TY - JOUR T1 - Natural Disasters and Cholera Outbreaks: Current Understanding and Future Outlook JF - Current Environmental Health Reports Y1 - 2017 A1 - Jutla, Antarpreet A1 - Khan, Rakibul A1 - Rita R Colwell AB - Purpose of Review Diarrheal diseases remain a serious global public health threat, especially for those populations lacking access to safe water and sanitation infrastructure. Although association of several diarrheal diseases, e.g., cholera, shigellosis, etc., with climatic processes has been documented, the global human population remains at heightened risk of outbreak of diseases after natural disasters, such as earthquakes, floods, or droughts. In this review, cholera was selected as a signature diarrheal disease and the role of natural disasters in triggering and transmitting cholera was analyzed. Recent Findings Key observations include identification of an inherent feedback loop that includes societal structure, prevailing climatic processes, and spatio-temporal seasonal variability of natural disasters. Data obtained from satellite-based remote sensing are concluded to have application, although limited, in predicting risks of a cholera outbreak(s). Summary We argue that with the advent of new high spectral and spatial resolution data, earth observation systems should be seamlessly integrated in a decision support mechanism to be mobilize resources when a region suffers a natural disaster. A framework is proposed that can be used to assess the impact of natural disasters with response to outbreak of cholera, providing assessment of short- and long-term influence of climatic processes on disease outbreaks. UR - http://link.springer.com/10.1007/s40572-017-0132-5 CP - 1Suppl 1 J1 - Curr Envir Health Rpt M3 - 10.1007/s40572-017-0132-5 ER - TY - JOUR T1 - Non-O1/Non-O139 Vibrio cholerae Carrying Multiple Virulence Factors and V. cholerae O1 in the Chesapeake Bay, Maryland JF - Applied and Environmental Microbiology Y1 - 2015 A1 - Ceccarelli, Daniela A1 - Chen, Arlene A1 - Hasan, Nur A. A1 - Rashed, Shah M. A1 - Huq, Anwar A1 - Rita R Colwell ED - Elkins, C. A. AB - Non-O1/non-O139 Vibrio cholerae inhabits estuarine and coastal waters globally, but its clinical significance has not been sufficiently investigated, despite the fact that it has been associated with septicemia and gastroenteritis. The emergence of virulent non-O1/non-O139 V. cholerae is consistent with the recognition of new pathogenic variants worldwide. Oyster, sediment, and water samples were collected during a vibrio surveillance program carried out from 2009 to 2012 in the Chesapeake Bay, Maryland. V. cholerae O1 was detected by a direct fluorescent-antibody (DFA) assay but was not successfully cultured, whereas 395 isolates of non-O1/non-O139 V. cholerae were confirmed by multiplex PCR and serology. Only a few of the non-O1/non-O139 V. cholerae isolates were resistant to ampicillin and/or penicillin. Most of the isolates were sensitive to all antibiotics tested, and 77 to 90% carried the El Tor variant hemolysin gene hlyA ET, the actin cross-linking repeats in toxin gene rtxA, the hemagglutinin protease gene hap, and the type 6 secretion system. About 19 to 21% of the isolates carried the neuraminidase-encoding gene nanH and/or the heat-stable toxin (NAG-ST), and only 5% contained a type 3 secretion system. None of the non-O1/non-O139 V. cholerae isolates contained Vibrio pathogenicity island-associated genes. However, ctxA, ace, or zot was present in nine isolates. Fifty-five different genotypes showed up to 12 virulence factors, independent of the source of isolation, and represent the first report of both antibiotic susceptibility and virulence associated with non-O1/non-O139 V. cholerae from the Chesapeake Bay. Since these results confirm the presence of potentially pathogenic non-O1/non-O139 V. cholerae, monitoring for total V. cholerae, regardless of serotype, should be done within the context of public health. UR - http://aem.asm.org/lookup/doi/10.1128/AEM.03540-14 CP - 631 J1 - Appl. Environ. Microbiol. M3 - 10.1128/AEM.03540-14 ER - TY - JOUR T1 - Nontoxigenic Vibrio cholerae Non-O1/O139 Isolate from a Case of Human Gastroenteritis in the U.S. Gulf Coast JF - Journal of Clinical Microbiology Y1 - 2015 A1 - Hasan, Nur A. A1 - Rezayat, Talayeh A1 - Blatz, Peter J. A1 - Choi, Seon Young A1 - Griffitt, Kimberly J. A1 - Rashed, Shah M. A1 - Huq, Anwar A1 - Conger, Nicholas G. A1 - Rita R Colwell A1 - Grimes, D. Jay ED - Munson, E. AB - An occurrence of Vibrio cholerae non-O1/O139 gastroenteritis in the U.S. Gulf Coast is reported here. Genomic analysis revealed that the isolate lacked known virulence factors associated with the clinical outcome of a V. cholerae infection but did contain putative genomic islands and other accessory virulence factors. Many of these factors are widespread among environmental strains of V. cholerae, suggesting that there might be additional virulence factors in non-O1/O139 V. cholerae yet to be determined. Phylogenetic analysis revealed that the isolate belonged to a phyletic lineage of environmental V. cholerae isolates associated with sporadic cases of gastroenteritis in the Western Hemisphere, suggesting a need to monitor non-O1/O139 V. cholerae in the interest of public health. UR - http://jcm.asm.org/lookup/doi/10.1128/JCM.02187-14 CP - 1 J1 - J. Clin. Microbiol. M3 - 10.1128/JCM.02187-14 ER - TY - JOUR T1 - A new integrative conjugative element detected in Haitian isolates of Vibrio cholerae non-O1/non-O139 JF - Research in Microbiology Y1 - 2013 A1 - Ceccarelli, Daniela A1 - Spagnoletti, Matteo A1 - Hasan, Nur A. A1 - Lansing, Stephanie A1 - Huq, Anwar A1 - Rita R Colwell AB - The presence of SXT/R391-related integrating conjugative elements (ICEs) in Vibrio cholerae O1 and non-O1/non-O139 isolated from clinical and environmental samples in Haiti in 2010 was studied. The main finding of this work was the identification of the novel ICEVchHai2 among closely related V. cholerae non-O1/non-O139 clinical strains. The mosaic structure of this element confirms the role of ICEs as efficient recombination systems whereby new genetic material can be acquired and exchanged, according V. cholerae strains new accessory functions. VL - 164 UR - https://linkinghub.elsevier.com/retrieve/pii/S092325081300154X CP - 9 J1 - Research in Microbiology M3 - 10.1016/j.resmic.2013.08.004 ER - TY - CONF T1 - Networking lessons: From computers to water T2 - 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS) Y1 - 2012 A1 - Narayanan,I. A1 - Sarangan,V. A1 - Vasan, A. A1 - Srinivasan, Aravind A1 - Sivasubramaniam,A. KW - Biological cells KW - computer networking KW - Computer networks KW - COMPUTERS KW - energy footprint KW - Genetic algorithms KW - green nonIT domains KW - infrastructure enhancement problem KW - Internet KW - network theory (graphs) KW - networking lessons KW - planning KW - pricing KW - water distribution networks KW - water supply KW - water utility network AB - As an instance of using IT to green non-IT domains, we consider the question whether lessons from computer networking can be applied in water distribution networks to improve their energy footprint and/or efficiency. Our contributions in this work are: (i) we identify several areas where principles from computer networking can be used to better water distribution; (ii) we focus on a specific infrastructure enhancement problem caused by increasing demands on a water utility network and present solutions (similar to those used in computer networks) that optimize both operational expenditure and total cost of ownership. We validate our solutions through simulations and compare their efficacy against techniques that are traditionally used in enhancing water networks. Our results show that lessons from computer networks can help in enhancing water networks. JA - 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS) PB - IEEE SN - 978-1-4673-0296-8 M3 - 10.1109/COMSNETS.2012.6151373 ER - TY - JOUR T1 - No-Reference Image Quality Assessment using Visual Codebooks JF - Image Processing, IEEE Transactions on Y1 - 2012 A1 - Ye,P. A1 - David Doermann AB - The goal of no-reference objective image quality assessment (NR-IQA) is to develop a computational model that can predict the human perceived quality of distorted images accurately and automatically without any prior knowledge of reference images. Most existing NR-IQA approaches are distortionspecific (DS) and are typically limited to one or two specific types of distortions. In most practical applications, however, information about the distortion type is not really available. In this paper, we propose a general-purpose NR-IQA approach based on visual codebooks. A visual codebook consisting of Gabor filter based local features extracted from local image patches is used to capture complex statistics of a natural image. The codebook encodes statistics by quantizing the feature space and accumulating histograms of patch appearances. This method does not assume any specific types of distortions, however, when evaluating images with a particular type of distortion, it does require examples with the same or similar distortion for training. Experimental results demonstrate that the predicted quality score using our method is consistent with human perceived image quality. The proposed method is comparable to state-ofthe- art general purpose NR-IQA methods and outperforms the full-reference image quality metrics, peak signal-to-noise ratio (PSNR) and structural similarity index (SSIM) on the LIVE image quality assessment database. VL - PP SN - 1057-7149 CP - 99 M3 - 10.1109/TIP.2012.2190086 ER - TY - CONF T1 - NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & Content T2 - Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom) Y1 - 2011 A1 - Gove,R. A1 - Gramsky,N. A1 - Kirby,R. A1 - Sefer,E. A1 - Sopan,A. A1 - Dunne,C. A1 - Shneiderman, Ben A1 - Taieb-Maimon,M. KW - business intelligence concept KW - business intelligence entity KW - competitive intelligence KW - data visualisation KW - dynamic networks KW - dynamic social network KW - heat map KW - Heating KW - Image color analysis KW - Information Visualization KW - Layout KW - matrix visualization KW - measurement KW - NetVisia system KW - network evolution KW - network visualization KW - node-link diagrams KW - outlier node KW - social network content KW - Social network services KW - social network statistics KW - social networking (online) KW - social networks KW - static network visualization KW - time period KW - topological similarity KW - Training KW - usability KW - user evaluation KW - User interfaces AB - Visualizations of static networks in the form of node-link diagrams have evolved rapidly, though researchers are still grappling with how best to show evolution of nodes over time in these diagrams. This paper introduces NetVisia, a social network visualization system designed to support users in exploring temporal evolution in networks by using heat maps to display node attribute changes over time. NetVisia's novel contributions to network visualizations are to (1) cluster nodes in the heat map by similar metric values instead of by topological similarity, and (2) align nodes in the heat map by events. We compare NetVisia to existing systems and describe a formative user evaluation of a NetVisia prototype with four participants that emphasized the need for tool tips and coordinated views. Despite the presence of some usability issues, in 30-40 minutes the user evaluation participants discovered new insights about the data set which had not been discovered using other systems. We discuss implemented improvements to NetVisia, and analyze a co-occurrence network of 228 business intelligence concepts and entities. This analysis confirms the utility of a clustered heat map to discover outlier nodes and time periods. JA - Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom) PB - IEEE SN - 978-1-4577-1931-8 M3 - 10.1109/PASSAT/SocialCom.2011.216 ER - TY - JOUR T1 - Network Clustering Approximation Algorithm Using One Pass Black Box Sampling JF - arXiv:1110.3563 Y1 - 2011 A1 - DuBois,Thomas A1 - Golbeck,Jennifer A1 - Srinivasan, Aravind KW - Computer Science - Social and Information Networks KW - Physics - Physics and Society AB - Finding a good clustering of vertices in a network, where vertices in the same cluster are more tightly connected than those in different clusters, is a useful, important, and well-studied task. Many clustering algorithms scale well, however they are not designed to operate upon internet-scale networks with billions of nodes or more. We study one of the fastest and most memory efficient algorithms possible - clustering based on the connected components in a random edge-induced subgraph. When defining the cost of a clustering to be its distance from such a random clustering, we show that this surprisingly simple algorithm gives a solution that is within an expected factor of two or three of optimal with either of two natural distance functions. In fact, this approximation guarantee works for any problem where there is a probability distribution on clusterings. We then examine the behavior of this algorithm in the context of social network trust inference. UR - http://arxiv.org/abs/1110.3563 ER - TY - JOUR T1 - New models and algorithms for throughput maximization in broadcast scheduling JF - Approximation and Online Algorithms Y1 - 2011 A1 - Chekuri,C. A1 - Gal,A. A1 - Im,S. A1 - Khuller, Samir A1 - Li,J. A1 - McCutchen,R. A1 - Moseley,B. A1 - Raschid, Louiqa ER - TY - JOUR T1 - Next Generation Sequence Assembly with AMOS JF - Current Protocols in Bioinformatics Y1 - 2011 A1 - Treangen, T.J. A1 - Sommer, D.D. A1 - Angly, F.E. A1 - Koren, S. A1 - Pop, Mihai VL - 11 ER - TY - CONF T1 - No-reference image quality assessment based on visual codebook T2 - Image Processing (ICIP), 2011 18th IEEE International Conference on Y1 - 2011 A1 - Ye,Peng A1 - David Doermann KW - assessment;quality KW - codebook;Gabor KW - descriptors;complex KW - estimation;visual KW - extraction;image KW - filter;appearance KW - filters;feature KW - gabor KW - image KW - image;no-reference KW - patches;natural KW - QUALITY KW - statistics;local KW - texture; AB - In this paper, we propose a new learning based No-Reference Image Quality Assessment (NR-IQA) algorithm, which uses a visual codebook consisting of robust appearance descriptors extracted from local image patches to capture complex statistics of natural image for quality estimation. We use Gabor filter based local features as appearance descriptors and the codebook method encodes the statistics of natural image classes by vector quantizing the feature space and accumulating histograms of patch appearances based on this coding. This method does not assume any specific types of distortion and experimental results on the LIVE image quality assessment database show that this method provides consistent and reliable performance in quality estimation that exceeds other state-of-the-art NR-IQA approaches and is competitive with the full reference measure PSNR. JA - Image Processing (ICIP), 2011 18th IEEE International Conference on M3 - 10.1109/ICIP.2011.6116318 ER - TY - JOUR T1 - Nouveau-ROUGE: A Novelty Metric for Update Summarization JF - Computational Linguistics Y1 - 2011 A1 - Conroy,John M. A1 - Schlesinger,Judith D. A1 - O'Leary, Dianne P. AB - An update summary should provide a fluent summarization of new information on a time-evolving topic, assuming that the reader has already reviewed older documents or summaries. In 2007 and 2008, an annual summarization evaluation included an update summarization task. Several participating systems produced update summaries indistinguishable from human-generated summaries when measured using ROUGE. However, no machine system performed near human-level performance in manual evaluations such as pyramid and overall responsiveness scoring. VL - 37 SN - 0891-2017 UR - http://dx.doi.org/10.1162/coli_a_00033 CP - 1 M3 - 10.1162/coli_a_00033 ER - TY - CONF T1 - A novel feature descriptor based on the shearlet transform T2 - Image Processing (ICIP), 2011 18th IEEE International Conference on Y1 - 2011 A1 - Schwartz, W.R. A1 - da Silva,R.D. A1 - Davis, Larry S. A1 - Pedrini,H. KW - analysis;multiscale KW - analysis;object KW - classification;face KW - classification;image KW - classification;intensity KW - coefficients;image KW - descriptor;feature KW - detection;object KW - distribution KW - edge KW - EXTRACTION KW - extraction;image KW - gradient KW - gradients;histograms KW - identification;feature KW - methods;histograms KW - of KW - orientations;face KW - oriented KW - recognition;feature KW - recognition;shearlet KW - recognition;transforms; KW - shearlet KW - singularities;texture KW - texture;object KW - transform;signal AB - Problems such as image classification, object detection and recognition rely on low-level feature descriptors to represent visual information. Several feature extraction methods have been proposed, including the Histograms of Oriented Gradients (HOG), which captures edge information by analyzing the distribution of intensity gradients and their directions. In addition to directions, the analysis of edge at different scales provides valuable information. Shearlet transforms provide a general framework for analyzing and representing data with anisotropic information at multiple scales. As a consequence, signal singularities, such as edges, can be precisely detected and located in images. Based on the idea of employing histograms to estimate the distribution of edge orientations and on the accurate multi-scale analysis provided by shearlet transforms, we propose a feature descriptor called Histograms of Shearlet Coefficients (HSC). Experimental results comparing HOG with HSC show that HSC provides significantly better results for the problems of texture classification and face identification. JA - Image Processing (ICIP), 2011 18th IEEE International Conference on M3 - 10.1109/ICIP.2011.6115600 ER - TY - CONF T1 - NSF/IEEE-TCPP curriculum initiative on parallel and distributed computing: core topics for undergraduates T2 - Proceedings of the 42nd ACM technical symposium on Computer science education Y1 - 2011 A1 - Prasad,S. K. A1 - Chtchelkanova,A. A1 - Das,S. A1 - Dehne,F. A1 - Gouda,M. A1 - Gupta,A. A1 - JaJa, Joseph F. A1 - Kant,K. A1 - La Salle,A. A1 - LeBlanc,R. A1 - others JA - Proceedings of the 42nd ACM technical symposium on Computer science education ER - TY - JOUR T1 - On the Numerical Analysis of Oblique Projectors JF - SIAM Journal on Matrix Analysis and Applications Y1 - 2011 A1 - Stewart, G.W. KW - $B$-orthogonality KW - oblique projector KW - Perturbation theory KW - updating algorithms KW - XQRY form AB - An oblique projector is an idempotent matrix whose null space is oblique to its range, in contrast to an orthogonal projector, whose null space is orthogonal to its range. Oblique projectors arise naturally in many applications and have a substantial literature. Missing from that literature, however, are systematic expositions of their numerical properties, including their perturbation theory, their various representations, their behavior in the presence of rounding error, the computation of complementary projections, and updating algorithms. This article is intended to make a start at filling this gap. The first part of the article is devoted to the first four of the above topics, with particular attention given to complementation. In the second part, stable algorithms are derived for updating an XQRY representation of projectors, which was introduced in the first part. VL - 32 UR - http://link.aip.org/link/?SML/32/309/1 CP - 1 M3 - 10.1137/100792093 ER - TY - JOUR T1 - Natural language annotations for the Semantic Web JF - On the Move to Meaningful Internet Systems 2002: CoopIS, DOA, and ODBASE Y1 - 2010 A1 - Katz,B. A1 - Jimmy Lin A1 - Quan,D. ER - TY - CONF T1 - Nearest-neighbor search algorithms on non-Euclidean manifolds for computer vision applications T2 - Proceedings of the Seventh Indian Conference on Computer Vision, Graphics and Image Processing Y1 - 2010 A1 - Turaga,Pavan A1 - Chellapa, Rama KW - Grassmann manifold KW - hashing KW - manifold