%0 Journal Article %J The Analyst %D 2020 %T Rapid, quantitative therapeutic screening for Alzheimer's enzymes enabled by optimal signal transduction with transistors %A Le, Son T. %A Morris, Michelle A. %A Cardone, Antonio %A Guros, Nicholas B. %A Klauda, Jeffery B. %A Sperling, Brent A. %A Richter, Curt A. %A Pant, Harish C. %A Balijepalli, Arvind %B The Analyst %V 145 %P 2925 - 2936 %8 Feb-04-2021 %G eng %U http://xlink.rsc.org/?DOI=C9AN01804Bhttp://pubs.rsc.org/en/content/articlepdf/2020/AN/C9AN01804Bhttp://pubs.rsc.org/en/content/articlepdf/2020/AN/C9AN01804B %N 8 %! Analyst %R 10.1039/C9AN01804B %0 Journal Article %J Nanoscale %D 2019 %T Quantum Capacitance-Limited MoS2 Biosensors Enable Remote Label-Free Enzyme Measurements %A Le, Son T %A Guros, Nicholas B %A Bruce, Robert C %A Cardone, Antonio %A Amin, Niranjana D %A Zhang, Siyuan %A Klauda, Jeffery %A Pant, Harish C %A Richter, Curt A %A Balijepalli, Arvind %B Nanoscale %8 Jan-01-2019 %G eng %U http://pubs.rsc.org/en/Content/ArticleLanding/2019/NR/C9NR03171Ehttp://pubs.rsc.org/en/content/articlepdf/2019/NR/C9NR03171E %! Nanoscale %R 10.1039/C9NR03171E %0 Journal Article %J Biological Reviews %D 2018 %T Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis) %A Carlson, Colin J. %A Getz, Wayne M. %A Kausrud, Kyrre L. %A Cizauskas, Carrie A. %A Blackburn, Jason K. %A Bustos Carrillo, Fausto A. %A Rita R Colwell %A Easterday, W. Ryan %A Ganz, Holly H. %A Kamath, Pauline L. %A Økstad, Ole A. %A Turner, Wendy C. %A Kolsto, Anne-Brit %A Stenseth, Nils C. %X Environmentally transmitted diseases are comparatively poorly understood and managed, and their ecology is particularly understudied. Here we identify challenges of studying environmental transmission and persistence with a six‐sided interdisciplinary review of the biology of anthrax (Bacillus anthracis). Anthrax is a zoonotic disease capable of maintaining infectious spore banks in soil for decades (or even potentially centuries), and the mechanisms of its environmental persistence have been the topic of significant research and controversy. Where anthrax is endemic, it plays an important ecological role, shaping the dynamics of entire herbivore communities. The complex eco‐epidemiology of anthrax, and the mysterious biology of Bacillus anthracis during its environmental stage, have necessitated an interdisciplinary approach to pathogen research. Here, we illustrate different disciplinary perspectives through key advances made by researchers working in Etosha National Park, a long‐term ecological research site in Namibia that has exemplified the complexities of the enzootic process of anthrax over decades of surveillance. In Etosha, the role of scavengers and alternative routes (waterborne transmission and flies) has proved unimportant relative to the long‐term persistence of anthrax spores in soil and their infection of herbivore hosts. Carcass deposition facilitates green‐ups of vegetation to attract herbivores, potentially facilitated by the role of anthrax spores in the rhizosphere. The underlying seasonal pattern of vegetation, and herbivores' immune and behavioural responses to anthrax risk, interact to produce regular ‘anthrax seasons’ that appear to be a stable feature of the Etosha ecosystem. Through the lens of microbiologists, geneticists, immunologists, ecologists, epidemiologists, and clinicians, we discuss how anthrax dynamics are shaped at the smallest scale by population genetics and interactions within the bacterial communities up to the broadest scales of ecosystem structure. We illustrate the benefits and challenges of this interdisciplinary approach to disease ecology, and suggest ways anthrax might offer insights into the biology of other important pathogens. Bacillus anthracis, and the more recently emerged Bacillus cereus biovar anthracis, share key features with other environmentally transmitted pathogens, including several zoonoses and panzootics of special interest for global health and conservation efforts. Understanding the dynamics of anthrax, and developing interdisciplinary research programs that explore environmental