10.1128/EC.00036-07

ER - TY - CONF T1 - Noise Features for Image Tampering Detection and Steganalysis T2 - Image Processing, 2007. ICIP 2007. IEEE International Conference on Y1 - 2007 A1 - Gou,Hongmei A1 - Swaminathan,A. A1 - M. Wu KW - analysis;cryptography;data KW - analysis;image KW - analysis;wavelet KW - authenticity;hidden KW - computing;statistical KW - data;image KW - denoising KW - denoising;multimedia KW - detection;low-cost KW - editing KW - encapsulation;feature KW - extraction;image KW - features;steganalysis;wavelet KW - forensic KW - forensics;neighborhood KW - image KW - NOISE KW - operations;digital KW - prediction;statistical KW - softwares;multimedia KW - tampering KW - transforms; AB - With increasing availability of low-cost image editing softwares, the authenticity of digital images can no longer be taken for granted. Digital images have also been used as cover data for transmitting secret information in the field of steganography. In this paper, we introduce a new set of features for multimedia forensics to determine if a digital image is an authentic camera output or if it has been tampered or embedded with hidden data. We perform such image forensic analysis employing three sets of statistical noise features, including those from denoising operations, wavelet analysis, and neighborhood prediction. Our experimental results demonstrate that the proposed method can effectively distinguish digital images from their tampered or stego versions. JA - Image Processing, 2007. ICIP 2007. IEEE International Conference on VL - 6 M3 - 10.1109/ICIP.2007.4379530 ER - TY - JOUR T1 - Nonintrusive component forensics of visual sensors using output images JF - Information Forensics and Security, IEEE Transactions on Y1 - 2007 A1 - Swaminathan,A. A1 - M. Wu A1 - Liu,K. J.R KW - ACQUISITION KW - array;color KW - authenticating KW - component KW - filter KW - forensics;patent KW - infringements;visual KW - Interpolation KW - manipulations;intellectual KW - modules;content KW - property KW - property; KW - protection;nonintrusive KW - rights KW - sensors;image KW - sensors;industrial KW - sources;color AB - Rapid technology development and the widespread use of visual sensors have led to a number of new problems related to protecting intellectual property rights, handling patent infringements, authenticating acquisition sources, and identifying content manipulations. This paper introduces nonintrusive component forensics as a new methodology for the forensic analysis of visual sensing information, aiming to identify the algorithms and parameters employed inside various processing modules of a digital device by only using the device output data without breaking the device apart. We propose techniques to estimate the algorithms and parameters employed by important camera components, such as color filter array and color interpolation modules. The estimated interpolation coefficients provide useful features to construct an efficient camera identifier to determine the brand and model from which an image was captured. The results obtained from such component analysis are also useful to examine the similarities between the technologies employed by different camera models to identify potential infringement/licensing and to facilitate studies on technology evolution VL - 2 SN - 1556-6013 CP - 1 M3 - 10.1109/TIFS.2006.890307 ER - TY - JOUR T1 - Numerical Analysis of Nanoparticle-Structured Plasmon Waveguides of Light JF - Magnetics, IEEE Transactions on Y1 - 2007 A1 - Mayergoyz, Issak D A1 - Zhang,Zhenyu KW - analysis;optical KW - analysis;resonant KW - cross-sections;light KW - Frequency KW - frequency;light KW - nanoparticle-structured KW - plasmon KW - polarisation;light KW - polarization;numerical KW - propagation;numerical KW - waveguides;light KW - waveguides;plasmonics;plasmons; AB - A novel numerical approach to the analysis of nanoparticle-structured plasmon waveguides of light is presented. The extinct cross-sections and resonance (propagation) frequencies are computed for various geometries of these waveguides and compared with available experimental data. The computational results for resonance frequencies corresponding to different light polarizations are reported as well VL - 43 SN - 0018-9464 CP - 4 M3 - 10.1109/TMAG.2006.892270 ER - TY - JOUR T1 - Numerical Analysis of Plasmon Resonances in Metallic Nanoshells JF - Magnetics, IEEE Transactions on Y1 - 2007 A1 - Mayergoyz, Issak D A1 - Zhang,Zhenyu KW - analysis;plasmon KW - and KW - boundary KW - eigenfunctions;nanostructured KW - equation-based KW - equations;eigenvalues KW - frequency;boundary KW - integral KW - materials;nanotechnology;plasmons; KW - nanoshells;numerical KW - problems;metallic KW - resonance;resonant KW - techniques;eigenvalue AB - A novel boundary integral equation-based technique for the direct computations of resonance frequencies for plasmon resonances in metallic nanoshells is presented. In this technique, the calculation of resonance frequencies is reduced to a generalized eigenvalue problem. Numerical results that demonstrate fairly good agreement with theoretical results and available experimental data are reported VL - 43 SN - 0018-9464 CP - 4 M3 - 10.1109/TMAG.2006.892271 ER - TY - JOUR T1 - Numerical Analysis of Plasmon Resonances in Nanoparticles Based on Fast Multipole Method JF - Magnetics, IEEE Transactions on Y1 - 2007 A1 - Zhang,Zhenyu A1 - Mayergoyz, Issak D A1 - Gumerov, Nail A. A1 - Duraiswami, Ramani KW - analysis;boundary KW - and KW - boundary KW - eigenfunctions;nanoparticles;plasmons; KW - equations;eigenvalue KW - equations;eigenvalues KW - integral KW - method;nanoparticle KW - multipole KW - plasmon KW - problems;fast KW - resonance;numerical AB - A novel technique for the numerical analysis of plasmon resonances by using the fast multipole method (FMM) is presented. This approach is based on the solution of the eigenvalue problem for boundary integral equations, which can be naturally implemented by using the FMM. Numerical examples that highlight the efficiency of the fast multipole implementation are reported VL - 43 SN - 0018-9464 CP - 4 M3 - 10.1109/TMAG.2007.891413 ER - TY - JOUR T1 - Name reference resolution in organizational email archives JF - SIAM International Conference on Data Mining Y1 - 2006 A1 - Diehl,C. P A1 - Getoor, Lise A1 - Namata,G. ER - TY - JOUR T1 - Network Visualization by Semantic Substrates JF - IEEE Transactions on Visualization and Computer Graphics Y1 - 2006 A1 - Shneiderman, Ben A1 - Aris,A. KW - Automatic control KW - data visualisation KW - Data visualization KW - Displays KW - Filters KW - Graphical user interfaces KW - Information Visualization KW - information visualization designers KW - Law KW - legal citations KW - Legal factors KW - legal precedent data KW - network visualization KW - NVSS 1.0 KW - scalability KW - semantic substrate KW - Terminology KW - Tunneling KW - user-defined semantic substrates AB - Networks have remained a challenge for information visualization designers because of the complex issues of node and link layout coupled with the rich set of tasks that users present. This paper offers a strategy based on two principles: (1) layouts are based on user-defined semantic substrates, which are non-overlapping regions in which node placement is based on node attributes, (2) users interactively adjust sliders to control link visibility to limit clutter and thus ensure comprehensibility of source and destination. Scalability is further facilitated by user control of which nodes are visible. We illustrate our semantic substrates approach as implemented in NVSS 1.0 with legal precedent data for up to 1122 court cases in three regions with 7645 legal citations VL - 12 SN - 1077-2626 CP - 5 M3 - 10.1109/TVCG.2006.166 ER - TY - CONF T1 - New DNS results of shockwave/turbulent boundary layer interaction T2 - 3rd AIAA Flow Control Conference Y1 - 2006 A1 - Wu,M. A1 - Martin, M.P JA - 3rd AIAA Flow Control Conference ER - TY - JOUR T1 - A New Hardware Monitor Design to Measure Data Structure-Specific Cache Eviction Information JF - International Journal of High Performance Computing Applications Y1 - 2006 A1 - Buck, B. R A1 - Hollingsworth, Jeffrey K AB - In this paper, we propose a hardware performance monitor that provides support not only for measuring cache misses and the addresses associated with them, but also for determining what data is being evicted from the cache when a miss occurs. We describe how to use this hardware support to efficiently determine the cache behavior of application data structures at the source code level. We also present the results of a simulation-based study of this technique, in which we examined the overhead, perturbation of results, and usefulness of collecting this information. VL - 20 UR - http://hpc.sagepub.com/content/20/3/353.abstract CP - 3 M3 - 10.1177/1094342006067470 ER - TY - CONF T1 - New lower bounds for oblivious routing in undirected graphs T2 - Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm Y1 - 2006 A1 - Hajiaghayi, Mohammad T. A1 - Kleinberg,R. D A1 - Leighton,T. A1 - R\äcke,H. JA - Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm ER - TY - JOUR T1 - Noise causes slant underestimation in stereo and motion JF - Vision Research Y1 - 2006 A1 - Hui Ji A1 - Fermüller, Cornelia KW - Bias KW - Partial bias correction KW - shape estimation KW - Shape from motion KW - Stereo orientation disparity AB - This paper discusses a problem, which is inherent in the estimation of 3D shape (surface normals) from multiple views. Noise in the image signal causes bias, which may result in substantial errors in the parameter estimation. The bias predicts the underestimation of slant found in psychophysical and computational experiments. Specifically, we analyze the estimation of 3D shape from motion and stereo using orientation disparity. For the case of stereo, we show that bias predicts the anisotropy in the perception of horizontal and vertical slant. For the case of 3D motion we demonstrate the bias by means of a new illusory display. Finally, we discuss statistically optimal strategies for the problem and suggest possible avenues for visual systems to deal with the bias. VL - 46 SN - 0042-6989 