KW - nearest-neighbor KW - region covariance KW - shapes AB - Nearest-neighbor searching is a crucial component in many computer vision applications such as face recognition, object recognition, texture classification, and activity recognition. When large databases are involved in these applications, it is also important to perform these searches in a fast manner. Depending on the problem at hand, nearest neighbor strategies need to be devised over feature and model spaces which in many cases are not Euclidean in nature. Thus, metrics that are tuned to the geometry of this space are required which are also known as geodesics. In this paper, we address the problem of fast nearest neighbor searching in non-Euclidean spaces, where in addition to dealing with the large size of the dataset, the significant computational load involves geodesic computations. We study the applicability of the various classes of nearest neighbor algorithms toward this end. Exact nearest neighbor methods that rely solely on the existence of a metric can be extended, albeit with a huge computational cost. We derive an approximate method of searching via approximate embeddings using the logarithmic map. We study the error incurred in such an embedding and show that it performs well in real experiments. JA - Proceedings of the Seventh Indian Conference on Computer Vision, Graphics and Image Processing T3 - ICVGIP '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0060-5 UR - http://doi.acm.org/10.1145/1924559.1924597 M3 - 10.1145/1924559.1924597 ER - TY - CONF T1 - Nested refinement domains for tetrahedral and diamond hierarchies T2 - IEEE Visualization Y1 - 2010 A1 - Weiss,K. A1 - De Floriani, Leila AB - Three nested refinement domains for hierarchies of tetrahedra and diamonds. The descendant domain (left) is the limit shape of thedomain covered by all descendants of a given diamond (colored). Due to the fractal nature of these shapes, we introduce the more conservative convex descendant domain (middle) and bounding box descendant domain (right) to simplify the computation while still tightly covering the descendant domain. In each case, the refinement domain of one of the diamond’s parents, grandparents and great-grandparents is shown. JA - IEEE Visualization ER - TY - CONF T1 - Network I/O fairness in virtual machines T2 - Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures Y1 - 2010 A1 - Anwer,Muhammad Bilal A1 - Nayak,Ankur A1 - Feamster, Nick A1 - Liu,Ling KW - netfpga KW - network virtualization KW - xen AB - We present a mechanism for achieving network I/O fairness in virtual machines, by applying flexible rate limiting mechanisms directly to virtual network interfaces. Conventional approaches achieve this fairness by implementing rate limiting either in the virtual machine monitor or hypervisor, which generates considerable CPU interrupt and instruction overhead for forwarding packets. In contrast, our design pushes per-VM rate limiting as close as possible to the physical hardware themselves, effectively implementing per-virtual interface rate limiting in hardware. We show that this design reduces CPU overhead (both interrupts and instructions) by an order of magnitude. Our design can be applied either to virtual servers for cloud-based services, or to virtual routers JA - Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures T3 - VISA '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0199-2 UR - http://doi.acm.org/10.1145/1851399.1851412 M3 - 10.1145/1851399.1851412 ER - TY - CHAP T1 - New Approaches to Robust, Point-Based Image Registration T2 - Image Registration for Remote SensingImage Registration for Remote Sensing Y1 - 2010 A1 - Mount, Dave A1 - Netanyahu,N. S A1 - Ratanasanya,S. ED - LeMoigne,Jacqueline ED - Netanyahu,Nathan S. ED - Eastman,Roger D. AB - We consider various algorithmic solutions to image registration based on thealignment of a set of feature points. We present a number of enhancements to a branch-and-bound algorithm introduced by Mount, Netanyahu, and Le Moigne (Pattern Recognition, Vol. 32, 1999, pp. 17–38), which presented a registration algorithm based on the partial Hausdorff distance. Our enhance- ments include a new distance measure, the discrete Gaussian mismatch, and a number of improvements and extensions to the above search algorithm. Both distance measures are robust to the presence of outliers, that is, data points from either set that do not match any point of the other set. We present experimental studies, which show that the new distance measure considered can provide significant improvements over the partial Hausdorff distance in instances where the number of outliers is not known in advance. These experiments also show that our other algorithmic improvements can offer tangible improvements. We demonstrate the algorithm’s efficacy by considering images involving different sensors and different spectral bands, both in a traditional framework and in a multiresolution framework. JA - Image Registration for Remote SensingImage Registration for Remote Sensing PB - Cambridge University Press SN - 9780521516112 ER - TY - CONF T1 - New Constructive Aspects of the Lovasz Local Lemma T2 - 2010 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS) Y1 - 2010 A1 - Haeupler,B. A1 - Saha,B. A1 - Srinivasan, Aravind KW - acyclic edge coloring KW - Algorithm design and analysis KW - Approximation algorithms KW - Approximation methods KW - computational complexity KW - Computer science KW - constant factor approximation algorithm KW - graph colouring KW - Linearity KW - Lovasz Local Lemma KW - MAX k-SAT KW - Monte Carlo Algorithm KW - Monte Carlo methods KW - Moser-Tardos algorithm KW - nonrepetitive graph coloring KW - output distribution KW - polynomial sized core subset KW - Polynomials KW - Probabilistc Method KW - probabilistic analysis KW - probabilistic logic KW - probability KW - Ramsey type graph KW - Sampling methods KW - Santa Claus Problem AB - The Lov'{a}sz Local Lemma (LLL) is a powerful tool that gives sufficient conditions for avoiding all of a given set of ``bad'' events, with positive probability. A series of results have provided algorithms to efficiently construct structures whose existence is non-constructively guaranteed by the LLL, culminating in the recent breakthrough of Moser & Tardos. We show that the output distribution of the Moser-Tardos algorithm well-approximates the emph{conditional LLL-distribution} – the distribution obtained by conditioning on all bad events being avoided. We show how a known bound on the probabilities of events in this distribution can be used for further probabilistic analysis and give new constructive and non-constructive results. We also show that when an LLL application provides a small amount of slack, the number of resamplings of the Moser-Tardos algorithm is nearly linear in the number of underlying independent variables (not events!), and can thus be used to give efficient constructions in cases where the underlying proof applies the LLL to super-polynomially many events. Even in cases where finding a bad event that holds is computationally hard, we show that applying the algorithm to avoid a polynomial-sized ``core'' subset of bad events leads to a desired outcome with high probability. We demonstrate this idea on several applications. We give the first constant-factor approximation algorithm for the Santa Claus problem by making an LLL-based proof of Feige constructive. We provide Monte Carlo algorithms for acyclic edge coloring, non-repetitive graph colorings, and Ramsey-type graphs. In all these applications the algorithm falls directly out of the non-constructive LLL-based proof. Our algorithms are very simple, often provide better bounds than previous algorithms, and are in several cases the first efficient algorithms known. As a second type of application we consider settings beyond the critical dependency threshold of the LLL: - - avoiding all bad events is impossible in these cases. As the first (even non-constructive) result of this kind, we show that by sampling from the LLL-distribution of a selected smaller core, we can avoid a fraction of bad events that is higher than the expectation. MAX $k$-SAT is an example of this. JA - 2010 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS) PB - IEEE SN - 978-1-4244-8525-3 M3 - 10.1109/FOCS.2010.45 ER - TY - JOUR T1 - New forms of Human-Computer Interaction for Visualizing Information JF - Information Visualization Y1 - 2010 A1 - Reiterer,H. A1 - Kerren,A. A1 - Plaisant, Catherine A1 - Stasko,J.T. AB - The Graphical User Interface (GUI) – although developed in research laboratories in the late 1970s – is still the dominant interaction paradigm in Information Visualization. We propose a new interaction paradigm called Blended Interaction. It combines ideas of Embodied Cognition, Multimodal Interaction, Reality-Based Interaction & Ubiquitous Computing. This is intended to stress that a single increase in the reality aspect of the interaction cannot go far enough. The particular challenge – and from the user's standpoint, the key advantage – lies in a meaningful marriage between the tested real-world options and the digital world. As a minimum this marriage must exist on the levels of the interaction, communication, of the way we solve problems with conventional tools (workflows), and of the design of the space or the architecture of buildings and places. The digital world often offers entirely new possibilities and takes the form of interactive devices of various shapes but also of intelligent everyday objects (e.g. the 'Internet of things'). In our view, interaction concepts can indeed offer a new quality of interaction, but only when the design of the interaction includes all these domains at the same time and with equal weighting. We test the suitability of our ideas of Blended Interaction concepts by using specific application examples that are being worked on as part of current research projects. Our experiences show that this new interaction paradigm has also great potential for interacting with visualization. For example, we have developed multi-touch scatter plots & facet maps for tangible user interfaces supporting the searching & browsing in Digital Libraries. We have embedded different visualizations into a Zoomable Object-oriented Information Landscape (ZOIL), which supports our vision of using visualizations on different displays of different size at the same time. We have developed specific kind of search tokens that supports collaborative search activities. For example, we try to address the following research questions: * How can future interactive InfoVis tools look like, especially in the light of the idea Blended Interaction? * How can future interactive InfoVis tools benefit from Multi-Displays & Multimodal environments used by Multiple Users? * What are the specific design requirements for multi-touch visualizations? * How can we support the collaborative use visualization tools? ER - TY - CONF T1 - A new framework for efficient password-based authenticated key exchange T2 - Proceedings of the 17th ACM conference on Computer and communications security Y1 - 2010 A1 - Groce,Adam A1 - Katz, Jonathan KW - exchange KW - key KW - password-based AB - Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The challenge in designing such protocols is that they must be immune to off-line dictionary attacks in which an eavesdropping adversary exhaustively enumerates the dictionary of likely passwords in an attempt to match a password to the set of observed transcripts. To date, few general frameworks for constructing PAKE protocols in the standard model are known. Here, we abstract and generalize a protocol by Jiang and Gong to give a new methodology for realizing PAKE without random oracles, in the common reference string model. In addition to giving a new approach to the problem, the resulting construction off ers several advantages over prior work. We also describe an extension of our protocol that is secure within the universal composability (UC) framework and, when instantiated using El Gamal encryption, is more efficient than a previous protocol of Canetti et al. JA - Proceedings of the 17th ACM conference on Computer and communications security T3 - CCS '10 PB - ACM CY - New York, NY, USA SN - 978-1-4503-0245-6 UR - http://doi.acm.org/10.1145/1866307.1866365 M3 - 10.1145/1866307.1866365 ER - TY - JOUR T1 - A New Framework for Password-Based Authenticated Key Exchange JF - ACM CCCS 2010 Y1 - 2010 A1 - Groce,Adam A1 - Katz, Jonathan KW - Cryptographic protocols KW - password-based key exchange AB - Protocols for password-based authenticated key exchange (PAKE) allowtwo users who share only a short, low-entropy password to agree on a cryptographically strong session key. The challenge in designing such protocols is that they must be immune to off-line dictionary attacks in which an eavesdropping adversary exhaustively enumerates the dictionary of likely passwords in an attempt to match a password to the set of observed transcripts. To date, few general frameworks for constructing PAKE protocols in the standard model are known. Here, we abstract and generalize a protocol by Jiang and Gong to give a new methodology for realizing PAKE without random oracles, in the common reference string model. In addition to giving a new approach to the problem, the resulting construction offers several advantages over prior work. We also describe an extension of our protocol that is secure within the universal composability~(UC) framework and, when instantiated using El Gamal encryption, is more efficient than a previous protocol of Canetti et al. UR - http://eprint.iacr.org/2010/147 ER - TY - CONF T1 - Nfsight: netflow-based network awareness tool Y1 - 2010 A1 - Berthier,R. A1 - Michel Cukier A1 - Hiltunen,M. A1 - Kormann,D. A1 - Vesonder,G. A1 - Sheleheda,D. AB - Network awareness is highly critical for network and se-curity administrators. It enables informed planning and management of network resources, as well as detection and a comprehensive understanding of malicious activ- ity. It requires a set of tools to efficiently collect, process, and represent network data. While many such tools al- ready exist, there is no flexible and practical solution for visualizing network activity at various granularities, and quickly gaining insights about the status of network as- sets. To address this issue, we developed Nfsight, a Net- Flow processing and visualization application designed to offer a comprehensive network awareness solution. Nfsight constructs bidirectional flows out of the unidi- rectional NetFlow flows and leverages these bidirectional flows to provide client/server identification and intrusion detection capabilities. We present in this paper the in- ternal architecture of Nfsight, the evaluation of the ser- vice, and intrusion detection algorithms. We illustrate the contributions of Nfsight through several case studies conducted by security administrators on a large univer- sity network. UR - http://www.usenix.org/event/lisa10/tech/full_papers/Berthier.pdf ER - TY - JOUR T1 - Non-visual exploration of geographic maps: Does sonification help? JF - Disability & Rehabilitation: Assistive Technology Y1 - 2010 A1 - Delogu,Franco A1 - Palmiero,Massimiliano A1 - Federici,Stefano A1 - Plaisant, Catherine A1 - Zhao,Haixia A1 - Belardinelli,Olivetti AB - Purpose. This study aims at evaluating the effectiveness of sonification as a mean to provide access to geo-referenced information to users with visual impairments.Method. Thiry-five participants (10 congenitally blind, 10 with acquired blindness and 15 blindfolded sighted) completed four tasks of progressive difficulty. During each task, participants first explored a sonified map by using either a tablet or a keyboard to move across regions and listened to sounds giving information about the current location. Then the participants were asked to identify, among four tactile maps, the one that crossmodally corresponds to the sonifed map they just explored. Finally, participants answered a self-report questionnaire of understanding and satisfaction. Results. Participants achieved high accuracy in all of the four tactile map discrimination tasks. No significant performance difference was found neither between subjects that used keyboard or tablet, nor between the three groups of blind and sighted participants. Differences between groups and interfaces were found in the usage strategies. High levels of satisfaction and understanding of the tools and tasks emerged from users' reports. VL - 5 SN - 1748-3107, 1748-3115 UR - http://informahealthcare.com/doi/abs/10.3109/17483100903100277 CP - 3 M3 - 10.3109/17483100903100277 ER - TY - RPRT T1 - A Narrow Waist for Multipath Routing Y1 - 2009 A1 - Motiwala,M. A1 - bin Tariq,M. A1 - Anwer,B. A1 - Andersen,D. A1 - Feamster, Nick AB - Many applications can use multipath routing to improvereliability or throughput, and many multipath routing pro- tocols exist. Despite this diversity of mechanisms and applications, no common interface exists to allow an ap- plication to select these paths. This paper presents a de- sign for such a common interface, called path bits. Path bits are a small string of opaque, semantic-free bits in a packet header; these bits have a simple property: changing a packet’s path bits should, with high probability, result in the packet taking a different path to the destination. This paper presents the design of path bits and demonstrates that they are simple enough to be easily implemented in both hardware and software and expressive enough to sup- port a variety of applications that can benefit from mul- tipath routing. We present both hardware and software implementations of multipath routing protocols that im- plement the path bits abstraction, as well as implementa- tions of applications that can use this abstraction with only small modifications. PB - School of Computer Science, Georgia Tech ER - TY - JOUR T1 - A National Initiative for Social Participation JF - ScienceScience Y1 - 2009 A1 - Shneiderman, Ben VL - 323 SN - 0036-8075, 1095-9203 UR - http://www.sciencemag.org/content/323/5920/1426 CP - 5920 M3 - 10.1126/science.323.5920.1426 ER - TY - CONF T1 - Network-aware forward caching T2 - Proceedings of the 18th international conference on World wide web Y1 - 2009 A1 - Erman,Jeffrey A1 - Gerber,Alexandre A1 - Hajiaghayi, Mohammad T. A1 - Pei,Dan A1 - Spatscheck,Oliver KW - caching KW - Web AB - This paper proposes and evaluates a Network Aware Forward Caching approach for determining the optimal deployment strategy of forward caches to a network. A key advantage of this approach is that we can reduce the network costs associated with forward caching to maximize the benefit obtained from their deployment. We show in our simulation that a 37% increase to net benefits could be achieved over the standard method of full cache deployment to cache all POPs traffic. In addition, we show that this maximal point occurs when only 68% of the total traffic is cached. Another contribution of this paper is the analysis we use to motivate and evaluate this problem. We characterize the Internet traffic of 100K subscribers of a US residential broadband provider. We use both layer 4 and layer 7 analysis to investigate the traffic volumes of the flows as well as study the general characteristics of the applications used. We show that HTTP is a dominant protocol and account for 68% of the total downstream traffic and that 34% of that traffic is multimedia. In addition, we show that multimedia content using HTTP exhibits a 83% annualized growth rate and other HTTP traffic has a 53% growth rate versus the 26% over all annual growth rate of broadband traffic. This shows that HTTP traffic will become ever more dominent and increase the potential caching opportunities. Furthermore, we characterize the core backbone traffic of this broadband provider to measure the distance travelled by content and traffic. We find that CDN traffic is much more efficient than P2P content and that there is large skew in the Air Miles between POP in a typical network. Our findings show that there are many opportunties in broadband provider networks to