persistence, is a critical step forward for understanding these emerging threats. %B Biological Reviews %P 1813 - 1831 %8 Jan-11-2018 %G eng %U https://onlinelibrary.wiley.com/doi/full/10.1111/brv.12420 %N 4 %! Biol Rev %R 10.1111/brv.12420 %0 Journal Article %J Frontiers in Microbiology %D 2017 %T Characterization of Two Cryptic Plasmids Isolated in Haiti from Clinical Vibrio cholerae Non-O1/Non-O139 %A Ceccarelli, Daniela %A Garriss, Genevieve %A Choi, Seon Y. %A Hasan, Nur A. %A Stepanauskas, Ramunas %A Pop, Mihai %A Huq, Anwar %A Rita R Colwell %B Frontiers in Microbiology %8 Nov-11-2018 %G eng %U http://journal.frontiersin.org/article/10.3389/fmicb.2017.02283 %! Front. Microbiol. %R 10.3389/fmicb.2017.02283 %0 Journal Article %J Genome Biology %D 2017 %T Comprehensive benchmarking and ensemble approaches for metagenomic classifiers %A McIntyre, Alexa B. R. %A Ounit, Rachid %A Afshinnekoo, Ebrahim %A Prill, Robert J. %A Hénaff, Elizabeth %A Alexander, Noah %A Minot, Samuel S. %A Danko, David %A Foox, Jonathan %A Ahsanuddin, Sofia %A Tighe, Scott %A Hasan, Nur A. %A Subramanian, Poorani %A Moffat, Kelly %A Levy, Shawn %A Lonardi, Stefano %A Greenfield, Nick %A Rita R Colwell %A Rosen, Gail L. %A Mason, Christopher E. %B Genome Biology %8 Jan-12-2017 %G eng %U http://genomebiology.biomedcentral.com/articles/10.1186/s13059-017-1299-7 %N 1210 %! Genome Biol %R 10.1186/s13059-017-1299-7 %0 Journal Article %J Journal of Biomolecular Techniques : JBT %D 2017 %T Genomic Methods and Microbiological Technologies for Profiling Novel and Extreme Environments for the Extreme Microbiome Project (XMP) %A Tighe, Scott %A Afshinnekoo, Ebrahim %A Rock, Tara M. %A McGrath, Ken %A Alexander, Noah %A McIntyre, Alexa %A Ahsanuddin, Sofia %A Bezdan, Daniela %A Green, Stefan J. %A Joye, Samantha %A Stewart Johnson, Sarah %A Baldwin, Don A. %A Bivens, Nathan %A Ajami, Nadim %A Carmical, Joseph R. %A Herriott, Ian Charold %A Rita R Colwell %A Donia, Mohamed %A Foox, Jonathan %A Greenfield, Nick %A Hunter, Tim %A Hoffman, Jessica %A Hyman, Joshua %A Jorgensen, Ellen %A Krawczyk, Diana %A Lee, Jodie %A Levy, Shawn %A Garcia-Reyero, àlia %A Settles, Matthew %A Thomas, Kelley %A ómez, Felipe %A Schriml, Lynn %A Kyrpides, Nikos %A Zaikova, Elena %A Penterman, Jon %A Mason, Christopher E. %X The Extreme Microbiome Project (XMP) is a project launched by the Association of Biomolecular Resource Facilities Metagenomics Research Group (ABRF MGRG) that focuses on whole genome shotgun sequencing of extreme and unique environments using a wide variety of biomolecular techniques. The goals are multifaceted, including development and refinement of new techniques for the following: 1) the detection and characterization of novel microbes, 2) the evaluation of nucleic acid techniques for extremophilic samples, and 3) the identification and implementation of the appropriate bioinformatics pipelines. Here, we highlight the different ongoing projects that we have been working on, as well as details on the various methods we use to characterize the microbiome and metagenome of these complex samples. In particular, we present data of a novel multienzyme extraction protocol that we developed, called Polyzyme or MetaPolyZyme. Presently, the XMP is characterizing sample sites around the world with the intent of discovering new species, genes, and gene clusters. Once a project site is complete, the resulting data will be publically available. Sites include Lake Hillier in Western Australia, the “Door to Hell” crater in Turkmenistan, deep ocean brine lakes of the Gulf of Mexico, deep ocean sediments from Greenland, permafrost tunnels in Alaska, ancient microbial biofilms from Antarctica, Blue Lagoon Iceland, Ethiopian toxic hot springs, and the acidic hypersaline ponds in Western Australia. %B Journal of Biomolecular Techniques : JBT %V 28 %P 31 - 39 %8 Jan-04-2017 %G eng %U https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5345951/ %N 1 %! J Biomol Tech %R 10.7171/jbt.17-2801-004 %0 Journal Article %J Scientific Reports %D 2017 %T The microbiomes of blowflies and houseflies as bacterial transmission reservoirs %A Junqueira, AC %A Ratan, Aakrosh %A Acerbi, Enzo %A Drautz-Moses, Daniela I. %A Premkrishnan, BNV %A Costea, PI %A Linz, Bodo %A Purbojati, Rikky W. %A Paulo, Daniel F. %A Gaultier, Nicolas E. %A Subramanian, Poorani %A Hasan, Nur A. %A Rita R Colwell %A Bork, Peer %A Azeredo-Espin, Ana Maria L. %A Bryant, Donald A. %A Schuster, Stephan C. %X Blowflies and houseflies are mechanical vectors inhabiting synanthropic environments around the world. They feed and breed in fecal and decaying organic matter, but the microbiome they harbour and transport is largely uncharacterized. We sampled 116 individual houseflies and blowflies from varying habitats on three continents and subjected them to high-coverage, whole-genome shotgun sequencing. This allowed for genomic and metagenomic analyses of the host-associated microbiome at the species level. Both fly host species segregate based on principal coordinate analysis of their microbial communities, but they also show an overlapping core microbiome. Legs and wings displayed the largest microbial diversity and were shown to be an important route for microbial dispersion. The environmental sequencing approach presented here detected a stochastic distribution of human pathogens, such as Helicobacter pylori, thereby demonstrating the potential of flies as proxies for environmental and public health surveillance. %B Scientific Reports %8 Jan-12-2017 %G eng %U http://www.nature.com/articles/s41598-017-16353-x %N 1 %! Sci Rep %R 10.1038/s41598-017-16353-x %0 Journal Article %J FEMS Microbiology Ecology %D 2016 %T Chitin promotes Mycobacterium ulcerans growth %A Sanhueza, Daniel %A Chevillon, Christine %A Rita R Colwell %A Babonneau, Jérémie %A Marion, Estelle %A Marsollier, Laurent %A égan, çois %E Sobecky, Patricia %X Mycobacterium ulcerans (MU) is the causative agent of Buruli ulcer, an emerging human infectious disease. However, both the ecology and life cycle of MU are poorly understood. The occurrence of MU has been linked to the aquatic environment, notably water bodies affected by human activities. It has been hypothesized that one or a combination of environmental factor(s) connected to human activities could favour growth of MU in aquatic systems. Here, we tested in vitro the growth effect of two ubiquitous polysaccharides and five chemical components on MU at concentration ranges shown to occur in endemic regions. Real-time PCR showed that chitin increased MU growth significantly providing a nutrient source or environmental support for the bacillus, thereby, providing a focus on the association between MU and aquatic arthropods. Aquatic environments with elevated population of arthropods provide increased chitin availability and, thereby, enhanced multiplication of MU. If calcium very slightly enhanced MU growth, iron, zinc, sulphate and phosphate did not stimulate MU growth, and at the concentration ranges of this study would limit MU population in natural ecosystems. %B FEMS Microbiology Ecology %V 928565871 %P fiw067 %8 Jun-06-2017 %G eng %U https://academic.oup.com/femsec/article-lookup/doi/10.1093/femsec/fiw067 %N 6 %! FEMS Microbiology Ecology %R 10.1093/femsec/fiw067 %0 Journal Article %J Proceedings of the National Academy of Sciences %D 2016 %T Climate influence on Vibrio and associated human diseases during the past half-century in the coastal North Atlantic %A Vezzulli, Luigi %A Grande, Chiara %A Reid, Philip C. %A élaouët, Pierre %A Edwards, Martin %A öfle, Manfred G. %A Brettar, Ingrid %A Rita R Colwell %A Pruzzo, Carla %X Climate change is having a dramatic impact on marine animal and plant communities but little is known of its influence on marine prokaryotes, which represent the largest living biomass in the world oceans and play a fundamental role in maintaining life on our planet. In this study, for the first time to our knowledge, experimental evidence is provided on the link between multidecadal climatic variability in the temperate North Atlantic and the presence and spread of an important group of marine prokaryotes, the vibrios, which are responsible for several infections in both humans and