UR - http://www.sciencedirect.com/science/article/pii/S0042698906002124 CP - 19 M3 - 10.1016/j.visres.2006.04.010 ER - TY - CONF T1 - Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images T2 - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on Y1 - 2006 A1 - Swaminathan,A. A1 - M. Wu A1 - Liu,K. J.R KW - algorithms;interpolation KW - analysis;image KW - analysis;output KW - array KW - cameras;forensic KW - Color KW - colour KW - engineering;forensic KW - forensic KW - images;visual KW - methods;nonintrusive KW - PROCESSING KW - sensor;digital KW - sensors;cameras;image KW - sensors;interpolation; KW - signal AB - This paper considers the problem of non-intrusive forensic analysis of the individual components in visual sensors and its implementation. As a new addition to the emerging area of forensic engineering, we present a framework for analyzing technologies employed inside digital cameras based on output images, and develop a set of forensic signal processing algorithms for visual sensors based on color array sensor and interpolation methods. We show through simulations that the proposed method is robust against compression and noise, and can help identify various processing components inside the camera. Such a non-intrusive forensic framework would provide useful evidence for analyzing technology infringement and evolution for visual sensors JA - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on VL - 5 M3 - 10.1109/ICASSP.2006.1661297 ER - TY - JOUR T1 - A note on generalized and hypergeneralized projectors JF - Linear Algebra and its Applications Y1 - 2006 A1 - Stewart, G.W. KW - Generalized projection KW - projection KW - Spectral decomposition AB - Groß and Trenkler [Generalized and hypergeneralized projectors, Linear Algebra Appl. 264 (1997) 463–474] have introduced two generalizations of orthogonal projectors called generalized projectors and hypergeneralized projectors. In this note we characterize these generalizations by their spectral decompositions. VL - 412 SN - 0024-3795 UR - http://www.sciencedirect.com/science/article/pii/S0024379505003836 CP - 2–3 M3 - 10.1016/j.laa.2005.07.022 ER - TY - RPRT T1 - A Novel Information-Aware Octree for the Visualization of Large Scale Time-Varying Data Y1 - 2006 A1 - Kim,Jusub A1 - JaJa, Joseph F. KW - Technical Report AB - Large scale scientific simulations are increasingly generatingvery large data sets that present substantial challenges to current visualization systems. In this paper, we develop a new scalable and efficient scheme for the visual exploration of 4-D isosurfaces of time varying data by rendering the 3-D isosurfaces obtained through an arbitrary axis-parallel hyperplane cut. The new scheme is based on: (i) a new 4-D hierarchical indexing structure, called Information-Aware Octree; (ii) a controllable delayed fetching technique; and (iii) an optimized data layout. Together, these techniques enable efficient and scalable out-of-core visualization of large scale time varying data sets. We introduce an entropy-based dimension integration technique by which the relative resolutions of the spatial and temporal dimensions are established, and use this information to design a compact size 4-D hierarchical indexing structure. We also present scalable and efficient techniques for out-of-core rendering. Compared with previous algorithms for constructing 4-D isosurfaces, our scheme is substantially faster and requires much less memory. Compared to the Temporal Branch-On-Need octree (T-BON), which can only handle a subset of our queries, our indexing structure is an order of magnitude smaller and is at least as effective in dealing with the queries that the T-BON can handle. We have tested our scheme on two large time-varying data sets and obtained very good performance for a wide range of isosurface extraction queries using an order of magnitude smaller indexing structures than previous techniques. In particular, we can generate isosurfaces at intermediate time steps very quickly. PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-2006-03 UR - http://drum.lib.umd.edu/handle/1903/3335 ER - TY - RPRT T1 - NSF Workshop Storage Resource Broker Data Grid Preservation Assessment Y1 - 2006 A1 - JaJa, Joseph F. PB - San Diego Supercomputer Center VL - TR-2006.3 ER - TY - JOUR T1 - Nuclear Envelope Dystrophies Show a Transcriptional Fingerprint Suggesting Disruption of Rb–MyoD Pathways in Muscle Regeneration JF - BrainBrain Y1 - 2006 A1 - Bakay,Marina A1 - Wang,Zuyi A1 - Melcon,Gisela A1 - Schiltz,Louis A1 - Xuan,Jianhua A1 - Zhao,Po A1 - Sartorelli,Vittorio A1 - Seo,Jinwook A1 - Pegoraro,Elena A1 - Angelini,Corrado A1 - Shneiderman, Ben A1 - Escolar,Diana A1 - Chen,Yi-Wen A1 - Winokur,Sara T A1 - Pachman,Lauren M A1 - Fan,Chenguang A1 - Mandler,Raul A1 - Nevo,Yoram A1 - Gordon,Erynn A1 - Zhu,Yitan A1 - Dong,Yibin A1 - Wang,Yue A1 - Hoffman,Eric P KW - EDMD = Emery–Dreifuss muscular dystrophy KW - emerin KW - Emery-Dreifuss muscular dystrophy KW - FSHD = fascioscapulohumeral muscular dystrophy KW - IDG = individual discriminatory genes KW - JDG = jointly discriminatory genes KW - lamin A/C KW - LGMD = limb-girdle muscular dystrophy KW - LOO = leave-one-out KW - RT–PCR = reverse transcription–polymerase chain reaction; VISDA = Visual and Statistical Data Analyzer KW - Skeletal muscle KW - wFC = weighted Fisher criterion AB - Mutations of lamin A/C (LMNA) cause a wide range of human disorders, including progeria, lipodystrophy, neuropathies and autosomal dominant Emery–Dreifuss muscular dystrophy (EDMD). EDMD is also caused by X-linked recessive loss-of-function mutations of emerin, another component of the inner nuclear lamina that directly interacts with LMNA. One model for disease pathogenesis of LMNA and emerin mutations is cell-specific perturbations of the mRNA transcriptome in terminally differentiated cells. To test this model, we studied 125 human muscle biopsies from 13 diagnostic groups (125 U133A, 125 U133B microarrays), including EDMD patients with LMNA and emerin mutations. A Visual and Statistical Data Analyzer (VISDA) algorithm was used to statistically model cluster hierarchy, resulting in a tree of phenotypic classifications. Validations of the diagnostic tree included permutations of U133A and U133B arrays, and use of two probe set algorithms (MAS5.0 and MBEI). This showed that the two nuclear envelope defects (EDMD LMNA, EDMD emerin) were highly related disorders and were also related to fascioscapulohumeral muscular dystrophy (FSHD). FSHD has recently been hypothesized to involve abnormal interactions of chromatin with the nuclear envelope. To identify disease-specific transcripts for EDMD, we applied a leave-one-out (LOO) cross-validation approach using LMNA patient muscle as a test data set, with reverse transcription–polymerase chain reaction (RT–PCR) validations in both LMNA and emerin patient muscle. A high proportion of top-ranked and validated transcripts were components of the same transcriptional regulatory pathway involving Rb1 and MyoD during muscle regeneration (CRI-1, CREBBP, Nap1L1, ECREBBP/p300), where each was specifically upregulated in EDMD. Using a muscle regeneration time series (27 time points) we develop a transcriptional model for downstream consequences of LMNA and emerin mutations. We propose that key interactions between the nuclear envelope and Rb and MyoD fail in EDMD at the point of myoblast exit from the cell cycle, leading to poorly coordinated phosphorylation and acetylation steps. Our data is consistent with mutations of nuclear lamina components leading to destabilization of the transcriptome in differentiated cells. VL - 129 SN - 0006-8950, 1460-2156 UR - http://brain.oxfordjournals.org/content/129/4/996 CP - 4 M3 - 10.1093/brain/awl023 ER - TY - CONF T1 - Numerical Analysis of Plasmon Resonances Based on Fast Multipole Method T2 - Electromagnetic Field Computation, 2006 12th Biennial IEEE Conference on Y1 - 2006 A1 - Zhang,Zhenyu A1 - Mayergoyz, Issak D A1 - Gumerov, Nail A. A1 - Duraiswami, Ramani KW - analysis;plasmon KW - and KW - boundary KW - eigenfunctions;plasmons; KW - equations;eigenvalue KW - equations;eigenvalues KW - integral KW - method;numerical KW - multipole KW - problem;fast KW - resonances;boundary AB - A novel technique for the numerical analysis of plasmon resonances by using fast multipole method (FMM) is presented. This approach is based on the solution of eigenvalue problem for boundary integral equations, which can be naturally implemented by using the fast multipole method. Numerical examples that highlight the efficiency of the fast multipole implementation are reported JA - Electromagnetic Field Computation, 2006 12th Biennial IEEE Conference on M3 - 10.1109/CEFC-06.2006.1633249 ER - TY - JOUR T1 - Numerical analysis of plasmon resonances in nanoparticles JF - Magnetics, IEEE Transactions on Y1 - 2006 A1 - Mayergoyz, Issak D A1 - Zhang,Zhenyu KW - 3D KW - analysis;plasmon KW - and KW - boundary KW - eigenfunctions;electrostatics;nanoparticles;permittivity;surface KW - equation;boundary KW - equations;eigenvalues KW - integral KW - nanoparticles;eigenvalue KW - plasmon KW - problem;numerical KW - resonance; KW - resonances;specific AB - Plasmon (electrostatic) resonances in nanoparticles are treated as an eigenvalue problem for a specific boundary integral equation. This leads to direct calculation of resonance values of permittivity and resonance frequency. The numerical technique is illustrated by examples of calculation of resonance frequencies for three-dimensional nanoparticles VL - 42 SN - 0018-9464 CP - 4 M3 - 10.1109/TMAG.2006.870976 ER - TY - JOUR T1 - Numerical computation of the Green?s function for two-dimensional finite-size photonic crystals of infinite length JF - Optics ExpressOpt. Express Y1 - 2006 A1 - Seydou,F. A1 - Ramahi,Omar M. A1 - Duraiswami, Ramani A1 - Seppänen,T. KW - Diffraction and gratings KW - Multiple scattering AB - We develop a numerical algorithm that computes the Green’s function of Maxwell equation for a 2D finite-size photonic crystal, composed of rods of arbitrary shape. The method is based on the boundary integral equation, and a Nyström discretization is used for the numerical solution. To provide an