optimize how traffic is delivered and cached. JA - Proceedings of the 18th international conference on World wide web T3 - WWW '09 PB - ACM CY - New York, NY, USA SN - 978-1-60558-487-4 UR - http://doi.acm.org/10.1145/1526709.1526749 M3 - 10.1145/1526709.1526749 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 9. Some rare and a new species JF - Bangladesh Journal of Plant Taxonomy Y1 - 2009 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - Ten taxa belonging to Chlorophyceae, Cyanophyceae, Bacillariophyceae and Euglenophyceae, and one with an uncertain taxonomic position have been described in this paper. Of these, 10 taxa have been found to be globally rare and new records for Bangladesh, whereas Strombomonas islamii Khondker sp. nov. has been described as new to science. VL - 16 SN - 1028-2092 UR - http://www.banglajol.info/bd/index.php/BJPT/article/viewArticle/2734 CP - 1 M3 - 10.3329/bjpt.v16i1.2734 ER - TY - JOUR T1 - No Downtime for Data Conversions: Rethinking Hot Upgrades (CMU-PDL-09-106) JF - Parallel Data Laboratory Y1 - 2009 A1 - Tudor Dumitras A1 - Narasimhan, Priya UR - http://repository.cmu.edu/pdl/74 ER - TY - JOUR T1 - Nonlinear Resonant and Chaotic Dynamics in Microwave Assisted Magnetization Switching JF - Magnetics, IEEE Transactions on Y1 - 2009 A1 - d'Aquino,M. A1 - Serpico,C. A1 - Bertotti,G. A1 - Mayergoyz, Issak D A1 - Bonin,R. KW - amplitude;chaotic KW - components;magnetic KW - dynamical KW - dynamics;coercive KW - dynamics;numerical KW - field KW - field;coercivity;linearly-polarized KW - force;magnetic KW - magnetization KW - nanoparticle;microwave-assisted KW - particles;magnetic KW - radiofrequency KW - resonant KW - RF KW - simulations;perturbation KW - switching;nanoparticles;nonlinear KW - switching;nonlinear KW - systems;perturbation KW - technique;chaos;coercive KW - theory; AB - The switching process of a uniformly magnetized magnetic nanoparticle is considered. The particle is subject to applied fields having both dc and linearly-polarized radio-frequency (RF) components. The possibility of using the RF power to obtain a reduced coercivity of the particle is related to the onset of chaotic magnetization dynamics for moderately low values of the RF field amplitude. Perturbation technique for the evaluation of the reduced coercive field is developed and applied to the microwave assisted switching of the particle. Numerical simulations confirm the predictions of the theory. VL - 45 SN - 0018-9464 CP - 10 M3 - 10.1109/TMAG.2009.2023242 ER - TY - CONF T1 - Non-parametric bayesian areal linguistics T2 - Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics Y1 - 2009 A1 - Daumé, Hal JA - Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics ER - TY - JOUR T1 - Name translation in statistical machine translation: Learning when to transliterate JF - Proceedings of ACL-08: HLT Y1 - 2008 A1 - Hermjakob,U. A1 - Knight,K. A1 - Daumé, Hal ER - TY - RPRT T1 - NANO: Network Access Neutrality Observatory Y1 - 2008 A1 - Tariq,M.B. A1 - Motiwala,M. A1 - Feamster, Nick AB - This paper tackles a technical problem that is of growing interest in light of the ongoing network neutrality debate: We aim to develop a system that can reliably determine whether particular ISP is discriminating against a service using only passive measurements from end-hosts. This problem presents significant challenges because many types of discrimination can often resemble commonplace performance degradations (e.g., resulting from failure or misconfiguration). To distinguish discrimination from degradation, we propose a statistical method to estimate causal effect and develop a system, NANO, based on this method. NANO aggregates passive measurements from end-hosts, stratifies the measurements to account for possible confounding factors, and distinguishes when an ISP is discriminating against a particular service or group of clients. Preliminary simulation results demonstrate the promise of NANO for both detecting various types of discrimination and absolving an ISP when it is not discriminating. PB - Georgia Institute of Technology VL - GT-CS-08-03 UR - http://hdl.handle.net/1853/25461 ER - TY - JOUR T1 - NASDAQ Velocity and Forces: An Interactive Visualization of Activity and Change JF - Journal of Universal Computer Science Y1 - 2008 A1 - Dao,H.T. A1 - Bazinet,A. A1 - Berthier,R. A1 - Shneiderman, Ben VL - 14 CP - 9 ER - TY - JOUR T1 - Navigating information spaces: A case study of related article search in PubMed JF - Information Processing & Management Y1 - 2008 A1 - Jimmy Lin A1 - DiCuccio,Michael A1 - Grigoryan,Vahan A1 - Wilbur,W. John KW - Browsing KW - Interactive IR KW - MEDLINE KW - TREC genomics AB - The concept of an “information space” provides a powerful metaphor for guiding the design of interactive retrieval systems. We present a case study of related article search, a browsing tool designed to help users navigate the information space defined by results of the PubMed® search engine. This feature leverages content-similarity links that tie MEDLINE® citations together in a vast document network. We examine the effectiveness of related article search from two perspectives: a topological analysis of networks generated from information needs represented in the TREC 2005 genomics track and a query log analysis of real PubMed users. Together, data suggest that related article search is a useful feature and that browsing related articles has become an integral part of how users interact with PubMed. VL - 44 SN - 0306-4573 UR - http://www.sciencedirect.com/science/article/pii/S0306457308000502 CP - 5 M3 - 10.1016/j.ipm.2008.04.002 ER - TY - CONF T1 - Network-Aware Join Processing in Global-Scale Database Federations T2 - IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008 Y1 - 2008 A1 - Xiaodan Wang A1 - Burns,R. A1 - Terzis,A. A1 - Deshpande, Amol KW - Astronomy KW - Computer networks KW - Concurrent computing KW - global-scale database federations KW - join scheduling algorithms KW - network utilization KW - network-aware join processing KW - parallel schedules KW - polynomial-time algorithm KW - Polynomials KW - Processor scheduling KW - Query processing KW - reduce resource usage KW - Scheduling algorithm KW - Spatial databases KW - spatial-join queries KW - Telecommunication traffic KW - Throughput AB - We introduce join scheduling algorithms that employ a balanced network utilization metric to optimize the use of all network paths in a global-scale database federation. This metric allows algorithms to exploit excess capacity in the network, while avoiding narrow, long-haul paths. We give a two- approximate, polynomial-time algorithm for serial (left-deep) join schedules. We also present extensions to this algorithm that explore parallel schedules, reduce resource usage, and define tradeoffs between computation and network utilization. We evaluate these techniques within the SkyQuery federation of Astronomy databases using spatial-join queries submitted by SkyQuery's users. Experiments show that our algorithms realize near-optimal network utilization with minor computational overhead. JA - IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008 PB - IEEE SN - 978-1-4244-1836-7 M3 - 10.1109/ICDE.2008.4497467 ER - TY - CONF T1 - A New Approach of Dynamic Background Modeling for Surveillance Information T2 - Computer Science and Software Engineering, 2008 International Conference on Y1 - 2008 A1 - Gao,Dongfa A1 - Zhuolin Jiang A1 - Ye,Ming KW - approximate information extraction KW - binary mask images KW - disturbance filtering KW - dynamic background modeling KW - Feature extraction KW - filtering theory KW - Image reconstruction KW - information frame reconstruction KW - NOISE KW - noise filtering KW - orthogonal nonseparable wavelet transformation KW - Surveillance KW - surveillance information KW - Wavelet transforms AB - This paper presents a new approach of best background modeling for surveillance information. The approach makes orthogonal non-separable wavelet transformation of information frames used for background modeling, extracts the approximate information to reconstruct information frames, filters out the disturbance, shadow and noise from the reconstructed frames, constructs basic background with the method of binary mask images, uses multi-frame combination of non-uniform noise to filter noise in basic background, applies mutual information to detect the situation of adjacent changes. If the background has a gradual change, weighted superposition of multi background modeling images with time will be applied to update the background. If the background has a major or sudden change, the background will remodel from this frame. JA - Computer Science and Software Engineering, 2008 International Conference on VL - 1 M3 - 10.1109/CSSE.2008.601 ER - TY - CONF T1 - A new multiresolution generalized directional filter bank design and application in image enhancement T2 - 15th IEEE International Conference on Image Processing, 2008. ICIP 2008 Y1 - 2008 A1 - Patel, Vishal M. A1 - Easley,G. R A1 - Healy,D. M KW - Algorithm design and analysis KW - Approximation error KW - Channel bank filters KW - contourlet transform KW - Design methodology KW - Discrete transforms KW - Feature extraction KW - Filter bank KW - Frequency KW - geometric feature extraction KW - Image Enhancement KW - IMAGE PROCESSING KW - image resolution KW - image restoration KW - Multidimensional digital filters KW - Multidimensional systems KW - multiresolution generalized directional filter bank design KW - shearlet transform KW - shift-invariant overcomplete representation KW - transforms KW - Wavelet transforms AB - In this paper, we present an image enhancement technique based on a new multiscale generalized directional filter bank design. The design presented is a shift-invariant overcomplete representation, which is well suited to extracting geometric features such as edges. Special cases of this design method can be made to reduce to different and improved implementations of the shearlet and the contourlet transforms, which are known to represent certain classes of images optimally. Use of this new filter bank design has proven itself competitive in image restoration for noisy images and is well suited for distinguishing noise from weak edges. Experimental results show that our unique image enhancement technique out-performs wavelet and contourlet based enhancement methods. JA - 15th IEEE International Conference on Image Processing, 2008. ICIP 2008 PB - IEEE SN - 978-1-4244-1765-0 M3 - 10.1109/ICIP.2008.4712380 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 2. Cryptophyceae and Synurophyceae JF - Bangladesh Journal of Botany Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents two species of Rhodomonas, four species of Chroomonas, six species of Cryptomonas and Cryptochrysis minor, Cyanomonas coeruleus, Chrysodidymus synuroideus and Mallomonas akrokomos. These species have been reported from some ponds of Mathbaria in Pirojpur and Bakerganj of Barisal district in Bangladesh. VL - 36 SN - 0253-5416 UR - http://www.banglajol.info/bd/index.php/BJB/article/viewArticle/1549 CP - 1 M3 - 10.3329/bjb.v36i1.1549 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 5. Euglena, Euglenocapsa JF - Bangladesh Journal of Plant Taxonomy Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents 20 taxa of the genus Euglena and one species of the rare euglenoid genus Euglenocapsa. All these taxa are reported for the first time from some pond ecosystems of Mathbaria in Pirojpur and Bakerganj of Barisal districts of Bangladesh. VL - 15 SN - 1028-2092 UR - http://www.banglajol.info/index.php/BJPT/article/viewArticle/910 CP - 1 M3 - 10.3329/bjpt.v15i1.910 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 7. Phacus spp. JF - Bangladesh Journal of Botany Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - Thirteen species of Phacus hitherto not reported from Bangladesh have been described and illustrated. Freshwater ponds at southern districts of Pirojpur and Barisal revealed these presence of the species. VL - 37 SN - 0253-5416 UR - http://www.banglajol.info/bd/index.php/BJB/article/viewArticle/1564 CP - 1 M3 - 10.3329/bjb.v37i1.1564 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 8. Trachelomonas Ehr. (Euglenophyceae) JF - Bangladesh Journal of Botany Y1 - 2008 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - Investigation of pelagic plankton communities from some freshwater ponds of Pirojpur and Barisal districts revealed the presence of 17 species under the genus Trachelomonas Ehr. for the first time in Bangladesh. VL - 37 SN - 0253-5416 UR - http://www.banglajol.info/bd/index.php/BJB/article/viewArticle/1719 CP - 2 M3 - 10.3329/bjb.v37i2.1719 ER - TY - CONF T1 - NewsStand: a new view on news T2 - Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems Y1 - 2008 A1 - Teitler,Benjamin E. A1 - Lieberman,Michael D. A1 - Panozzo,Daniele A1 - Sankaranarayanan,Jagan A1 - Samet, Hanan A1 - Sperling,Jon KW - clustering KW - geotagging KW - knowledge discovery KW - text mining AB - News articles contain a wealth of implicit geographic content that if exposed to readers improves understanding of today's news. However, most articles are not explicitly geotagged with their geographic content, and few news aggregation systems expose this content to users. A new system named NewsStand is presented that collects, analyzes, and displays news stories in a map interface, thus leveraging on their implicit geographic content. NewsStand monitors RSS feeds from thousands of online news sources and retrieves articles within minutes of publication. It then extracts geographic content from articles using a custom-built geotagger, and groups articles into story clusters using a fast online clustering algorithm. By panning and zooming in NewsStand's map interface, users can retrieve stories based on both topical significance and geographic region, and see substantially different stories depending on position and zoom level. JA - Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems T3 - GIS '08 PB - ACM CY - New York, NY, USA SN - 978-1-60558-323-5 UR - http://doi.acm.org/10.1145/1463434.1463458 M3 - 10.1145/1463434.1463458 ER - TY - JOUR T1 - Nitric oxide production from surface recombination of oxygen and nitrogen atoms JF - Journal of Thermophysics and Heat Transfer Y1 - 2008 A1 - Pejaković,D. A A1 - Marschall,J. A1 - Duan,L. A1 - Martin, M.P VL - 22 CP - 2 ER - TY - RPRT T1 - A Node Aggregation Strategy to Reduce Complexity of Network Visualization using Semantic Substrates Y1 - 2008 A1 - Aris,A. A1 - Shneiderman, Ben AB - Semantic substrates are spatial templates for networks, wherenodes are grouped into regions and laid out within each region according to one or more node attributes. Analysts’ ability to design their own substrates leads to a different approach than other more automatic approaches to layout nodes (force-directed, circular, etc.). While the semantic substrate approach provides more interpretable node locations, sometimes a set of nodes is compressed into a small space on the display, leading to node overlap. In this paper, we significantly improve this situation by introducing the node aggregation mechanism in the context of semantic substrates. We illustrate this functionality in a document citation network and provide pros and cons of the approach. We conclude with guidelines and future directions for this research. Throughout the paper, examples are illustrated with NVSS 3.0, the network visualization tool developed to explore the semantic substrate idea. PB - Human-Computer Interaction Lab, University of Maryland ER - TY - CONF T1 - A Non-generative Approach for Face Recognition Across Aging T2 - Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on Y1 - 2008 A1 - Biswas,S. A1 - Aggarwal,G. A1 - Ramanathan,N. A1 - Chellapa, Rama KW - appearance;nongenerative KW - approach;face KW - Face KW - image KW - matching; KW - recognition;facial KW - recognition;image KW - synthesis;face AB - Human faces undergo a lot of change in appearance as they age. Though facial aging has been studied for decades, it is only recently that attempts have been made to address the problem from a computational point of view. Most of these early efforts follow a simulation approach in which matching is performed by synthesizing face images at the target age. Given the innumerable different ways in which a face can potentially age, the synthesized aged image may not be similar to the actual aged image. In this paper, we bypass the synthesis step and directly analyze the drifts of facial features with aging from a purely matching perspective. Our analysis is based on the observation that facial appearance changes in a coherent manner as people age. We provide measures to capture this coherency in feature drifts. Illustrations and experimental results show the efficacy of such an approach for matching faces across age progression. JA - Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on M3 - 10.1109/BTAS.2008.4699331 ER - TY - JOUR T1 - A note on the distribution of the number of prime factors of the integers JF - Information Processing Letters Y1 - 2008 A1 - Srinivasan, Aravind KW - Chernoff bounds KW - Dependent random variables KW - Primes KW - Probabilistic number theory KW - randomized algorithms KW - Tail bounds AB - The Chernoff–Hoeffding bounds are fundamental probabilistic tools. An elementary approach is presented to obtain a Chernoff-type upper-tail bound for the number of prime factors of a random integer in { 1 , 2 , … , n } . The method illustrates tail bounds in negatively-correlated settings. VL - 109 SN - 0020-0190 UR - http://www.sciencedirect.com/science/article/pii/S0020019008002688 CP - 2 M3 - 10.1016/j.ipl.2008.09.010 ER - TY - BOOK T1 - NETB'07: Proceedings of the 3rd USENIX international workshop on Networking meets databases Y1 - 2007 ED - Cooper,Brian ED - Feamster, Nick PB - USENIX Association CY - Berkeley, CA, USA ER - TY - JOUR T1 - NetLens: Iterative Exploration of Content-Actor Network Data JF - Information VisualizationInformation Visualization Y1 - 2007 A1 - Kang,Hyunmo A1 - Plaisant, Catherine A1 - Lee,Bongshin A1 - Bederson, Benjamin B. KW - content-actor network data KW - digital library KW - incremental data exploration KW - iterative query refinement KW - User interfaces AB - Networks have remained a challenge for information retrieval and visualization because of the rich set of tasks that users want to accomplish. This paper offers an abstract Content-Actor network data model, a classification of tasks, and a tool to support them. The NetLens interface was designed around the abstract Content-Actor network data model to allow users to pose a series of elementary queries and iteratively refine visual overviews and sorted lists. This enables the support of complex queries that are traditionally hard to specify. NetLens is general and scalable in that it applies to any data set that can be represented with our abstract data model. This paper describes the use of NetLens with a subset of the ACM Digital Library consisting of about 4000 papers from the CHI conference written by about 6000 authors, and reports on a usability study with nine participants. VL - 6 SN - 1473-8716, 1473-8724 UR - http://ivi.sagepub.com/content/6/1/18 CP - 1 M3 - 10.1057/palgrave.ivs.9500143 ER - TY - JOUR T1 - NetLens: iterative exploration of content-actor network data JF - Information Visualization Y1 - 2007 A1 - Kang,H. A1 - Plaisant, Catherine A1 - Lee,B. A1 - Bederson, Benjamin B. VL - 6 CP - 1 ER - TY - JOUR T1 - Network-Wide Prediction of BGP Routes JF - Networking, IEEE/ACM Transactions on Y1 - 2007 A1 - Feamster, Nick A1 - Rexford,J. KW - BGP message passing KW - BGP route-selection process KW - border gateway protocol KW - Message passing KW - multiple exit discriminator attribute KW - network-wide prediction KW - route reflectors KW - route-prediction algorithm KW - routing protocols KW - telecommunication network topology AB - This paper presents provably correct algorithms for computing the outcome of the BGP route-selection process for each router in a network, without simulating the complex details of BGP message passing. The algorithms require only static inputs that can be easily obtained from the routers: the BGP routes learned from neighboring domains, the import policies configured on the BGP sessions, and the internal topology. Solving the problem would be easy if the route-selection process were deterministic and every router received all candidate BGP routes. However, two important features of BGP-the Multiple Exit Discriminator (MED) attribute and route reflectors-violate these properties. After presenting a simple route-prediction algorithm for networks that do not use these features, we present algorithms that capture the effects of the MED attribute and route reflectors in isolation. Then, we explain why the interaction between these two features precludes efficient route prediction. These two features also create difficulties for the operation of BGP itself, leading us to suggest improvements to BGP that achieve the same goals as MED and route reflection without introducing the negative side effects VL - 15 SN - 1063-6692 CP - 2 M3 - 10.1109/TNET.2007.892876 ER - TY - CONF T1 - A new database for medical images and information T2 - Proceedings of SPIE-Medical Imaging Y1 - 2007 A1 - Tahmoush,D. A1 - Samet, Hanan AB - We present a medical image and medical record database for the storage, research,transmission, and evaluation of medical images, as well as tele-medicine applications. Any medical image from a source that supports the DICOM standard can be stored and accessed, as well as associated analysis and annotations. Information and image retrieval can be done based on patient info, date, doctor’s annotations, features in the images, or a spatial combination of features. Secure access and transmission is addressed for tele- medicine applications. This database application follows all HIPAA regulations. JA - Proceedings of SPIE-Medical Imaging ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 3. Volvocales JF - Bangladesh Journal of Plant Taxonomy Y1 - 2007 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasmin,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents 21 species of Chlamydomonas, four species of Carteria, two species of each of Nephroselmis, Pyramidomonas and Scherffelia, and Collodictyon triciliatum, Polytoma minus, Tetrachloridium ? allorgei and Tetraselmis cordiformis. These species have been reported from some ponds of Mathbaria of Pirojpur and Bakerganj of Barisal districts in Bangladesh. VL - 14 SN - 1028-2092 UR - http://www.banglajol.info/bd/index.php/BJPT/article/viewArticle/518 CP - 1 M3 - 10.3329/bjpt.v14i1.518 ER - TY - JOUR T1 - New records of phytoplankton for Bangladesh. 