curse of dimensionality is not based on the dimension of the data itself, but primarily upon the effective dimension of the distance function. We also introduce a new distance function that utilizes fewer dimensions of the higher dimensional space to produce a maximal lower bound distance in order to approximate the full distance function. This work has demonstrated significant dimension reduction, up to 70% reduction with an improvement in accuracy or over 99% with only a 6% loss in accuracy on a prostate cancer data set. JA - Similarity Search and Applications, 2008. SISAP 2008. First International Workshop on M3 - 10.1109/SISAP.2008.20 ER - TY - RPRT T1 - Hosting virtual networks on commodity hardware Y1 - 2008 A1 - Bhatia,S. A1 - Motiwala,M. A1 - Muhlbauer,W. A1 - Valancius,V. A1 - Bavier,A. A1 - Feamster, Nick A1 - Peterson,L. A1 - Rexford,J. AB - This paper describes Trellis, a software platform for hostingmultiple virtual networks on shared commodity hardware. Trellis allows each virtual network to define its own topol- ogy, control protocols, and forwarding tables, which low- ers the barrier for deploying custom services on an isolated, reconfigurable, and programmable network, while amor- tizing costs by sharing the physical infrastructure. Trellis synthesizes two container-based virtualization technologies, VServer and NetNS, as well as a new tunneling mechanism, EGRE, into a coherent platform that enables high-speed vir- tual networks. We describe the design and implementation, of Trellis, including kernel-level performance optimizations, and evaluate its supported packet-forwarding rates against other virtualization technologies. We are in the process of upgrading the VINI facility to use Trellis. We also plan to release Trellis as part of MyVINI, a standalone software dis- tribution that allows researchers and application developers to deploy their own virtual network hosting platforms. PB - Georgia Institute of Technology VL - GT-CS-07-10 ER - TY - BOOK T1 - HotSWUp '08: Proceedings of the 1st International Workshop on Hot Topics in Software Upgrades Y1 - 2008 PB - ACM CY - New York, NY, USA SN - 978-1-60558-304-4 ER - TY - RPRT T1 - How Do Users Find Things with PubMed? Towards Automatic Utility Evaluation with User Simulations Y1 - 2008 A1 - Jimmy Lin A1 - Smucker,Mark D. KW - *BIOMEDICAL INFORMATION SYSTEMS KW - *BROWSING KW - *INFORMATION RETRIEVAL KW - *PUBMED KW - *SIMILARITY KW - *SIMULATION KW - *USER NEEDS KW - DOCUMENTS KW - FIND-SIMILAR KW - HUMAN FACTORS ENGINEERING & MAN MACHINE SYSTEM KW - INFORMATION SCIENCE KW - MAN COMPUTER INTERFACE KW - QUALITY KW - queries KW - searching KW - TEST AND EVALUATION KW - UTILITY AB - In the context of document retrieval in the biomedical domain, this paper explores the complex relationship between the quality of initial query results and the overall utility of an interactive system. We demonstrate that a content-similarity browsing tool can compensate for poor retrieval results, and that the relationship between retrieval performance and overall utility is non-linear. Arguments are advanced with user simulations, which characterize the relevance of documents that a user might encounter with different browsing strategies. With broader implications to IR, this work provides a case study of how user simulations can be exploited as a formative tool for automatic utility evaluation. Simulation-based studies provide researchers with an additional evaluation tool to complement interactive and Cranfield-style experiments. PB - Human-Computer Interaction Lab, University of Maryland, College Park UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA478703 ER - TY - RPRT T1 - How friendship links and group memberships affect the privacy of individuals in social networks Y1 - 2008 A1 - Zheleva,Elena A1 - Getoor, Lise KW - Technical Report AB - In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit a social network with a mixture of public and private user profiles to predict the private attributes of users. We map this problem to a relational classification problem and we propose a simple yet powerful model that uses group features and group memberships of users to perform multi-value classification. We compare its efficacy against several other classification approaches. Our results show that even in the case when there is an option for making profile attributes private, if links and group affiliations are known, users' privacy in social networks may be compromised. On a dataset from a well-known social-media website, we could easily recover the sensitive attributes for half of the private-profile users with a high accuracy when as much as half of the profiles are private. To the best of our knowledge, this is the first work that uses link-based and group-based classification to study privacy implications in social networks. We conclude with a discussion of our findings and the broader applicability of our proposed model. PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-2008-16 UR - http://drum.lib.umd.edu/handle/1903/8691 ER - TY - JOUR T1 - How to encrypt with a malicious random number generator JF - Fast Software Encryption Y1 - 2008 A1 - Kamara,S. A1 - Katz, Jonathan AB - Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that are generated uniformly at random and independently of anything else. This leaves open the possibility of attacks in case the random coins are poorly generated (e.g., using a faulty random number generator), or are under partial adversarial control (e.g., when encryption is done by lightweight devices that may be captured and tampered with).We introduce new notions of security modeling such attacks, propose two concrete schemes meeting our definitions, and show generic transformations for achieving security in this context. M3 - 10.1007/978-3-540-71039-4_19 ER - TY - JOUR T1 - How to succeed in graduate school: a guide for students and advisors JF - Crossroads Y1 - 2008 A1 - desJardins, Marie VL - 14 SN - 1528-4972 UR - http://doi.acm.org/10.1145/1375972.1375975 CP - 4 M3 - 10.1145/1375972.1375975 ER - TY - CONF T1 - Human detection using iterative feature selection and logistic principal component analysis T2 - Robotics and Automation, 2008. ICRA 2008. IEEE International Conference on Y1 - 2008 A1 - Abd-Almageed, Wael A1 - Davis, Larry S. KW - algorithm;logistic KW - analysis;edge KW - analysis;probability; KW - applications;principal KW - belongness KW - component KW - DETECTION KW - detection;feature KW - detection;iterative KW - detection;principal KW - extraction;filtering KW - feature KW - filtering;human KW - MAP KW - methods;object KW - PCA;object KW - probability;edge KW - selection KW - theory;iterative AB - We present a fast feature selection algorithm suitable for object detection applications where the image being tested must be scanned repeatedly to detected the object of interest at different locations and scales. The algorithm iteratively estimates the belongness probability of image pixels to foreground of the image. To prove the validity of the algorithm, we apply it to a human detection problem. The edge map is filtered using a feature selection algorithm. The filtered edge map is then projected onto an eigen space of human shapes to determine if the image contains a human. Since the edge maps are binary in nature, Logistic Principal Component Analysis is used to obtain the eigen human shape space. Experimental results illustrate the accuracy of the human detector. JA - Robotics and Automation, 2008. ICRA 2008. IEEE International Conference on M3 - 10.1109/ROBOT.2008.4543444 ER - TY - JOUR T1 - Hawkeye: an interactive visual analytics tool for genome assemblies JF - Genome Biology Y1 - 2007 A1 - Schatz,Michael C A1 - Phillippy,Adam M A1 - Shneiderman, Ben A1 - Salzberg,Steven L. AB - Genome sequencing remains an inexact science, and genome sequences can contain significant errors if they are not carefully examined. Hawkeye is our new visual analytics tool for genome assemblies, designed to aid in identifying and correcting assembly errors. Users can analyze all levels of an assembly along with summary statistics and assembly metrics, and are guided by a ranking component towards likely mis-assemblies. Hawkeye is freely available and released as part of the open source AMOS project http://amos.sourceforge.net/hawkeye. VL - 8 SN - 1465-6906 UR - http://genomebiology.com/2007/8/3/R34 CP - 3 M3 - 10.1186/gb-2007-8-3-r34 ER - TY - CONF T1 - HCI4D: hci challenges in the global south T2 - SIGCHI EA '07 Y1 - 2007 A1 - Marshini Chetty A1 - Grinter, Rebecca E. KW - global south KW - hci KW - methodologies AB - While researchers have designed user-centered systems for the Global South, fewer have discussed the unique challenges facing HCI projects. In this paper, we describe methodological and practical challenges for HCI research and practice in the Global South. JA - SIGCHI EA '07 T3 - CHI EA '07 PB - ACM SN - 978-1-59593-642-4 UR - http://doi.acm.org/10.1145/1240866.1241002 ER - TY - JOUR T1 - Heuristic Search and Information Visualization Methods for School Redistricting JF - AI Magazine Y1 - 2007 A1 - desJardins, Marie A1 - Bulka,Blazej A1 - Carr,Ryan A1 - Jordan,Eric A1 - Rheingans,Penny AB - We describe an application of AI search and information visualization techniques to the problem of school redistricting, in which students are assigned to home schools within a county or school district. This is a multicriteria optimization problem in which competing objectives, such as school capacity, busing costs, and socioeconomic distribution, must be considered. Because of the complexity of the decision-making problem, tools are needed to help end users generate, evaluate, and compare alternative school assignment plans. A key goal of our research is to aid users in finding multiple qualitatively different redistricting plans that represent different trade-offs in the decision space. We present heuristic search methods that can be used to find a set of qualitatively different plans, and give empirical results of these search methods on population data from the school district of Howard County, Maryland. We show the resulting plans using novel visualization methods that we have developed for summarizing and comparing alternative plans. VL - 28 SN - 0738-4602 UR - https://www.aaai.org/ojs/index.php/aimagazine/article/viewArticle/2055 CP - 3 M3 - 10.1609/aimag.v28i3.2055 ER - TY - CONF T1 - Hierarchical Part-Template Matching for Human Detection and Segmentation T2 - Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on Y1 - 2007 A1 - Zhe Lin A1 - Davis, Larry S. A1 - David Doermann A1 - DeMenthon,D. KW - analysis;global KW - approach;background KW - articulations;video KW - Bayesian KW - detection;human KW - detectors;hierarchical KW - detectors;partial KW - framework;Bayesian KW - human KW - likelihood KW - MAP KW - matching;human KW - matching;image KW - methods;image KW - occlusion KW - occlusions;shape KW - part-based KW - part-template KW - re-evaluation;global KW - segmentation;image KW - segmentation;local KW - sequences; KW - sequences;Bayes KW - SHAPE KW - subtraction;fine KW - template-based AB - Local part-based human detectors are capable of handling partial occlusions efficiently and modeling shape articulations flexibly, while global shape template-based human detectors are capable of detecting and segmenting human shapes simultaneously. We describe a Bayesian approach to human detection and segmentation combining local part-based and global template-based schemes. The approach relies on the key ideas of matching a part-template tree to images hierarchically to generate a reliable set of detection hypotheses and optimizing it under a Bayesian MAP framework through global likelihood re-evaluation and fine occlusion analysis. In addition to detection, our approach is able to obtain human shapes and poses simultaneously. We applied the approach to human detection and segmentation in crowded scenes with and without background subtraction. Experimental results show that our approach achieves good performance on images and video sequences with severe occlusion. JA - Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on M3 - 10.1109/ICCV.2007.4408975 ER - TY - JOUR T1 - High frequency acoustic simulations via FMM accelerated BEM JF - 19th Internal congress on acoustics Y1 - 2007 A1 - Gumerov, Nail A. A1 - Duraiswami, Ramani AB - High frequency simulations of acoustics are among the most expensive problems to simulate. Inpractice 6 to 10 points per wavelength are required. Since the wavenumber k is inversely proportional to wavelength, if a numerical method is a surface based method (such as the BEM), then problem size scales as O(k2D2), where D is the size of the domain. Dense matrices appear and typical iter- ative solution can be achieved for O(k4D4) memory and O(k4D4) per iteration cost. We employ an algorithm based on the fast multipole method (FMM) using coaxial and diagonal translation operators based on the frequency of simulation to reduce the memory requirements and per iteration cost to O(k2D2 log kD) for larger kD (kD ~250). The number of iterations needed depend upon the condition of the matrix, and preconditioning chosen. Preconditioned Krylov methods such as the flexible gen- eralized minimum residual method (FGMRES), with preconditioning based upon a lower accuracy FMM, usually ensure a convergent iteration. Example calculations are presented. VL - 159 ER - TY - JOUR T1 - High-throughput sequence alignment using Graphics Processing Units JF - BMC Bioinformatics Y1 - 2007 A1 - Schatz,Michael C A1 - Trapnell,Cole A1 - Delcher,Arthur L. A1 - Varshney, Amitabh VL - 8 SN - 1471-2105 UR - http://www.biomedcentral.com/1471-2105/8/474 CP - 1 M3 - 10.1186/1471-2105-8-474 ER - TY - JOUR T1 - HIV risk behaviors among female IDUs in developing and transitional countries JF - BMC Public Health Y1 - 2007 A1 - Charles,C. A1 - Des Jarlais Don,P. T A1 - Gerry,S. VL - 7 ER - TY - CONF T1 - Holding the Internet Accountable T2 - Proc. 6th ACM Workshop on Hot Topics in Networks (Hotnets-VI) Y1 - 2007 A1 - Andersen,David A1 - Balakrishnan,Hari A1 - Feamster, Nick A1 - Koponen,Teemu A1 - Moon,Daekyong A1 - Shenker,Scott AB - Today’s IP network layer provides little to no protection against misconfiguration or malice. Despite some progress in improving the robustness and security of the IP layer, misconfigurations and attacks still occur frequently. We show how a network layer that provides accountability, i.e., the ability to associate each action with the responsible entity, provides a firm foundation for defenses against misconfiguration and malice. We present the design of a network layer that incorporates accountability called AIP (Accountable Internet Protocol) and show how its features—notably, its use of self-certifying addresses— can improve both source accountability (the ability to trace actions to a particular end host and stop that host from misbehaving) and control-plane accountability (the ability to pinpoint and prevent attacks on routing). JA - Proc. 6th ACM Workshop on Hot Topics in Networks (Hotnets-VI) UR - http://repository.cmu.edu/compsci/66 ER - TY - CONF T1 - Hood College, Master of Business Administration, 2005 Hood College, Master of Science (Computer Science), 2001 Hood College, Bachelor of Science (Computer Science), 1998 Frederick Community College, Associate in Arts (Business Administration), 1993 T2 - Proceedings of the Workshop on Metareasoning in Agent-Based Systems Y1 - 2007 A1 - Anderson,M. L A1 - Schmill,M. A1 - Oates,T. A1 - Perlis, Don A1 - Josyula,D. A1 - Wright,D. A1 - Human,S. W.T.D.N A1 - Metacognition,L. A1 - Fults,S. A1 - Josyula,D. P JA - Proceedings of the Workshop on Metareasoning in Agent-Based Systems ER - TY - CHAP T1 - How Smart Homes Learn: The Evolution of the Networked Home and Household T2 - UbiComp 2007: Ubiquitous Computing Y1 - 2007 A1 - Marshini Chetty A1 - Sung, Ja-Young A1 - Grinter, Rebecca E. ED - Krumm, John ED - Abowd, Gregory D. ED - Seneviratne, Aruna ED - Strang, Thomas KW - Computer Communication Networks KW - computers and society KW - home networking KW - Information Systems Applications (incl.Internet) KW - infrastructure KW - smart home KW - software engineering KW - Systems and Data Security KW - User Interfaces and Human Computer Interaction AB - Despite a growing desire to create smart homes, we know little about how networked technologies interact with a house’s infrastructure. In this paper, we begin to close this gap by presenting findings from a study that examined the relationship between home networking and the house itself—and the work that results for householders as a consequence of this interaction. We discuss four themes that emerged: an ambiguity in understanding the virtual boundaries created by wireless networks, the home network control paradox, a new home network access paradox, and the relationship between increased