exact solution that validates our code we derive multipole expansions for circular cylinders using our integral equation approach. The numerical method performs very well on the test case. We then apply it to crystals of arbitrary shape and discuss the convergence. VL - 14 UR - http://www.opticsexpress.org/abstract.cfm?URI=oe-14-23-11362 CP - 23 M3 - 10.1364/OE.14.011362 ER - TY - CONF T1 - NeurAlign: combining word alignments using neural networks T2 - Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing Y1 - 2005 A1 - Ayan,Necip Fazil A1 - Dorr, Bonnie J A1 - Monz,Christof AB - This paper presents a novel approach to combining different word alignments. We view word alignment as a pattern classification problem, where alignment combination is treated as a classifier ensemble, and alignment links are adorned with linguistic features. A neural network model is used to learn word alignments from the individual alignment systems. We show that our alignment combination approach yields a significant 20--34% relative error reduction over the best-known alignment combination technique on English-Spanish and English-Chinese data. JA - Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing T3 - HLT '05 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dx.doi.org/10.3115/1220575.1220584 M3 - 10.3115/1220575.1220584 ER - TY - JOUR T1 - Neuromimetic sound representation for percept detection and manipulation JF - EURASIP Journal on Applied Signal Processing Y1 - 2005 A1 - Zotkin,Dmitry N A1 - Chi,T. A1 - Shamma,S.A. A1 - Duraiswami, Ramani AB - The acoustic wave received at the ears is processed by the human auditory system to separate different sounds along the intensity,pitch, and timbre dimensions. Conventional Fourier-based signal processing, while endowed with fast algorithms, is unable to easily represent a signal along these attributes. In this paper, we discuss the creation of maximally separable sounds in auditory user interfaces and use a recently proposed cortical sound representation, which performs a biomimetic decomposition of an acoustic signal, to represent and manipulate sound for this purpose. We briefly overview algorithms for obtaining, manipulating, and inverting a cortical representation of a sound and describe algorithms for manipulating signal pitch and timbre separately. The algorithms are also used to create sound of an instrument between a “guitar” and a “trumpet.” Excellent sound quality can be achieved if processing time is not a concern, and intelligible signals can be reconstructed in reasonable processing time (about ten seconds of computational time for a one-second signal sampled at 8 kHz). Work on bringing the algorithms into the real-time processing domain is ongoing. VL - 9 ER - TY - CONF T1 - A new approach to image fusion based on cokriging T2 - Information Fusion, 2005 8th International Conference on Y1 - 2005 A1 - Memarsadeghi,N. A1 - Le Moigne,J. A1 - Mount, Dave A1 - Morisette,J. KW - ALI; KW - analysis; KW - based KW - cokriging; KW - component KW - data; KW - forecasting KW - fusion KW - fusion; KW - geophysical KW - geostatistical KW - Hyperion KW - image KW - Interpolation KW - interpolation; KW - invasive KW - ISFS KW - method; KW - metrics; KW - PCA; KW - principal KW - processing; KW - project; KW - QUALITY KW - quantitative KW - remote KW - remotely KW - sensed KW - sensing; KW - sensor KW - sensors; KW - signal KW - species KW - system; KW - techniques; KW - transforms; KW - wavelet KW - wavelet-based AB - We consider the image fusion problem involving remotely sensed data. We introduce cokriging as a method to perform fusion. We investigate the advantages of fusing Hyperion with ALI. This evaluation is performed by comparing the classification of the fused data with that of input images and by calculating well-chosen quantitative fusion quality metrics. We consider the invasive species forecasting system (ISFS) project as our fusion application. The fusion of ALI with Hyperion data is studied using PCA and wavelet-based fusion. We then propose utilizing a geostatistical based interpolation method called cokriging as a new approach for image fusion. JA - Information Fusion, 2005 8th International Conference on VL - 1 M3 - 10.1109/ICIF.2005.1591912 ER - TY - JOUR T1 - New experimental data of STBLI at DNS/LES accessible Reynolds numbers JF - AIAA paper Y1 - 2005 A1 - Bookey,P. A1 - Wyckham,C. A1 - Smits,A. J. A1 - Martin, M.P VL - 309 ER - TY - JOUR T1 - A new framework for addressing temporal range queries and some preliminary results JF - Theoretical Computer Science Y1 - 2005 A1 - Shi,Qingmin A1 - JaJa, Joseph F. KW - algorithms KW - Data structures KW - Orthogonal range search KW - temporal data AB - Given a set of n objects, each characterized by d attributes specified at m fixed time instances, we are interested in the problem of designing space efficient indexing structures such that a class of temporal range search queries can be handled efficiently. When m = 1 , our problem reduces to the d-dimensional orthogonal search problem. We establish efficient data structures to handle several classes of the general problem. Our results include a linear size data structure that enables a query time of O ( log n log m + f ) for one-sided queries when d = 1 , where f is the number of objects satisfying the query. A similar result is shown for counting queries. We also show that the most general problem can be solved with a polylogarithmic query time using superlinear space data structures. VL - 332 SN - 0304-3975 UR - http://www.sciencedirect.com/science/article/pii/S0304397504007005 CP - 1–3 M3 - 10.1016/j.tcs.2004.10.013 ER - TY - JOUR T1 - Non-negative lighting and specular object recognition JF - Proc. of IEEE International Conference on Computer Vision Y1 - 2005 A1 - Jacobs, David W. A1 - Shirdhonkar,S. VL - 2 ER - TY - CONF T1 - Non-negative lighting and specular object recognition T2 - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on Y1 - 2005 A1 - Shirdhonkar,S. A1 - Jacobs, David W. KW - and KW - distribution KW - eigenfunctions;image KW - eigenvalue KW - harmonic KW - Lambertian KW - lighting;nonnegative KW - lighting;semidefinite KW - matching;object KW - object KW - objects;Szego KW - optimization;incident KW - programming;specular KW - recognition;optimisation; KW - recognition;spherical KW - representation;eigenvalues KW - theorem;constrained AB - Recognition of specular objects is particularly difficult because their appearance is much more sensitive to lighting changes than that of Lambertian objects. We consider an approach in which we use a 3D model to deduce the lighting that best matches the model to the image. In this case, an important constraint is that incident lighting should be non-negative everywhere. In this paper, we propose a new method to enforce this constraint and explore its usefulness in specular object recognition, using the spherical harmonic representation of lighting. The method follows from a novel extension of Szego's eigenvalue distribution theorem to spherical harmonics, and uses semidefinite programming to perform a constrained optimization. The new method is faster as well as more accurate than previous methods. Experiments on both synthetic and real data indicate that the constraint can improve recognition of specular objects by better separating the correct and incorrect models JA - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on VL - 2 M3 - 10.1109/ICCV.2005.168 ER - TY - CONF T1 - Non-Stationary "Shape Activities" T2 - Decision and Control, 2005 and 2005 European Control Conference. CDC-ECC '05. 44th IEEE Conference on Y1 - 2005 A1 - Vaswani, N. A1 - Chellapa, Rama AB - The changing configuration of a group of moving landmarks can be modeled as a moving and deforming shape. The landmarks defining the shape could be moving objects(people/vehicles/robots) or rigid components of an articulated shape like the human body. In past work, the term "shape activity" has been used to denote a particular stochastic model for shape deformation. Dynamical models have been proposed for characterizing stationary shape activities (assume constant mean shape). In this work we define stochastic dynamic models for non-stationary shape activities and show that the stationary shape activity model follows as a special case of this. Most activities performed by a group of moving landmarks (here, objects) are not stationary and hence this more general model is needed. We also define a piecewise stationary model with non-stationary transitions which can be used to segment out and track a sequence of activities. Noisy observations coming from these models can be tracked using a particle filter. We discuss applications of our framework to abnormal activity detection, tracking and activity sequence segmentation. JA - Decision and Control, 2005 and 2005 European Control Conference. CDC-ECC '05. 