4. Chlorococcales JF - Bangladesh Journal of Plant Taxonomy Y1 - 2007 A1 - Khondker,Moniruzzaman A1 - Bhuiyan,Rauf Ahmed A1 - Yeasim,Jenat A1 - Alam,Munirul A1 - Sack,R. Bradley A1 - Huq,Anwar A1 - Rita R Colwell AB - This study presents three species from each of Schroederia, Monoraphidium and Ankistrodesmus, two species and one variety of Dictyosphaerium, two varieties of Pediastrum, and Tetraedron arthrodesmiforme var. contorta, Chlorotetraedron polymorphum, Myrmecia aquatica, Oocystis tainoensis, Nephrocytium spirale, Kirchneriella irregularis, Coelastrum indicum and Scenedesmus similagineus. These taxa have been reported from some ponds of Mathbaria of Pirojpur and Bakerganj of Barisal Districts in Bangladesh. VL - 14 SN - 1028-2092 UR - http://www.banglajol.info/bd/index.php/BJPT/article/viewArticle/528 CP - 2 M3 - 10.3329/bjpt.v14i2.528 ER - TY - CONF T1 - New techniques for ensuring the long term integrity of digital archives T2 - Proceedings of the 8th annual international conference on Digital government research Y1 - 2007 A1 - Song,S. A1 - JaJa, Joseph F. AB - A large portion of the government, business, cultural, andscientific digital data being created today needs to be archived and preserved for future use of periods ranging from a few years to decades and sometimes centuries. A fundamental requirement of a long term archive is to ensure the integrity of its holdings. In this paper, we develop a new methodology to address the integrity of long term archives using rigorous cryptographic techniques. Our approach involves the generation of a small-size integrity token for each digital object to be archived, and some cryptographic summary information based on all the objects handled within a dynamic time period. We present a framework that enables the continuous auditing of the holdings of the archive depending on the policy set by the archive. Moreover, an independent auditor will be able to verify the integrity of every version of an archived digital object as well as link the current version to the original form of the object when it was ingested into the archive. We built a - prototype system that is completely independent of the archive’s underlying architecture, and tested it on large scale data. We include in this paper some preliminary results on the validation and performance of our prototype. JA - Proceedings of the 8th annual international conference on Digital government research ER - TY - JOUR T1 - New Trypanosoma cruzi Repeated Element That Shows Site Specificity for Insertion JF - Eukaryotic Cell Y1 - 2007 A1 - Souza,Renata T. A1 - Santos,Marcia R. M. A1 - Lima,Fabio M. A1 - El‐Sayed, Najib M. A1 - Myler,Peter J. A1 - Ruiz,Jeronimo C. A1 - da Silveira,Jose Franco AB - A new family of site-specific repeated elements identified in Trypanosoma cruzi, which we named TcTREZO, is described here. TcTREZO appears to be a composite repeated element, since three subregions may be defined within it on the basis of sequence similarities with other T. cruzi sequences. Analysis of the distribution of TcTREZO in the genome clearly indicates that it displays site specificity for insertion. Most TcTREZO elements are flanked by conserved sequences. There is a highly conserved 68-bp sequence at the 5' end of the element and a sequence domain of [~]500 bp without a well-defined borderline at the 3' end. Northern blot hybridization and reverse transcriptase PCR analyses showed that TcTREZO transcripts are expressed as oligo(A)-terminated transcripts whose length corresponds to the unit size of the element (1.6 kb). Transcripts of [~]0.2 kb derived from a small part of TcTREZO are also detected in steady-state RNA. TcTREZO transcripts are unspliced and not translated. The copy number of TcTREZO sequences was estimated to be [~]173 copies per haploid genome. TcTREZO appears to have been assembled by insertions of sequences into a progenitor element. Once associated with each other, these subunits were amplified as a new transposable element. TcTREZO shows site specificity for insertion, suggesting that a sequence-specific endonuclease could be responsible for its insertion at a unique site. VL - 6 UR - http://ec.asm.org/cgi/content/abstract/6/7/1228 CP - 7 M3 -

10.1128/EC.00036-07

ER - TY - CONF T1 - Noise Features for Image Tampering Detection and Steganalysis T2 - Image Processing, 2007. ICIP 2007. IEEE International Conference on Y1 - 2007 A1 - Gou,Hongmei A1 - Swaminathan,A. A1 - M. Wu KW - analysis;cryptography;data KW - analysis;image KW - analysis;wavelet KW - authenticity;hidden KW - computing;statistical KW - data;image KW - denoising KW - denoising;multimedia KW - detection;low-cost KW - editing KW - encapsulation;feature KW - extraction;image KW - features;steganalysis;wavelet KW - forensic KW - forensics;neighborhood KW - image KW - NOISE KW - operations;digital KW - prediction;statistical KW - softwares;multimedia KW - tampering KW - transforms; AB - With increasing availability of low-cost image editing softwares, the authenticity of digital images can no longer be taken for granted. Digital images have also been used as cover data for transmitting secret information in the field of steganography. In this paper, we introduce a new set of features for multimedia forensics to determine if a digital image is an authentic camera output or if it has been tampered or embedded with hidden data. We perform such image forensic analysis employing three sets of statistical noise features, including those from denoising operations, wavelet analysis, and neighborhood prediction. Our experimental results demonstrate that the proposed method can effectively distinguish digital images from their tampered or stego versions. JA - Image Processing, 2007. ICIP 2007. IEEE International Conference on VL - 6 M3 - 10.1109/ICIP.2007.4379530 ER - TY - JOUR T1 - Nonintrusive component forensics of visual sensors using output images JF - Information Forensics and Security, IEEE Transactions on Y1 - 2007 A1 - Swaminathan,A. A1 - M. Wu A1 - Liu,K. J.R KW - ACQUISITION KW - array;color KW - authenticating KW - component KW - filter KW - forensics;patent KW - infringements;visual KW - Interpolation KW - manipulations;intellectual KW - modules;content KW - property KW - property; KW - protection;nonintrusive KW - rights KW - sensors;image KW - sensors;industrial KW - sources;color AB - Rapid technology development and the widespread use of visual sensors have led to a number of new problems related to protecting intellectual property rights, handling patent infringements, authenticating acquisition sources, and identifying content manipulations. This paper introduces nonintrusive component forensics as a new methodology for the forensic analysis of visual sensing information, aiming to identify the algorithms and parameters employed inside various processing modules of a digital device by only using the device output data without breaking the device apart. We propose techniques to estimate the algorithms and parameters employed by important camera components, such as color filter array and color interpolation modules. The estimated interpolation coefficients provide useful features to construct an efficient camera identifier to determine the brand and model from which an image was captured. The results obtained from such component analysis are also useful to examine the similarities between the technologies employed by different camera models to identify potential infringement/licensing and to facilitate studies on technology evolution VL - 2 SN - 1556-6013 CP - 1 M3 - 10.1109/TIFS.2006.890307 ER - TY - JOUR T1 - Numerical Analysis of Nanoparticle-Structured Plasmon Waveguides of Light JF - Magnetics, IEEE Transactions on Y1 - 2007 A1 - Mayergoyz, Issak D A1 - Zhang,Zhenyu KW - analysis;optical KW - analysis;resonant KW - cross-sections;light KW - Frequency KW - frequency;light KW - nanoparticle-structured KW - plasmon KW - polarisation;light KW - polarization;numerical KW - propagation;numerical KW - waveguides;light KW - waveguides;plasmonics;plasmons; AB - A novel numerical approach to the analysis of nanoparticle-structured plasmon waveguides of light is presented. The extinct cross-sections and resonance (propagation) frequencies are computed for various geometries of these waveguides and compared with available experimental data. The computational results for resonance frequencies corresponding to different light polarizations are reported as well VL - 43 SN - 0018-9464 CP - 4 M3 - 10.1109/TMAG.2006.892270 ER - TY - JOUR T1 - Numerical Analysis of Plasmon Resonances in Metallic Nanoshells JF - Magnetics, IEEE Transactions on Y1 - 2007 A1 - Mayergoyz, Issak D A1 - Zhang,Zhenyu KW - analysis;plasmon KW - and KW - boundary KW - eigenfunctions;nanostructured KW - equation-based KW - equations;eigenvalues KW - frequency;boundary KW - integral KW - materials;nanotechnology;plasmons; KW - nanoshells;numerical KW - problems;metallic KW - resonance;resonant KW - techniques;eigenvalue AB - A novel boundary integral equation-based technique for the direct computations of resonance frequencies for plasmon resonances in metallic nanoshells is presented. In this technique, the calculation of resonance frequencies is reduced to a generalized eigenvalue problem. Numerical results that demonstrate fairly good agreement with theoretical results and available experimental data are reported VL - 43 SN - 0018-9464 CP - 4 M3 - 10.1109/TMAG.2006.892271 ER - TY - JOUR T1 - Numerical Analysis of Plasmon Resonances in Nanoparticles Based on Fast Multipole Method JF - Magnetics, IEEE Transactions on Y1 - 2007 A1 - Zhang,Zhenyu A1 - Mayergoyz, Issak D A1 - Gumerov, Nail A. A1 - Duraiswami, Ramani KW - analysis;boundary KW - and KW - boundary KW - eigenfunctions;nanoparticles;plasmons; KW - equations;eigenvalue KW - equations;eigenvalues KW - integral KW - method;nanoparticle KW - multipole KW - plasmon KW - problems;fast KW - resonance;numerical AB - A novel technique for the numerical analysis of plasmon resonances by using the fast multipole method (FMM) is presented. This approach is based on the solution of the eigenvalue problem for boundary integral equations, which can be naturally implemented by using the FMM. Numerical examples that highlight the efficiency of the fast multipole implementation are reported VL - 43 SN - 0018-9464 CP - 4 M3 - 10.1109/TMAG.2007.891413 ER - TY - JOUR T1 - Name reference resolution in organizational email archives JF - SIAM International Conference on Data Mining Y1 - 2006 A1 - Diehl,C. P A1 - Getoor, Lise A1 - Namata,G. ER - TY - JOUR T1 - Network Visualization by Semantic Substrates JF - IEEE Transactions on Visualization and Computer Graphics Y1 - 2006 A1 - Shneiderman, Ben A1 - Aris,A. KW - Automatic control KW - data visualisation KW - Data visualization KW - Displays KW - Filters KW - Graphical user interfaces KW - Information Visualization KW - information visualization designers KW - Law KW - legal citations KW - Legal factors KW - legal precedent data KW - network visualization KW - NVSS 1.0 KW - scalability KW - semantic substrate KW - Terminology KW - Tunneling KW - user-defined semantic substrates AB - Networks have remained a challenge for information visualization designers because of the complex issues of node and link layout coupled with the rich set of tasks that users present. This paper offers a strategy based on two principles: (1) layouts are based on user-defined semantic substrates, which are non-overlapping regions in which node placement is based on node attributes, (2) users interactively adjust sliders to control link visibility to limit clutter and thus ensure comprehensibility of source and destination. Scalability is further facilitated by user control of which nodes are visible. We illustrate our semantic substrates approach as implemented in NVSS 1.0 with legal precedent data for up to 1122 court cases in three regions with 7645 legal citations VL - 12 SN - 1077-2626 CP - 5 M3 - 10.1109/TVCG.2006.166 ER - TY - CONF T1 - New DNS results of shockwave/turbulent boundary layer interaction T2 - 3rd AIAA Flow Control Conference Y1 - 2006 A1 - Wu,M. A1 - Martin, M.P JA - 3rd AIAA Flow Control Conference ER - TY - JOUR T1 - A New Hardware Monitor Design to Measure Data Structure-Specific Cache Eviction Information JF - International Journal of High Performance Computing Applications Y1 - 2006 A1 - Buck, B. R A1 - Hollingsworth, Jeffrey K AB - In this paper, we propose a hardware performance monitor that provides support not only for measuring cache misses and the addresses associated with them, but also for determining what data is being evicted from the cache when a miss occurs. We describe how to use this hardware support to efficiently determine the cache behavior of application data structures at the source code level. We also present the results of a simulation-based study of this technique, in which we examined the overhead, perturbation of results, and usefulness of collecting this information. VL - 20 UR - http://hpc.sagepub.com/content/20/3/353.abstract CP - 3 M3 - 10.1177/1094342006067470 ER - TY - CONF T1 - New lower bounds for oblivious routing in undirected graphs T2 - Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm Y1 - 2006 A1 - Hajiaghayi, Mohammad T. A1 - Kleinberg,R. D A1 - Leighton,T. A1 - R\äcke,H. JA - Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm ER - TY - JOUR T1 - Noise causes slant underestimation in stereo and motion JF - Vision Research Y1 - 2006 A1 - Hui Ji A1 - Fermüller, Cornelia KW - Bias KW - Partial bias correction KW - shape estimation KW - Shape from motion KW - Stereo orientation disparity AB - This paper discusses a problem, which is inherent in the estimation of 3D shape (surface normals) from multiple views. Noise in the image signal causes bias, which may result in substantial errors in the parameter estimation. The bias predicts the underestimation of slant found in psychophysical and computational experiments. Specifically, we analyze the estimation of 3D shape from motion and stereo using orientation disparity. For the case of stereo, we show that bias predicts the anisotropy in the perception of horizontal and vertical slant. For the case of 3D motion we demonstrate the bias by means of a new illusory display. Finally, we discuss statistically optimal strategies for the problem and suggest possible avenues for visual systems to deal with the bias. VL - 46 SN - 0042-6989 UR - http://www.sciencedirect.com/science/article/pii/S0042698906002124 CP - 19 M3 - 10.1016/j.visres.2006.04.010 ER - TY - CONF T1 - Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images T2 - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on Y1 - 2006 A1 - Swaminathan,A. A1 - M. Wu A1 - Liu,K. J.R KW - algorithms;interpolation KW - analysis;image KW - analysis;output KW - array KW - cameras;forensic KW - Color KW - colour KW - engineering;forensic KW - forensic KW - images;visual KW - methods;nonintrusive KW - PROCESSING KW - sensor;digital KW - sensors;cameras;image KW - sensors;interpolation; KW - signal AB - This paper considers the problem of non-intrusive forensic analysis of the individual components in visual sensors and its implementation. As a new addition to the emerging area of forensic engineering, we present a framework for analyzing technologies employed inside digital cameras based on output images, and develop a set of forensic signal processing algorithms for visual sensors based on color array sensor and interpolation methods. We show through simulations that the proposed method is robust against compression and noise, and can help identify various processing components inside the camera. Such a non-intrusive forensic framework would provide useful evidence for analyzing technology infringement and evolution for visual sensors JA - Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on VL - 5 M3 - 10.1109/ICASSP.2006.1661297 ER - TY - JOUR T1 - A note on generalized and hypergeneralized projectors JF - Linear Algebra and its Applications Y1 - 2006 A1 - Stewart, G.W. KW - Generalized projection KW - projection KW - Spectral decomposition AB - Groß and Trenkler [Generalized and hypergeneralized projectors, Linear Algebra Appl. 264 (1997) 463–474] have introduced two generalizations of orthogonal projectors called generalized projectors and hypergeneralized projectors. In this note we characterize these generalizations by their spectral decompositions. VL - 412 SN - 0024-3795 UR - http://www.sciencedirect.com/science/article/pii/S0024379505003836 CP - 2–3 M3 - 10.1016/j.laa.2005.07.022 ER - TY - RPRT T1 - A Novel Information-Aware Octree for the Visualization of Large Scale Time-Varying Data Y1 - 2006 A1 - Kim,Jusub A1 - JaJa, Joseph F. KW - Technical Report AB - Large scale scientific simulations are increasingly generatingvery large data sets that present substantial challenges to current visualization systems. In this paper, we develop a new scalable and efficient scheme for the visual exploration of 4-D isosurfaces of time varying data by rendering the 3-D isosurfaces obtained through an arbitrary axis-parallel hyperplane cut. The new scheme is based on: (i) a new 4-D hierarchical indexing structure, called Information-Aware Octree; (ii) a controllable delayed fetching technique; and (iii) an optimized data layout. Together, these techniques enable efficient and scalable out-of-core visualization of large scale time varying data sets. We introduce an entropy-based dimension integration technique by which the relative resolutions of the spatial and temporal dimensions are established, and use this information