responsibilities and the possibilities of wireless networking. JA - UbiComp 2007: Ubiquitous Computing T3 - Lecture Notes in Computer Science PB - Springer Berlin Heidelberg SN - 978-3-540-74852-6, 978-3-540-74853-3 UR - http://link.springer.com/chapter/10.1007/978-3-540-74853-3_8 ER - TY - JOUR T1 - How to lease the internet in your spare time JF - SIGCOMM Comput. Commun. Rev. Y1 - 2007 A1 - Feamster, Nick A1 - Gao,Lixin A1 - Rexford,Jennifer AB - Today's Internet Service Providers (ISPs) serve two roles: managing their network infrastructure and providing (arguably limited) services to end users. We argue that coupling these roles impedes the deployment of new protocols and architectures, and that the future Internet should support two separate entities: infrastructure providers (who manage the physical infrastructure) and service providers (who deploy network protocols and offer end-to-end services). We present a high-level design for Cabo, an architecture that enables this separation; we also describe challenges associated with realizing this architecture. VL - 37 SN - 0146-4833 UR - http://doi.acm.org/10.1145/1198255.1198265 CP - 1 M3 - 10.1145/1198255.1198265 ER - TY - JOUR T1 - Human activity understanding using visibility context JF - IEEE/RSJ IROS Workshop: From sensors to human spatial concepts (FS2HSC) Y1 - 2007 A1 - Morariu,V.I. A1 - Prasad,V. S.N A1 - Davis, Larry S. AB - Visibility in architectural layouts affects humannavigation, so a suitable representation of visibility context is useful in understanding human activity. Motivated by studies of spatial behavior, we use a set of features from visibility analysis to represent spatial context in the interpretation of human activity. An agent’s goal, belief about the world, trajectory and visible layout are considered to be random variables that evolve with time during the agent’s movement, and are modeled in a Bayesian framework. We design a search-based task in a sprite-world, and compare the results of our framework to those of human subject experiments. Our findings confirm that knowledge of spatial layout improves human interpretations of the trajectories (implying that visibility context is useful in this task). Since our framework demonstrates performance close to that of human subjects with knowledge of spatial layout, our findings confirm that our model makes adequate use of visibility context. In addition, the representation we use for visibility context allows our model to generalize well when presented with new scenes. ER - TY - CONF T1 - Human Appearance Change Detection T2 - Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on Y1 - 2007 A1 - Ghanem,N.M. A1 - Davis, Larry S. KW - (artificial KW - appearance KW - approach;occupancy KW - change KW - changes KW - classification;support KW - classifier;vector KW - detection;image KW - detection;machine KW - difference KW - Frequency KW - intelligence);pattern KW - intersection KW - learning KW - machine KW - machines;vector KW - map;histogram KW - map;human KW - map;support KW - package KW - quantisation;video KW - quantization;video KW - recognition;boosting KW - recognition;image KW - sequence;left KW - sequences;image KW - sequences;learning KW - surveillance; KW - technique;codeword KW - vector AB - We present a machine learning approach to detect changes in human appearance between instances of the same person that may be taken with different cameras, but over short periods of time. For each video sequence of the person, we approximately align each frame in the sequence and then generate a set of features that captures the differences between the two sequences. The features are the occupancy difference map, the codeword frequency difference map (based on a vector quantization of the set of colors and frequencies) at each aligned pixel and the histogram intersection map. A boosting technique is then applied to learn the most discriminative set of features, and these features are then used to train a support vector machine classifier to recognize significant appearance changes. We apply our approach to the problem of left package detection. We train the classifiers on a laboratory database of videos in which people are seen with and without common articles that people carry - backpacks and suitcases. We test the approach on some real airport video sequences. Moving to the real world videos requires addressing additional problems, including the view selection problem and the frame selection problem. JA - Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on M3 - 10.1109/ICIAP.2007.4362833 ER - TY - JOUR T1 - Human appearance modeling for matching across video sequences JF - Machine Vision and Applications Y1 - 2007 A1 - Yu,Y. A1 - Harwood,D. A1 - Yoon,K. A1 - Davis, Larry S. AB - We present an appearance model for establishing correspondence between tracks of people which may be taken at different places, at different times or across different cameras. The appearance model is constructed by kernel density estimation. To incorporate structural information and to achieve invariance to motion and pose, besides color features, an additional feature of path-length is used. To achieve illumination invariance, two types of illumination insensitive color features are discussed: brightness color feature and RGB rank feature. The similarity between a test image and an appearance model is measured by the information gain or Kullback–Leibler distance. To thoroughly represent the information contained in a video sequence with as little data as possible, a key frame selection and matching scheme is proposed. Experimental results demonstrate the important role of the path-length feature in the appearance model and the effectiveness of the proposed appearance model and matching method. VL - 18 CP - 3 ER - TY - CONF T1 - Human Identification using Gait and Face T2 - Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on Y1 - 2007 A1 - Chellapa, Rama A1 - Roy-Chowdhury, A.K. A1 - Kale, A. KW - algorithm;visual-hull KW - analysis;image KW - approach;cameras;face KW - approximation;probabilistic KW - database;camera;face KW - databases; KW - fusion;face KW - fusion;human KW - fusion;probability;video KW - Gait KW - identification;planar KW - NIST KW - processing;visual KW - recognition KW - recognition;gait KW - recognition;view-invariant KW - signal AB - In general the visual-hull approach for performing integrated face and gait recognition requires at least two cameras. In this paper we present experimental results for fusion of face and gait for the single camera case. We considered the NIST database which contains outdoor face and gait data for 30 subjects. In the NIST database, subjects walk along an inverted Sigma pattern. In (A. Kale, et al., 2003), we presented a view-invariant gait recognition algorithm for the single camera case along with some experimental evaluations. In this chapter we present the results of our view-invariant gait recognition algorithm in (A. Kale, et al., 2003) on the NIST database. The algorithm is based on the planar approximation of the person which is valid when the person walks far away from the camera. In (S. Zhou et al., 2003), an algorithm for probabilistic recognition of human faces from video was proposed and the results were demonstrated on the NIST database. Details of these methods can be found in the respective papers. We give an outline of the fusion strategy here. JA - Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on M3 - 10.1109/CVPR.2007.383523 ER - TY - JOUR T1 - Human Responsibility for Autonomous Agents JF - IEEE Intelligent Systems Y1 - 2007 A1 - Shneiderman, Ben KW - Automatic control KW - Autonomous agents KW - autonomous systems KW - Bandwidth KW - Computer bugs KW - Computer errors KW - Control systems KW - data privacy KW - Human-computer interaction KW - HUMANS KW - Robots KW - Safety KW - Software design AB - Automated or autonomous systems can sometimes fail harmlessly, but they can also destroy data, compromise privacy, and consume resources, such as bandwidth or server capacity. What's more troubling is that automated systems embedded in vital systems can cause financial losses, destruction of property, and loss of life. Controlling these dangers will increase trust while enabling broader use of these systems with higher degrees of safety. Obvious threats stem from design errors and software bugs, but we can't overlook mistaken assumptions by designers, unanticipated actions by humans, and interference from other computerized systems. This article is part of a special issue on Interacting with Autonomy. VL - 22 SN - 1541-1672 CP - 2 M3 - 10.1109/MIS.2007.32 ER - TY - CHAP T1 - Human Values for Shaping the Made World T2 - Human-Computer Interaction – INTERACT 2007Human-Computer Interaction – INTERACT 2007 Y1 - 2007 A1 - Shneiderman, Ben ED - Baranauskas,Cécilia ED - Palanque,Philippe ED - Abascal,Julio ED - Barbosa,Simone AB - Interface design principles have been effective in shaping new desktop applications, web-based resources, and mobile devices. Usability and sociability promote successful online communities and social network services. The contributions of human-computer interaction researchers have been effective in raising the quality of design of many products and services. As our influence grows, we can play an even more profound role in guaranteeing that enduring human values are embedded in the next generation of technology. This talk identifies which goals are realistic, such as universality, responsibility, trust, empathy, and privacy, and how we might ensure that they become part of future services and systems. JA - Human-Computer Interaction – INTERACT 2007Human-Computer Interaction – INTERACT 2007 T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 4662 SN - 978-3-540-74794-9 UR - http://dx.doi.org/10.1007/978-3-540-74796-3_1 ER - TY - JOUR T1 - Hybrid Detectors for Subpixel Targets JF - Pattern Analysis and Machine Intelligence, IEEE Transactions on Y1 - 2007 A1 - Broadwater, J. A1 - Chellapa, Rama KW - ACE subpixel algorithm;AMSD subpixel algorithm;hybrid detectors;hyperspectral imagery analysis;physics;statistics;subpixel target detection;subspace detection;object detection;spectral analysis;statistical analysis;target tracking;Algorithms;Artificial In KW - Automated;Reproducibility of Results;Sensitivity and Specificity;Signal Processing KW - Computer-Assisted; KW - Computer-Assisted;Models KW - Computer-Assisted;Pattern Recognition KW - Statistical;Image Enhancement;Image Interpretation KW - Statistical;Numerical Analysis AB - Subpixel detection is a challenging problem in hyperspectral imagery analysis. Since the target size is smaller than the size of a pixel, detection algorithms must rely solely on spectral information. A number of different algorithms have been developed over the years to accomplish this task, but most detectors have taken either a purely statistical or a physics-based approach to the problem. We present two new hybrid detectors that take advantage of these approaches by modeling the background using both physics and statistics. Results demonstrate improved performance over the well-known AMSD and ACE subpixel algorithms in experiments that include multiple targets, images, and area types - especially when dealing with weak targets in complex backgrounds. VL - 29 SN - 0162-8828 CP - 11 M3 - 10.1109/TPAMI.2007.1104 ER - TY - JOUR T1 - Hyperstereo algorithms for the perception of terrain drop-offs JF - Proceedings of SPIE Y1 - 2007 A1 - Mohananchettiar,Arunkumar A1 - Cevher,Volkan A1 - CuQlock-Knopp,Grayson A1 - Chellapa, Rama A1 - Merritt,John AB - The timely detection of terrain drop-offs is critical for safe and efficient off-road mobility, whether with human drivers or with terrain navigation systems that use autonomous machine-vision. In this paper, we propose a joint tracking and detection machine-vision approach for accurate and efficient terrain drop-off detection and localization. We formulate the problem using a hyperstereo camera system and build an elevation map using the range map obtained from a stereo algorithm. A terrain drop-off is then detected with the use of optimal drop-off detection filters applied to the range map. For more robust results, a method based on multi-frame fusion of terrain drop-off evidence is proposed. Also presented is a fast, direct method that does not employ stereo disparity mapping. We compared our algorithm's detection of terrain drop-offs with time-code data from human observers viewing the same video clips in stereoscopic 3D. The algorithm detected terrain drop-offs an average of 9 seconds sooner, or 12m farther, than the human observers. This suggests that passive image-based hyperstereo machine-vision may be useful as an early warning system for off-road mobility. VL - 6557 SN - 0277786X UR - http://spiedigitallibrary.org/proceedings/resource/2/psisdg/6557/1/65570L_1?isAuthorized=no CP - 1 M3 - doi:10.1117/12.721066 ER - TY - CONF T1 - Headphone-Based Reproduction of 3D Auditory Scenes Captured by Spherical/Hemispherical Microphone Arrays T2 - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on Y1 - 2006 A1 - Zhiyun Li A1 - Duraiswami, Ramani KW - 3D KW - analysis;headphones;microphone KW - arrays;orthogonal KW - arrays;spatial KW - auditory KW - beam-space;spatial KW - filter;spherical KW - filters; KW - function;headphone-based KW - harmonics;array KW - microphone KW - processing;audio KW - processing;harmonic KW - related KW - reproduction;hemispherical KW - scenes;head KW - signal KW - transfer AB - We propose a method to reproduce 3D auditory scenes captured by spherical microphone arrays over headphones. This algorithm employs expansions of the captured sound and the head related transfer function over the sphere and uses the orthonormality of the spherical harmonics. Using a spherical microphone array, we first record the 3D auditory scene, then the recordings are spatially filtered and reproduced through headphones in the orthogonal beam-space of the head related transfer functions (HRTFs). We use the KEMAR HRTF measurements to verify our algorithm JA - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on VL - 5 M3 - 10.1109/ICASSP.2006.1661281 ER - TY - JOUR T1 - Head-related transfer functions via the fast multipole accelerated boundary element method JF - The Journal of the Acoustical Society of America Y1 - 2006 A1 - Gumerov, Nail A. A1 - Duraiswami, Ramani A1 - Zotkin,Dmitry N AB - Computation of head‐related transfer functions (HRTF) via geometrical meshes and numerical methods has been suggested by a number of authors. An issue facing this approach is the large computational time needed for high frequencies, where the discretization must include hundreds of thousands of elements. Conventional computational methods are unable to achieve such computations without excessive time or memory. We use a newly developed fast multipole accelerated boundary element method (FMM/BEM) that scales linearly both in time and memory. The method is applied to the mesh of the widely used KEMAR manikin and its HRTF computed up to 20 kHz. The results are compared with available experimental measurements. VL - 120 UR - http://link.aip.org/link/?JAS/120/3342/6 CP - 5 ER - TY - CONF T1 - Heuristic search and information visualization methods for school redistricting T2 - Proceedings of the 18th conference on Innovative applications of artificial intelligence - Volume 2 Y1 - 2006 A1 - desJardins, Marie A1 - Bulka,Blazej A1 - Carr,Ryan A1 - Hunt,Andrew A1 - Rathod,Priyang A1 - Rheingans,Penny AB - We describe an application of AI search and information visualization techniques to the problem of school redistricting, in which students are assigned to home schools within a county or school district. This is a multicriteria optimization problem in which competing objectives must be considered, such as school capacity, busing costs, and socioeconomic distribution. Because of the complexity of the decision-making problem, tools are needed to help end users generate, evaluate, and compare alternative school assignment plans. A key goal of our research is to aid users in finding multiple qualitatively different redistricting plans that represent different tradeoffs in the decision space.We present heuristic search methods that can be used to find a set of qualitatively different plans, and give empirical results of these search methods on population data from the school district of Howard County, Maryland. We show the resulting plans using novel visualization methods that we have developed for summarizing and comparing alternative plans. JA - Proceedings of the 18th conference on Innovative applications of artificial intelligence - Volume 2 T3 - IAAI'06 PB - AAAI Press SN - 978-1-57735-281-5 UR - http://dl.acm.org/citation.cfm?id=1597122.1597136 ER - TY - JOUR T1 - Hierarchical Layouts for Photo Libraries JF - IEEE Multimedia Y1 - 2006 A1 - Kustanowitz,J. A1 - Shneiderman, Ben KW - annotated digital photo collection KW - auto-layout technique KW - bi-level hierarchies KW - Computer science KW - data visualisation KW - digital libraries KW - document image processing KW - Information Visualization KW - interactive algorithms KW - interactive displays KW - Libraries KW - Lifting equipment KW - Organization Charts KW - photo collections KW - photo layouts KW - photo library KW - Photography KW - quantum content KW - Silver KW - Springs KW - User interfaces KW - Web pages AB - We use an annotated digital photo collection to demonstrate a two-level auto-layout technique consisting of a central primary region with secondary regions surrounding it. Because the object sizes within regions can only be changed in discrete units, we refer to them as quantum content. Our real-time algorithms enable a compelling interactive display as users resize the canvas, or move and resize the primary region VL - 13 SN - 1070-986X CP - 4 M3 - 10.1109/MMUL.2006.83 ER - TY - JOUR T1 - High-confidence medical device software and systems JF - Computer Y1 - 2006 A1 - Lee,I. A1 - Pappas,G. J A1 - Cleaveland, Rance A1 - Hatcliff,J. A1 - Krogh,B. H A1 - Lee,P. A1 - Rubin,H. A1 - Sha,L. KW - Aging KW - biomedical equipment KW - Clinical software engineering KW - Costs KW - FDA device KW - Food and Drug Administration device KW - health and safety KW - health care KW - health information system KW - health safety KW - healthcare delivery KW - Healthcare technology KW - Information systems KW - medical computing KW - medical device manufacturing KW - medical device software development KW - medical device systems development KW - medical information systems KW - Medical services KW - Medical software KW - Medical tests KW - networked medical devices KW - Production systems KW - Software design KW - Software safety KW - Software systems KW - Software testing KW - US healthcare quality AB - Given the shortage of caregivers and the increase in an aging US population, the future of US healthcare quality does not look promising and definitely is unlikely to be cheaper. Advances in health information systems and healthcare technology offer a tremendous opportunity for improving the quality of care while reducing costs. The development and production of medical device software and systems is a crucial issue, both for the US economy and for ensuring safe advances in healthcare delivery. As devices become increasingly smaller in physical terms but larger in software terms, the design, testing, and eventual Food and Drug Administration (FDA) device approval is becoming much more expensive for medical device manufacturers both in terms of time and cost. Furthermore, the number of devices that have recently been recalled due to software and hardware problems is increasing at an alarming rate. As medical devices are becoming increasingly networked, ensuring even the same level of health safety seems a challenge. VL - 39 SN - 0018-9162 CP - 4 M3 - 10.1109/MC.2006.127 ER - TY - THES T1 - A holistic approach to structure from motion Y1 - 2006 A1 - Hui Ji AB - This dissertation investigates the general structure from motion problem. That is, how to compute in an unconstrained environment 3D scene structure, camera motion and moving objects from video sequences. We present a framework which uses concatenated feed-back loops to overcome the main difficulty in the structure from motion problem: the chicken-and-egg dilemma between scene segmentation and structure recovery. The idea is that we compute structure and motion in stages by gradually computing 3D scene information of increasing complexity and using processes which operate on increasingly large spatial image areas. Within this framework, we developed three modules. First, we introduce a new constraint for the estimation of shape using image features from multiple views. We analyze this constraint and show that noise leads to unavoidable mis-estimation of the shape, which also predicts the erroneous shape perception in human. This insight provides a clear argument for the need for feed-back loops. Second, a novel constraint on shape is developed which allows us to connect multiple frames in the estimation of camera motion by matching only small image patches. Third, we present a texture descriptor for matching areas of extended sizes. The advantage of this texture descriptor, which is based on fractal geometry, lies in its invariance to any smooth mapping (Bi-Lipschitz transform) including changes of viewpoint, illumination and surface distortion. Finally, we apply our framework to the problem of super-resolution imaging. We use the 3D motion estimation together with a novel wavelet-based reconstruction scheme to reconstruct a high-resolution image from a sequence of low-resolution images. PB - University of Maryland at College Park CY - College Park, MD, USA ER - TY - JOUR T1 - How Multirobot Systems Research will Accelerate our Understanding of Social Animal Behavior JF - Proceedings of the IEEE Y1 - 2006 A1 - Balch, T. A1 - Dellaert, F. A1 - Feldman, A. A1 - Guillory, A. A1 - Isbell, C.L. A1 - Zia Khan A1 - Pratt, S.C. A1 - Stein, A.N. A1 - Wilde, H. KW - Acceleration KW - Animal behavior KW - ant movement tracking KW - Artificial intelligence KW - biology computing KW - Computer vision KW - control engineering computing KW - Insects KW - Intelligent robots KW - Labeling KW - monkey movement tracking KW - multi-robot systems KW - multirobot systems KW - robotics algorithms KW - Robotics and automation KW - social animal behavior KW - social animals KW - social insect behavior KW - Speech recognition KW - tracking AB - Our understanding of social insect behavior has significantly influenced artificial intelligence (AI) and multirobot systems' research (e.g., ant algorithms and swarm robotics). In this work, however, we focus on the opposite question: "How can multirobot systems research contribute to the understanding of social animal behavior?" As we show, we are able to contribute at several levels. First, using algorithms that originated in the robotics community, we can track animals under observation to provide essential quantitative data for animal behavior research. Second, by developing and applying algorithms originating in speech recognition and computer vision, we can automatically label the behavior of animals under observation. In some cases the automatic labeling is more accurate and consistent than manual behavior identification. Our ultimate goal, however, is to automatically create, from observation, executable models of behavior. An executable model is a control program for an agent that can run in simulation (or on a robot). The representation for these executable models is drawn from research in multirobot systems programming. In this paper we present the algorithms we have developed for tracking, recognizing, and learning models of social animal behavior, details of their implementation, and quantitative experimental results using them to study social insects VL - 94 SN - 0018-9219 CP - 7 ER - TY - JOUR T1 - Human activity language: Grounding concepts with a linguistic framework JF - Semantic Multimedia Y1 - 2006 A1 - Guerra-Filho,G. A1 - Aloimonos, J. ER - TY - BOOK T1 - Human identification based on gait Y1 - 2006 A1 - Nixon,Mark S. A1 - Tan,Tieniu A1 - Chellapa, Rama KW - Biometric identification KW - Computers / Computer Graphics KW - Computers / Computer Science KW - Computers / Computer Vision & Pattern Recognition KW - Computers / General KW - Computers / Information Technology KW - Computers / Programming / Software Development KW - Computers / Software Development & Engineering / Systems Analysis & Design KW - Gait in humans KW - Medical / Physiology KW - Social Science / Anthropology / Physical AB - Biometrics now affect many people's lives, and is the focus of much academic research and commercial development. Gait is one of the most recent biometrics, with its own unique advantages. Gait recognizes people by the way they walk and run, analyzes movement, which in turn implies analyzing sequences of images. This professional book introduces developments from the laboratories of very distinguished researchers within this relatively new area of biometrics and clearly establishes human gait as a biometric. Human Identification Based on Gait provides a snapshot of all the biometric work in human identification by gait (all major centers for research are indicated in this book). To complete the picture, studies are included from medicine, psychology and other areas wherein we find not only justification for the use of gait as a biometric, but also pointers to techniques and to analysis. Human Identification Based on Gait is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science. PB - Springer Science & Business SN - 9780387244242 ER - TY - CONF T1 - The half-edge tree: a compact data structure for level-of-detail tetrahedral meshes T2 - Shape Modeling and Applications, 2005 International Conference Y1 - 2005 A1 - Danovaro,E. A1 - De Floriani, Leila A1 - Magillo,P. A1 - Puppo,E. A1 - Sobrero,D. A1 - Sokolovsky,N. KW - application; KW - compact KW - computational KW - data KW - detection; KW - edge KW - encoding; KW - generation; KW - geometry; KW - half-edge KW - iterative KW - level-of-detail KW - mesh KW - meshes; KW - methods; KW - model; KW - structure; KW - structures; KW - tetrahedral KW - tree KW - tree; AB - We propose a new data structure for the compact encoding of a level-of detail (LOD) model of a three-dimensional scalar field based on unstructured tetrahedral meshes. Such data structure, called a half-edge tree (HET), is built through the iterative application of a half-edge collapse, i.e. by contracting an edge to one of its endpoints. We also show that selective refined meshes extracted from an HET contain on average about 34% and up to 75% less tetrahedra than those extracted from an LOD model built through a general edge collapse. JA - Shape Modeling and Applications, 2005 International Conference M3 - 10.1109/SMI.2005.47 ER - TY - JOUR T1 - Handling uneven embedding capacity in binary images: a revisit JF - Proceedings of SPIE Y1 - 2005 A1 - M. Wu A1 - Fridrich,Jessica A1 - Goljan,Miroslav A1 - Gou,Hongmei AB - Hiding data in binary images can facilitate the authentication and annotation of important document images in digital domain. A representative approach is to first identify pixels whose binary color can be flipped without introducing noticeable artifacts, and then embed one bit in each non-overlapping block by adjusting the flippable pixel values to obtain the desired block parity. The distribution of these flippable pixels is highly uneven across the image, which is handled by random shuffling in the literature. In this paper, we revisit the problem of data embedding for binary images and investigate the incorporation of a most recent steganography framework known as the wet paper coding to improve the embedding capacity. The wet paper codes naturally handle the uneven embedding capacity through randomized projections. In contrast to the previous approach, where only a small portion of the flippable pixels are actually utilized in the embedding, the wet paper codes allow for a high utilization of pixels that have high flippability score for embedding, thus giving a significantly improved embedding capacity than the previous approach. The performance of the proposed technique is demonstrated on several representative images. We also analyze the perceptual impact and capacity-robustness relation of the new approach. VL - 5681 SN - 0277786X UR - http://spiedigitallibrary.org/proceedings/resource/2/psisdg/5681/1/194_1?isAuthorized=no CP - 1 M3 - doi:10.1117/12.587379 ER - TY - CONF T1 - Handwriting matching and its application to handwriting synthesis T2 - Document Analysis and Recognition, 2005. Proceedings. Eighth International Conference on Y1 - 2005 A1 - Yefeng Zheng A1 - David Doermann KW - (artificial KW - deformation KW - deformation; KW - handwriting KW - image KW - intelligence); KW - learning KW - learning; KW - matching; KW - point KW - recognition; KW - sampling; KW - SHAPE KW - synthesis; AB - Since it is extremely expensive to collect a large volume of handwriting samples, synthesized data are often used to enlarge the training set. We argue that, in order to generate good handwriting samples, a synthesis algorithm should learn the shape deformation characteristics of handwriting from real samples. In this paper, we present a point matching algorithm to learn the deformation, and apply it to handwriting synthesis. Preliminary experiments show the advantages of our approach. JA - Document Analysis and Recognition, 2005. Proceedings. Eighth International Conference on M3 - 10.1109/ICDAR.2005.122 ER - TY - RPRT T1 - Headline Generation for Written and Broadcast News Y1 - 2005 A1 - Zajic, David A1 - Dorr, Bonnie J A1 - Schwartz,Richard KW - *INFORMATION RETRIEVAL KW - *RADIO BROADCASTING KW - AUTOMATIC KW - AUTOMATIC SUMMARIZATION KW - HEDGE TRIMMER KW - INFORMATION SCIENCE KW - RADIO COMMUNICATIONS KW - STATISTICAL PROCESSES KW - TEST AND EVALUATION KW - WORDS(LANGUAGE) AB - This technical report is an overview of work done on Headline Generation for written and broadcast news. The report covers HMM Hedge, a statistical approach based on the noisy channel model, Hedge Trimmer, a parse-and-trim approach using linguistically motivated trimming rules, and Topiary, a combination of Trimmer and Unsupervised Topic Discovery. Automatic evaluation of summaries using ROUGE and BLEU is described and used to evaluate the Headline Generation systems. PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park UR - http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA454198 ER - TY - JOUR T1 - Help! I'm Lost: User Frustration in Web Navigation (2003) JF - Institute for Systems Research Technical Reports Y1 - 2005 A1 - Lazar,Jonathan A1 - Bessiere,Katie A1 - Ceaparu,Irina A1 - Robinson,John A1 - Shneiderman, Ben KW - Technical Report AB - Computers can be valuable tools, and networked resources via the Internet can be beneficial to many different populations and communities. Unfortunately, when people are unable to reach their task goals due to frustrating experiences, this can hinder the effectiveness of technology. This research summary provides information about the user frustration research that has been performed at the University of Maryland and Towson University. Causes of user frustration are discussed in this research summary, along with the surprising finding that nearly one-third to one-half of the time spent in front of the computer is wasted due to frustrating experiences. Furthermore, when interfaces are planned to be deceptive and confusing, this UR - http://drum.lib.umd.edu/handle/1903/6508 ER - TY - CONF T1 - A hierarchical task-network planner based on symbolic model checking Y1 - 2005 A1 - Kuter,U. A1 - Nau, Dana S. A1 - Pistore,M. A1 - Traverso,P. AB - Although several approaches have been developed for planning in nondeterministic domains, solving large planning problems is still quite difficult. In this work, we present a novel algorithm, called YoYo, for planning in nondeterministic domains under the assumption of full observability. This algorithm enables us to combine the power of search-control strategies as in Planning with Hierarchical Task Networks (HTNs) with tech- niques from the Planning via Symbolic Model-Checking (SMC). Our experimental evaluation confirms the po- tentialities of our approach, demonstrating that it com- bines the advantages of these paradigms. UR - https://www.aaai.org/Papers/ICAPS/2005/ICAPS05-031.pdf ER - TY - CONF T1 - The Hiero machine translation system: Extensions, evaluation, and analysis T2 - Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing Y1 - 2005 A1 - Chiang,D. A1 - Lopez,A. A1 - Madnani,N. A1 - Monz,C. A1 - Resnik, Philip A1 - Subotin,M. JA - Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing ER - TY - JOUR T1 - High Order Spatial Audio Capture and Binaural Head-Tracked Playback over Headphones with HRTF Cues JF - Proceedings 119th convention of AES Y1 - 2005 A1 - Duraiswami, Ramani A1 - Zotkin,Dmitry N A1 - Li,Z. A1 - Grassi,E. A1 - Gumerov, Nail A. A1 - Davis, Larry S. AB - A theory and a system for capturing an audio scene and then rendering it remotely are developed andpresented. The sound capture is performed with a spherical microphone array. The sound field at the location of the array is deduced from the captured sound and is represented using either spherical wave-functions or plane-wave expansions. The sound field representation is then transmitted to a remote location for immediate rendering or stored for later use. The sound renderer, coupled with the head tracker, reconstructs the acoustic field using individualized head-related transfer functions to preserve the perceptual spatial structure of the audio scene. Rigorous