44th IEEE Conference on M3 - 10.1109/CDC.2005.1582374 ER - TY - JOUR T1 - Novel transformation techniques using q-heaps with applications to computational geometry JF - SIAM Journal on Computing Y1 - 2005 A1 - Shi,Q. A1 - JaJa, Joseph F. AB - Using the notions of Q-heaps and fusion trees developed by Fredman and Willard,we develop general transformation techniques to reduce a number of computational geometry prob- lems to their special versions in partially ranked spaces. In particular, we develop a fast fractional cascading technique, which uses linear space and enables sublogarithmic iterative search on catalog trees in the case when the degree of each node is bounded by O(log∈ n), for some constant ϵ > 0, where n is the total size of all the lists stored in the tree. We apply the fast fractional cascading tech- nique in combination with the other techniques to derive the first linear-space sublogarithmic time algorithms for the two fundamental geometric retrieval problems: orthogonal segment intersection and rectangular point enclosure. VL - 34 CP - 6 ER - TY - CONF T1 - New directions in design for manufacturing Y1 - 2004 A1 - Herrmann,J.W. A1 - Cooper,J. A1 - Gupta,S.K. A1 - Hayes,C. C. A1 - Ishii,K. A1 - Kazmer,D. A1 - Sandborn,P. A. A1 - Wood,W. H. AB - This paper gives an overview of research that is expandingthe domain of design for manufacturing (DFM) into new and important areas. This paper covers DFM and concurrent engineering, DFM for conceptual design, DFM for embodiment design, DFM for detailed design, design for production, platform design for reducing time-to-market, design for system quality, design for life cycle costs, and design for environment. The paper concludes with some general guidelines that suggest how manufacturing firms can develop useful, effective DFM tools. UR - http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.198.8706&rep=rep1&type=pdf ER - TY - JOUR T1 - New year’s resolutions for software quality JF - IEEE Software Y1 - 2004 A1 - Basili, Victor R. A1 - Boehm,B. A1 - Davis,A. A1 - Humphrey,W. S A1 - Leveson,N. A1 - Mead,N. R A1 - Musa,J. D A1 - Parnas,D. L A1 - Pfleeger,S. L A1 - Weyuker,E. AB - In the spirit of making resolutions for betterment in the New Year, ten distinguished individuals in the software quality field offer their recommendations on how organizations can improve software quality In the spirit of making resolutions for betterment in the New Year, ten distinguished individuals in the software quality field offer their recommendations on how organizations can improve software quality. VL - 21 CP - 1 ER - TY - JOUR T1 - A Note on Efficient Computation of Haplotypes via Perfect Phylogeny JF - Journal of Computational Biology Y1 - 2004 A1 - Bafna,Vineet A1 - Gusfield,Dan A1 - Hannenhalli, Sridhar A1 - Yooseph,Shibu AB - The problem of inferring haplotype phase from a population of genotypes has received a lot of attention recently. This is partly due to the observation that there are many regions on human genomic DNA where genetic recombination is rare (Helmuth, 2001; Daly et al., 2001; Stephens et al., 2001; Friss et al., 2001). A Haplotype Map project has been announced by NIH to identify and characterize populations in terms of these haplotypes. Recently, Gusfield introduced the perfect phylogeny haplotyping problem, as an algorithmic implication of the no-recombination in long blocks observation, together with the standard population-genetic assumption of infinite sites. Gusfield's solution based on matroid theory was followed by direct θ(nm2 ) solutions that use simpler techniques (Bafna et al., 2003; Eskin et al., 2003), and also bound the number of solutions to the PPH problem. In this short note, we address two questions that were left open. First, can the algorithms of Bafna et al. (2003) and Eskin et al. (2003) be sped-up to O(nm + m2 ) time, which would imply an O(nm) time-bound for the PPH problem? Second, if there are multiple solutions, can we find one that is most parsimonious in terms of the number of distinct haplotypes.We give reductions that suggests that the answer to both questions is "no." For the first problem, we show that computing the output of the first step (in either method) is equivalent to Boolean matrix multiplication. Therefore, the best bound we can presently achieve is O(nmω–1), where ω ≤ 2.52 is the exponent of matrix multiplication. Thus, any linear time solution to the PPH problem likely requires a different approach. For the second problem of computing a PPH solution that minimizes the number of distinct haplotypes, we show that the problem is NP-hard using a reduction from Vertex Cover (Garey and Johnson, 1979). VL - 11 SN - 1066-5277, 1557-8666 UR - http://www.liebertonline.com/doi/abs/10.1089/cmb.2004.11.858 CP - 5 M3 - 10.1089/cmb.2004.11.858 ER - TY - JOUR T1 - A novel approach to removing intersymbol interference from spin-stand images JF - Magnetics, IEEE Transactions on Y1 - 2004 A1 - Mayergoyz, Issak D A1 - Tse,C. A1 - Krafft,C. A1 - McAvoy,P. KW - algorithm; KW - characterization; KW - Deconvolution KW - function KW - function; KW - giant KW - giant-magnetoresistive KW - Head KW - heads; KW - image KW - image; KW - imaging; KW - Interference KW - interference; KW - intersymbol KW - ISI-distorted KW - ISI-free KW - magnetic KW - magnetization KW - magnetoresistance; KW - patterns; KW - readback KW - removal; KW - response KW - signal; KW - spin-stand KW - suppression; AB - A novel intersymbol interference (ISI) removal technique based on the "response function" characterization of giant-magnetoresistive heads is presented. It is demonstrated that the ISI-free readback image that corresponds to the actual underlying magnetization patterns can be extracted from the ISI-distorted readback signal through deconvolution. A new image deconvolution algorithm has been implemented, and it has been shown that it effectively removes the ISI distortions. VL - 40 SN - 0018-9464 CP - 4 M3 - 10.1109/TMAG.2004.830153 ER - TY - CONF T1 - Np bracketing by maximum entropy tagging and SVM reranking T2 - Proceedings of EMNLP Y1 - 2004 A1 - Daumé, Hal A1 - Marcu,D. JA - Proceedings of EMNLP VL - 4 ER - TY - CHAP T1 - Navigation Patterns and Usability of Zoomable User Interfaces With and Without an Overview T2 - The craft of information visualization: readings and reflections Y1 - 2003 A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine JA - The craft of information visualization: readings and reflections PB - Morgan Kaufmann Publishers Inc. SN - 978-1-55860-915-0 ER - TY - JOUR T1 - Navigation patterns & usability of zoomable user interfaces: with and without an overview JF - interactions Y1 - 2003 A1 - Hornbaek,Kasper A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine AB - The following abstracts are from recent issues and the forthcoming issue of ACM's Transactions of Computer Human Interaction (ToCHI). They are included here to alert interactions' readers to what research is being done in the field of Computer Human Interaction. The complete papers, when published, can be found in ACM's Digital Library at www.acm.org/pubs/contents/journals/tochi/ VL - 10 SN - 1072-5520 UR - http://doi.acm.org/10.1145/604575.604582 CP - 1 M3 - 10.1145/604575.604582 ER - TY - JOUR T1 - Necessity is the mother of invention: a simple grid computing system using commodity tools JF - J Parallel Distr Com Y1 - 2003 A1 - Myers,D. S A1 - Cummings, Michael P. KW - Apache; KW - computing; KW - distributed KW - Grid KW - HTTP; KW - Java; KW - Linux; KW - Perl; KW - SQL; KW - Unix; KW - XML-RPC AB - Access to sufficient resources is a barrier to scientific progress for many researchers facing large computational problems. Gaining access to large-scale resources (i.e., university-wide or federally supported computer centers) can be difficult, given their limited availability, particular architectures, and request/review/approval cycles. Simultaneously, researchers often find themselves with access to workstations and older clusters overlooked by their owners in favor of newer hardware. Software to tie these resources into a coherent Grid, however, has been problematic. Here, we describe our experiences building a Grid computing system to conduct a large-scale simulation study using "borrowed" computing resources distributed over a wide area. Using standard software components, we have produced a Grid computing system capable of coupling several hundred processors spanning multiple continents and administrative domains. We believe that this system fills an important niche between a closely coupled local system and a heavyweight, highly customized wide area system. (C) 2003 Elsevier Science (USA). All rights reserved. VL - 63 CP - 5 M3 - DOI 10.1016/S0743-7315(03)00004-2 ER - TY - CONF T1 - New approaches to help users get started with visual interfaces: multi-layered interfaces and integrated initial guidance T2 - Proceedings of the 2003 annual national conference on Digital government research Y1 - 2003 A1 - Kang,Hyunmo A1 - Plaisant, Catherine A1 - Shneiderman, Ben AB - We are investigating new ways to help users learn to use public access interactive tools, in particular for the visual exploration of government statistics. Our work led to a series of interfaces using multi-layered design and a new help method called Integrated Initial Guidance. Multi-layer designs structure an interface so that a simpler interface is available for users to get started and more complex features are accessed as users move through the more advanced layers. Integrated Initial Guidance provides help within the working interface, right at the start of the application. Using the metaphor of "sticky notes" overlaid on top of the functional interface locates the main widgets, demonstrates their manipulation, and explains the resulting actions using preset animation of the interface. Usability testing with 12 participants led to refined designs and guidelines for the design of Integrated Initial Guidance interfaces. JA - Proceedings of the 2003 annual national conference on Digital government research T3 - dg.o '03 PB - Digital Government Society of North America UR - http://dl.acm.org/citation.cfm?id=1123196.1123269 ER - TY - CONF T1 - New eyes for robotics T2 - 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings Y1 - 2003 A1 - Baker, P. A1 - Ogale, A. S A1 - Fermüller, Cornelia A1 - Aloimonos, J. KW - 3D motion estimation KW - Argus eye KW - array signal processing KW - Birds KW - Calibration KW - CAMERAS KW - Control systems KW - Eyes KW - geometric configuration KW - imaging KW - imaging system KW - Layout KW - Motion estimation KW - multiple stereo configurations KW - Robot kinematics KW - robot vision KW - Robot vision systems KW - ROBOTICS KW - Robotics and automation KW - SHAPE KW - shape models AB - This paper describes an imaging system that has been designed to facilitate robotic tasks of motion. The system consists of a number of cameras in a network arranged so that they sample different parts of the visual sphere. This geometric configuration has provable advantages compared to small field of view cameras for the estimation of the system's own motion and consequently the estimation of shape models from the individual cameras. The reason is that inherent ambiguities of confusion between translation and rotation disappear. Pairs of cameras may also be arranged in multiple stereo configurations which provide additional advantages for segmentation. Algorithms for the calibration of the system and the 3D motion estimation are provided. JA - 