to design a compact size 4-D hierarchical indexing structure. We also present scalable and efficient techniques for out-of-core rendering. Compared with previous algorithms for constructing 4-D isosurfaces, our scheme is substantially faster and requires much less memory. Compared to the Temporal Branch-On-Need octree (T-BON), which can only handle a subset of our queries, our indexing structure is an order of magnitude smaller and is at least as effective in dealing with the queries that the T-BON can handle. We have tested our scheme on two large time-varying data sets and obtained very good performance for a wide range of isosurface extraction queries using an order of magnitude smaller indexing structures than previous techniques. In particular, we can generate isosurfaces at intermediate time steps very quickly. PB - Instititue for Advanced Computer Studies, Univ of Maryland, College Park VL - UMIACS-TR-2006-03 UR - http://drum.lib.umd.edu/handle/1903/3335 ER - TY - RPRT T1 - NSF Workshop Storage Resource Broker Data Grid Preservation Assessment Y1 - 2006 A1 - JaJa, Joseph F. PB - San Diego Supercomputer Center VL - TR-2006.3 ER - TY - JOUR T1 - Nuclear Envelope Dystrophies Show a Transcriptional Fingerprint Suggesting Disruption of Rb–MyoD Pathways in Muscle Regeneration JF - BrainBrain Y1 - 2006 A1 - Bakay,Marina A1 - Wang,Zuyi A1 - Melcon,Gisela A1 - Schiltz,Louis A1 - Xuan,Jianhua A1 - Zhao,Po A1 - Sartorelli,Vittorio A1 - Seo,Jinwook A1 - Pegoraro,Elena A1 - Angelini,Corrado A1 - Shneiderman, Ben A1 - Escolar,Diana A1 - Chen,Yi-Wen A1 - Winokur,Sara T A1 - Pachman,Lauren M A1 - Fan,Chenguang A1 - Mandler,Raul A1 - Nevo,Yoram A1 - Gordon,Erynn A1 - Zhu,Yitan A1 - Dong,Yibin A1 - Wang,Yue A1 - Hoffman,Eric P KW - EDMD = Emery–Dreifuss muscular dystrophy KW - emerin KW - Emery-Dreifuss muscular dystrophy KW - FSHD = fascioscapulohumeral muscular dystrophy KW - IDG = individual discriminatory genes KW - JDG = jointly discriminatory genes KW - lamin A/C KW - LGMD = limb-girdle muscular dystrophy KW - LOO = leave-one-out KW - RT–PCR = reverse transcription–polymerase chain reaction; VISDA = Visual and Statistical Data Analyzer KW - Skeletal muscle KW - wFC = weighted Fisher criterion AB - Mutations of lamin A/C (LMNA) cause a wide range of human disorders, including progeria, lipodystrophy, neuropathies and autosomal dominant Emery–Dreifuss muscular dystrophy (EDMD). EDMD is also caused by X-linked recessive loss-of-function mutations of emerin, another component of the inner nuclear lamina that directly interacts with LMNA. One model for disease pathogenesis of LMNA and emerin mutations is cell-specific perturbations of the mRNA transcriptome in terminally differentiated cells. To test this model, we studied 125 human muscle biopsies from 13 diagnostic groups (125 U133A, 125 U133B microarrays), including EDMD patients with LMNA and emerin mutations. A Visual and Statistical Data Analyzer (VISDA) algorithm was used to statistically model cluster hierarchy, resulting in a tree of phenotypic classifications. Validations of the diagnostic tree included permutations of U133A and U133B arrays, and use of two probe set algorithms (MAS5.0 and MBEI). This showed that the two nuclear envelope defects (EDMD LMNA, EDMD emerin) were highly related disorders and were also related to fascioscapulohumeral muscular dystrophy (FSHD). FSHD has recently been hypothesized to involve abnormal interactions of chromatin with the nuclear envelope. To identify disease-specific transcripts for EDMD, we applied a leave-one-out (LOO) cross-validation approach using LMNA patient muscle as a test data set, with reverse transcription–polymerase chain reaction (RT–PCR) validations in both LMNA and emerin patient muscle. A high proportion of top-ranked and validated transcripts were components of the same transcriptional regulatory pathway involving Rb1 and MyoD during muscle regeneration (CRI-1, CREBBP, Nap1L1, ECREBBP/p300), where each was specifically upregulated in EDMD. Using a muscle regeneration time series (27 time points) we develop a transcriptional model for downstream consequences of LMNA and emerin mutations. We propose that key interactions between the nuclear envelope and Rb and MyoD fail in EDMD at the point of myoblast exit from the cell cycle, leading to poorly coordinated phosphorylation and acetylation steps. Our data is consistent with mutations of nuclear lamina components leading to destabilization of the transcriptome in differentiated cells. VL - 129 SN - 0006-8950, 1460-2156 UR - http://brain.oxfordjournals.org/content/129/4/996 CP - 4 M3 - 10.1093/brain/awl023 ER - TY - CONF T1 - Numerical Analysis of Plasmon Resonances Based on Fast Multipole Method T2 - Electromagnetic Field Computation, 2006 12th Biennial IEEE Conference on Y1 - 2006 A1 - Zhang,Zhenyu A1 - Mayergoyz, Issak D A1 - Gumerov, Nail A. A1 - Duraiswami, Ramani KW - analysis;plasmon KW - and KW - boundary KW - eigenfunctions;plasmons; KW - equations;eigenvalue KW - equations;eigenvalues KW - integral KW - method;numerical KW - multipole KW - problem;fast KW - resonances;boundary AB - A novel technique for the numerical analysis of plasmon resonances by using fast multipole method (FMM) is presented. This approach is based on the solution of eigenvalue problem for boundary integral equations, which can be naturally implemented by using the fast multipole method. Numerical examples that highlight the efficiency of the fast multipole implementation are reported JA - Electromagnetic Field Computation, 2006 12th Biennial IEEE Conference on M3 - 10.1109/CEFC-06.2006.1633249 ER - TY - JOUR T1 - Numerical analysis of plasmon resonances in nanoparticles JF - Magnetics, IEEE Transactions on Y1 - 2006 A1 - Mayergoyz, Issak D A1 - Zhang,Zhenyu KW - 3D KW - analysis;plasmon KW - and KW - boundary KW - eigenfunctions;electrostatics;nanoparticles;permittivity;surface KW - equation;boundary KW - equations;eigenvalues KW - integral KW - nanoparticles;eigenvalue KW - plasmon KW - problem;numerical KW - resonance; KW - resonances;specific AB - Plasmon (electrostatic) resonances in nanoparticles are treated as an eigenvalue problem for a specific boundary integral equation. This leads to direct calculation of resonance values of permittivity and resonance frequency. The numerical technique is illustrated by examples of calculation of resonance frequencies for three-dimensional nanoparticles VL - 42 SN - 0018-9464 CP - 4 M3 - 10.1109/TMAG.2006.870976 ER - TY - JOUR T1 - Numerical computation of the Green?s function for two-dimensional finite-size photonic crystals of infinite length JF - Optics ExpressOpt. Express Y1 - 2006 A1 - Seydou,F. A1 - Ramahi,Omar M. A1 - Duraiswami, Ramani A1 - Seppänen,T. KW - Diffraction and gratings KW - Multiple scattering AB - We develop a numerical algorithm that computes the Green’s function of Maxwell equation for a 2D finite-size photonic crystal, composed of rods of arbitrary shape. The method is based on the boundary integral equation, and a Nyström discretization is used for the numerical solution. To provide an exact solution that validates our code we derive multipole expansions for circular cylinders using our integral equation approach. The numerical method performs very well on the test case. We then apply it to crystals of arbitrary shape and discuss the convergence. VL - 14 UR - http://www.opticsexpress.org/abstract.cfm?URI=oe-14-23-11362 CP - 23 M3 - 10.1364/OE.14.011362 ER - TY - CONF T1 - NeurAlign: combining word alignments using neural networks T2 - Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing Y1 - 2005 A1 - Ayan,Necip Fazil A1 - Dorr, Bonnie J A1 - Monz,Christof AB - This paper presents a novel approach to combining different word alignments. We view word alignment as a pattern classification problem, where alignment combination is treated as a classifier ensemble, and alignment links are adorned with linguistic features. A neural network model is used to learn word alignments from the individual alignment systems. We show that our alignment combination approach yields a significant 20--34% relative error reduction over the best-known alignment combination technique on English-Spanish and English-Chinese data. JA - Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing T3 - HLT '05 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dx.doi.org/10.3115/1220575.1220584 M3 - 10.3115/1220575.1220584 ER - TY - JOUR T1 - Neuromimetic sound representation for percept detection and manipulation JF - EURASIP Journal on Applied Signal Processing Y1 - 2005 A1 - Zotkin,Dmitry N A1 - Chi,T. A1 - Shamma,S.A. A1 - Duraiswami, Ramani AB - The acoustic wave received at the ears is processed by the human auditory system to separate different sounds along the intensity,pitch, and timbre dimensions. Conventional Fourier-based signal processing, while endowed with fast algorithms, is unable to easily represent a signal along these attributes. In this paper, we discuss the creation of maximally separable sounds in auditory user interfaces and use a recently proposed cortical sound representation, which performs a biomimetic decomposition of an acoustic signal, to represent and manipulate sound for this purpose. We briefly overview algorithms for obtaining, manipulating, and inverting a cortical representation of a sound and describe algorithms for manipulating signal pitch and timbre separately. The algorithms are also used to create sound of an instrument between a “guitar” and a “trumpet.” Excellent sound quality can be achieved if processing time is not a concern, and intelligible signals can be reconstructed in reasonable processing time (about ten seconds of computational time for a one-second signal sampled at 8 kHz). Work on bringing the algorithms into the real-time processing domain is ongoing. VL - 9 ER - TY - CONF T1 - A new approach to image fusion based on cokriging T2 - Information Fusion, 2005 8th International Conference on Y1 - 2005 A1 - Memarsadeghi,N. A1 - Le Moigne,J. A1 - Mount, Dave A1 - Morisette,J. KW - ALI; KW - analysis; KW - based KW - cokriging; KW - component KW - data; KW - forecasting KW - fusion KW - fusion; KW - geophysical KW - geostatistical KW - Hyperion KW - image KW - Interpolation KW - interpolation; KW - invasive KW - ISFS KW - method; KW - metrics; KW - PCA; KW - principal KW - processing; KW - project; KW - QUALITY KW - quantitative KW - remote KW - remotely KW - sensed KW - sensing; KW - sensor KW - sensors; KW - signal KW - species KW - system; KW - techniques; KW - transforms; KW - wavelet KW - wavelet-based AB - We consider the image fusion problem involving remotely sensed data. We introduce cokriging as a method to perform fusion. We investigate the advantages of fusing Hyperion with ALI. This evaluation is performed by comparing the classification of the fused data with that of input images and by calculating well-chosen quantitative fusion quality metrics. We consider the invasive species forecasting system (ISFS) project as our fusion application. The fusion of ALI with Hyperion data is studied using PCA and wavelet-based fusion. We then propose utilizing a geostatistical based interpolation method called cokriging as a new approach for image fusion. JA - Information Fusion, 2005 8th International Conference on VL - 1 M3 - 10.1109/ICIF.2005.1591912 ER - TY - JOUR T1 - New experimental data of STBLI at DNS/LES accessible Reynolds numbers JF - AIAA paper Y1 - 2005 A1 - Bookey,P. A1 - Wyckham,C. A1 - Smits,A. J. A1 - Martin, M.P VL - 309 ER - TY - JOUR T1 - A new framework for addressing temporal range queries and some preliminary results JF - Theoretical Computer Science Y1 - 2005 A1 - Shi,Qingmin A1 - JaJa, Joseph F. KW - algorithms KW - Data structures KW - Orthogonal range search KW - temporal data AB - Given a set of n objects, each characterized by d attributes specified at m fixed time instances, we are interested in the problem of designing space efficient indexing structures such that a class of temporal range search queries can be handled efficiently. When m = 1 , our problem reduces to the d-dimensional orthogonal search problem. We establish efficient data structures to handle several classes of the general problem. Our results include a linear size data structure that enables a query time of O ( log n log m + f ) for one-sided queries when d = 1 , where f is the number of objects satisfying the query. A similar result is shown for counting queries. We also show that the most general problem can be solved with a polylogarithmic query time using superlinear space data structures. VL - 332 SN - 0304-3975 UR - http://www.sciencedirect.com/science/article/pii/S0304397504007005 CP - 1–3 M3 - 10.1016/j.tcs.2004.10.013 ER - TY - CONF T1 - Non-negative lighting and specular object recognition T2 - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on Y1 - 2005 A1 - Shirdhonkar,S. A1 - Jacobs, David W. KW - and KW - distribution KW - eigenfunctions;image KW - eigenvalue KW - harmonic KW - Lambertian KW - lighting;nonnegative KW - lighting;semidefinite KW - matching;object KW - object KW - objects;Szego KW - optimization;incident KW - programming;specular KW - recognition;optimisation; KW - recognition;spherical KW - representation;eigenvalues KW - theorem;constrained AB - Recognition of specular objects is particularly difficult because their appearance is much more sensitive to lighting changes than that of Lambertian objects. We consider an approach in which we use a 3D model to deduce the lighting that best matches the model to the image. In this case, an important constraint is that incident lighting should be non-negative everywhere. In this paper, we propose a new method to enforce this constraint and explore its usefulness in specular object recognition, using the spherical harmonic representation of lighting. The method follows from a novel extension of Szego's eigenvalue distribution theorem to spherical harmonics, and uses semidefinite programming to perform a constrained optimization. The new method is faster as well as more accurate than previous methods. Experiments on both synthetic and real data indicate that the constraint can improve recognition of specular objects by better separating the correct and incorrect models JA - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on VL - 2 M3 - 10.1109/ICCV.2005.168 ER - TY - JOUR T1 - Non-negative lighting and specular object recognition JF - Proc. of IEEE International Conference on Computer Vision Y1 - 2005 A1 - Jacobs, David W. A1 - Shirdhonkar,S. VL - 2 ER - TY - CONF T1 - Non-Stationary "Shape Activities" T2 - Decision and Control, 2005 and 2005 European Control Conference. CDC-ECC '05. 44th IEEE Conference on Y1 - 2005 A1 - Vaswani, N. A1 - Chellapa, Rama AB - The changing configuration of a group of moving landmarks can be modeled as a moving and deforming shape. The landmarks defining the shape could be moving objects(people/vehicles/robots) or rigid components of an articulated shape like the human body. In past work, the term "shape activity" has been used to denote a particular stochastic model for shape deformation. Dynamical models have been proposed for characterizing stationary shape activities (assume constant mean shape). In this work we define stochastic dynamic models for non-stationary shape activities and show that the stationary shape activity model follows as a special case of this. Most activities performed by a group of moving landmarks (here, objects) are not stationary and hence this more general model is needed. We also define a piecewise stationary model with non-stationary transitions which can be used to segment out and track a sequence of activities. Noisy observations coming from these models can be tracked using a particle filter. We discuss applications of our framework to abnormal activity detection, tracking and activity sequence segmentation. JA - Decision and Control, 2005 and 2005 European Control Conference. CDC-ECC '05. 44th IEEE Conference on M3 - 10.1109/CDC.2005.1582374 ER - TY - JOUR T1 - Novel transformation techniques using q-heaps with applications to computational geometry JF - SIAM Journal on Computing Y1 - 2005 A1 - Shi,Q. A1 - JaJa, Joseph F. AB - Using the notions of Q-heaps and fusion trees developed by Fredman and Willard,we develop general transformation techniques to reduce a number of computational geometry prob- lems to their special versions in partially ranked spaces. In particular, we develop a fast fractional cascading technique, which uses linear space and enables sublogarithmic iterative search on catalog trees in the case when the degree of each node is bounded by O(log∈ n), for some constant ϵ > 0, where n is the total size of all the lists stored in the tree. We apply the fast fractional cascading tech- nique in combination with the other techniques to derive the first linear-space sublogarithmic time algorithms for the two fundamental geometric retrieval problems: orthogonal segment intersection and rectangular point enclosure. VL - 34 CP - 6 ER - TY - CONF T1 - New directions in design for manufacturing Y1 - 2004 A1 - Herrmann,J.W. A1 - Cooper,J. A1 - Gupta,S.K. A1 - Hayes,C. C. A1 - Ishii,K. A1 - Kazmer,D. A1 - Sandborn,P. A. A1 - Wood,W. H. AB - This paper gives an overview of research that is expandingthe domain of design for manufacturing (DFM) into new and important areas. This paper covers DFM and concurrent engineering, DFM for conceptual design, DFM for embodiment design, DFM for detailed design, design for production, platform design for reducing time-to-market, design for system quality, design for life cycle costs, and design for environment. The paper concludes with some general guidelines that suggest how manufacturing firms can develop useful, effective DFM tools. UR - http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.198.8706&rep=rep1&type=pdf ER - TY - JOUR T1 - New year’s resolutions for software quality JF - IEEE Software Y1 - 2004 A1 - Basili, Victor R. A1 - Boehm,B. A1 - Davis,A. A1 - Humphrey,W. S A1 - Leveson,N. A1 - Mead,N. R A1 - Musa,J. D A1 - Parnas,D. L A1 - Pfleeger,S. L A1 - Weyuker,E. AB - In the spirit of making resolutions for betterment in the New Year, ten distinguished individuals in the software quality field offer their recommendations on how organizations can improve software quality In the spirit of making resolutions for betterment in the New Year, ten distinguished individuals in the software quality field offer their recommendations on how organizations can improve software quality. VL - 21 CP - 1 ER - TY - JOUR T1 - A Note on Efficient Computation of Haplotypes via Perfect Phylogeny JF - Journal of Computational Biology Y1 - 2004 A1 - Bafna,Vineet A1 - Gusfield,Dan A1 - Hannenhalli, Sridhar A1 - Yooseph,Shibu AB - The problem of inferring haplotype phase from a population of genotypes has received a lot of attention recently. This is partly due to the observation that there are many regions on human genomic DNA where genetic recombination is rare (Helmuth, 2001; Daly et al., 2001; Stephens et al., 2001; Friss et al., 2001). A Haplotype Map project has been announced by NIH to identify and characterize populations in terms of these haplotypes. Recently, Gusfield introduced the perfect phylogeny haplotyping problem, as an algorithmic implication of the no-recombination in long blocks observation, together with the standard population-genetic assumption of infinite sites. Gusfield's solution based on matroid theory was followed by direct θ(nm2 ) solutions that use simpler techniques (Bafna et al., 2003; Eskin et al., 2003), and also bound the number of solutions to the PPH problem. In this short note, we address two questions that were left open. First, can the algorithms of Bafna et al. (2003) and Eskin et al. (2003) be sped-up to O(nm + m2 ) time, which would imply an O(nm) time-bound for the PPH problem? Second, if there are multiple solutions, can we find one that is most parsimonious in terms of the number of distinct haplotypes.We give reductions that suggests that the answer to both questions is "no." For the first problem, we show that computing the output of the first step (in either method) is equivalent to Boolean matrix multiplication. Therefore, the