error bounds and Nyquist-like sampling criterion for the representation of the sound field are presented and verified. ER - TY - CONF T1 - High Order Spatial Audio Capture and Its Binaural Head-Tracked Playback Over Headphones with HRTF Cues T2 - Audio Engineering Society Convention 119 Y1 - 2005 A1 - Davis, Larry S. A1 - Duraiswami, Ramani A1 - Grassi,E. A1 - Gumerov, Nail A. A1 - Li,Z. A1 - Zotkin,Dmitry N AB - A theory and a system for capturing an audio scene and then rendering it remotely are developed and presented. The sound capture is performed with a spherical microphone array. The sound field at the location, and in a region of space in the neighborhood, of the array is deduced from the captured sound and represented using either spherical wave-functions or plane-wave expansions. The representation is then transmitted to a remote location for immediate rendering or stored for later reproduction. The sound renderer, coupled with the head tracker, reconstructs the acoustic field using individualized head-related transfer functions to preserve the perceptual spatial structure of the audio scene. Rigorous error bounds and a Nyquist-like sampling criterion for the representation of the sound field are presented and verified. JA - Audio Engineering Society Convention 119 ER - TY - CONF T1 - High Order Spatial Audio Capture and Its Binaural Head-Tracked Playback Over Headphones with HRTF Cues T2 - Audio Engineering Society Convention 119 Y1 - 2005 A1 - Zotkin,Dmitry N A1 - Davis, Larry S. A1 - Duraiswami, Ramani A1 - Grassi,Elena A1 - Gumerov, Nail A. A1 - Zhiyun,Li JA - Audio Engineering Society Convention 119 UR - http://www.aes.org/e-lib/browse.cfm?elib=13369 ER - TY - CONF T1 - High Order Spatial Audio Capture and Its Binaural Head-Tracked Playback Over Headphones with HRTF Cues T2 - Audio Engineering Society Convention 119 Y1 - 2005 A1 - Zotkin,Dmitry N JA - Audio Engineering Society Convention 119 UR - http://www.aes.org/e-lib/browse.cfm?elib=13369 ER - TY - CONF T1 - High Performance Communication between Parallel Programs T2 - Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International Y1 - 2005 A1 - Jae-Yong Lee A1 - Sussman, Alan KW - Adaptive arrays KW - Analytical models KW - Chaotic communication KW - Computational modeling KW - Computer science KW - Data analysis KW - data distribution KW - Educational institutions KW - high performance communication KW - image data analysis KW - image resolution KW - inter-program communication patterns KW - InterComm KW - Libraries KW - Message passing KW - parallel languages KW - parallel libraries KW - parallel programming KW - parallel programs KW - performance evaluation KW - Wind AB - We present algorithms for high performance communication between message-passing parallel programs, and evaluate the algorithms as implemented in InterComm. InterComm is a framework to couple parallel programs in the presence of complex data distributions within a coupled application. Multiple parallel libraries and languages may be used in the different programs of a single coupled application. The ability to couple such programs is required in many emerging application areas, such as complex simulations that model physical phenomena at multiple scales and resolutions, and image data analysis applications. We describe the new algorithms we have developed for computing inter-program communication patterns. We present experimental results showing the performance of various algorithmic tradeoffs, and also compare performance against an earlier system. JA - Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International PB - IEEE SN - 0-7695-2312-9 M3 - 10.1109/IPDPS.2005.243 ER - TY - JOUR T1 - HOPE: A Homotopy Optimization Method for Protein Structure Prediction JF - Journal of Computational Biology Y1 - 2005 A1 - Dunlavy,Daniel M. A1 - O'Leary, Dianne P. A1 - Klimov,Dmitri A1 - Thirumalai,D. AB - We use a homotopy optimization method, HOPE, to minimize the potential energy associated with a protein model. The method uses the minimum energy conformation of one protein as a template to predict the lowest energy structure of a query sequence. This objective is achieved by following a path of conformations determined by a homotopy between the potential energy functions for the two proteins. Ensembles of solutions are produced by perturbing conformations along the path, increasing the likelihood of predicting correct structures. Successful results are presented for pairs of homologous proteins, where HOPE is compared to a variant of Newton's method and to simulated annealing. VL - 12 SN - 1066-5277, 1557-8666 UR - http://www.liebertonline.com/doi/abs/10.1089/cmb.2005.12.1275 CP - 10 M3 - 10.1089/cmb.2005.12.1275 ER - TY - JOUR T1 - How do I find blue books about dogs? The errors and frustrations of young digital library users JF - Proceedings of HCII 2005 Y1 - 2005 A1 - Hutchinson,H. A1 - Druin, Allison A1 - Bederson, Benjamin B. A1 - Reuter,K. A1 - Rose,A. A1 - Weeks,A. C ER - TY - JOUR T1 - Human action-recognition using mutual invariants JF - Computer Vision and Image Understanding Y1 - 2005 A1 - Parameswaran,Vasu A1 - Chellapa, Rama KW - Human action-recognition KW - Model based invariants KW - Mutual invariants KW - View invariance AB - Static and temporally varying 3D invariants are proposed for capturing the spatio-temporal dynamics of a general human action to enable its representation in a compact, view-invariant manner. Two variants of the representation are presented and studied: (1) a restricted-3D version, whose theory and implementation are simple and efficient but which can be applied only to a restricted class of human action, and (2) a full-3D version, whose theory and implementation are more complex but which can be applied to any general human action. A detailed analysis of the two representations is presented. We show why a straightforward implementation of the key ideas does not work well in the general case, and present strategies designed to overcome inherent weaknesses in the approach. What results is an approach for human action modeling and recognition that is not only invariant to viewpoint, but is also robust enough to handle different people, different speeds of action (and hence, frame rate) and minor variabilities in a given action, while encoding sufficient distinction among actions. Results on 2D projections of human motion capture and on manually segmented real image sequences demonstrate the effectiveness of the approach. VL - 98 SN - 1077-3142 UR - http://www.sciencedirect.com/science/article/pii/S107731420400147X CP - 2 M3 - 10.1016/j.cviu.2004.09.002 ER - TY - CONF T1 - Human-computer interaction themes in digital government: web site comprehension and statistics visualization T2 - Proceedings of the 2005 national conference on Digital government research Y1 - 2005 A1 - Shneiderman, Ben AB - Digital government applications often involve web sites to provide information for citizens and visitors from essential services such as passport application or motor vehicle registration to discretionary, but highly popular applications such as recreation and parks information. Another aspect of government web sites is the delivery of statistical reports with summary tables, aggregated data resources, and extensive raw data files. This review focuses on human-computer interaction themes to improve designs of web sites and statistics visualization, ??? specifically as they relate to digital government sites. It also addresses research methods that are appropriate for digital government interfaces. JA - Proceedings of the 2005 national conference on Digital government research T3 - dg.o '05 PB - Digital Government Society of North America UR - http://dl.acm.org/citation.cfm?id=1065226.1065230 ER - TY - THES T1 - Handling estimation errors in database query processing Y1 - 2004 A1 - Deshpande, Amol AB - A query optimizer is among the core pieces of a modern database management system, responsible for choosing a query execution plan for a user-provided declarative query. Query optimizers typically employ a cost estimation procedure to compare costs of different execution plans. Errors in this estimation process are quite common and arise due to reasons such as incomplete and insufficient statistical information about the data, and highly variable runtime environments that can affect the plan costs in unpredictable manners. Two approaches have been previously proposed for handling such estimation errors: (1) building sophisticated synopsis techniques that succintly summarize the data in the database and thus provide more statistical information to the query optimizer, and (2) aggressive reoptimization schemes that attempt to change the execution plans chosen to execute queries, on-the-fly. In the first part of this dissertation, we focus on building and using sophisticated synopsis techniques in the context of a traditional query optimizer. We propose a class of synopsis techniques called DEPENDENCY-B ASED Histograms that use statistical interaction models to exploit the correlations in the data, and to estimate selectivities efficiently. We also develop an efficient algorithm to search through the class of statistical models that we employ. Using sophisticated synopsis techniques such as these in the context of a traditional query optimizer poses interesting computational challenges; a naive approach to doing this could make the query optimization process so expensive as to be ineffective. This naturally leads to an “estimation planning” problem that asks for the best strategy to compute all the estimates required by an optimizer using the synopses at its disposal. We analyze this problem, its solution space, and propose algorithms to efficiently find good estimation plans. There are many scenarios where sophisticated synopsis techniques may not be applicable; examples include wide area and web based data sources, data streams and complex data domains. In the second part of this dissertation, we explore a highly-adaptive query processing technique called eddies that treats query processing as routing of tuples through operators, and adapts to changing data and runtime characteristics by continuously changing the order in which tuples are routed. We analyze the eddies architecture and identify a fundamental flaw in the basic design of the architecture: the burden of history in routing. (Abstract shortened by UMI.) PB - University of California at Berkeley CY - Berkeley, CA, USA ER - TY - RPRT T1 - Headline evaluation experiment results Y1 - 2004 A1 - Zajic, David A1 - Dorr, Bonnie J A1 - Schwartz,R. A1 - President,S. AB - This technical report describes an experiment intending to show that different summarizationtechniques have an effect on human performance of an extrinsic task. The task is document selection in the context of information retrieval. We conclude that the task was too difficult and ambiguous for subjects to perform at the level required in order to make statistically significant claims about the relationship between summarization techniques and human performance. An alternate interpretation of the experimental results is described and plans for future experiments are discussed. PB - University of Maryland, College Park, MD. UMIACS-TR-2004-18 ER - TY - JOUR T1 - Hierarchical in-network data aggregation with quality guarantees JF - Advances in Database Technology-EDBT 2004 Y1 - 2004 A1 - Deligiannakis,A. A1 - Kotidis,Y. A1 - Roussopoulos, Nick ER - TY - CONF T1 - Hierarchical routing with soft-state replicas in TerraDir T2 - Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International Y1 - 2004 A1 - Silaghi,B. A1 - Gopalakrishnan,Vijay A1 - Bhattacharjee, Bobby A1 - Kelcher,P. KW - ad-hoc KW - adaptive KW - allocation; KW - asymmetrical KW - balancing; KW - bottlenecks; KW - consistency KW - constraints; KW - delivering; KW - demand KW - distribution; KW - guarantees; KW - hierarchical KW - latency KW - load KW - low KW - namespaces; KW - peer-to-peer KW - protocol; KW - protocols; KW - replica KW - replicas; KW - replication KW - resource KW - routing; KW - soft-state KW - systems; KW - TerraDir; KW - topological AB - Summary form only given. Recent work on peer-to-peer systems has demonstrated the ability to deliver low latencies and good load balance when demand for data is relatively uniform. We describe an adaptive replication protocol that delivers low latencies, good load balance even when demand is heavily skewed. The protocol can withstand arbitrary and instantaneous changes in demand distribution. Our approach also addresses classical concerns related to topological constraints of asymmetrical namespaces, such as hierarchical bottlenecks in the context of hierarchical namespaces. The protocol replicates routing state in an ad-hoc manner based on profiled information, is lightweight, scalable, and requires no replica consistency guarantees. JA - Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International M3 - 10.1109/IPDPS.2004.1302967 ER - TY - JOUR T1 - Hierarchical Scaffolding With Bambus JF - Genome Research Y1 - 2004 A1 - Pop, Mihai A1 - Kosack,Daniel S. A1 - Salzberg,Steven L. AB - The output of a genome assembler generally comprises a collection of contiguous DNA sequences (contigs) whose relative placement along the genome is not defined. A procedure called scaffolding is commonly used to order and orient these contigs using paired read information. This ordering of contigs is an essential step when finishing and analyzing the data from a whole-genome shotgun project. Most recent assemblers include a scaffolding module; however, users have little control over the scaffolding algorithm or the information produced. We thus developed a general-purpose scaffolder, called Bambus, which affords users significant flexibility in controlling the scaffolding parameters. Bambus was used recently to scaffold the low-coverage draft dog genome data. Most significantly, Bambus enables the use of linking data other than that inferred from mate-pair information. For example, the sequence of a completed genome can be used to guide the scaffolding of a related organism. We present several applications of Bambus: support for finishing, comparative genomics, analysis of the haplotype structure of genomes, and scaffolding of a mammalian genome at low coverage. Bambus is available as an open-source package from our Web site. VL - 14 UR - http://genome.cshlp.org/content/14/1/149.abstract CP - 1 M3 - 10.1101/gr.1536204 ER - TY - JOUR T1 - A hierarchy of cameras for 3D photography JF - Computer Vision and Image Understanding Y1 - 2004 A1 - Neumann, Jan A1 - Fermüller, Cornelia A1 - Aloimonos, J. KW - Camera design KW - Multi-view geometry KW - Polydioptric cameras KW - Spatio-temporal image analysis KW - structure from motion AB - The view-independent visualization of 3D scenes is most often based on rendering accurate 3D models or utilizes image-based rendering techniques. To compute the 3D structure of a scene from a moving vision sensor or to use image-based rendering approaches, we need to be able to estimate the motion of the sensor from the recorded image information with high accuracy, a problem that has been well-studied. In this work, we investigate the relationship between camera design and our ability to perform accurate 3D photography, by examining the influence of camera design on the estimation of the motion and structure of a scene from video data. By relating the differential structure of the time varying plenoptic function to different known and new camera designs, we can establish a hierarchy of cameras based upon the stability and complexity of the computations necessary to estimate structure and motion. At the low end of this hierarchy is the standard planar pinhole camera for which the structure from motion problem is non-linear and ill-posed. At the high end is a camera, which we call the full field of view polydioptric camera, for which the motion estimation problem can be solved independently of the depth of the scene which leads to fast and robust algorithms for 3D Photography. In between are multiple view cameras with a large field of view which we have built, as well as omni-directional sensors. VL - 96 SN - 1077-3142 UR - http://www.sciencedirect.com/science/article/pii/S1077314204000505 CP - 3 M3 - 10.1016/j.cviu.2004.03.013 ER - TY - CONF T1 - High-performance MAC for high-capacity wireless LANs T2 - 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings Y1 - 2004 A1 - Yuan Yuan A1 - Daqing Gu A1 - Arbaugh, William A. A1 - Jinyun Zhang KW - 35 Mbit/s KW - access protocols KW - Aggregates KW - Bandwidth KW - batch transmission KW - Computer science KW - Educational institutions KW - high-capacity wireless LAN KW - high-performance MAC KW - Laboratories KW - Local area networks KW - Media Access Protocol KW - opportunistic selection KW - Physical layer KW - probability KW - Throughput KW - Wireless