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings PB - IEEE VL - 1 SN - 0-7803-7860-1 M3 - 10.1109/IROS.2003.1250761 ER - TY - CONF T1 - Nonlinear collusion attacks on independent fingerprints for multimedia T2 - Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on Y1 - 2003 A1 - Zhao,Hong A1 - M. Wu A1 - Wang,Z.J. A1 - Liu,K. J.R KW - attacks; KW - average KW - bounded KW - collusion KW - computing; KW - content KW - copies; KW - digital KW - distribution; KW - fingerprinted KW - fingerprinting; KW - fingerprints; KW - Gaussian KW - independent KW - multimedia KW - nonlinear KW - perceptual KW - quality; KW - robustness; KW - watermarking; AB - Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Collusion attack is a cost effective attack against digital fingerprinting where several copies with the same content but different fingerprints are combined to remove the original fingerprints. In this paper, we investigate average and nonlinear collusion attacks of independent Gaussian fingerprints and study both their effectiveness and the perceptual quality. We also propose the bounded Gaussian fingerprints to improve the perceptual quality of the fingerprinted copies. We further discuss the tradeoff between the robustness against collusion attacks and the perceptual quality of a fingerprinting system. JA - Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on VL - 5 M3 - 10.1109/ICASSP.2003.1200058 ER - TY - CONF T1 - Non-parametric expectation maximization: a learning automata approach T2 - IEEE International Conference on Systems, Man and Cybernetics, 2003 Y1 - 2003 A1 - Abd-Almageed, Wael A1 - El-Osery,A. A1 - Smith,C.E. KW - Automatic speech recognition KW - bivariate simulation data KW - Computational modeling KW - Computer vision KW - Density functional theory KW - expectation maximization technique KW - learning automata KW - mixture parameters estimation KW - nonparametric expectation maximization KW - nonparametric statistics KW - optimisation KW - parameter estimation KW - Parzen Window KW - PDF KW - probability KW - probability density function KW - Speech processing KW - Speech recognition KW - stochastic learning automata KW - Stochastic processes KW - stochastic technique AB - The famous expectation maximization technique suffers two major drawbacks. First, the number of components has to be specified apriori. Also, the expectation maximization is sensitive to initialization. In this paper, we present a new stochastic technique for estimating the mixture parameters. Parzen Window is used to estimate a discrete estimate of the PDF of the given data. Stochastic learning automata is then used to select the mixture parameters that minimize the distance between the discrete estimate of the PDF and the estimate of the expectation maximization. The validity of the proposed approach is verified using bivariate simulation data. JA - IEEE International Conference on Systems, Man and Cybernetics, 2003 PB - IEEE VL - 3 SN - 0-7803-7952-7 M3 - 10.1109/ICSMC.2003.1244347 ER - TY - JOUR T1 - Navigation patterns and usability of zoomable user interfaces with and without an overview JF - ACM Transactions on Computer-Human Interaction (TOCHI) Y1 - 2002 A1 - Hornbaek,K. A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine VL - 9 CP - 4 ER - TY - JOUR T1 - Network-wide BGP route prediction for traffic engineering JF - Proceedings of ITCOM Y1 - 2002 A1 - Feamster, Nick A1 - Rexford,J. AB - The Internet consists of about 13,000 Autonomous Systems (AS’s) that exchange routing information using the BorderGateway Protocol (BGP). The operators of each AS must have control over the flow of traffic through their network and between neighboring AS’s. However, BGP is a complicated, policy-based protocol that does not include any direct support for traffic engineering. In previous work, we have demonstrated that network operators can adapt the flow of traffic in an efficient and predictable fashion through careful adjustments to the BGP policies running on their edge routers. Nevertheless, many details of the BGP protocol and decision process make predicting the effects of these policy changes difficult. In this paper, we describe a tool that predicts traffic flow at network exit points based on the network topology, the import policy associated with each BGP session, and the routing advertisements received from neighboring AS’s. We present a linear-time algorithm that computes a network-wide view of the best BGP routes for each destination prefix given a static snapshot of the network state, without simulating the complex details of BGP message passing. We describe how to construct this snapshot using the BGP routing tables and router configuration files available from operational routers. We verify the accuracy of our algorithm by applying our tool to routing and configuration data from AT&T’s commercial IP network. Our route prediction techniques help support the operation of large IP backbone networks, where interdomain routing is an important aspect of traffic engineering. ER - TY - JOUR T1 - A new, expressed multigene family containing a hot spot for insertion of retroelements is associated with polymorphic subtelomeric regions of Trypanosoma brucei JF - Eukaryotic cell Y1 - 2002 A1 - Bringaud,F. A1 - Biteau,N. A1 - Melville,S. E. A1 - Hez,S. A1 - El‐Sayed, Najib M. A1 - Leech,V. A1 - Berriman,M. A1 - Hall,N. A1 - Donelson,J. E A1 - Baltz,T. VL - 1 CP - 1 ER - TY - CONF T1 - A noisy-channel model for document compression T2 - Proceedings of the 40th Annual Meeting on Association for Computational Linguistics Y1 - 2002 A1 - Daumé, Hal A1 - Marcu,Daniel AB - We present a document compression system that uses a hierarchical noisy-channel model of text production. Our compression system first automatically derives the syntactic structure of each sentence and the overall discourse structure of the text given as input. The system then uses a statistical hierarchical model of text production in order to drop non-important syntactic and discourse constituents so as to generate coherent, grammatical document compressions of arbitrary length. The system outperforms both a baseline and a sentence-based compression system that operates by simplifying sequentially all sentences in a text. Our results support the claim that discourse knowledge plays an important role in document summarization. JA - Proceedings of the 40th Annual Meeting on Association for Computational Linguistics T3 - ACL '02 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dx.doi.org/10.3115/1073083.1073159 M3 - 10.3115/1073083.1073159 ER - TY - CONF T1 - A non-intrusive Kalman filter-based tracker for pursuit eye movement T2 - American Control Conference, 2002. Proceedings of the 2002 Y1 - 2002 A1 - Abd-Almageed, Wael A1 - Fadali,M. S A1 - Bebis,G. KW - Application software KW - characterization KW - Computer vision KW - Current measurement KW - deterministic component KW - Electric variables measurement KW - eye position estimation KW - eye tracking KW - gaze tracking KW - Human computer interaction KW - Kalman filter KW - Kalman filters KW - Lenses KW - Motion estimation KW - Optical reflection KW - pursuit eye movement KW - pursuit motion KW - random component KW - Skin KW - tracking AB - In this paper, we introduce a new non-intrusive approach to estimating the eye position during pursuit motion of the eye. We introduce a new characterization for the pursuit eye movement. Our characterization is based on the decomposition of the pursuit eye motion into a deterministic component and random component. We use a discrete Kalman filter to estimate the random component and calculate the deterministic component. We add the two components to obtain an estimate of the eye position. Simulation results are provided to illustrate the eye position estimation. JA - American Control Conference, 2002. Proceedings of the 2002 PB - IEEE VL - 2 SN - 0-7803-7298-0 UR - http://ieeexplore.ieee.org/ielx5/7965/22015/01023224.pdf?tp=&arnumber=1023224&isnumber=22015 M3 - 10.1109/ACC.2002.1023224 ER - TY - JOUR T1 - Nonlinear collusion attacks on independent multimedia fingerprints JF - submitted to IEEE Trans. on Image Proc Y1 - 2002 A1 - Zhao,H. A1 - Wu,M. A1 - Wang,Z.J. A1 - Liu,K. J.R ER - TY - CONF T1 - Non-manifold decomposition in arbitrary dimensions T2 - Discrete Geometry for Computer Imagery Y1 - 2002 A1 - De Floriani, Leila A1 - Mesmoudi,M. A1 - Morando,F. A1 - Puppo,E. AB - In this paper we consider the problem of decomposing a nonmanifold n-dimensional object described by an abstract simplicial complex into an assembly of ‘more-regular’ components. Manifolds, which would be natural candidates for components, cannot be used to this aim in high dimensions because they are not decidable sets. Therefore, we define d-quasi-manifolds, a decidable superset of the class of combinatorial d-manifolds that coincides with d-manifolds in dimension less or equal than two. We first introduce the notion of d-quasi-manifold complexes, then we sketch an algorithm to decompose an arbitrary complex into an assembly of quasi-manifold components abutting at non-manifold joints. This result provides a rigorous starting point for our future work, which includes designing efficient data structures for non-manifold modeling, as well as defining a notion of measure of shape complexity of such models. JA - Discrete Geometry for Computer Imagery M3 - 10.1007/3-540-45986-3_6 ER - TY - CONF T1 - Numerical study of the influence of the torso on the HRTF T2 - Acoustics, Speech, and Signal Processing, 1993. ICASSP-93., 1993 IEEE International Conference on Y1 - 2002 A1 - Gumerov, Nail A. A1 - Duraiswami, Ramani A1 - Tang,Z. JA - Acoustics, Speech, and Signal Processing, 1993. ICASSP-93., 1993 IEEE International Conference on VL - 2 ER - TY - JOUR T1 - Near-optimal design of MP S tunnels with shared recovery JF - DIMACS Mini-Workshop on Quality of Service Issues in the Internet Y1 - 2001 A1 - Fleischer,L. A1 - Meyerson,A. A1 - Saniee,I. A1 - Shepherd,FB A1 - Srinivasan, Aravind AB - We describe the optimization problem associ-ated with the concurrent routing of demands with guar- anteed shared recovery in case of network failures. This problem arises in routing with protection in