best bound we can presently achieve is O(nmω–1), where ω ≤ 2.52 is the exponent of matrix multiplication. Thus, any linear time solution to the PPH problem likely requires a different approach. For the second problem of computing a PPH solution that minimizes the number of distinct haplotypes, we show that the problem is NP-hard using a reduction from Vertex Cover (Garey and Johnson, 1979). VL - 11 SN - 1066-5277, 1557-8666 UR - http://www.liebertonline.com/doi/abs/10.1089/cmb.2004.11.858 CP - 5 M3 - 10.1089/cmb.2004.11.858 ER - TY - JOUR T1 - A novel approach to removing intersymbol interference from spin-stand images JF - Magnetics, IEEE Transactions on Y1 - 2004 A1 - Mayergoyz, Issak D A1 - Tse,C. A1 - Krafft,C. A1 - McAvoy,P. KW - algorithm; KW - characterization; KW - Deconvolution KW - function KW - function; KW - giant KW - giant-magnetoresistive KW - Head KW - heads; KW - image KW - image; KW - imaging; KW - Interference KW - interference; KW - intersymbol KW - ISI-distorted KW - ISI-free KW - magnetic KW - magnetization KW - magnetoresistance; KW - patterns; KW - readback KW - removal; KW - response KW - signal; KW - spin-stand KW - suppression; AB - A novel intersymbol interference (ISI) removal technique based on the "response function" characterization of giant-magnetoresistive heads is presented. It is demonstrated that the ISI-free readback image that corresponds to the actual underlying magnetization patterns can be extracted from the ISI-distorted readback signal through deconvolution. A new image deconvolution algorithm has been implemented, and it has been shown that it effectively removes the ISI distortions. VL - 40 SN - 0018-9464 CP - 4 M3 - 10.1109/TMAG.2004.830153 ER - TY - CONF T1 - Np bracketing by maximum entropy tagging and SVM reranking T2 - Proceedings of EMNLP Y1 - 2004 A1 - Daumé, Hal A1 - Marcu,D. JA - Proceedings of EMNLP VL - 4 ER - TY - CHAP T1 - Navigation Patterns and Usability of Zoomable User Interfaces With and Without an Overview T2 - The craft of information visualization: readings and reflections Y1 - 2003 A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine JA - The craft of information visualization: readings and reflections PB - Morgan Kaufmann Publishers Inc. SN - 978-1-55860-915-0 ER - TY - JOUR T1 - Navigation patterns & usability of zoomable user interfaces: with and without an overview JF - interactions Y1 - 2003 A1 - Hornbaek,Kasper A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine AB - The following abstracts are from recent issues and the forthcoming issue of ACM's Transactions of Computer Human Interaction (ToCHI). They are included here to alert interactions' readers to what research is being done in the field of Computer Human Interaction. The complete papers, when published, can be found in ACM's Digital Library at www.acm.org/pubs/contents/journals/tochi/ VL - 10 SN - 1072-5520 UR - http://doi.acm.org/10.1145/604575.604582 CP - 1 M3 - 10.1145/604575.604582 ER - TY - JOUR T1 - Necessity is the mother of invention: a simple grid computing system using commodity tools JF - J Parallel Distr Com Y1 - 2003 A1 - Myers,D. S A1 - Cummings, Michael P. KW - Apache; KW - computing; KW - distributed KW - Grid KW - HTTP; KW - Java; KW - Linux; KW - Perl; KW - SQL; KW - Unix; KW - XML-RPC AB - Access to sufficient resources is a barrier to scientific progress for many researchers facing large computational problems. Gaining access to large-scale resources (i.e., university-wide or federally supported computer centers) can be difficult, given their limited availability, particular architectures, and request/review/approval cycles. Simultaneously, researchers often find themselves with access to workstations and older clusters overlooked by their owners in favor of newer hardware. Software to tie these resources into a coherent Grid, however, has been problematic. Here, we describe our experiences building a Grid computing system to conduct a large-scale simulation study using "borrowed" computing resources distributed over a wide area. Using standard software components, we have produced a Grid computing system capable of coupling several hundred processors spanning multiple continents and administrative domains. We believe that this system fills an important niche between a closely coupled local system and a heavyweight, highly customized wide area system. (C) 2003 Elsevier Science (USA). All rights reserved. VL - 63 CP - 5 M3 - DOI 10.1016/S0743-7315(03)00004-2 ER - TY - CONF T1 - New approaches to help users get started with visual interfaces: multi-layered interfaces and integrated initial guidance T2 - Proceedings of the 2003 annual national conference on Digital government research Y1 - 2003 A1 - Kang,Hyunmo A1 - Plaisant, Catherine A1 - Shneiderman, Ben AB - We are investigating new ways to help users learn to use public access interactive tools, in particular for the visual exploration of government statistics. Our work led to a series of interfaces using multi-layered design and a new help method called Integrated Initial Guidance. Multi-layer designs structure an interface so that a simpler interface is available for users to get started and more complex features are accessed as users move through the more advanced layers. Integrated Initial Guidance provides help within the working interface, right at the start of the application. Using the metaphor of "sticky notes" overlaid on top of the functional interface locates the main widgets, demonstrates their manipulation, and explains the resulting actions using preset animation of the interface. Usability testing with 12 participants led to refined designs and guidelines for the design of Integrated Initial Guidance interfaces. JA - Proceedings of the 2003 annual national conference on Digital government research T3 - dg.o '03 PB - Digital Government Society of North America UR - http://dl.acm.org/citation.cfm?id=1123196.1123269 ER - TY - CONF T1 - New eyes for robotics T2 - 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings Y1 - 2003 A1 - Baker, P. A1 - Ogale, A. S A1 - Fermüller, Cornelia A1 - Aloimonos, J. KW - 3D motion estimation KW - Argus eye KW - array signal processing KW - Birds KW - Calibration KW - CAMERAS KW - Control systems KW - Eyes KW - geometric configuration KW - imaging KW - imaging system KW - Layout KW - Motion estimation KW - multiple stereo configurations KW - Robot kinematics KW - robot vision KW - Robot vision systems KW - ROBOTICS KW - Robotics and automation KW - SHAPE KW - shape models AB - This paper describes an imaging system that has been designed to facilitate robotic tasks of motion. The system consists of a number of cameras in a network arranged so that they sample different parts of the visual sphere. This geometric configuration has provable advantages compared to small field of view cameras for the estimation of the system's own motion and consequently the estimation of shape models from the individual cameras. The reason is that inherent ambiguities of confusion between translation and rotation disappear. Pairs of cameras may also be arranged in multiple stereo configurations which provide additional advantages for segmentation. Algorithms for the calibration of the system and the 3D motion estimation are provided. JA - 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings PB - IEEE VL - 1 SN - 0-7803-7860-1 M3 - 10.1109/IROS.2003.1250761 ER - TY - CONF T1 - Nonlinear collusion attacks on independent fingerprints for multimedia T2 - Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on Y1 - 2003 A1 - Zhao,Hong A1 - M. Wu A1 - Wang,Z.J. A1 - Liu,K. J.R KW - attacks; KW - average KW - bounded KW - collusion KW - computing; KW - content KW - copies; KW - digital KW - distribution; KW - fingerprinted KW - fingerprinting; KW - fingerprints; KW - Gaussian KW - independent KW - multimedia KW - nonlinear KW - perceptual KW - quality; KW - robustness; KW - watermarking; AB - Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Collusion attack is a cost effective attack against digital fingerprinting where several copies with the same content but different fingerprints are combined to remove the original fingerprints. In this paper, we investigate average and nonlinear collusion attacks of independent Gaussian fingerprints and study both their effectiveness and the perceptual quality. We also propose the bounded Gaussian fingerprints to improve the perceptual quality of the fingerprinted copies. We further discuss the tradeoff between the robustness against collusion attacks and the perceptual quality of a fingerprinting system. JA - Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on VL - 5 M3 - 10.1109/ICASSP.2003.1200058 ER - TY - CONF T1 - Non-parametric expectation maximization: a learning automata approach T2 - IEEE International Conference on Systems, Man and Cybernetics, 2003 Y1 - 2003 A1 - Abd-Almageed, Wael A1 - El-Osery,A. A1 - Smith,C.E. KW - Automatic speech recognition KW - bivariate simulation data KW - Computational modeling KW - Computer vision KW - Density functional theory KW - expectation maximization technique KW - learning automata KW - mixture parameters estimation KW - nonparametric expectation maximization KW - nonparametric statistics KW - optimisation KW - parameter estimation KW - Parzen Window KW - PDF KW - probability KW - probability density function KW - Speech processing KW - Speech recognition KW - stochastic learning automata KW - Stochastic processes KW - stochastic technique AB - The famous expectation maximization technique suffers two major drawbacks. First, the number of components has to be specified apriori. Also, the expectation maximization is sensitive to initialization. In this paper, we present a new stochastic technique for estimating the mixture parameters. Parzen Window is used to estimate a discrete estimate of the PDF of the given data. Stochastic learning automata is then used to select the mixture parameters that minimize the distance between the discrete estimate of the PDF and the estimate of the expectation maximization. The validity of the proposed approach is verified using bivariate simulation data. JA - IEEE International Conference on Systems, Man and Cybernetics, 2003 PB - IEEE VL - 3 SN - 0-7803-7952-7 M3 - 10.1109/ICSMC.2003.1244347 ER - TY - JOUR T1 - Navigation patterns and usability of zoomable user interfaces with and without an overview JF - ACM Transactions on Computer-Human Interaction (TOCHI) Y1 - 2002 A1 - Hornbaek,K. A1 - Bederson, Benjamin B. A1 - Plaisant, Catherine VL - 9 CP - 4 ER - TY - JOUR T1 - Network-wide BGP route prediction for traffic engineering JF - Proceedings of ITCOM Y1 - 2002 A1 - Feamster, Nick A1 - Rexford,J. AB - The Internet consists of about 13,000 Autonomous Systems (AS’s) that exchange routing information using the BorderGateway Protocol (BGP). The operators of each AS must have control over the flow of traffic through their network and between neighboring AS’s. However, BGP is a complicated, policy-based protocol that does not include any direct support for traffic engineering. In previous work, we have demonstrated that network operators can adapt the flow of traffic in an efficient and predictable fashion through careful adjustments to the BGP policies running on their edge routers. Nevertheless, many details of the BGP protocol and decision process make predicting the effects of these policy changes difficult. In this paper, we describe a tool that predicts traffic flow at network exit points based on the network topology, the import policy associated with each BGP session, and the routing advertisements received from neighboring AS’s. We present a linear-time algorithm that computes a network-wide view of the best BGP routes for each destination prefix given a static snapshot of the network state, without simulating the complex details of BGP message passing. We describe how to construct this snapshot using the BGP routing tables and router configuration files available from operational routers. We verify the accuracy of our algorithm by applying our tool to routing and configuration data from AT&T’s commercial IP network. Our route prediction techniques help support the operation of large IP backbone networks, where interdomain routing is an important aspect of traffic engineering. ER - TY - JOUR T1 - A new, expressed multigene family containing a hot spot for insertion of retroelements is associated with polymorphic subtelomeric regions of Trypanosoma brucei JF - Eukaryotic cell Y1 - 2002 A1 - Bringaud,F. A1 - Biteau,N. A1 - Melville,S. E. A1 - Hez,S. A1 - El‐Sayed, Najib M. A1 - Leech,V. A1 - Berriman,M. A1 - Hall,N. A1 - Donelson,J. E A1 - Baltz,T. VL - 1 CP - 1 ER - TY - CONF T1 - A noisy-channel model for document compression T2 - Proceedings of the 40th Annual Meeting on Association for Computational Linguistics Y1 - 2002 A1 - Daumé, Hal A1 - Marcu,Daniel AB - We present a document compression system that uses a hierarchical noisy-channel model of text production. Our compression system first automatically derives the syntactic structure of each sentence and the overall discourse structure of the text given as input. The system then uses a statistical hierarchical model of text production in order to drop non-important syntactic and discourse constituents so as to generate coherent, grammatical document compressions of arbitrary length. The system outperforms both a baseline and a sentence-based compression system that operates by simplifying sequentially all sentences in a text. Our results support the claim that discourse knowledge plays an important role in document summarization. JA - Proceedings of the 40th Annual Meeting on Association for Computational Linguistics T3 - ACL '02 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dx.doi.org/10.3115/1073083.1073159 M3 - 10.3115/1073083.1073159 ER - TY - CONF T1 - A non-intrusive Kalman filter-based tracker for pursuit eye movement T2 - American Control Conference, 2002. Proceedings of the 2002 Y1 - 2002 A1 - Abd-Almageed, Wael A1 - Fadali,M. S A1 - Bebis,G. KW - Application software KW - characterization KW - Computer vision KW - Current measurement KW - deterministic component KW - Electric variables measurement KW - eye position estimation KW - eye tracking KW - gaze tracking KW - Human computer interaction KW - Kalman filter KW - Kalman filters KW - Lenses KW - Motion estimation KW - Optical reflection KW - pursuit eye movement KW - pursuit motion KW - random component KW - Skin KW - tracking AB - In this paper, we introduce a new non-intrusive approach to estimating the eye position during pursuit motion of the eye. We introduce a new characterization for the pursuit eye movement. Our characterization is based on the decomposition of the pursuit eye motion into a deterministic component and random component. We use a discrete Kalman filter to estimate the random component and calculate the deterministic component. We add the two components to obtain an estimate of the eye position. Simulation results are provided to illustrate the eye position estimation. JA - American Control Conference, 2002. Proceedings of the 2002 PB - IEEE VL - 2 SN - 0-7803-7298-0 UR - http://ieeexplore.ieee.org/ielx5/7965/22015/01023224.pdf?tp=&arnumber=1023224&isnumber=22015 M3 - 10.1109/ACC.2002.1023224 ER - TY - JOUR T1 - Nonlinear collusion attacks on independent multimedia fingerprints JF - submitted to IEEE Trans. on Image Proc Y1 - 2002 A1 - Zhao,H. A1 - Wu,M. A1 - Wang,Z.J. A1 - Liu,K. J.R ER - TY - CONF T1 - Non-manifold decomposition in arbitrary dimensions T2 - Discrete Geometry for Computer Imagery Y1 - 2002 A1 - De Floriani, Leila A1 - Mesmoudi,M. A1 - Morando,F. A1 - Puppo,E. AB - In this paper we consider the problem of decomposing a nonmanifold n-dimensional object described by an abstract simplicial complex into an assembly of ‘more-regular’ components. Manifolds, which would be natural candidates for components, cannot be used to this aim in high dimensions because they are not decidable sets. Therefore, we define d-quasi-manifolds, a decidable superset of the class of combinatorial d-manifolds that coincides with d-manifolds in dimension less or equal than two. We first introduce the notion of d-quasi-manifold complexes, then we sketch an algorithm to decompose an arbitrary complex into an assembly of quasi-manifold components abutting at non-manifold joints. This result provides a rigorous starting point for our future work, which includes designing efficient data structures for non-manifold modeling, as well as defining a notion of measure of shape complexity of such models. JA - Discrete Geometry for Computer Imagery M3 - 10.1007/3-540-45986-3_6 ER - TY - CONF T1 - Numerical study of the influence of the torso on the HRTF T2 - Acoustics, Speech, and Signal Processing, 1993. ICASSP-93., 1993 IEEE International Conference on Y1 - 2002 A1 - Gumerov, Nail A. A1 - Duraiswami, Ramani A1 - Tang,Z. JA - Acoustics, Speech, and Signal Processing, 1993. ICASSP-93., 1993 IEEE International Conference on VL - 2 ER - TY - JOUR T1 - Near-optimal design of MP S tunnels with shared recovery JF - DIMACS Mini-Workshop on Quality of Service Issues in the Internet Y1 - 2001 A1 - Fleischer,L. A1 - Meyerson,A. A1 - Saniee,I. A1 - Shepherd,FB A1 - Srinivasan, Aravind AB - We describe the optimization problem associ-ated with the concurrent routing of demands with guar- anteed shared recovery in case of network failures. This problem arises in routing with protection in meshes and is known to be hard. We describe the problem in the context of the efficient design of restorable MP S tunnels in optical networks. The underlying design gives rise to a stochastic optimization problem that is equivalent to a (very) large- scale linear programming (LP) problem that explicitly in- corporates the network failure scenarios. The feasible re- gion for this LP is given by combined packing and cover- ing constraints for concurrent and optimal multicommodity flows. We develop a novel -approximation procedure for this problem and demonstrate its performance for a variety of real network sizes. An attraction of our approach is that its main computation consists of routing flow along a pair of short paths and these paths are easily found. Commer- cial general-purpose LP solvers are typically unable to solve these problems once they become large enough, while our approach scales for large networks. We conclude that the proposed scheme provides guaranteed approximation to the design of restorable MP S tunnels with shared protection within realistic network settings. ER - TY - CONF T1 - New approaches to covering and packing problems T2 - Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms Y1 - 2001 A1 - Srinivasan, Aravind AB - Covering and packing integer programs model a large family of combinatorial optimization problems. The current-best approximation algorithms for these are an instance of the basic probabilistic method: showing that a certain randomized approach produces a good approximation with positive probability. This approach seems inherently sequential; by employing the method of alteration we present the first RNC and NC approximation algorithms that match the best sequential guarantees. Extending our approach, we get the first RNC and NC approximation algorithms for certain multi-criteria versions of these problems. We also present the first NC algorithms for two packing and covering problems that are not subsumed by the above result: finding large independent sets in graphs, and rounding fractional Group Steiner solutions on trees. JA - Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms T3 - SODA '01 PB - Society for Industrial and Applied Mathematics CY - Philadelphia, PA, USA SN - 0-89871-490-7 UR - http://dl.acm.org/citation.cfm?id=365411.365535 ER - TY - CONF T1 - Nearly optimal expected-case planar point location T2 - Foundations of Computer Science, 2000. Proceedings. 