LAN AB - The next-generation wireless technologies, e.g., 802.11n and 802.15.3a, offer a physical-layer speed at least an-order-of-magnitude higher than the current standards. However, direct application of current MACs leads to high protocol overhead and significant throughput degradation. In this paper, we propose ADCA, a high-performance MAC that works with high-capacity physical layer. ADCA exploits two ideas of adaptive batch transmission and opportunistic selection of high-rate hosts to simultaneously reduce the overhead and improve the aggregate throughput. It opportunistically favors high-rate hosts by providing higher access probability and more access time, while ensuring each low-rate host certain minimum amount of channel access time. Simulations show that the ADCA design increases the throughput by 112% and reduces the average delay by 55% compared with the legacy DCF. It delivers more than 100 Mbps MAC-layer throughput as compared with 35 Mbps offered by the legacy MAC JA - 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings PB - IEEE SN - 0-7803-8814-3 M3 - 10.1109/ICCCN.2004.1401615 ER - TY - JOUR T1 - HTN planning for Web Service composition using SHOP2 JF - Web Semantics: Science, Services and Agents on the World Wide Web Y1 - 2004 A1 - Sirin,Evren A1 - Parsia,Bijan A1 - Wu,Dan A1 - Hendler,James A1 - Nau, Dana S. KW - HTN planning KW - OWL-S KW - SHOP2 KW - Web Service composition KW - Web services AB - Automated composition of Web Services can be achieved by using AI planning techniques. Hierarchical Task Network (HTN) planning is especially well-suited for this task. In this paper, we describe how HTN planning system SHOP2 can be used with OWL-S Web Service descriptions. We provide a sound and complete algorithm to translate OWL-S service descriptions to a SHOP2 domain. We prove the correctness of the algorithm by showing the correspondence to the situation calculus semantics of OWL-S. We implemented a system that plans over sets of OWL-S descriptions using SHOP2 and then executes the resulting plans over the Web. The system is also capable of executing information-providing Web Services during the planning process. We discuss the challenges and difficulties of using planning in the information-rich and human-oriented context of Web Services. VL - 1 SN - 1570-8268 UR - http://www.sciencedirect.com/science/article/pii/S1570826804000113 CP - 4 M3 - 10.1016/j.websem.2004.06.005 ER - TY - CONF T1 - Human needs and mobile technologies: small, fast, and fun T2 - Proceedings of the 2nd international conference on Mobile systems, applications, and services Y1 - 2004 A1 - Shneiderman, Ben AB - The central thesis of "Leonardo's Laptop" (MIT Press, 2002) is that designers who are sensitive to human needs are more likely to make the breakthroughs that yield new technologies successes. Therefore, a theory of mobile devices would focus on compact devices that support human relationships, provide salient information, and enable creative expression. The foundations are not only the megahertz of connectivity, but also the usability and universality of interfaces. Demonstrations include digital photo applications, personal info, healthcare, and e-commerce. JA - Proceedings of the 2nd international conference on Mobile systems, applications, and services T3 - MobiSys '04 PB - ACM CY - New York, NY, USA SN - 1-58113-793-1 UR - http://doi.acm.org/10.1145/990064.990065 M3 - 10.1145/990064.990065 ER - TY - CONF T1 - A hybrid algorithm for subpixel detection in hyperspectral imagery T2 - Geoscience and Remote Sensing Symposium, 2004. IGARSS '04. Proceedings. 2004 IEEE International Y1 - 2004 A1 - Broadwater, J. A1 - Meth, R. A1 - Chellapa, Rama KW - alarm KW - algorithm;abundance KW - algorithm;Fully KW - algorithm;hybrid KW - algorithm;statistical KW - AMSD;Adaptive KW - analysis;structured KW - approximations;maximum KW - backgrounds;subpixel KW - constrained KW - detection;alarm KW - detection;target KW - Detector;FCLS KW - detector;hyperspectral KW - estimation; KW - estimation;emittance KW - identification;adaptive KW - imagery;reflectance KW - least KW - likelihood KW - Matched KW - matching;least KW - processing;geophysical KW - rate;generalized KW - ratio KW - signal KW - signatures;spectral KW - spectra;false KW - spectra;spectral KW - squares KW - subspace KW - systems;geophysical KW - techniques;image KW - tests;hybrid KW - unmixing AB - Numerous subpixel detection algorithms utilizing structured backgrounds have been developed over the past few years. These range from detection schemes based on spectral unmixing to generalized likelihood ratio tests. Spectral unmixing algorithms such as the Fully Constrained Least Squares (FCLS) algorithm have the advantage of physically modeling the interactions of spectral signatures based on reflectance/emittance spectroscopy. Generalized likelihood ratio tests like the Adaptive Matched Subspace Detector (AMSD) have the advantage of identifying targets that are statistically different from the background. Therefore, a hybrid detector based on both AMSD and FCLS was developed to take advantage of each detector's strengths. Results demonstrate that the hybrid detector achieved the lowest false alarm rates while also producing meaningful abundance estimates JA - Geoscience and Remote Sensing Symposium, 2004. IGARSS '04. Proceedings. 2004 IEEE International VL - 3 M3 - 10.1109/IGARSS.2004.1370633 ER - TY - JOUR T1 - HCIL Technical Report Listing (1993-2002) JF - The craft of information visualization: readings and reflections Y1 - 2003 A1 - Ceaparu,I. A1 - Druin, Allison A1 - Guimbretiere,F. A1 - Manipulation,D. A1 - Shneiderman, Ben A1 - Westerlurid,B. A1 - Keogh,E. A1 - Hochheiser,H. A1 - Shrieidemian,B. A1 - Shneidemiari,B. A1 - others VL - 27 CP - 29 ER - TY - CONF T1 - Hedge Trimmer: a parse-and-trim approach to headline generation T2 - Proceedings of the HLT-NAACL 03 on Text summarization workshop - Volume 5 Y1 - 2003 A1 - Dorr, Bonnie J A1 - Zajic, David A1 - Schwartz,Richard AB - This paper presents Hedge Trimmer, a HEaDline GEneration system that creates a headline for a newspaper story using linguistically-motivated heuristics to guide the choice of a potential headline. We present feasibility tests used to establish the validity of an approach that constructs a headline by selecting words in order from a story. In addition, we describe experimental results that demonstrate the effectiveness of our linguistically-motivated approach over a HMM-based model, using both human evaluation and automatic metrics for comparing the two approaches. JA - Proceedings of the HLT-NAACL 03 on Text summarization workshop - Volume 5 T3 - HLT-NAACL-DUC '03 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dx.doi.org/10.3115/1119467.1119468 M3 - 10.3115/1119467.1119468 ER - TY - JOUR T1 - Help! I’m lost: User frustration in web navigation JF - IT & Society Y1 - 2003 A1 - Lazar,J. A1 - Bessiere,K. A1 - Ceaparu,I. A1 - Robinson,J. A1 - Shneiderman, Ben AB - Computers can be valuable tools, and networked resources via the Internet can be beneficial to many different populations and communities. Unfortunately, when people are unable to reach their task goals due to frustrating experiences, this can hinder the effectiveness of technology. This research summary provides information about the user frustration research that has been performed at the University of Maryland and Towson University. Causes of user frustration are discussed in this research summary, along with the surprising finding that nearly one-third to one-half of the time spent in front of the computer is wasted due to frustrating experiences. Furthermore, when interfaces are planned to be deceptive and confusing, this can lead to increased frustration. Implications for designers and users are discussed. VL - 1 CP - 3 ER - TY - CONF T1 - Helping users get started with visual interfaces: multi-layered interfaces, integrated initial guidance and video demonstrations T2 - Proceedings of the 2003 annual national conference on Digital government research Y1 - 2003 A1 - Kang,Hyunmo A1 - Plaisant, Catherine A1 - Shneiderman, Ben AB - We are investigating new ways to help users learn to use public access interactive tools, in particular for the visual exploration of government statistics. Our work led to a series of interfaces using multi-layered design, a new help method called Integrated Initial Guidance, and video demonstrations. Multi-layer designs structure an interface so that a simpler interface is available for users to get started and more complex features are accessed as users move through the more advanced layers. Integrated Initial Guidance provides help within the working interface, right at the start of the application. Using the metaphor of "sticky notes" overlaid on top of the functional interface locates the main widgets, demonstrates their manipulation, and explains the resulting actions using preset activations of the interface. JA - Proceedings of the 2003 annual national conference on Digital government research T3 - dg.o '03 PB - Digital Government Society of North America UR - http://dl.acm.org/citation.cfm?id=1123196.1123257 ER - TY - CONF T1 - A hidden Markov model based framework for recognition of humans from gait sequences T2 - Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on Y1 - 2003 A1 - Sundaresan,Aravind A1 - RoyChowdhury,Amit A1 - Chellapa, Rama KW - analysis; KW - background-subtracted KW - binarized KW - discrete KW - distance KW - feature KW - Gait KW - hidden KW - human KW - image KW - image; KW - Markov KW - metrics; KW - model; KW - models; KW - postures; KW - recognition; KW - sequences; KW - vector; AB - In this paper we propose a generic framework based on hidden Markov models (HMMs) for recognition of individuals from their gait. The HMM framework is suitable, because the gait of an individual can be visualized as his adopting postures from a set, in a sequence which has an underlying structured probabilistic nature. The postures that the individual adopts can be regarded as the states of the HMM and are typical to that individual and provide a means of discrimination. The framework assumes that, during gait, the individual transitions between N discrete postures or states but it is not dependent on the particular feature vector used to represent the gait information contained in the postures. The framework, thus, provides flexibility in the selection of the feature vector. The statistical nature of the HMM lends robustness to the model. In this paper we use the binarized background-subtracted image as the feature vector and use different distance metrics, such as those based on the L1 and L2 norms of the vector difference, and the normalized inner product of the vectors, to measure the similarity between feature vectors. The results we obtain are better than the baseline recognition rates reported before. JA - Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on VL - 2 M3 - 10.1109/ICIP.2003.1246624 ER - TY - CONF T1 - Hierarchical dwarfs for the rollup cube T2 - Proceedings of the 6th ACM international workshop on Data warehousing and OLAP - DOLAP '03 Y1 - 2003 A1 - Sismanis,Yannis A1 - Deligiannakis,Antonios A1 - Kotidis,Yannis A1 - Roussopoulos, Nick JA - Proceedings of the 6th ACM international workshop on Data warehousing and OLAP - DOLAP '03 CY - New Orleans, Louisiana, USA UR - http://dl.acm.org/citation.cfm?id=956064 M3 - 10.1145/956060.956064 ER - TY - CONF T1 - A high performance multi-perspective vision studio T2 - Proceedings of the 17th annual international conference on Supercomputing Y1 - 2003 A1 - Borovikov,Eugene A1 - Sussman, Alan KW - database KW - distributed system KW - high-performance KW - IMAGE PROCESSING KW - multi-perspective KW - VISION KW - volumetric reconstruction AB - We describe a multi-perspective vision studio as a flexible high performance framework for solving complex image processing and machine vision problems on multi-view image sequences. The studio abstracts multi-view image data from image sequence acquisition facilities, stores and catalogs sequences in a high performance distributed database, allows customization of back-end processing services, and can serve custom client applications, thus helping make multi-view video sequence processing efficient and generic. To illustrate our approach, we describe two multi-perspective studio applications, and discuss performance and scalability results. JA - Proceedings of the 17th annual international conference on Supercomputing T3 - ICS '03 PB - ACM CY - New York, NY, USA SN - 1-58113-733-8 UR - http://doi.acm.org/10.1145/782814.782862 M3 - 10.1145/782814.782862 ER - TY - CONF T1 - HRTF personalization using anthropometric measurements T2 - Applications of Signal Processing to Audio and Acoustics, 2003 IEEE Workshop on. Y1 - 2003 A1 - Zotkin,Dmitry N A1 - Hwang,J. A1 - Duraiswami, Ramani A1 - Davis, Larry S. KW - acoustic KW - anthropometric KW - audio KW - audio; KW - auditory KW - Ear KW - functions; KW - Head KW - head-and-torso KW - HRTF KW - individualized KW - localization; KW - measurements; KW - model; KW - models; KW - parameters; KW - perception; KW - personalization; KW - physiological KW - processing; KW - related KW - scattering; KW - scene; KW - signal KW - sound KW - spatial KW - subjective KW - transfer KW - virtual KW - wave AB - Individualized head related transfer functions (HRTFs) are needed for accurate rendering of spatial audio, which is important in many applications. Since these are relatively tedious to acquire, they may not be acceptable for some applications. A number of studies have sought to perform simple customization of the HRTF. We propose and test a strategy for HRTF personalization, based on matching certain anthropometric ear parameters with the HRTF database, and the incorporation of a low-frequency "head-and-torso" model. We present preliminary tests aimed at evaluation of this customization. Results show that the approach improves both the accuracy of the localization and subjective perception of the virtual auditory scene. JA - Applications of Signal Processing to Audio and Acoustics, 2003 IEEE Workshop on. M3 - 10.1109/ASPAA.2003.1285855 ER - TY - CONF T1 - Human body pose estimation using silhouette shape analysis T2 - Proceedings. IEEE Conference on Advanced Video and Signal Based Surveillance, 2003. Y1 - 2003 A1 - Mittal,A. A1 - Liang Zhao A1 - Davis, Larry S. KW - 3D KW - analysis; KW - body KW - classification; KW - clutter; KW - detection; KW - estimation; KW - extraction; KW - feature KW - function; KW - human KW - image KW - likelihood KW - multiple KW - object KW - parameter KW - parameters; KW - Pixel KW - pose KW - probability; KW - segmentation; KW - segmentations; KW - SHAPE KW - silhouette KW - structure; KW - surveillance; KW - views; AB - We describe a system for human body pose estimation from multiple views that is fast and completely automatic. The algorithm works in the presence of multiple people by decoupling the problems of pose estimation of different people. The pose is estimated based on a likelihood function that integrates information from multiple views and thus obtains a globally optimal solution. Other characteristics that make our method more general than previous work include: (1) no manual initialization; (2) no specification of the dimensions of the 3D structure; (3) no reliance on some learned poses or patterns of activity; (4) insensitivity to edges and clutter in the background and within the foreground. The algorithm has applications in surveillance and promising results have been obtained. JA - Proceedings. IEEE Conference on Advanced Video and Signal Based Surveillance, 2003. M3 - 10.1109/AVSS.2003.1217930 ER - TY - PAT T1 - Human visual model for data hiding Y1 - 2003 A1 - M. Wu A1 - Yu,Hong Heather ED - Matsushita Electric Industrial Co., Ltd. AB - A method and apparatus of hiding identification data in visual media. When image or video data is received, frequency masking is performed to divide the image or video data into blocks of smooth regions and blocks of non-smooth regions and to obtain preliminary just-noticeable-difference. Edge detection is performed to divide the non-smooth region of the image or video data into texture blocks and edge blocks. Then blocks of regions that are substantially proximate to blocks of smooth regions of the image or video data are determined. The image or video data is then adjusted by applying different strength of watermark in association with the type of each block. VL - : 09/691,544 UR - http://www.google.com/patents?id=aNgOAAAAEBAJ CP - 6611608 ER - TY - JOUR T1 - Hybrid Natural Language Generation from Lexical Conceptual Structures JF - Machine Translation Y1 - 2003 A1 - Habash,Nizar A1 - Dorr, Bonnie J A1 - Traum,David AB - This paper describes Lexogen, a system for generating natural-languagesentences from Lexical Conceptual Structure, an