meshes and is known to be hard. We describe the problem in the context of the efficient design of restorable MP S tunnels in optical networks. The underlying design gives rise to a stochastic optimization problem that is equivalent to a (very) large- scale linear programming (LP) problem that explicitly in- corporates the network failure scenarios. The feasible re- gion for this LP is given by combined packing and cover- ing constraints for concurrent and optimal multicommodity flows. We develop a novel -approximation procedure for this problem and demonstrate its performance for a variety of real network sizes. An attraction of our approach is that its main computation consists of routing flow along a pair of short paths and these paths are easily found. Commer- cial general-purpose LP solvers are typically unable to solve these problems once they become large enough, while our approach scales for large networks. We conclude that the proposed scheme provides guaranteed approximation to the design of restorable MP S tunnels with shared protection within realistic network settings. ER - TY - CONF T1 - New approaches to covering and packing problems T2 - Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms Y1 - 2001 A1 - Srinivasan, Aravind AB - Covering and packing integer programs model a large family of combinatorial optimization problems. The current-best approximation algorithms for these are an instance of the basic probabilistic method: showing that a certain randomized approach produces a good approximation with positive probability. This approach seems inherently sequential; by employing the method of alteration we present the first RNC and NC approximation algorithms that match the best sequential guarantees. Extending our approach, we get the first RNC and NC approximation algorithms for certain multi-criteria versions of these problems. We also present the first NC algorithms for two packing and covering problems that are not subsumed by the above result: finding large independent sets in graphs, and rounding fractional Group Steiner solutions on trees. JA - Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms T3 - SODA '01 PB - Society for Industrial and Applied Mathematics CY - Philadelphia, PA, USA SN - 0-89871-490-7 UR - http://dl.acm.org/citation.cfm?id=365411.365535 ER - TY - CONF T1 - Nearly optimal expected-case planar point location T2 - Foundations of Computer Science, 2000. Proceedings. 41st Annual Symposium on Y1 - 2000 A1 - Arya,S. A1 - Malamatos,T. A1 - Mount, Dave KW - computational geometry KW - convex cells KW - data structure KW - expected search time KW - nearly optimal expected-case planar point location KW - optimal binary search tree KW - planar point location KW - planar polygonal subdivision KW - polygonal cells KW - polygonal subdivision KW - probability KW - search problems KW - search structure KW - subdivision KW - trees (mathematics) AB - We consider the planar point location problem from the perspective of expected search time. We are given a planar polygonal subdivision S and for each polygon of the subdivision the probability that a query point lies within this polygon. The goal is to compute a search structure to determine which cell of the subdivision contains a given query point, so as to minimize the expected search time. This is a generalization of the classical problem of computing an optimal binary search tree for one-dimensional keys. In the one-dimensional case it has long been known that the entropy H of the distribution is the dominant term in the lower bound on the expected-case search time, and further there exist search trees achieving expected search times of at most H+2. Prior to this work, there has been no known structure for planar point location with an expected search time better than 2H, and this result required strong assumptions on the nature of the query point distribution. Here we present a data structure whose expected search time is nearly equal to the entropy lower bound, namely H+o(H). The result holds for any polygonal subdivision in which the number of sides of each of the polygonal cells is bounded, and there are no assumptions on the query distribution within each cell. We extend these results to subdivisions with convex cells, assuming a uniform query distribution within each cell JA - Foundations of Computer Science, 2000. Proceedings. 41st Annual Symposium on M3 - 10.1109/SFCS.2000.892108 ER - TY - JOUR T1 - A Neural Network Approach for Predicting Network Resource Requirements in Video Transmission Systems JF - Proc. IEEE Pacific RIM Conference on Multimedia, Sydney, Australia Y1 - 2000 A1 - Wong,H.S. A1 - Wu,M. A1 - Joyce,R.A. A1 - Guan,L. A1 - Kung, S.Y. AB - Dynamic resource allocation is important for ensuring ef-ficient network utilization in Internet-based multimedia content delivery system. To allow accurate network traf- fic prediction in the case of video delivery, relevant infor- mation based on video contents and the short term traffic pattern has to be taken into account, while the inclusion of non-relevant features will deterioriate the prediction per- formance due to the "curse of dimensionality" problem. In this work, we propose a neural network-based predic- tion system and specifically address the determination of relevant input features for the system. Experiments have shown that the current system is capable of identifying a highly relevant subset of features for traffic prediction given a large number of video content and short-term net- work traffic descriptors. ER - TY - JOUR T1 - New eyes for building models from video JF - Computational Geometry Y1 - 2000 A1 - Fermüller, Cornelia A1 - Aloimonos, J. A1 - Brodský,Tomáš KW - model building KW - shape reconstruction KW - structure from motion KW - video analysis AB - Models of real-world objects and actions for use in graphics, virtual and augmented reality and related fields can only be obtained through the use of visual data and particularly video. This paper examines the question of recovering shape models from video information. Given video of an object or a scene captured by a moving camera, a prerequisite for model building is to recover the three-dimensional (3D) motion of the camera which consists of a rotation and a translation at each instant. It is shown here that a spherical eye (an eye or system of eyes providing panoramic vision) is superior to a camera-type eye (an eye with restricted field of view such as a common video camera) as regards the competence of 3D motion estimation. This result is derived from a geometric/statistical analysis of all the possible computational models that can be used for estimating 3D motion from an image sequence. Regardless of the estimation procedure for a camera-type eye, the parameters of the 3D rigid motion (translation and rotation) contain errors satisfying specific geometric constraints. Thus, translation is always confused with rotation, resulting in inaccurate results. This confusion does not happen for the case of panoramic vision. Insights obtained from this study point to new ways of constructing powerful imaging devices that suit particular tasks in visualization and virtual reality better than conventional cameras, thus leading to a new camera technology. Such new eyes are constructed by putting together multiple existing video cameras in specific ways, thus obtaining eyes from eyes. For a new eye of this kind we describe an implementation for deriving models of scenes from video data, while avoiding the correspondence problem in the video sequence. VL - 15 SN - 0925-7721 UR - http://www.sciencedirect.com/science/article/pii/S0925772199000449 CP - 1–3 M3 - 10.1016/S0925-7721(99)00044-9 ER - TY - CHAP T1 - New Eyes for Shape and Motion Estimation T2 - Biologically Motivated Computer VisionBiologically Motivated Computer Vision Y1 - 2000 A1 - Baker,Patrick A1 - Pless,Robert A1 - Fermüller, Cornelia A1 - Aloimonos, J. ED - Lee,Seong-Whan ED - Bülthoff,Heinrich ED - Poggio,Tomaso AB - Motivated by the full field of view of insect eyes and their fast and accurate estimation of egomotion, we constructed a system of cameras to take advantage of the full field of view (FOV) constraints that insects use. In this paper, we develop a new ego-motion algorithm for a rigidly mounted set of cameras undergoing arbitrary rigid motion. This egomotion algorithm combines the unambiguous components of the motion computed by each separate camera. We prove that the cyclotorsion is resistant to errors and show this empirically. We show how to calibrate the system with two novel algorithms, one using secondary cameras and one using self calibration. Given this system calibration, the new 3D motion algorithm first computes the rotation and then the 3D translation. We apply this algorithm to a camera system constructed with four rigidly mounted synchronized cameras pointing in various directions and present motion estimation results at www.cfar.umd.edu/ pbaker/argus.html. JA - Biologically Motivated Computer VisionBiologically Motivated Computer Vision T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1811 SN - 978-3-540-67560-0 UR - http://dx.doi.org/10.1007/3-540-45482-9_12 ER - TY - CONF T1 - A New Framework for Multi-camera Structure from Motion T2 - Mustererkennung 2000, 22. DAGM-Symposium Y1 - 2000 A1 - Neumann, J. A1 - Fermüller, Cornelia A1 - Aloimonos, J. JA - Mustererkennung 2000, 22. DAGM-Symposium ER - TY - JOUR T1 - A new relative perturbation theorem for singular subspaces JF - Linear Algebra and its Applications Y1 - 2000 A1 - Li,Ren-Cang A1 - Stewart, G.W. KW - Multiplicative perturbation KW - Relative gap KW - Relative perturbation theory KW - Singular subspace AB - This note addresses the sensitivity of singular subspaces of a matrix under relative perturbations. It employs a new technique of separating a multiplicative perturbation D into two components: one is the distance of a scalar multiple of D to the nearest unitary matrix Q and the other is the distance of Q to the identity. Consequently, the new bounds reflect the intrinsic differences in how left and right multiplicative perturbations affect left and right singular subspaces. VL - 313 SN - 0024-3795 UR - http://www.sciencedirect.com/science/article/pii/S0024379500000744 CP - 1–3 M3 - 10.1016/S0024-3795(00)00074-4 ER - TY - CONF T1 - A no-busy-wait balanced tree parallel algorithmic paradigm T2 - Proceedings of the twelfth annual ACM symposium on Parallel algorithms and architectures Y1 - 2000 A1 - Vishkin, Uzi AB - Suppose that a parallel algorithm can include any number of parallel threads. Each thread can proceed without ever having to busy wait to another thread. A thread can proceed till its termination, but no new threads can be formed. What kind of problems can such restrictive algorithms solve and still be competitive in the total number of operations they perform with the fastest serial algorithm for the same problem?Intrigued by this informal question, we considered one of the most elementary parallel algorithmic paradigms, that of balanced binary trees. The main contribution of this paper is a new balanced (not necessarily binary) tree no-busy-wait paradigm for parallel algorithms; applications of the basic paradigm to two problems are presented: building heaps, and executing parallel tree contraction (assuming a preparatory stage); the latter is known to be applicable to evaluating a family of general arithmetic expressions. For putting things in context, we also discuss our “PRAM-on-chip” vision (actually a small update to it), presented at SPAA98. JA - Proceedings of the twelfth annual ACM symposium on Parallel algorithms and architectures T3 - SPAA '00 PB - ACM CY - New York, NY, USA SN - 1-58113-185-2 UR - http://doi.acm.org/10.1145/341800.341818 M3 - 10.1145/341800.341818 ER - TY - JOUR T1 - Numerical simulation of small-signal microwave performance of 4H–SiC MESFET JF - Solid-State Electronics Y1 - 2000 A1 - Huang,Mingwei A1 - Mayergoyz, Issak D A1 - Goldsman,Neil AB - Small-signal high frequency characteristics of 4H–SiC MESFET has been studied by using two-dimensional numerical drift-diffusion model in frequency domain. Non-ideal Schottky boundary conditions have been introduced that take into account a thin interfacial layer and interface energy states. It has been demonstrated that the 10 dB/dec small-signal current gain roll-off can be attributed to the existence of high density interface states at the metal–semiconductor interface. It has been found that as the gate length is reduced to 0.1 μm, fT and fmax may reach as high as 30 and 62 GHz, respectively. VL - 44 SN - 0038-1101 UR - http://www.sciencedirect.com/science/article/pii/S0038110100000253 CP - 7 M3 - 10.1016/S0038-1101(00)00025-3 ER - TY - JOUR T1 - Nano-to-millimeter scale integrated systems JF - Components and Packaging Technologies, IEEE Transactions on Y1 - 1999 A1 - Last,H.R. A1 - Deeds,M. A1 - Garvick,D. A1 - Kavetsky,R. A1 - Sandborn,P. A. A1 - Magrab,E. B. A1 - Gupta,S.K. KW - fabrication technology KW - In2m KW - integrated nano to millimeter system KW - micromechanical devices KW - nanotechnology AB - Over the last several years various industries have been developing nano, micro, and millimeter scale technologies, which have resulted in components ranging from quantum transistors, to widely commercialized integrated circuits, to microelectromechanical sensors. A common emphasis of these fabrication industries has been on the integration of different functions in miniaturized systems; however, the technology currently used to realize these systems is monolithic. A unique class of hybrid technology systems is Integrated nano to millimeter (In2m) systems. An In2m system typically has components spanning multiple sizes, diverse technology domains, and mixtures of electrical, mechanical, thermal, chemical, fluidic, and biological functions VL - 22 SN - 1521-3331 CP - 2 M3 - 10.1109/6144.774758 ER - TY - CHAP T1 - Network Programming Using PLAN T2 - Internet Programming LanguagesInternet Programming Languages Y1 - 1999 A1 - Hicks, Michael W. A1 - Kakkar,Pankaj A1 - Moore,Jonathan A1 - Gunter,Carl A1 - Nettles,Scott ED - Bal,Henri ED - Belkhouche,Boumediene ED - Cardelli,Luca AB - We present here a methodology for programming active networks in the environment defined by our new language PLAN (Packet Language for Active Networks). This environment presumes a two-level architecture consisting of: 1. active packets carrying PLAN code; and 2. downloadable, node-resident services written in more general-purpose languages. We present several examples which illustrate how these two features can be combined to implement various network functions. JA - Internet Programming LanguagesInternet Programming Languages T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1686 SN - 978-3-540-66673-8 UR - http://dx.doi.org/10.1007/3-540-47959-7_7 ER - TY - CONF T1 - Network service selection for distributed multimedia applications T2 - Third International Conference on Computational Intelligence and Multimedia Applications, 1999. ICCIMA '99. Proceedings Y1 - 1999 A1 - Simon,R. A1 - Sood,A. A1 - Mundur, Padma KW - Admission control KW - Application software KW - application-adequate end-to-end service KW - Bandwidth KW - Communication system traffic control KW - Computer science KW - Delay KW - distributed processing KW - end-to-end delivery delay control KW - flexibility KW - high-bandwidth distributed multimedia applications KW - interactive multimedia KW - multimedia systems KW - network service selection KW - network throughput KW - nonpreemptive earliest deadline first KW - queueing theory KW - Regulators KW - system support KW - telecommunication services KW - Throughput KW - Traffic control KW - weighted fair queueing AB - An important question in the development of system support for distributed multimedia is the type of network service offered to applications. This paper compares two network service disciplines: weighted fair queueing (WFQ) and non-preemptive earliest deadline first (NEDF). We show that, for a broad class of high-bandwidth distributed multimedia applications, WFQ outperforms NEDF in terms of network throughput while still providing an application-adequate end-to-end service. This result holds despite the fact that NEDF offers applications far greater flexibility in terms of control over end-to-end delivery delay JA - Third International Conference on Computational Intelligence and Multimedia Applications, 1999. ICCIMA '99. Proceedings PB - IEEE SN - 0-7695-0300-4 M3 - 10.1109/ICCIMA.1999.798561 ER - TY - JOUR T1 - A neural network model of lateralization during letter identification JF - Journal of Cognitive Neuroscience Y1 - 1999 A1 - Shevtsova,N. A1 - Reggia, James A. VL - 11 CP - 2 ER - TY - CONF T1 - New algorithmic aspects of the Local Lemma with applications to routing and partitioning T2 - Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms Y1 - 1999 A1 - Leighton,Tom A1 - Rao,Satish A1 - Srinivasan, Aravind JA - Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms T3 - SODA '99 PB - Society for Industrial and Applied Mathematics CY - Philadelphia, PA, USA SN - 0-89871-434-6 UR - http://dl.acm.org/citation.cfm?id=314500.314886 ER - TY - JOUR T1 - A new deterministic parallel sorting algorithm with an experimental evaluation JF - Journal of Experimental Algorithmics (JEA) Y1 - 1998 A1 - Helman,David R. A1 - JaJa, Joseph F. A1 - Bader,David A. KW - generalized sorting KW - integer sorting KW - Parallel algorithms KW - parallel performance KW - sorting by regular sampling AB - We introduce a new deterministic parallel sorting algorithm for distributed memory machines based on the regular sampling approach. The algorithm uses only two rounds of regular all-to-all personalized communication in a scheme that yields very good load balancing with virtually no overhead. Moreover, unlike previous variations, our algorithm efficiently handles the presence of duplicate values without the overhead of tagging each element with a unique identifier. This algorithm was implemented in SPLIT-C and run on a variety of platforms, including the Thinking Machines CM-5, the IBM SP-2-WN, and the Cray Research T3D. We ran our code using widely different benchmarks to examine the dependence of our algorithm on the input distribution. Our experimental results illustrate the efficiency and scalability of our algorithm across different platforms. In fact, the performance compares closely to that of our random sample sort algorithm, which seems to outperform all similar algorithms known to the authors on these platforms. Together, their performance is nearly invariant over the set of input distributions, unlike previous efficient algorithms. However, unlike our randomized sorting algorithm, the performance and memory requirements of our regular sorting algorithm can be deterministically guaranteed. VL - 3 SN - 1084-6654 UR - http://doi.acm.org/10.1145/297096.297128 M3 - 10.1145/297096.297128 ER - TY - JOUR T1 - A New Method to Recover Vectorial Electric Fields and Current Densities from Unstructured Meshes JF - VLSI DESIGN Y1 - 1998 A1 - Kerr,D. C. A1 - Mayergoyz, Issak D AB - In the context of 2-D and 3-D unstructured mixed-element meshes, a new method of recover-ing vectorial fields and currents in multidimensional simulation is introduced. The new method, called the method of edge elements, directly interpolates the projections of the vec- tors on the edges of an element into its interior. The new method is compared to two other recovery methods on the basis of resolution, consistency, and implementation ease. VL - 6 CP - 1/4 ER - TY - JOUR T1 - Nucleotide sequence diversity at the alcohol dehydrogenase 1 locus in wild barley (ıt Hordeum vulgare ssp. ıt spontaneum): an evaluation of the background selection hypothesis JF - Proc Natl Acad Sci USA Y1 - 1998 A1 - Cummings, Michael P. A1 - Clegg,M. T AB - The background selection hypothesis predicts a reduction in nucleotide site diversity and an excess of rare variants, owing to linkage associations with deleterious alleles. This effect is expected to be amplified in species that are predominantly self-fertilizing. To examine the predictions of the background selection hypothesis in self-fertilizing species, we sequenced 1,362 bp of adh1, a gene for alcohol dehydrogenase (Adh; alcohol:NAD+ oxidoreductase, EC 1.1.1.1), in a sample of 45 accessions of wild barley, Hordeum vulgare