41st Annual Symposium on Y1 - 2000 A1 - Arya,S. A1 - Malamatos,T. A1 - Mount, Dave KW - computational geometry KW - convex cells KW - data structure KW - expected search time KW - nearly optimal expected-case planar point location KW - optimal binary search tree KW - planar point location KW - planar polygonal subdivision KW - polygonal cells KW - polygonal subdivision KW - probability KW - search problems KW - search structure KW - subdivision KW - trees (mathematics) AB - We consider the planar point location problem from the perspective of expected search time. We are given a planar polygonal subdivision S and for each polygon of the subdivision the probability that a query point lies within this polygon. The goal is to compute a search structure to determine which cell of the subdivision contains a given query point, so as to minimize the expected search time. This is a generalization of the classical problem of computing an optimal binary search tree for one-dimensional keys. In the one-dimensional case it has long been known that the entropy H of the distribution is the dominant term in the lower bound on the expected-case search time, and further there exist search trees achieving expected search times of at most H+2. Prior to this work, there has been no known structure for planar point location with an expected search time better than 2H, and this result required strong assumptions on the nature of the query point distribution. Here we present a data structure whose expected search time is nearly equal to the entropy lower bound, namely H+o(H). The result holds for any polygonal subdivision in which the number of sides of each of the polygonal cells is bounded, and there are no assumptions on the query distribution within each cell. We extend these results to subdivisions with convex cells, assuming a uniform query distribution within each cell JA - Foundations of Computer Science, 2000. Proceedings. 41st Annual Symposium on M3 - 10.1109/SFCS.2000.892108 ER - TY - JOUR T1 - A Neural Network Approach for Predicting Network Resource Requirements in Video Transmission Systems JF - Proc. IEEE Pacific RIM Conference on Multimedia, Sydney, Australia Y1 - 2000 A1 - Wong,H.S. A1 - Wu,M. A1 - Joyce,R.A. A1 - Guan,L. A1 - Kung, S.Y. AB - Dynamic resource allocation is important for ensuring ef-ficient network utilization in Internet-based multimedia content delivery system. To allow accurate network traf- fic prediction in the case of video delivery, relevant infor- mation based on video contents and the short term traffic pattern has to be taken into account, while the inclusion of non-relevant features will deterioriate the prediction per- formance due to the "curse of dimensionality" problem. In this work, we propose a neural network-based predic- tion system and specifically address the determination of relevant input features for the system. Experiments have shown that the current system is capable of identifying a highly relevant subset of features for traffic prediction given a large number of video content and short-term net- work traffic descriptors. ER - TY - JOUR T1 - New eyes for building models from video JF - Computational Geometry Y1 - 2000 A1 - Fermüller, Cornelia A1 - Aloimonos, J. A1 - Brodský,Tomáš KW - model building KW - shape reconstruction KW - structure from motion KW - video analysis AB - Models of real-world objects and actions for use in graphics, virtual and augmented reality and related fields can only be obtained through the use of visual data and particularly video. This paper examines the question of recovering shape models from video information. Given video of an object or a scene captured by a moving camera, a prerequisite for model building is to recover the three-dimensional (3D) motion of the camera which consists of a rotation and a translation at each instant. It is shown here that a spherical eye (an eye or system of eyes providing panoramic vision) is superior to a camera-type eye (an eye with restricted field of view such as a common video camera) as regards the competence of 3D motion estimation. This result is derived from a geometric/statistical analysis of all the possible computational models that can be used for estimating 3D motion from an image sequence. Regardless of the estimation procedure for a camera-type eye, the parameters of the 3D rigid motion (translation and rotation) contain errors satisfying specific geometric constraints. Thus, translation is always confused with rotation, resulting in inaccurate results. This confusion does not happen for the case of panoramic vision. Insights obtained from this study point to new ways of constructing powerful imaging devices that suit particular tasks in visualization and virtual reality better than conventional cameras, thus leading to a new camera technology. Such new eyes are constructed by putting together multiple existing video cameras in specific ways, thus obtaining eyes from eyes. For a new eye of this kind we describe an implementation for deriving models of scenes from video data, while avoiding the correspondence problem in the video sequence. VL - 15 SN - 0925-7721 UR - http://www.sciencedirect.com/science/article/pii/S0925772199000449 CP - 1–3 M3 - 10.1016/S0925-7721(99)00044-9 ER - TY - CHAP T1 - New Eyes for Shape and Motion Estimation T2 - Biologically Motivated Computer VisionBiologically Motivated Computer Vision Y1 - 2000 A1 - Baker,Patrick A1 - Pless,Robert A1 - Fermüller, Cornelia A1 - Aloimonos, J. ED - Lee,Seong-Whan ED - Bülthoff,Heinrich ED - Poggio,Tomaso AB - Motivated by the full field of view of insect eyes and their fast and accurate estimation of egomotion, we constructed a system of cameras to take advantage of the full field of view (FOV) constraints that insects use. In this paper, we develop a new ego-motion algorithm for a rigidly mounted set of cameras undergoing arbitrary rigid motion. This egomotion algorithm combines the unambiguous components of the motion computed by each separate camera. We prove that the cyclotorsion is resistant to errors and show this empirically. We show how to calibrate the system with two novel algorithms, one using secondary cameras and one using self calibration. Given this system calibration, the new 3D motion algorithm first computes the rotation and then the 3D translation. We apply this algorithm to a camera system constructed with four rigidly mounted synchronized cameras pointing in various directions and present motion estimation results at www.cfar.umd.edu/ pbaker/argus.html. JA - Biologically Motivated Computer VisionBiologically Motivated Computer Vision T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1811 SN - 978-3-540-67560-0 UR - http://dx.doi.org/10.1007/3-540-45482-9_12 ER - TY - CONF T1 - A New Framework for Multi-camera Structure from Motion T2 - Mustererkennung 2000, 22. DAGM-Symposium Y1 - 2000 A1 - Neumann, J. A1 - Fermüller, Cornelia A1 - Aloimonos, J. JA - Mustererkennung 2000, 22. DAGM-Symposium ER - TY - JOUR T1 - A new relative perturbation theorem for singular subspaces JF - Linear Algebra and its Applications Y1 - 2000 A1 - Li,Ren-Cang A1 - Stewart, G.W. KW - Multiplicative perturbation KW - Relative gap KW - Relative perturbation theory KW - Singular subspace AB - This note addresses the sensitivity of singular subspaces of a matrix under relative perturbations. It employs a new technique of separating a multiplicative perturbation D into two components: one is the distance of a scalar multiple of D to the nearest unitary matrix Q and the other is the distance of Q to the identity. Consequently, the new bounds reflect the intrinsic differences in how left and right multiplicative perturbations affect left and right singular subspaces. VL - 313 SN - 0024-3795 UR - http://www.sciencedirect.com/science/article/pii/S0024379500000744 CP - 1–3 M3 - 10.1016/S0024-3795(00)00074-4 ER - TY - CONF T1 - A no-busy-wait balanced tree parallel algorithmic paradigm T2 - Proceedings of the twelfth annual ACM symposium on Parallel algorithms and architectures Y1 - 2000 A1 - Vishkin, Uzi AB - Suppose that a parallel algorithm can include any number of parallel threads. Each thread can proceed without ever having to busy wait to another thread. A thread can proceed till its termination, but no new threads can be formed. What kind of problems can such restrictive algorithms solve and still be competitive in the total number of operations they perform with the fastest serial algorithm for the same problem?Intrigued by this informal question, we considered one of the most elementary parallel algorithmic paradigms, that of balanced binary trees. The main contribution of this paper is a new balanced (not necessarily binary) tree no-busy-wait paradigm for parallel algorithms; applications of the basic paradigm to two problems are presented: building heaps, and executing parallel tree contraction (assuming a preparatory stage); the latter is known to be applicable to evaluating a family of general arithmetic expressions. For putting things in context, we also discuss our “PRAM-on-chip” vision (actually a small update to it), presented at SPAA98. JA - Proceedings of the twelfth annual ACM symposium on Parallel algorithms and architectures T3 - SPAA '00 PB - ACM CY - New York, NY, USA SN - 1-58113-185-2 UR - http://doi.acm.org/10.1145/341800.341818 M3 - 10.1145/341800.341818 ER - TY - JOUR T1 - Numerical simulation of small-signal microwave performance of 4H–SiC MESFET JF - Solid-State Electronics Y1 - 2000 A1 - Huang,Mingwei A1 - Mayergoyz, Issak D A1 - Goldsman,Neil AB - Small-signal high frequency characteristics of 4H–SiC MESFET has been studied by using two-dimensional numerical drift-diffusion model in frequency domain. Non-ideal Schottky boundary conditions have been introduced that take into account a thin interfacial layer and interface energy states. It has been demonstrated that the 10 dB/dec small-signal current gain roll-off can be attributed to the existence of high density interface states at the metal–semiconductor interface. It has been found that as the gate length is reduced to 0.1 μm, fT and fmax may reach as high as 30 and 62 GHz, respectively. VL - 44 SN - 0038-1101 UR - http://www.sciencedirect.com/science/article/pii/S0038110100000253 CP - 7 M3 - 10.1016/S0038-1101(00)00025-3 ER - TY - JOUR T1 - Nano-to-millimeter scale integrated systems JF - Components and Packaging Technologies, IEEE Transactions on Y1 - 1999 A1 - Last,H.R. A1 - Deeds,M. A1 - Garvick,D. A1 - Kavetsky,R. A1 - Sandborn,P. A. A1 - Magrab,E. B. A1 - Gupta,S.K. KW - fabrication technology KW - In2m KW - integrated nano to millimeter system KW - micromechanical devices KW - nanotechnology AB - Over the last several years various industries have been developing nano, micro, and millimeter scale technologies, which have resulted in components ranging from quantum transistors, to widely commercialized integrated circuits, to microelectromechanical sensors. A common emphasis of these fabrication industries has been on the integration of different functions in miniaturized systems; however, the technology currently used to realize these systems is monolithic. A unique class of hybrid technology systems is Integrated nano to millimeter (In2m) systems. An In2m system typically has components spanning multiple sizes, diverse technology domains, and mixtures of electrical, mechanical, thermal, chemical, fluidic, and biological functions VL - 22 SN - 1521-3331 CP - 2 M3 - 10.1109/6144.774758 ER - TY - CHAP T1 - Network Programming Using PLAN T2 - Internet Programming LanguagesInternet Programming Languages Y1 - 1999 A1 - Hicks, Michael W. A1 - Kakkar,Pankaj A1 - Moore,Jonathan A1 - Gunter,Carl A1 - Nettles,Scott ED - Bal,Henri ED - Belkhouche,Boumediene ED - Cardelli,Luca AB - We present here a methodology for programming active networks in the environment defined by our new language PLAN (Packet Language for Active Networks). This environment presumes a two-level architecture consisting of: 1. active packets carrying PLAN code; and 2. downloadable, node-resident services written in more general-purpose languages. We present several examples which illustrate how these two features can be combined to implement various network functions. JA - Internet Programming LanguagesInternet Programming Languages T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 1686 SN - 978-3-540-66673-8 UR - http://dx.doi.org/10.1007/3-540-47959-7_7 ER - TY - CONF T1 - Network service selection for distributed multimedia applications T2 - Third International Conference on Computational Intelligence and Multimedia Applications, 1999. ICCIMA '99. Proceedings Y1 - 1999 A1 - Simon,R. A1 - Sood,A. A1 - Mundur, Padma KW - Admission control KW - Application software KW - application-adequate end-to-end service KW - Bandwidth KW - Communication system traffic control KW - Computer science KW - Delay KW - distributed processing KW - end-to-end delivery delay control KW - flexibility KW - high-bandwidth distributed multimedia applications KW - interactive multimedia KW - multimedia systems KW - network service selection KW - network throughput KW - nonpreemptive earliest deadline first KW - queueing theory KW - Regulators KW - system support KW - telecommunication services KW - Throughput KW - Traffic control KW - weighted fair queueing AB - An important question in the development of system support for distributed multimedia is the type of network service offered to applications. This paper compares two network service disciplines: weighted fair queueing (WFQ) and non-preemptive earliest deadline first (NEDF). We show that, for a broad class of high-bandwidth distributed multimedia applications, WFQ outperforms NEDF in terms of network throughput while still providing an application-adequate end-to-end service. This result holds despite the fact that NEDF offers applications far greater flexibility in terms of control over end-to-end delivery delay JA - Third International Conference on Computational Intelligence and Multimedia Applications, 1999. ICCIMA '99. Proceedings PB - IEEE SN - 0-7695-0300-4 M3 - 10.1109/ICCIMA.1999.798561 ER - TY - JOUR T1 - A neural network model of lateralization during letter identification JF - Journal of Cognitive Neuroscience Y1 - 1999 A1 - Shevtsova,N. A1 - Reggia, James A. VL - 11 CP - 2 ER - TY - CONF T1 - New algorithmic aspects of the Local Lemma with applications to routing and partitioning T2 - Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms Y1 - 1999 A1 - Leighton,Tom A1 - Rao,Satish A1 - Srinivasan, Aravind JA - Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms T3 - SODA '99 PB - Society for Industrial and Applied Mathematics CY - Philadelphia, PA, USA SN - 0-89871-434-6 UR - http://dl.acm.org/citation.cfm?id=314500.314886 ER - TY - JOUR T1 - A new deterministic parallel sorting algorithm with an experimental evaluation JF - Journal of Experimental Algorithmics (JEA) Y1 - 1998 A1 - Helman,David R. A1 - JaJa, Joseph F. A1 - Bader,David A. KW - generalized sorting KW - integer sorting KW - Parallel algorithms KW - parallel performance KW - sorting by regular sampling AB - We introduce a new deterministic parallel sorting algorithm for distributed memory machines based on the regular sampling approach. The algorithm uses only two rounds of regular all-to-all personalized communication in a scheme that yields very good load balancing with virtually no overhead. Moreover, unlike previous variations, our algorithm efficiently handles the presence of duplicate values without the overhead of tagging each element with a unique identifier. This algorithm was implemented in SPLIT-C and run on a variety of platforms, including the Thinking Machines CM-5, the IBM SP-2-WN, and the Cray Research T3D. We ran our code using widely different benchmarks to examine the dependence of our algorithm on the input distribution. Our experimental results illustrate the efficiency and scalability of our algorithm across different platforms. In fact, the performance compares closely to that of our random sample sort algorithm, which seems to outperform all similar algorithms known to the authors on these platforms. Together, their performance is nearly invariant over the set of input distributions, unlike previous efficient algorithms. However, unlike our randomized sorting algorithm, the performance and memory requirements of our regular sorting algorithm can be deterministically guaranteed. VL - 3 SN - 1084-6654 UR - http://doi.acm.org/10.1145/297096.297128 M3 - 10.1145/297096.297128 ER - TY - JOUR T1 - A New Method to Recover Vectorial Electric Fields and Current Densities from Unstructured Meshes JF - VLSI DESIGN Y1 - 1998 A1 - Kerr,D. C. A1 - Mayergoyz, Issak D AB - In the context of 2-D and 3-D unstructured mixed-element meshes, a new method of recover-ing vectorial fields and currents in multidimensional simulation is introduced. The new method, called the method of edge elements, directly interpolates the projections of the vec- tors on the edges of an element into its interior. The new method is compared to two other recovery methods on the basis of resolution, consistency, and implementation ease. VL - 6 CP - 1/4 ER - TY - JOUR T1 - Nucleotide sequence diversity at the alcohol dehydrogenase 1 locus in wild barley (ıt Hordeum vulgare ssp. ıt spontaneum): an evaluation of the background selection hypothesis JF - Proc Natl Acad Sci USA Y1 - 1998 A1 - Cummings, Michael P. A1 - Clegg,M. T AB - The background selection hypothesis predicts a reduction in nucleotide site diversity and an excess of rare variants, owing to linkage associations with deleterious alleles. This effect is expected to be amplified in species that are predominantly self-fertilizing. To examine the predictions of the background selection hypothesis in self-fertilizing species, we sequenced 1,362 bp of adh1, a gene for alcohol dehydrogenase (Adh; alcohol:NAD+ oxidoreductase, EC 1.1.1.1), in a sample of 45 accessions of wild barley, Hordeum vulgare ssp. spontaneum, drawn from throughout the species range. The region sequenced included 786 bp of exon sequence (part of exon 4, all of exons 5-9, and part of exon 10) and 576 bp of intron sequence (all of introns 4-9). There were 19 sites polymorphic for nucleotide substitutions, 8 in introns, and 11 in exons. Of the 11 nucleotide substitutions in codons, 4 were synonymous and 7 were nonsynonymous, occurring uniquely in the sample. There was no evidence of recombination in the region studied, and the estimated effective population size (Ne) based on synonymous sites was approximately 1.8-4.2 x 10(5). Several tests reveal that the pattern of nonsynonymous substitutions departs significantly from neutral expectations. However, the data do not appear to be consistent with recovery from a population bottleneck, recent population expansion, selective sweep, or strong positive selection. Though several features of the data are consistent with background selection, the distributions of polymorphic synonymous and intron sites are not perturbed toward a significant excess of rare alleles as would be predicted by background selection. VL - 95 CP - 10 ER - TY - CONF T1 - Navigating static environments using image-space simplification and morphing T2 - Proceedings of the 1997 symposium on Interactive 3D graphics Y1 - 1997 A1 - Darsa,Lucia A1 - Costa Silva,Bruno A1 - Varshney, Amitabh JA - Proceedings of the 1997 symposium on Interactive 3D graphics T3 - I3D '97 PB - ACM CY - New York, NY, USA SN - 0-89791-884-3 UR - http://doi.acm.org/10.1145/253284.253298 M3 - 10.1145/253284.253298 ER - TY - JOUR T1 - A Network-Flow Technique for Finding Low-Weight Bounded-Degree Spanning Trees JF - Journal of Algorithms Y1 - 1997 A1 - Fekete,Sándor P A1 - Khuller, Samir A1 - Klemmstein,Monika A1 - Raghavachari,Balaji A1 - Young,Neal AB - Given a graph with edge weights satisfying the triangle inequality, and a degree bound for each vertex, the problem of computing a low-weight spanning tree such that the degree of each vertex is at most its specified bound is considered. In particular, modifying a given spanning treeTusingadoptionsto meet the degree constraints is considered. A novel network-flow-based algorithm for finding a good sequence of adoptions is introduced. The method yields a better performance guarantee than any previous algorithm. If the degree constraintd(v) for eachvis at least 2, the algorithm is guaranteed to find a tree whose weight is at most the weight of the given tree times 2 − min{(d(v) − 2)/(degT(v) − 2) : degT(v) > 2}, where degT(v) is the initial degree ofv. Equally importantly, it takes this approach to the limit in the following sense: if any performance guarantee that is solely a function of the topology and edge weights of a given tree holds foranyalgorithm at all, then it also holds for the given algorithm. Examples are provided in which no lighter tree meeting the degree constraint exists. Linear-time algorithms are provided with the same worst-case performance guarantee. ChoosingTto be a minimum spanning tree yields approximation algorithms with factors less than 2 for the general problem on geometric graphs with distances induced by variousLpnorms. Finally, examples of Euclidean graphs are provided in which the ratio of the lengths of an optimal Traveling Salesman path and a minimum spanning tree can be arbitrarily close to 2. VL - 24 SN - 0196-6774 UR - http://www.sciencedirect.com/science/article/pii/S0196677497908622 CP - 2 M3 - 10.1006/jagm.1997.0862 ER - TY - JOUR T1 - The next generation of graphical user interfaces: information visualization and better window management JF - Displays Y1 - 1997 A1 - Shneiderman, Ben VL - 17 SN - 0141-9382 UR - http://www.sciencedirect.com/science/article/pii/S014193829700005X CP - 3–4 M3 - 10.1016/S0141-9382(97)00005-X ER - TY - JOUR T1 - A note on conjugate gradient convergence JF - Numerische Mathematik Y1 - 1997 A1 - Naiman, A. E A1 - Babuška, I. M A1 - Elman, Howard VL - 76 CP - 2 ER - TY - CONF T1 - The NCSU concurrency workbench T2 - Computer Aided Verification Y1 - 1996 A1 - Cleaveland, Rance A1 - Sims,S. JA - Computer Aided Verification ER - TY - JOUR T1 - A neural model of positive schizophrenic symptoms JF - Schizophrenia Bulletin Y1 - 1996 A1 - Ruppin,E. A1 - Reggia, James A. A1 - Horn,D. VL - 22 CP - 1 ER - TY - JOUR T1 - A neural model of delusions and hallucinations in schizophrenia JF - Advances in Neural Information Processing Systems Y1 - 1995 A1 - Ruppin,E. A1 - Reggia, James A. A1 - Horn,D. ER - TY - JOUR T1 - A neural model of memory impairment in diffuse cerebral atrophy JF - The British Journal of Psychiatry Y1 - 1995 A1 - Ruppin,E. A1 - Reggia, James A. VL - 166 CP - 1 ER - TY - JOUR T1 - Next generation network management technology JF - AIP Conference Proceedings Y1 - 1995 A1 - Baras,John S A1 - Atallah,George C A1 - Ball,Mike A1 - Goli,Shravan A1 - Karne,Ramesh K A1 - Kelley,Steve A1 - Kumar,Harsha A1 - Plaisant, Catherine A1 - Roussopoulos, Nick A1 - Schneiderman,Ben A1 - Srinivasarao,Mulugu A1 - Stathatos,Kosta A1 - Teittinen,Marko A1 - Whitefield,David AB - Today’s telecommunications networks are becoming increasingly large, complex, mission critical and heterogeneous in several dimensions. For example, the underlying physical transmission facilities of a given network may be ‘‘mixed media’’ (copper, fiber‐optic, radio, and satellite); the subnetworks may be acquired from different vendors due to economic, performance, or general availability reasons; the information being transmitted over the network may be ‘‘multimedia’’ (video, data, voice, and images) and, finally, varying performance criteria may be imposed e.g., data transfer may require high throughput while the others, whose concern is voice communications, may require low call blocking probability. For these reasons, future telecommunications networks are expected to be highly complex in their services and operations. Due to this growing complexity and the disparity among management systems for individual sub‐networks, efficient network management systems have become critical to the current and future success of telecommunications companies. This paper addresses a research and development effort which focuses on prototyping configuration management, since that is the central process of network management and all other network management functions must be built upon it. Our prototype incorporates ergonomically designed graphical user interfaces tailored to the network configuration management subsystem and to the proposed advanced object‐oriented database structure. The resulting design concept follows open standards such as Open Systems Interconnection (OSI) and incorporates object oriented programming methodology to associate data with functions, permit customization, and provide an open architecture environment. © 1995 American Institute of Physics VL - 325 SN - 0094243X UR - http://proceedings.aip.org/resource/2/apcpcs/325/1/75_1?isAuthorized=no CP - 1 M3 - doi:10.1063/1.47255 ER - TY - CONF T1 - A note on reducing parallel model simulations to integer sorting T2 - Parallel Processing Symposium, 1995. Proceedings., 9th International Y1 - 1995 A1 - Matias,E. A1 - Vishkin, Uzi JA - Parallel Processing Symposium, 1995. Proceedings., 9th International ER - TY - JOUR T1 - Navigating in hyperspace: designing a structure-based toolbox JF - Communications of the ACM Y1 - 1994 A1 - Rivlin,Ehud A1 - Botafogo,Rodrigo A1 - Shneiderman, Ben VL - 37 SN - 0001-0782 UR - http://doi.acm.org/10.1145/175235.175242 CP - 2 M3 - 10.1145/175235.175242 ER - TY - JOUR T1 - A neural model of cortical map reorganization following a focal lesion JF - Artificial Intelligence in Medicine Y1 - 1994 A1 - Armentrout,S. L A1 - Reggia, James A. A1 - Weinrich,M. VL - 6 CP - 5 ER - TY - RPRT T1 - Next Generation Network Management Technology Y1 - 1994 A1 - Atallah,George C A1 - Ball,Michael O A1 - Baras,John S A1 - Goli,Shravan K A1 - Karne,Ramesh K A1 - Kelley,Stephen A1 - Kumar,Harsha P. A1 - Plaisant, Catherine A1 - Roussopoulos, Nick A1 - Shneiderman, Ben A1 - Srinivasarao,Mulugu A1 - Stathatos,Kostas A1 - Teittinen,Marko A1 - Whitefield,David KW - Constraints for Network Management. KW - Network Configuration Management KW - network management KW - Object Oriented Data Base Model for Network Management KW - Rules KW - Systems Integration KW - Visual Information Management for Network Configuration Management AB - Today's telecommunications networks are becoming increasingly large, complex, mission critical and heterogeneous in several dimensions. For example, the underlying physical transmission facilities of a given network may be ﲭixed media (copper, fiber- optic, radio, and satellite); the sub networks may be acquired from different vendors due to economic, performance, or general availability reasons; the information being transmitted over the network may be ﲭultimedia (video, data, voice, and images) and, finally, varying performance criteria may be imposed e.g. data transfer may require high throughput while the others, whose concern is voice communications, may require low call blocking probability. For these reasons, future telecommunications networks are expected to be highly complex in their services and operations. Due to this growing complexity and the disparity among management systems for individual sub networks, efficient network management systems have become critical to the current and future success of telecommunications companies. This paper addresses a research and development effort which focuses on prototyping configuration management, since that is the central process of network management and all other network management functions must be built upon it. Our prototype incorporates ergonomically designed graphical user interfaces tailored to the network configuration management subsystem and to the proposed advanced object-oriented database structure. The resulting design concept follows open standards such as Open Systems Interconnection (OSI) and incorporates object oriented programming methodology to associate data with functions, permit customization, and provide an open architecture environment. JA - Institute for Systems Research Technical Reports UR - http://drum.lib.umd.edu/handle/1903/5519 ER - TY - JOUR T1 - Neural computation in medicine JF - Artificial Intelligence in Medicine Y1 - 1993 A1 - Reggia, James A. VL - 5 CP - 2 ER - TY - JOUR T1 - A new point of view on the mathematical structure of Maxwell's equations JF - Magnetics, IEEE Transactions on Y1 - 1993 A1 - Mayergoyz, Issak D A1 - D'Angelo,J. KW - analysis;partial KW - conditions;boundary KW - conducting KW - differential KW - discretizations;mathematical KW - element KW - EM KW - equations; KW - equations;boundary KW - equations;boundary-value KW - equations;perfect KW - example;partial KW - Maxwell's KW - plate;plane KW - problems;electromagnetic KW - problems;finite KW - scattering;finite KW - scattering;Maxwell KW - structure;numerical KW - thin KW - value KW - wave AB - It is emphasized that the Maxwell equations have a peculiar mathematical structure which leads to boundary value problems with an overspecified number of partial differential equations and an underspecified number of boundary conditions. An attempt is made to reduce these boundary value problems to standard mathematical formulations with equal numbers of partial differential equations and boundary conditions. It is demonstrated that these formulations have some attractive features which appreciably facilitate their finite element discretizations. A numerical example involving scattering of plane electromagnetic waves from a perfect conducting thin plate illustrates the discussion VL - 29 SN - 0018-9464 CP - 2 M3 - 10.1109/20.250640 ER - TY - JOUR T1 - A nonanthropomorphic style guide: overcoming the Humpty Dumpty syndrome JF - Sparks of innovation in human-computer interaction Y1 - 1993 A1 - Shneiderman, Ben ER - TY - CONF T1 - On the nature of bias and defects in the software specification process T2 - Computer Software and Applications Conference, 1992. COMPSAC '92. Proceedings., Sixteenth Annual International Y1 - 1992 A1 - Straub,P. A1 - Zelkowitz, Marvin V KW - Center;NASA;Software KW - defects;software KW - engineering KW - Flight KW - Goddard KW - Laboratory;bias;coding KW - phase;design KW - processes;multiattribute KW - reliability; KW - reliability;formal KW - software KW - space KW - specification;software AB - Implementation bias in a specification is an arbitrary constraint in the solution space. The authors describe the problem of bias and then present a model of the specification and design processes describing individual subprocesses in terms of precision/detail programs, and a model of bias in multi-attribute software specifications. While studying how bias is introduced into a specification it was realized that software defects and bias are dual problems of a single phenomenon. This has been used to explain the large proportion of faults found during the coding phase at the Software Engineering Laboratory at NASA Goddard Space Flight Center JA - Computer Software and Applications Conference, 1992. COMPSAC '92. Proceedings., Sixteenth Annual International M3 - 10.1109/CMPSAC.1992.217609 ER - TY - JOUR T1 - A new era for high precision touchscreens JF - Advances in human-computer interaction Y1 - 1992 A1 - Sears,A. A1 - Plaisant, Catherine A1 - Shneiderman, Ben AB - While many input devices allow interfaces to be customized, increased directness distinguishes touchscreens. Touchscreens are easy to learn to use, fast, and result in low error rates when interfaces are designed carefully. Many actions which are diffi cult with a mouse, joystick, or keyboard are simple when using a touchscreen. Making rapid selections at widely separated locations on the screen, signing your name, dragging the hands of a clock in a circular motion are all simple when using a touchscre en, but may be awkward using other devices. This paper presents recent empirical research which can provide a basis for theories of touchscreen usage. We believe recent improvements warrant increased use of touchscreens. VL - 3 ER - TY - JOUR T1 - A new era for touchscreen applications: High precision, dragging icons, and refined feedback JF - Advances in Human-Computer Interaction Y1 - 1992 A1 - Sears,A. A1 - Plaisant, Catherine A1 - Shneiderman, Ben VL - 3 ER - TY - JOUR T1 - Nonmonotonicity and the scope of reasoning JF - Artificial Intelligence Y1 - 1991 A1 - Etherington,D. W A1 - Kraus,S. A1 - Perlis, Don VL - 52 CP - 3 ER - TY - JOUR T1 - The number of shortest paths on the surface of a polyhedron JF - SIAM Journal on Computing Y1 - 1990 A1 - Mount, Dave VL - 19 ER - TY - JOUR T1 - A new approach to realizing partially symmetric functions JF - Computers, IEEE Transactions on Y1 - 1989 A1 - JaJa, Joseph F. A1 - Wu,S.-M. KW - class KW - complexity;logic KW - cover;symmetric KW - covers;switching KW - design;switching KW - functions;Boolean KW - functions;complexity;partially KW - functions;computational KW - functions;sum-of-product KW - of KW - symmetric KW - theory; KW - theory;symmetric AB - Consideration is given to the class of partially symmetric functions and a method for realizing them is outlined. Each such function can be expressed as a sum of totally symmetric functions such that a circuit can be designed with its complexity dependent on the size of such symmetric cover. The authors compare the sizes of symmetric and sum-of-product covers and show that the symmetric cover will be substantially smaller for this class of functions VL - 38 SN - 0018-9340 CP - 6 M3 - 10.1109/12.24302 ER - TY - JOUR T1 - A numerical analysis for the small-signal response of the MOS capacitor JF - Solid-State Electronics Y1 - 1989 A1 - Gaitan,Michael A1 - Mayergoyz, Issak D AB - Simulation results for the small-signal sinusoidal steady-state response of the MOS capacitor using time perturbation analysis of the basic semiconductor equations are presented. The effects of interface and bulk trap dynamics are included. The model uses Fermi-Dirac statistics and Shockley-Read-Hall recombination to describe the traps. This analysis is an improvement over previous techniques since it can simulate the effect of trap dynamics on the small-signal sinusoidal steady-state response of a semiconductor device with arbitrary geometry, doping and trap distributions. VL - 32 SN - 0038-1101 UR - http://www.sciencedirect.com/science/article/pii/0038110189900932 CP - 3 M3 - 10.1016/0038-1101(89)90093-2 ER - TY - JOUR T1 - A note on the capacitance matrix algorithm, substructuring, and mixed or neumann boundary conditions JF - Applied Numerical Mathematics Y1 - 1987 A1 - O'Leary, Dianne P. AB - We develop in this work variants of the capacitance matrix algorithm which can be used to solve discretizations of elliptic partial differential equations when either the original system of equations or one which arises from substructuring has a rank-deficient matrix. VL - 3 SN - 0168-9274 UR - http://www.sciencedirect.com/science/article/pii/0168927487900389 CP - 4 M3 - 10.1016/0168-9274(87)90038-9 ER - TY - JOUR T1 - No members, no officers, no dues: A ten year history of the software psychology society JF - ACM SIGCHI Bulletin Y1 - 1986 A1 - Shneiderman, Ben AB - For ten years we have joyfully overcome our insecurity with anarchy and successfully conducted the "business" of the Software Psychology Society. Our business has always been science; to improve our understanding of how people use computers. The two-horse team of computer science and psychology usually pulled in the same direction. Sometimes it leaned towards design guidelines, software, and hardware, other times it leaned towards cognitive models, personality theory, and human problem-solving. Mostly our travel was steadied by an appreciation of the importance of empirical studies, data collection, and controlled experiments with an occasional diversion into theoretical models or inspirational system designs. Our destinations have included programming and command language design, human-computer interaction models, menu selection strategies, natural language interaction, software engineering metrics and methods, educational packages, expert system user interfaces, voice communications and conferencing systems, screen readability, use of color, user interface management systems, and text editor design. VL - 18 SN - 0736-6906 UR - http://doi.acm.org/10.1145/15683.15685 CP - 2 M3 - 10.1145/15683.15685 ER - TY - RPRT T1 - A New Approach for Compiling Boolean Functions Y1 - 1985 A1 - JaJa, Joseph F. A1 - Wu,S. M. KW - Technical Report AB - We propose a new approach for laying out Boolean functions which is based on extracting the symmetries of a given set of functions and applying optimization procedures especially tailored to exploit these symmetries. This paper establishes a rigorous foundation for this approach and shows that it will outperform existing methods for many classes of the functions. The different components of a newly developed system, SYMBL, will be briefly described. PB - Institute for Systems Research, University of Maryland, College Park VL - ISR; TR 1985-39 UR - http://drum.lib.umd.edu/handle/1903/4412 ER - TY - CONF T1 - Non-monotonicity and real-time reasoning T2 - AAAI Workshop on Nonmonotonic Reasoning Y1 - 1984 A1 - Perlis, Don JA - AAAI Workshop on Nonmonotonic Reasoning ER - TY - CONF T1 - A New Inference Method for Frame-based Expert System T2 - Proceedings of the National Conference on Artificial Intelligence Y1 - 1983 A1 - Reggia, James A. A1 - Nau, Dana S. A1 - Wang,P. Y JA - Proceedings of the National Conference on Artificial Intelligence ER - TY - JOUR T1 - The (new) Yale sparse matrix package JF - Elliptic problem solvers II Y1 - 1983 A1 - Eisenstat, S. C A1 - Elman, Howard A1 - Schultz, M. H A1 - Sherman, A. H ER - TY - JOUR T1 - A note on human factors issues of natural language interaction with database systems JF - Information Systems Y1 - 1981 A1 - Shneiderman, Ben AB - Efforts at constructing natural language computer systems have turned to implementing database query facilities. If the application domain is limited there is renewed hope for the success of natural language interfaces. This paper reviews arguments for and against such facilities, stresses research in human semantic knowledge, and emphasizes controlled psychologically oriented experimentation. The results of recent experiments are reported. VL - 6 SN - 0306-4379 UR - http://www.sciencedirect.com/science/article/pii/030643798190034X CP - 2 M3 - 10.1016/0306-4379(81)90034-X ER - TY - CONF T1 - Natural vs. precise concise languages for human operation of computers: research issues and experimental approaches T2 - Proceedings of the 18th annual meeting on Association for Computational Linguistics Y1 - 1980 A1 - Shneiderman, Ben AB - This paper raises concerns that natural language front ends for computer systems can limit a researcher's scope of thinking, yield inappropriately complex systems, and exaggerate public fear of computers. Alternative modes of computer use are suggested and the role of psychologically oriented controlled experimentation is emphasized. Research methods and recent experimental results are briefly reviewed. JA - Proceedings of the 18th annual meeting on Association for Computational Linguistics T3 - ACL '80 PB - Association for Computational Linguistics CY - Stroudsburg, PA, USA UR - http://dx.doi.org/10.3115/981436.981478 M3 - 10.3115/981436.981478 ER - TY - JOUR T1 - Numerical Solution of Nonlinear Elliptic Partial Differential Equations by a Generalized Conjugate Gradient Method JF - Computing Y1 - 1978 A1 - Concus,Paul A1 - Golub, Gene H. A1 - O'Leary, Dianne P. AB - We have studied previously a generalized conjugate gradient method for solving sparse positive-definite systems of linear equations arising from the discretization of elliptic partial-differential boundary-value problems. Here, extensions to the nonlinear case are considered. We split the original discretized operator into the sum of two operators, one of which corresponds to a more easily solvable system of equations, and accelerate the associated iteration based on this splitting by (nonlinear) conjugate gradients. The behavior of the method is illustrated for the minimal surface equation with splittings corresponding to nonlinear SSOR, to approximate factorization of the Jacobian matrix, and to elliptic operators suitable for use with fast direct methods. The results of numerical experiments are given as well for a mildy nonlinear example, for which, in the corresponding linear case, the finite termination property of the conjugate gradient algorithm is crucial. VL - 19 ER -