interlingualrepresentation. The system has been developed as part of aChinese–English Machine Translation (MT) system; however, it isdesigned to be used for many other MT language pairs and naturallanguage applications. The contributions of this work include: (1)development of a large-scale Hybrid Natural Language Generation system withlanguage-independent components; (2) enhancements to an interlingualrepresentation and associated algorithm forgeneration from ambiguous input; (3) development of an efficientreusable language-independent linearization module with a grammardescription language that can be used with other systems; (4)improvements to an earlier algorithm forhierarchically mapping thematic roles to surface positions; and (5)development of a diagnostic tool for lexicon coverage and correctnessand use of the tool for verification of English, Spanish, and Chineselexicons. An evaluation of Chinese–English translation quality showscomparable performance with a commercial translation system. Thegeneration system can also be extended to other languages and this isdemonstrated and evaluated for Spanish. VL - 18 SN - 0922-6567 UR - http://dx.doi.org/10.1023/B:COAT.0000020960.27186.18 CP - 2 ER - TY - CONF T1 - Half-edge Multi-Tessellation: a compact representations for multiresolution tetrahedral meshes T2 - Proceedings 1st International Symposium on 3D Data Processing Visualization and Transmission Y1 - 2002 A1 - Danovaro,E. A1 - De Floriani, Leila AB - This paper deals with the problem of analyzing and vi-sualizing volume data sets of large size. To this aim, we define a three-dimensional multi-resolution model based on unstructured tetrahedral meshes, and built through a half- edge-collapse simplification strategy, that we call a Half- Edge Multi-Tessellation (MT). We propose a new compact data structure for a half-edge MT, and we analyze it with respect to both its space requirements and its efficiency in supporting Level-Of-Detail (LOD) queries based on selec- tive refinement. JA - Proceedings 1st International Symposium on 3D Data Processing Visualization and Transmission ER - TY - CHAP T1 - Handling Translation Divergences: Combining Statistical and Symbolic Techniques in Generation-Heavy Machine Translation T2 - Machine Translation: From Research to Real UsersMachine Translation: From Research to Real Users Y1 - 2002 A1 - Habash,Nizar A1 - Dorr, Bonnie J ED - Richardson,Stephen AB - This paper describes a novel approach to handling translation divergences in a Generation-Heavy Hybrid Machine Translation (GHMT) system. The translation divergence problem is usually reserved for Transfer and Interlingual MT because it requires a large combination of complex lexical and structural mappings. A major requirement of these approaches is the accessibility of large amounts of explicit symmetric knowledge for both source and target languages. This limitation renders Transfer and Interlingual approaches ineffective in the face of structurally-divergent language pairs with asymmetric resources. GHMT addresses the more common form of this problem, source-poor/targetrich, by fully exploiting symbolic and statistical target-language resources. This non-interlingual non-transfer approach is accomplished by using target-language lexical semantics, categorial variations and subcategorization frames to overgenerate multiple lexico-structural variations from a target-glossed syntactic dependency of the source-language sentence. The symbolic overgeneration, which accounts for different possible translation divergences, is constrained by a statistical target-language model. JA - Machine Translation: From Research to Real UsersMachine Translation: From Research to Real Users T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 2499 SN - 978-3-540-44282-0 UR - http://dx.doi.org/10.1007/3-540-45820-4_9 ER - TY - CONF T1 - Hidden loop recovery for handwriting recognition T2 - Frontiers in Handwriting Recognition, 2002. Proceedings. Eighth International Workshop on Y1 - 2002 A1 - David Doermann A1 - Intrator,N. A1 - Rivin,E. A1 - Steinherz,T. KW - analysis; KW - character KW - contour KW - cursive KW - detection; KW - distance KW - edge KW - ellipses; KW - form KW - handwritten KW - hidden KW - loop KW - measurements; KW - mutual KW - partitioning; KW - recognition; KW - recovery; KW - SHAPE KW - shape; KW - sophisticated KW - strokes; KW - symmetric KW - truncated KW - word AB - One significant challenge in the recognition of off-line handwriting is in the interpretation of loop structures. Although this information is readily available in online representation, close proximity of strokes often merges their centers making them difficult to identify. In this paper a novel approach to the recovery of hidden loops in off-line scanned document images is presented. The proposed algorithm seeks blobs that resemble truncated ellipses. We use a sophisticated form analysis method based on mutual distance measurements between the two sides of a symmetric shape. The experimental results are compared with the ground truth of the online representations of each off-line word image. More than 86% percent of the meaningful loops are handled correctly. JA - Frontiers in Handwriting Recognition, 2002. Proceedings. Eighth International Workshop on M3 - 10.1109/IWFHR.2002.1030939 ER - TY - CONF T1 - Hidden Markov models for silhouette classification T2 - Automation Congress, 2002 Proceedings of the 5th Biannual World Y1 - 2002 A1 - Abd-Almageed, Wael A1 - Smith,C. KW - Computer vision KW - Feature extraction KW - Fourier transforms KW - hidden Markov models KW - HMM KW - image classification KW - Neural networks KW - object classification KW - Object recognition KW - parameter estimation KW - pattern recognition KW - Probability distribution KW - Shape measurement KW - silhouette classification KW - Wavelet transforms AB - In this paper, a new technique for object classification from silhouettes is presented. Hidden Markov models are used as a classification mechanism. Through a set of experiments, we show the validity of our approach and show its invariance under severe rotation conditions. Also, a comparison with other techniques that use hidden Markov models for object classification from silhouettes is presented. JA - Automation Congress, 2002 Proceedings of the 5th Biannual World PB - IEEE VL - 13 SN - 1-889335-18-5 M3 - 10.1109/WAC.2002.1049575 ER - TY - CONF T1 - A hierarchical approach for obtaining structure from two-frame optical flow T2 - Motion and Video Computing, 2002. Proceedings. Workshop on Y1 - 2002 A1 - Liu,Haiying A1 - Chellapa, Rama A1 - Rosenfeld, A. KW - algorithm; KW - aliasing; KW - analysis; KW - computer-rendered KW - depth KW - depth; KW - error KW - estimation; KW - extraction; KW - Face KW - feature KW - flow; KW - gesture KW - hierarchical KW - image KW - images; KW - inverse KW - iterative KW - methods; KW - MOTION KW - nonlinear KW - optical KW - parameter KW - processing; KW - real KW - recognition; KW - sequences; KW - signal KW - structure-from-motion; KW - system; KW - systems; KW - TIME KW - two-frame KW - variation; KW - video AB - A hierarchical iterative algorithm is proposed for extracting structure from two-frame optical flow. The algorithm exploits two facts: one is that in many applications, such as face and gesture recognition, the depth variation of the visible surface of an object in a scene is small compared to the distance between the optical center and the object; the other is that the time aliasing problem is alleviated at the coarse level for any two-frame optical flow estimate so that the estimate tends to be more accurate. A hierarchical representation for the relationship between the optical flow, depth, and the motion parameters is derived, and the resulting non-linear system is iteratively solved through two linear subsystems. At the coarsest level, the surface of the object tends to be flat, so that the inverse depth tends to be a constant, which is used as the initial depth map. Inverse depth and motion parameters are estimated by the two linear subsystems at each level and the results are propagated to finer levels. Error analysis and experiments using both computer-rendered images and real images demonstrate the correctness and effectiveness of our algorithm. JA - Motion and Video Computing, 2002. Proceedings. Workshop on M3 - 10.1109/MOTION.2002.1182239 ER - TY - JOUR T1 - High-level synthesis of DSP applications using adaptive negative cycle detection JF - EURASIP J. Appl. Signal Process. Y1 - 2002 A1 - Chandrachoodan,Nitin A1 - Bhattacharyya, Shuvra S. A1 - Liu,K. J.R KW - adaptive performance estimation KW - dynamic graphs KW - maximum cycle mean KW - negative cycle detection AB - The problem of detecting negative weight cycles in a graph is examined in the context of the dynamic graph structures that arise in the process of high level synthesis (HLS). The concept of adaptive negative cycle detection is introduced, in which a graph changes over time and negative cycle detection needs to be done periodically, but not necessarily after every individual change. We present an algorithm for this problem, based on a novel extension of the well-known Bellman-Ford algorithm that allows us to adapt existing cycle information to the modified graph, and show by experiments that our algorithm significantly outperforms previous incremental approaches for dynamic graphs. In terms of applications, the adaptive technique leads to a very fast implementation of Lawlers algorithm for the computation of the maximum cycle mean (MCM) of a graph, especially for a certain form of sparse graph. Such sparseness often occurs in practical circuits and systems, as demonstrated, for example, by the ISCAS 89/93 benchmarks. The application of the adaptive technique to design-space exploration (synthesis) is also demonstrated by developing automated search techniques for scheduling iterative data-flow graphs. VL - 2002 SN - 1110-8657 UR - http://dl.acm.org/citation.cfm?id=1283100.1283192 CP - 1 ER - TY - CONF T1 - A history-based test prioritization technique for regression testing in resource constrained environments T2 - Proceedings of the 24th international conference on Software engineering - ICSE '02 Y1 - 2002 A1 - Kim,Jung-Min A1 - Porter, Adam JA - Proceedings of the 24th international conference on Software engineering - ICSE '02 CY - Orlando, Florida UR - http://dl.acm.org/citation.cfm?id=581357 M3 - 10.1145/581339.581357 ER - TY - CONF T1 - How young can our design partners be T2 - Proceedings of the Participatory Design Conference Y1 - 2002 A1 - Farber,A. A1 - Druin, Allison A1 - Chipman,G. A1 - Julian,D. A1 - Somashekhar,S. JA - Proceedings of the Participatory Design Conference ER - TY - RPRT T1 - HTN Planning in Answer Set Programming Y1 - 2002 A1 - Dix,Jurgen A1 - Kuter,Ugur A1 - Nau, Dana S. KW - Technical Report AB - In this paper we introduce a formalism for solving Hierarchical Task NEtwork(HTN) Planning using Answer Set Programming (ASP). The ASP paradigm evolved out of the stable semantics for logic programs in recent years and is strongly related to nonmonotonic logics. We consider the formulation of HTM planning as described in the SHOP planning system and define a systematic translation method from SHOP's representation of the planning problems into logic programs with negation. We show that our translation is sound and complete: answer sets of the logic programs obtained by our translation correspond exactly to the solutions of the planning problems. Our approach does not rly on a particular system for computing answer sets. It can therefore serve as a means to evaluate ASP systems by using well-established benchmarks from the planning community. We tested our method on various such benchmarks and used smodels and DLV for computing answer sets. We compared our method to (1) similar approaches based on non-HTN planning and (2) SHOP, a dedicated planning system. We show that our approach outperforms non-HTN methods and that its performance is closer to that of SHOP, when we are using ASP systems which allow for nonground programs. (Also UMIACS-TR-2002-18) PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-2002-18 UR - http://drum.lib.umd.edu//handle/1903/1182 ER - TY - CONF T1 - Handling uncertainty with active logic T2 - In Proceedings, AAAI Fall Symposium on Uncertainty in Computation Y1 - 2001 A1 - Bhatia,M. A1 - Chi,P. A1 - Chong,W. A1 - Josyula,D. P A1 - Okamoto,Y. A1 - Perlis, Don A1 - Purang,K. JA - In Proceedings, AAAI Fall Symposium on Uncertainty in Computation ER - TY - JOUR T1 - Haptic and aural rendering of a virtual milling process JF - ASME 2001 Design Engineering Technical Conference and Computers and Information in Engineering Conference, Pittsburgh, PA Y1 - 2001 A1 - Chang,C. F A1 - Varshney, Amitabh A1 - Ge,Q. J ER - TY - CONF T1 - Hashing moving objects T2 - Mobile Data Management Y1 - 2001 A1 - Song,Z. A1 - Roussopoulos, Nick JA - Mobile Data Management ER - TY - JOUR T1 - Hierarchical GUI test case generation using automated planning JF - Software Engineering, IEEE Transactions on Y1 - 2001 A1 - Memon, Atif M. A1 - Pollack,M. E A1 - Soffa,M. L KW - Artificial intelligence KW - automated planning KW - automatic test case generation KW - Automatic testing KW - correctness testing KW - goal state KW - Graphical user interfaces KW - hierarchical GUI test case generation KW - initial state KW - Microsoft WordPad KW - operators KW - plan-generation system KW - planning (artificial intelligence) KW - Planning Assisted Tester for Graphical User Interface Systems KW - program testing KW - software AB - The widespread use of GUIs for interacting with software is leading to the construction of more and more complex GUIs. With the growing complexity come challenges in testing the correctness of a GUI and its underlying software. We present a new technique to automatically generate test cases for GUIs that exploits planning, a well-developed and used technique in artificial intelligence. Given a set of operators, an initial state, and a goal state, a planner produces a sequence of the operators that will transform the initial state to the goal state. Our test case generation technique enables efficient application of planning by first creating a hierarchical model of a GUI based on its structure. The GUI model consists of hierarchical planning operators representing the possible events in the GUI. The test designer defines the preconditions and effects of the hierarchical operators, which are input into a plan-generation system. The test designer also creates scenarios that represent typical initial and goal states for a GUI user. The planner then generates plans representing sequences of GUI interactions that a user might employ to reach the goal state from the initial state. We implemented our test case generation system, called Planning Assisted Tester for Graphical User Interface Systems (PATHS) and experimentally evaluated its practicality and effectiveness. We describe a prototype implementation of PATHS and report on the results of controlled experiments to generate test cases for Microsoft's WordPad VL - 27 SN - 0098-5589 CP - 2 M3 - 10.1109/32.908959 ER - TY - CHAP T1 - Hierarchical image-based and polygon-based rendering for large-scale visualizations T2 - Hierarchical and Geometrical Methods in Scientific VisualizationHierarchical and Geometrical Methods in Scientific Visualization Y1 - 2001 A1 - Chang,C. F A1 - Varshney, Amitabh A1 - Ge,Q. J JA - Hierarchical and Geometrical Methods in Scientific VisualizationHierarchical and Geometrical Methods in Scientific Visualization PB - Springer SN - 9783540433132 ER - TY - CONF T1 - Hybrid global/local search strategies for dynamic voltage scaling in embedded multiprocessors T2 - Hardware/Software Codesign, 2001. CODES 2001. Proceedings of the Ninth International Symposium on Y1 - 2001 A1 - Bambha,N. K A1 - Bhattacharyya, Shuvra S. A1 - Teich,J. A1 - Zitzler,E. JA - Hardware/Software Codesign, 2001. CODES 2001. Proceedings of the Ninth International Symposium on ER - TY - CONF T1 - A hypergraph-based workload partitioning strategy for parallel data aggregation T2 - Proceedings of the Eleventh SIAM Conference on Parallel Processing for Scientific Computing Y1 - 2001 A1 - Chang,C. A1 - Kurc, T. A1 - Sussman, Alan A1 - Catalyurek,U. A1 - Saltz, J. JA - Proceedings of the Eleventh SIAM Conference on Parallel Processing for Scientific Computing ER - TY - CONF T1 - Hidden Markov Models for Images T2 - ICPR Y1 - 2000 A1 - DeMenthon,D. A1 - Stuckelberg,M. Vuilleumier A1 - David Doermann AB - In this paper we investigate how speech recognition techniques can be extended to image processing. We describe a method for learning statistical models of images using a second order hidden Markov mesh model. First, an image can be segmented in a way that best matches its statistical model by an approach related to the dynamic programming used for