ssp. spontaneum, drawn from throughout the species range. The region sequenced included 786 bp of exon sequence (part of exon 4, all of exons 5-9, and part of exon 10) and 576 bp of intron sequence (all of introns 4-9). There were 19 sites polymorphic for nucleotide substitutions, 8 in introns, and 11 in exons. Of the 11 nucleotide substitutions in codons, 4 were synonymous and 7 were nonsynonymous, occurring uniquely in the sample. There was no evidence of recombination in the region studied, and the estimated effective population size (Ne) based on synonymous sites was approximately 1.8-4.2 x 10(5). Several tests reveal that the pattern of nonsynonymous substitutions departs significantly from neutral expectations. However, the data do not appear to be consistent with recovery from a population bottleneck, recent population expansion, selective sweep, or strong positive selection. Though several features of the data are consistent with background selection, the distributions of polymorphic synonymous and intron sites are not perturbed toward a significant excess of rare alleles as would be predicted by background selection. VL - 95 CP - 10 ER - TY - CONF T1 - Navigating static environments using image-space simplification and morphing T2 - Proceedings of the 1997 symposium on Interactive 3D graphics Y1 - 1997 A1 - Darsa,Lucia A1 - Costa Silva,Bruno A1 - Varshney, Amitabh JA - Proceedings of the 1997 symposium on Interactive 3D graphics T3 - I3D '97 PB - ACM CY - New York, NY, USA SN - 0-89791-884-3 UR - http://doi.acm.org/10.1145/253284.253298 M3 - 10.1145/253284.253298 ER - TY - JOUR T1 - A Network-Flow Technique for Finding Low-Weight Bounded-Degree Spanning Trees JF - Journal of Algorithms Y1 - 1997 A1 - Fekete,Sándor P A1 - Khuller, Samir A1 - Klemmstein,Monika A1 - Raghavachari,Balaji A1 - Young,Neal AB - Given a graph with edge weights satisfying the triangle inequality, and a degree bound for each vertex, the problem of computing a low-weight spanning tree such that the degree of each vertex is at most its specified bound is considered. In particular, modifying a given spanning treeTusingadoptionsto meet the degree constraints is considered. A novel network-flow-based algorithm for finding a good sequence of adoptions is introduced. The method yields a better performance guarantee than any previous algorithm. If the degree constraintd(v) for eachvis at least 2, the algorithm is guaranteed to find a tree whose weight is at most the weight of the given tree times 2 − min{(d(v) − 2)/(degT(v) − 2) : degT(v) > 2}, where degT(v) is the initial degree ofv. Equally importantly, it takes this approach to the limit in the following sense: if any performance guarantee that is solely a function of the topology and edge weights of a given tree holds foranyalgorithm at all, then it also holds for the given algorithm. Examples are provided in which no lighter tree meeting the degree constraint exists. Linear-time algorithms are provided with the same worst-case performance guarantee. ChoosingTto be a minimum spanning tree yields approximation algorithms with factors less than 2 for the general problem on geometric graphs with distances induced by variousLpnorms. Finally, examples of Euclidean graphs are provided in which the ratio of the lengths of an optimal Traveling Salesman path and a minimum spanning tree can be arbitrarily close to 2. VL - 24 SN - 0196-6774 UR - http://www.sciencedirect.com/science/article/pii/S0196677497908622 CP - 2 M3 - 10.1006/jagm.1997.0862 ER - TY - JOUR T1 - The next generation of graphical user interfaces: information visualization and better window management JF - Displays Y1 - 1997 A1 - Shneiderman, Ben VL - 17 SN - 0141-9382 UR - http://www.sciencedirect.com/science/article/pii/S014193829700005X CP - 3–4 M3 - 10.1016/S0141-9382(97)00005-X ER - TY - JOUR T1 - A note on conjugate gradient convergence JF - Numerische Mathematik Y1 - 1997 A1 - Naiman, A. E A1 - Babuška, I. M A1 - Elman, Howard VL - 76 CP - 2 ER - TY - CONF T1 - The NCSU concurrency workbench T2 - Computer Aided Verification Y1 - 1996 A1 - Cleaveland, Rance A1 - Sims,S. JA - Computer Aided Verification ER - TY - JOUR T1 - A neural model of positive schizophrenic symptoms JF - Schizophrenia Bulletin Y1 - 1996 A1 - Ruppin,E. A1 - Reggia, James A. A1 - Horn,D. VL - 22 CP - 1 ER - TY - JOUR T1 - A neural model of delusions and hallucinations in schizophrenia JF - Advances in Neural Information Processing Systems Y1 - 1995 A1 - Ruppin,E. A1 - Reggia, James A. A1 - Horn,D. ER - TY - JOUR T1 - A neural model of memory impairment in diffuse cerebral atrophy JF - The British Journal of Psychiatry Y1 - 1995 A1 - Ruppin,E. A1 - Reggia, James A. VL - 166 CP - 1 ER - TY - JOUR T1 - Next generation network management technology JF - AIP Conference Proceedings Y1 - 1995 A1 - Baras,John S A1 - Atallah,George C A1 - Ball,Mike A1 - Goli,Shravan A1 - Karne,Ramesh K A1 - Kelley,Steve A1 - Kumar,Harsha A1 - Plaisant, Catherine A1 - Roussopoulos, Nick A1 - Schneiderman,Ben A1 - Srinivasarao,Mulugu A1 - Stathatos,Kosta A1 - Teittinen,Marko A1 - Whitefield,David AB - Today’s telecommunications networks are becoming increasingly large, complex, mission critical and heterogeneous in several dimensions. For example, the underlying physical transmission facilities of a given network may be ‘‘mixed media’’ (copper, fiber‐optic, radio, and satellite); the subnetworks may be acquired from different vendors due to economic, performance, or general availability reasons; the information being transmitted over the network may be ‘‘multimedia’’ (video, data, voice, and images) and, finally, varying performance criteria may be imposed e.g., data transfer may require high throughput while the others, whose concern is voice communications, may require low call blocking probability. For these reasons, future telecommunications networks are expected to be highly complex in their services and operations. Due to this growing complexity and the disparity among management systems for individual sub‐networks, efficient network management systems have become critical to the current and future success of telecommunications companies. This paper addresses a research and development effort which focuses on prototyping configuration management, since that is the central process of network management and all other network management functions must be built upon it. Our prototype incorporates ergonomically designed graphical user interfaces tailored to the network configuration management subsystem and to the proposed advanced object‐oriented database structure. The resulting design concept follows open standards such as Open Systems Interconnection (OSI) and incorporates object oriented programming methodology to associate data with functions, permit customization, and provide an open architecture environment. © 1995 American Institute of Physics VL - 325 SN - 0094243X UR - http://proceedings.aip.org/resource/2/apcpcs/325/1/75_1?isAuthorized=no CP - 1 M3 - doi:10.1063/1.47255 ER - TY - CONF T1 - A note on reducing parallel model simulations to integer sorting T2 - Parallel Processing Symposium, 1995. Proceedings., 9th International Y1 - 1995 A1 - Matias,E. A1 - Vishkin, Uzi JA - Parallel Processing Symposium, 1995. Proceedings., 9th International ER - TY - JOUR T1 - Navigating in hyperspace: designing a structure-based toolbox JF - Communications of the ACM Y1 - 1994 A1 - Rivlin,Ehud A1 - Botafogo,Rodrigo A1 - Shneiderman, Ben VL - 37 SN - 0001-0782 UR - http://doi.acm.org/10.1145/175235.175242 CP - 2 M3 - 10.1145/175235.175242 ER - TY - JOUR T1 - A neural model of cortical map reorganization following a focal lesion JF - Artificial Intelligence in Medicine Y1 - 1994 A1 - Armentrout,S. L A1 - Reggia, James A. A1 - Weinrich,M. VL - 6 CP - 5 ER - TY - RPRT T1 - Next Generation Network Management Technology Y1 - 1994 A1 - Atallah,George C A1 - Ball,Michael O A1 - Baras,John S A1 - Goli,Shravan K A1 - Karne,Ramesh K A1 - Kelley,Stephen A1 - Kumar,Harsha P. A1 - Plaisant, Catherine A1 - Roussopoulos, Nick A1 - Shneiderman, Ben A1 - Srinivasarao,Mulugu A1 - Stathatos,Kostas A1 - Teittinen,Marko A1 - Whitefield,David KW - Constraints for Network Management. KW - Network Configuration Management KW - network management KW - Object Oriented Data Base Model for Network Management KW - Rules KW - Systems Integration KW - Visual Information Management for Network Configuration Management AB - Today's telecommunications networks are becoming increasingly large, complex, mission critical and heterogeneous in several dimensions. For example, the underlying physical transmission facilities of a given network may be ﲭixed media (copper, fiber- optic, radio, and satellite); the sub networks may be acquired from different vendors due to economic, performance, or general availability reasons; the information being transmitted over the network may be ﲭultimedia (video, data, voice, and images) and, finally, varying performance criteria may be imposed e.g. data transfer may require high throughput while the others, whose concern is voice communications, may require low call blocking probability. For these reasons, future telecommunications networks are expected to be highly complex in their services and operations. Due to this growing complexity and the disparity among management systems for individual sub networks, efficient network management systems have become critical to the current and future success of telecommunications companies. This paper addresses a research and development effort which focuses on prototyping configuration management, since that is the central process of network management and all other network management functions must be built upon it. Our prototype incorporates ergonomically designed graphical user interfaces tailored to the network configuration management subsystem and to the proposed advanced object-oriented database structure. The resulting design concept follows open standards such as Open Systems Interconnection (OSI) and incorporates object oriented programming methodology to associate data with functions, permit customization, and provide an open architecture environment.- A revised version of this technical report has been published in