segmenting Markov chains. Second, given an image segmentation a statistical model (3D state transition matrix and observation distributions within states) can be estimated. These two steps are repeated until convergence to provide both a segmentation and a statistical model of the image. We also describe a semi-Markov modeling technique in which the distributions of widths and heights of segmented regions are modeled explicitly by gamma distributions in a way related to explicit duration modeling in HMMs. Finally, we propose a statistical distance measure between images based on the similarity of their statistical models for classication and retrieval tasks. JA - ICPR ER - TY - JOUR T1 - High performance computing algorithms for land cover dynamics using remote sensing data JF - International Journal of Remote Sensing Y1 - 2000 A1 - Kalluri, SNV A1 - JaJa, Joseph F. A1 - Bader, D.A. A1 - Zhang,Z. A1 - Townshend,J.R.G. A1 - Fallah-Adl,H. AB - Global and regional land cover studies need to apply complex models on selected subsets of large volumes of multi-sensor and multi-temporal data sets that have been derived from raw instrument measurements using widely accepted pre-processing algorithms. The computational and storage requirements of most of these studies far exceed what is possible on a single workstation environment. We have been pursuing a new approach that couples scalable and open distributed heterogeneous hardware with the development of high performance software for processing, indexing and organizing remotely sensed data. Hierarchical data management tools are used to ingest raw data, create metadata and organize the archived data so as to automatically achieve computational load balancing among the available nodes and minimize input/output overheads. We illustrate our approach with four specific examples. The first is the development of the first fast operational scheme for the atmospheric correction of Landsat Thematic Mapper scenes, while the second example focuses on image segmentation using a novel hierarchical connected components algorithm. Retrieval of the global Bidirectional Reflectance Distribution Function in the red and near-infrared wavelengths using four years (1983 to 1986) of Pathfinder Advanced Very High Resolution Radiometer (AVHRR) Land data is the focus of our third example. The fourth example is the development of a hierarchical data organization scheme that allows on-demand processing and retrieval of regional and global AVHRR data sets. Our results show that substantial reductions in computational times can be achieved by the high performance computing technology. VL - 21 SN - 0143-1161 UR - http://www.tandfonline.com/doi/abs/10.1080/014311600210290 CP - 6-7 M3 - 10.1080/014311600210290 ER - TY - CONF T1 - A hierarchical data archiving and processing system to generate custom tailored products from AVHRR data T2 - Geoscience and Remote Sensing Symposium, 1999. IGARSS '99 Proceedings. IEEE 1999 International Y1 - 1999 A1 - Kalluri, SNV A1 - Zhang,Z. A1 - JaJa, Joseph F. A1 - Bader, D.A. A1 - Song,H. A1 - El Saleous,N. A1 - Vermote,E. A1 - Townshend,J.R.G. KW - archiving;image KW - AVHRR;GIS;PACS;custom KW - data KW - image;land KW - image;remote KW - mapping; KW - mapping;PACS;geophysical KW - measurement KW - PROCESSING KW - processing;geophysical KW - product;data KW - remote KW - scheme;infrared KW - sensing;optical KW - sensing;terrain KW - signal KW - surface;multispectral KW - system;indexing KW - tailored KW - technique;hierarchical KW - techniques;remote AB - A novel indexing scheme is described to catalogue satellite data on a pixel basis. The objective of this research is to develop an efficient methodology to archive, retrieve and process satellite data, so that data products can be generated to meet the specific needs of individual scientists. When requesting data, users can specify the spatial and temporal resolution, geographic projection, choice of atmospheric correction, and the data selection methodology. The data processing is done in two stages. Satellite data is calibrated, navigated and quality flags are appended in the initial processing. This processed data is then indexed and stored. Secondary processing such as atmospheric correction and projection are done after a user requests the data to create custom made products. By dividing the processing in to two stages saves time, since the basic processing tasks such as navigation and calibration which are common to all requests are not repeated when different users request satellite data. The indexing scheme described can be extended to allow fusion of data sets from different sensors JA - Geoscience and Remote Sensing Symposium, 1999. IGARSS '99 Proceedings. IEEE 1999 International VL - 5 M3 - 10.1109/IGARSS.1999.771514 ER - TY - JOUR T1 - Human values and the future of technology: a declaration of responsibility JF - ACM SIGCAS Computers and Society Y1 - 1999 A1 - Shneiderman, Ben AB - We can make a difference in shaping the future by ensuring that computers "serve human needs (Mumford, 1934)." By making explicit the enduring values that we hold dear we can guide computer system designers and developers for the next decade, century, and thereafter. After setting our high-level goals we can pursue the components and seek the process for fulfilling them. High-level goals might include peace, excellent health care, adequate nutrition, accessible education, communication, freedom of expression, support for creative exploration, safety, and socially constructive entertainment. Computer technology can help attain these high-level goals if we clearly state measurable objectives, obtain participation of professionals, and design effective human-computer interfaces. Design considerations include adequate attention to individual differences among users, support of social and organizational structures, design for reliability and safety, provision of access by the elderly, handicapped, or illiterate, and appropriate user controlled adaptation. With suitable theories and empirical research we can achieve ease of learning, rapid performance, low error rates, and good retention over time, while preserving high subjective satisfaction. To raise the consciousness of designers and achieve these goals, we must generate an international debate, stimulate discussions within organizations, and interact with other intellectual communities. This paper calls for a focus on the "you" and "I" in developing improved user interface (UI) research and systems, offers a Declaration of Responsibility, and proposes a Social Impact Statement for major computing projects. VL - 29 SN - 0095-2737 UR - http://doi.acm.org/10.1145/572183.572185 CP - 3 M3 - 10.1145/572183.572185 ER - TY - JOUR T1 - Human-centered computing, online communities, and virtual environments JF - IEEE Computer Graphics and Applications Y1 - 1999 A1 - Brown,J. R A1 - van Dam,A. A1 - Earnshaw,R. A1 - Encarnacao,J. A1 - Guedj,R. A1 - Preece,J. A1 - Shneiderman, Ben A1 - Vince,J. KW - Books KW - Collaboration KW - Collaborative work KW - Conferences KW - EC/NSF joint Advanced Research Workshop KW - Feeds KW - Human computer interaction KW - human-centered computing KW - Internet KW - Joining materials KW - Laboratories KW - Online communities KW - Research initiatives KW - USA Councils KW - User interfaces KW - Virtual environment KW - virtual environments KW - Virtual reality AB - This report summarizes results of the first EC/NSF joint Advanced Research Workshop, which identified key research challenges and opportunities in information technology. The group agreed that the first joint research workshop should concentrate on the themes of human-centered computing and VEs. Human-centered computing is perceived as an area of strategic importance because of the move towards greater decentralization and decomposition in the location and provision of computation. The area of VEs is one where increased collaboration should speed progress in solving some of the more intractable problems in building effective applications VL - 19 SN - 0272-1716 CP - 6 M3 - 10.1109/38.799742 ER - TY - JOUR T1 - Hybrid planning: An approach to integrating generative and case-based planning JF - Working Notes of the AAAI-98 Workshop on Case-Based Reasoning Integrations Y1 - 1998 A1 - desJardins, Marie A1 - Francis,A. A1 - Wolverton,M. ER - TY - JOUR T1 - Hydrodynamic Device Simulation with New State Variables Specially Chosen a Block Gummel Iterative Approach JF - VLSI DESIGN Y1 - 1998 A1 - Liang,W. A1 - Kerr,D. C. A1 - Goldsman,N. A1 - Mayergoyz, Issak D AB - A new numerical formulation for solving the hydrodynamic model of semiconductor devicesis presented. Themethod is based on using new variables to transform the conventional hydrodynamic equations into forms which facilitatenumerical evaluation with a block Gum- mel approach. To demonstrate the new method, we apply it to model a 0.35 wn 2-D LDD MOSFET, where robust convergence properties are observed. VL - 6 CP - 1-4 ER - TY - JOUR T1 - On hyperbolic triangularization: Stability and pivoting JF - SIAM journal on matrix analysis and applications Y1 - 1998 A1 - Stewart,M. A1 - Stewart, G.W. AB - This paper treats the problem of triangularizing a matrix by hyperbolic Householdertransformations. The stability of this method, which finds application in block updating and fast algorithms for Toeplitz-like matrices, has been analyzed only in special cases. Here we give a gen- eral analysis which shows that two distinct implementations of the individual transformations are relationally stable. The analysis also shows that pivoting is required for the entire triangularization algorithm to be stable. VL - 19 CP - 4 ER - TY - JOUR T1 - Hardness of flip-cut problems from optical mapping JF - Journal of Computational Biology Y1 - 1997 A1 - DANČÍK,V. A1 - Hannenhalli, Sridhar A1 - Muthukrishnan,S. VL - 4 CP - 2 ER - TY - CONF T1 - Hardness of flip-cut problems from optical mapping [DNA molecules application] T2 - Compression and Complexity of Sequences 1997. Proceedings Y1 - 1997 A1 - Dancik,V. A1 - Hannenhalli, Sridhar A1 - Muthukrishnan,S. KW - binary shift cut KW - Biochemistry KW - Bioinformatics KW - biological techniques KW - Biology KW - biomedical optical imaging KW - combinatorial mathematics KW - combinatorial problem KW - computational complexity KW - computational problems KW - DNA KW - DNA molecule KW - exclusive binary flip cut KW - flip-cut problem hardness KW - Genetic engineering KW - Genomics KW - MATHEMATICS KW - molecular biology KW - molecular biophysics KW - molecule orientation KW - multiple partial restriction maps KW - NP-complete problem KW - optical mapping KW - polynomial time solutions KW - Polynomials KW - sequences AB - Optical mapping is a new technology for constructing restriction maps. Associated computational problems include aligning multiple partial restriction maps into a single “consensus” restriction map, and determining the correct orientation of each molecule, which was formalized as the exclusive binary flip cut (EBFC) problem by Muthukrishnan and Parida (see Proc. of the First ACM Conference on Computational Molecular Biology (RECOMB), Santa Fe, p.209-19, 1997). Here, the authors prove that the EBFC problem, as well as a number of its variants, are NP-complete. They also identify another problem formalized as binary shift cut (BSC) problem motivated by the fact that there might be missing fragments at the beginnings and/or the ends of the molecules, and prove it to be NP-complete. Therefore, they do not have efficient, that is, polynomial time solutions unless P=NP JA - Compression and Complexity of Sequences 1997. Proceedings PB - IEEE SN - 0-8186-8132-2 M3 - 10.1109/SEQUEN.1997.666922 ER - TY - JOUR T1 - How to (plan to) meet a deadline between now and then JF - Journal of Logic and Computation Y1 - 1997 A1 - Nirkhe,M. A1 - Kraus,S. A1 - Miller,M. A1 - Perlis, Don VL - 7 CP - 1 ER - TY - CONF T1 - A high performance image database system for remotely sensed imagery T2 - Euro-Par'96 Parallel Processing Y1 - 1996 A1 - Shock,C. A1 - Chang,C. A1 - Davis, Larry S. A1 - Goward,S. A1 - Saltz, J. A1 - Sussman, Alan JA - Euro-Par'96 Parallel Processing ER - TY - JOUR T1 - Hybrid network management (communication systems) JF - 16th AIAA International Communications Satellite Systems Conference Y1 - 1996 A1 - Baras,J. S A1 - Ball,M. A1 - Karne,R. K A1 - Kelley,S. A1 - Jang,K.D. A1 - Plaisant, Catherine A1 - Roussopoulos, Nick A1 - Stathatos,K. A1 - Vakhutinsky,A. A1 - Valluri,J. AB - We describe our collaborative efforts towards the design and implementation of a next-generation integrated network management system for hybrid networks (INMS/HN). We describe the overall software architecture of the system at its current stage of development. This NMS is specifically designed to address issues relevant to complex heterogeneous networks consisting of seamlessly interoperable terrestrial and satellite networks. NMSs are a key element for interoperability in such networks. We describe the integration of configuration management and performance management. The next step in this integration is fault management. In particular, we describe the object model, issues concerning the graphical user interface, browsing tools, performance data graphical widget displays, and management information database organization issues. ER - TY - JOUR T1 - How to succeed in graduate school: a guide for students and advisors: part II of II JF - Crossroads Y1 - 1995 A1 - desJardins, Marie VL - 1 SN - 1528-4972 UR - http://doi.acm.org/10.1145/197892.197895 CP - 3 M3 - 10.1145/197892.197895 ER - TY - JOUR T1 - How to succeed in graduate school: A guide for students and advisors JF - International Amateur-Professional Photoelectric Photometry Communications Y1 - 1995 A1 - desJardins, Marie VL - 58 ER - TY - JOUR T1 - HUMAN VALUE AND THE FUTURE OF TECHNOLOGY JF - Human factors in information systems: emerging theoretical bases Y1 - 1995 A1 - Shneiderman, Ben ER - TY - BOOK T1 - Human-Computer Interaction Laboratory 1995 Video Reports Y1 - 1995 A1 - Plaisant, Catherine A1 - Morrison,S. A1 - Skokowski,C. A1 - Reesch,J. A1 - Shneiderman, Ben A1 - Laboratory,University of Maryland at College Park. Human/Computer Interaction A1 - Channel,F. PB - University of Maryland at College Park, Human/Computer Interaction Laboratory ER - TY - CONF T1 - Hybrid thinning through reconstruction T2 - Document Analysis and Recognition, 1995., Proceedings of the Third International Conference on Y1 - 1995 A1 - David Doermann A1 - Kia,O. KW - algorithms;edge KW - ambiguous KW - detection;automatic KW - detection;contextual KW - detection;image KW - information;contour KW - methods;nonlocal KW - methods;pixel-wise KW - noise;hybrid KW - Pixel KW - points;local KW - reconstruction;image KW - region KW - segmentation;noise; KW - stroke;junction KW - thinning KW - thinning;image AB - One difficulty with many pixel-wise thinning algorithms is that they produce unacceptable results at junction points, or in the presence of contour noise. The authors present a novel approach to detecting ambiguous regions in a thinned image. The method uses the reconstructability properties of appropriate thinning algorithms to reverse the thinning process and automatically detect those pixels which may have resulted from more then one stroke in the image. The ambiguous regions are then interpreted and reconstructed using domain specific or derived contextual information. The approach has the advantage of using local methods to rapidly identify strokes (or regions) which have been thinned correctly and allowing more detailed analysis based on non-local methods in the remaining regions JA - Document Analysis and Recognition, 1995., Proceedings of the Third International Conference on VL - 2 M3 - 10.1109/ICDAR.1995.601975 ER - TY - CONF T1 - High performance computing for land cover dynamics T2 - Pattern Recognition, 1994. Vol. 3-Conference C: Signal Processing, Proceedings of the 12th IAPR International Conference on Y1 - 1994 A1 - Parulekar,R. A1 - Davis, Larry S. A1 - Chellapa, Rama A1 - Saltz, J. A1 - Sussman, Alan A1 - Townshend,J. JA - Pattern Recognition, 1994. Vol. 3-Conference C: Signal Processing, Proceedings of the 12th IAPR International Conference on ER - TY - JOUR T1 - High-specificity neurological localization using a connectionist model JF - Artificial Intelligence in Medicine Y1 - 1994 A1 - Tuhrim,S. A1 - Reggia, James A. A1 - Peng,Y. VL - 6 CP - 6 ER - TY - JOUR T1 - How normal flow constrains relative depth for an active observer JF - Image and vision computing Y1 - 1994 A1 - Huang, L. A1 - Aloimonos, J. VL - 12 CP - 7 ER - TY - JOUR T1 - How to succeed in graduate school: a guide for students and advisors: part I of II JF - Crossroads Y1 - 1994 A1 - desJardins, Marie AB - This paper attempts to raise some issues that are important for graduate students to be successful and to get as much out of the process as possible, and for advisors who wish to help their students be successful. The intent is not to provide prescriptive advice -- no formulas for finishing a thesis or twelve-step programs for becoming a better advisor are given -- but to raise awareness on both sides of the advisor-student relationship as to what the expectations are and should be for this relationship, what a graduate student should expect to accomplish, common problems, and where to go if the advisor is not forthcoming. VL - 1 SN - 1528-4972 UR - http://doi.acm.org/10.1145/197149.197154 CP - 2 M3 - 10.1145/197149.197154 ER - TY - JOUR T1 - Human Emotion Recognition From Motion Using A Radial Basis Function Network Architecture JF - University Of Maryland Y1 - 1994 A1 - Mark,R. A1 - Yaser,Y. A1 - Larry,D. ER - TY - CONF T1 - Hierarchical curve representation T2 - , 11th IAPR International Conference on Pattern Recognition, 1992. Vol.III. Conference C: Image, Speech and Signal Analysis, Proceedings Y1 - 1992 A1 - Fermüller, Cornelia A1 - Kropatsch,W. KW - Automation KW - continuous curves KW - curvature KW - data mining KW - digital images KW - Educational institutions KW - Feature extraction KW - hierarchical curve representation KW - IMAGE PROCESSING KW - image recognition KW - image resolution KW - Image segmentation KW - multiresolution structure KW - Object recognition KW - planar curves KW - pyramid KW - Robustness KW - Sampling methods KW - Smoothing methods AB - Presents a robust method for describing planar curves in multiple resolution using curvature information. The method is developed by taking into account the discrete nature of digital images as well as the discrete aspect of a multiresolution structure (pyramid). The authors deal with the robustness of the technique, which is due to the additional information that is extracted from observing the behavior of corners in the pyramid. Furthermore the resulting algorithm is conceptually simple and easily parallelizable. They develop theoretical results, analyzing the curvature of continuous curves in scale-space, which show the behavior of curvature extrema under varying scale. These results are used to eliminate any ambiguities that might arise from sampling problems due to the discreteness of the representation. Finally, experimental results demonstrate the potential of the method JA - , 11th IAPR International Conference on Pattern Recognition, 1992. Vol.III. Conference C: Image, Speech and Signal Analysis, Proceedings PB - IEEE SN - 0-8186-2920-7 M3 - 10.1109/ICPR.1992.201947 ER - TY - JOUR T1 - High precision touchscreens: design strategies and comparisons with a mouse JF - International Journal of Man-Machine Studies Y1 - 1991 A1 - Sears,Andrew A1 - Shneiderman, Ben AB - Three studies were conducted comparing speed of performance, error rates and user preference ratings for three selection devices. The devices tested were a touchscreen, a touchscreen with stabilization (stabilization software filters and smooths raw data from hardware), and a mouse. The task was the selection of rectangular targets 1, 4, 16 and 32 pixels per side (0·4 × 0·6, 1·7 × 2·2, 6·9 × 9·0, 13·8 × 17·9 mm respectively). Touchscreen users were able to point at single pixel targets, thereby countering widespread expectations of poor touchscreen resolution. The results show no difference in performance between the mouse and touchscreen for targets ranging from 32 to 4 pixels per side. In addition, stabilization significantly reduced the error rates for the touchscreen when selecting small targets. These results imply that touchscreens, when properly used, have attractive advantages in selecting targets as small as 4 pixels per size (approximately one-quarter of the size of a single character). A variant of Fitts' Law is proposed to predict touchscreen pointing times. Ideas for future research are also presented. VL - 34 SN - 0020-7373 UR - http://www.sciencedirect.com/science/article/pii/0020737391900378 CP - 4 M3 - 10.1016/0020-7373(91)90037-8 ER - TY - JOUR T1 - Human values and the future of technology: a declaration of responsibility JF - ACM SIGCHI Bulletin Y1 - 1991 A1 - Shneiderman, Ben AB - "We must learn to balance the material wonders of technology with the spiritual demands of our human nature."---John Naisbitt (1982).We can make a difference in shaping the future by ensurin g that computers "serve human needs (Mumford, 1934)." By making explicit the enduring values that we hold dear we can guide computer system designers and developers for the next decade, century, and thereafter. After setting our high-level goals we can pursue the components and seek the process for fulfilling them.High-level goals might include peace, excellent health care, adequate nutrition, accessible education, communication, freedom of expression, support for creative exploration, safety, and socially constructive entertainment. Computer technology can help attain these high-level goals if we clearly state measurable objectives, obtain participation of professionals, and design effective human-computer interfaces. Design considerations include adequate attention to individual differences among users, support of social and organizational structures, design for reliability and safety, provision of access by the elderly, handicapped, or illiterate, and appropriate user controlled adaptation. With suitable theories and empirical research we can achieve ease of learning, rapid performance, low error rates, and good retention over time, while preserving high subjective satisfaction.To raise the consciousness of designers and achieve these goals, we must generate an international debate, stimulate discussions within organizations, and interact with other intellectual communities. This paper calls for a focus on the "you" and "I" in developing improved user interface (UI) research and systems, offers a Declaration of Responsibility, and proposes a Social Impact Statement for major computing projects. VL - 23 SN - 0736-6906 UR - http://doi.acm.org/10.1145/122672.122674 CP - 1 M3 - 10.1145/122672.122674 ER - TY - CONF T1 - Human values and the future of technology: a declaration of empowerment T2 - Proceedings of the conference on Computers and the quality of life Y1 - 1990 A1 - Shneiderman, Ben JA - Proceedings of the conference on Computers and the quality of life T3 - CQL '90 PB - ACM CY - New York, NY, USA SN - 0-89791-403-1 UR - http://doi.acm.org/10.1145/97344.97360 M3 - 10.1145/97344.97360 ER - TY - CONF T1 - Human-computer interaction lab, University of Maryland T2 - Proceedings of the SIGCHI conference on Human factors in computing systems: Wings for the mind Y1 - 1989 A1 - Shneiderman, Ben JA - Proceedings of the SIGCHI conference on Human factors in computing systems: Wings for the mind T3 - CHI '89 PB - ACM CY - New York, NY, USA SN - 0-89791-301-9 UR - http://doi.acm.org/10.1145/67449.67509 M3 - 10.1145/67449.67509 ER - TY - JOUR T1 - Human-Computer Interaction Laboratory, University of Maryland, Center for Automation Research JF - CHI Y1 - 1989 A1 - Shneiderman, Ben VL - 89 ER - TY - CONF T1 - Hypertext and software engineering T2 - Proceedings of the second annual ACM conference on Hypertext Y1 - 1989 A1 - Balzer,R. A1 - Begeman,M. A1 - Garg,P. K. A1 - Schwartz,M. A1 - Shneiderman, Ben AB - The purpose of this panel is to bring together researchers in software engineering and hypertext and help identify the major issues in the application of hypertext technology and concepts to software engineering and vice versa. JA - Proceedings of the second annual ACM conference on Hypertext T3 - HYPERTEXT '89 PB - ACM CY - New York, NY, USA SN - 0-89791-339-6 UR - http://doi.acm.org/10.1145/74224.74259 M3 - 10.1145/74224.74259 ER - TY - JOUR T1 - Hypertext hands-on! JF - Tech Report HCIL-89-06 Y1 - 1989 A1 - Shneiderman, Ben A1 - Kearsley,G. AB - This innovative book/software package provides the first hands-on nontechnical introduction to hypertext. Hypertext is a computer technology for manipulating information; in a grander sense, it is a new way of reading and writing. With the IBM-PC disket tes provided in this package, you will learn about hypertext by experiencing it. You will discover what it is like to read interactively, to find information according to your own needs and interests. Both the book and the software versions cover the basic concepts of hypertext, typical hypertext applications, and currently available authoring systems. They also raise important design and implementations issues. The book is self-contained an can be read from beginning to end without a computer. The software is also self-contained and, presenting hypertext in hypertext form, can be read in any order you choose. Since the two versions contain largely similar material, they provide an interesting basis for comparison between conventional text presentation and hypertext. ER - TY - BOOK T1 - Hypertext on hypertext: IBM PC & compatibles Y1 - 1988 ED - Shneiderman, Ben PB - ACM CY - New York, NY, USA SN - 0-89791-280-2 ER - TY - CONF T1 - How can a program mean T2 - Proceedings of the 10th Int'l Joint Conference on Artificial Intelligence Y1 - 1987 A1 - Perlis, Don JA - Proceedings of the 10th Int'l Joint Conference on Artificial Intelligence ER - TY - JOUR T1 - Human-computer interaction research at the University of Maryland JF - ACM SIGCHI Bulletin Y1 - 1986 A1 - Shneiderman, Ben AB - The Human-Computer Interaction Laboratory (HCIL) is a unit of the Center for Automation Research at the Univesity of Maryland. HCIL is an interdisciplinary research group whose participants are faculty in the Departments of Computer Science and Psychology and the Colleges of Library and Information Services, Business, and Education. In addition, staff scienctists, graduate students, and undergraduates contribute to this small, but lively community that pursues empirical studies of people using computers.Our support comes from industrial research projects, government grants, the State of Maryland, and the University of Maryland. Projects often become interrelated in surprising ways enabling individuals to cooperate constructively. Some of our efforts during the past year are described below. VL - 17 SN - 0736-6906 UR - http://doi.acm.org/10.1145/15671.15673 CP - 3 M3 - 10.1145/15671.15673 ER - TY - JOUR T1 - A Hybrid Chebyshev Krylov Subspace Algorithm for Solving Nonsymmetric Systems of Linear Equations JF - SIAM Journal on Scientific and Statistical ComputingSIAM J. Sci. and Stat. Comput. Y1 - 1986 A1 - Elman, Howard A1 - Saad, Youcef A1 - Saylor, Paul E. VL - 7 SN - 01965204 UR - http://link.aip.org/link/SJOCE3/v7/i3/p840/s1&Agg=doi CP - 3 M3 - 10.1137/0907057 ER - TY - RPRT T1 - A High-Level Interactive System for Designing VLSI Signal Processors Y1 - 1985 A1 - Owens,R. M. A1 - JaJa, Joseph F. KW - Technical Report AB - This paper describes a high-level interactive system that can be used to generate VLSI designs for various operations in signal processing such as filtering, convolution and computing the discrete Fourier transform. The overall process is fully automated and requires that the user specifies only a few parameters such as operation, precision, size and architecture type. The built-in architectures are new digit-on-line bit-serial architectures that are based on recently derived fast algorithms for the above operations. The basic elements are compact and have a very small gate delay. We feel that our system will offer a flexible and easy to use tool that can produce practical designs which are easy to test, efficient and fast. PB - Institute for Systems Research, University of Maryland, College Park VL - ISR-TR-1985-7 UR - http://drum.lib.umd.edu/handle/1903/4383 ER - TY - JOUR T1 - Human factors issues of manuals, online help, and tutorials JF - Empirical foundations of information and software science Y1 - 1985 A1 - Shneiderman, Ben VL - 1984 ER - TY - JOUR T1 - Human Factors in Interactive Medical Systems JF - Proceedings of the Annual Symposium on Computer Application in Medical CareProc Annu Symp Comput Appl Med Care Y1 - 1984 A1 - Shneiderman, Ben SN - 0195-4210 ER - TY - JOUR T1 - High-tech can stimulate creative action: the increased ease-of-use of computers supports individual competence and productive work JF - SIGCHI Bull. Y1 - 1983 A1 - Shneiderman, Ben AB - Jokes about the complexity and error-prone use of computer systems reflect the experience of many people. Computer anxiety, terminal terror, and network neurosis are modern maladies - but help is on the way! VL - 14 SN - 0736-6906 UR - http://doi.acm.org/10.1145/1044188.1044189 CP - 4 M3 - 10.1145/1044188.1044189 ER - TY - JOUR T1 - Human engineering management plan for interactive systems JF - Proceedings COMPCON Y1 - 1983 A1 - Shneiderman, Ben VL - 83 ER - TY - CHAP T1 - Human factors of interactive software T2 - Enduser Systems and Their Human FactorsEnduser Systems and Their Human Factors Y1 - 1983 A1 - Shneiderman, Ben ED - Blaser,Albrecht ED - Zoeppritz,Magdalena AB - There is intense interest about human factors issues in interactive computer systems for life-critical applications, industrial/commercial uses, and personal computing in the office or home. Primary design goals include proper functionality, adequate reliability, suitable cost, and adherence to schedule. Measurable human factors issues include time to learn, speed of performance, rate of errors, subjective satisfaction, and retention over time. Specific human factors acceptance tests are described as a natural complement to hardware and software acceptance tests. Project management ideas, information resources, and potential research directions are presented. JA - Enduser Systems and Their Human FactorsEnduser Systems and Their Human Factors T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 150 SN - 978-3-540-12273-9 UR - http://dx.doi.org/10.1007/3-540-12273-7_16 ER - TY - JOUR T1 - Human Aspects of Computing Editor Control Flow and Data Structure Documentation: Two Experiments JF - Human factors in software development Y1 - 1981 A1 - Shneiderman, Ben ER - TY - JOUR T1 - HUMAN FACTORS ISSUES IN DESIGNING INTERACTIVE SYSTEMS JF - Proceedings-Compcon Y1 - 1981 A1 - Shneiderman, Ben VL - 25 ER - TY - JOUR T1 - Human factors studies with system message styles (abstract only) JF - ACM SIGSOC Bulletin Y1 - 1981 A1 - Shneiderman, Ben AB - Computer systems often contain messages which are imprecise ('SYNTAX ERROR'), hostile ('FATAL ERROR, RUN ABORTED'), cryptic ('IEH291H'), or obscure ('CTL DAMAGE, TRANS ERR'). Such messages may be acceptable to computer professionals who regularly use a specific system, but they lead to frustration for novices and for professionals who are using new features or facilities.We have conducted five studies using COBOL compiler syntax errors and text editor command errors to measure the impact of improving the wording of system messages. The results indicate that increased specificity, more positive tone, and greater clarity can improve correction rates and user satisfaction.An overview of the experimental results will be presented along with guidelines for writing system messages. VL - 13 SN - 0163-5794 UR - http://doi.acm.org/10.1145/1015579.810979 CP - 2-3 M3 - 10.1145/1015579.810979 ER - TY - JOUR T1 - Hardware options, evaluation metrics, and a design sequence for interactive information systems JF - Information & Management Y1 - 1980 A1 - Shneiderman, Ben KW - casual users KW - design sequence KW - evaluation metrics KW - ferminal design KW - human factor KW - Interactive information systems AB - Interactive information systems must satisfy a wide variety of users, serve a broad range of tasks, and be suited to diverse hardware environments. This paper concentrates on three aspects of interactive information systems design: hardware options, evaluation metrics, and a possible design sequence. Rigorous pilot studies are emphasized, and supporting experimental evidence is offered. VL - 3 SN - 0378-7206 UR - http://www.sciencedirect.com/science/article/pii/0378720680900269 CP - 1 M3 - 10.1016/0378-7206(80)90026-9 ER - TY - JOUR T1 - HUMAN FACTORS EXPERIMENTS FOR REFINING INTERACTIVE SYSTEM DESIGNS JF - Proceedings-Compcon Y1 - 1980 A1 - Shneiderman, Ben VL - 21 ER - TY - JOUR T1 - Human Factors of Software Design and Development JF - Software Configuration Management Y1 - 1980 A1 - Weiser,M. A1 - Shneiderman, Ben ER - TY - JOUR T1 - Human Factors Experiments in Designing Interactive Systems JF - Computer Y1 - 1979 A1 - Shneiderman, Ben KW - Application software KW - Computer languages KW - Design engineering KW - Home computing KW - human factors KW - interactive systems KW - Process design KW - Testing AB - Successful industrial design gracefully unites esthetics and function at minimum cost. However, designers face special problems when they apply their skills to interactive computer systems. VL - 12 SN - 0018-9162 CP - 12 M3 - 10.1109/MC.1979.1658571 ER -