animals. Using archived formalin-preserved plankton samples collected by the Continuous Plankton Recorder survey over the past half-century (1958–2011), we assessed retrospectively the relative abundance of vibrios, including human pathogens, in nine areas of the North Atlantic and North Sea and showed correlation with climate and plankton changes. Generalized additive models revealed that long-term increase in Vibrio abundance is promoted by increasing sea surface temperatures (up to ∼1.5 °C over the past 54 y) and is positively correlated with the Northern Hemisphere Temperature (NHT) and Atlantic Multidecadal Oscillation (AMO) climatic indices (P < 0.001). Such increases are associated with an unprecedented occurrence of environmentally acquired Vibrio infections in the human population of Northern Europe and the Atlantic coast of the United States in recent years. %B Proceedings of the National Academy of Sciences %P E5062 - E5071 %8 Nov-08-2017 %G eng %U http://www.pnas.org/lookup/doi/10.1073/pnas.1609157113 %! Proc Natl Acad Sci USA %R 10.1073/pnas.1609157113 %0 Journal Article %J Proceedings of the National Academy of Sciences %D 2016 %T Cross-talk among flesh-eating Aeromonas hydrophila strains in mixed infection leading to necrotizing fasciitis %A Ponnusamy, Duraisamy %A Kozlova, Elena V. %A Sha, Jian %A Erova, Tatiana E. %A Azar, Sasha R. %A Fitts, Eric C. %A Kirtley, Michelle L. %A Tiner, Bethany L. %A Andersson, Jourdan A. %A Grim, Christopher J. %A Isom, Richard P. %A Hasan, Nur A. %A Rita R Colwell %A Chopra, Ashok K. %X Necrotizing fasciitis (NF) caused by flesh-eating bacteria is associated with high case fatality. In an earlier study, we reported infection of an immunocompetent individual with multiple strains of Aeromonas hydrophila (NF1–NF4), the latter three constituted a clonal group whereas NF1 was phylogenetically distinct. To understand the complex interactions of these strains in NF pathophysiology, a mouse model was used, whereby either single or mixed A. hydrophila strains were injected intramuscularly. NF2, which harbors exotoxin A (exoA) gene, was highly virulent when injected alone, but its virulence was attenuated in the presence of NF1 (exoA-minus). NF1 alone, although not lethal to animals, became highly virulent when combined with NF2, its virulence augmented by cis-exoA expression when injected alone in mice. Based on metagenomics and microbiological analyses, it was found that, in mixed infection, NF1 selectively disseminated to mouse peripheral organs, whereas the other strains (NF2, NF3, and NF4) were confined to the injection site and eventually cleared. In vitro studies showed NF2 to be more effectively phagocytized and killed by macrophages than NF1. NF1 inhibited growth of NF2 on solid media, but ExoA of NF2 augmented virulence of NF1 and the presence of NF1 facilitated clearance of NF2 from animals either by enhanced priming of host immune system or direct killing via a contact-dependent mechanism. %B Proceedings of the National Academy of Sciences %V 11312161268 %P 722 - 727 %8 Jul-01-2017 %G eng %U http://www.pnas.org/lookup/doi/10.1073/pnas.1523817113 %N 3321029 %! Proc Natl Acad Sci USA %R 10.1073/pnas.1523817113 %0 Journal Article %J BMC Microbiology %D 2016 %T Enrichment dynamics of Listeria monocytogenes and the associated microbiome from naturally contaminated ice cream linked to a listeriosis outbreak %A Ottesen, Andrea %A Ramachandran, Padmini %A Reed, Elizabeth %A White, James R. %A Hasan, Nur %A Subramanian, Poorani %A Ryan, Gina %A Jarvis, Karen %A Grim, Christopher %A Daquiqan, Ninalynn %A Hanes, Darcy %A Allard, Marc %A Rita R Colwell %A Brown, Eric %A Chen, Yi %B BMC Microbiology %8 Jan-12-2016 %G eng %U http://bmcmicrobiol.biomedcentral.com/articles/10.1186/s12866-016-0894-1 %! BMC Microbiol %R 10.1186/s12866-016-0894-1 %0 Journal Article %J Proceedings of the National Academy of Sciences %D 2015 %T Deep-sea hydrothermal vent bacteria related to human pathogenic Vibrio species %A Hasan, Nur A. %A Grim, Christopher J. %A Lipp, Erin K. %A Rivera, Irma N. G. %A Chun, Jongsik %A Haley, Bradd J. %A Taviani, Elisa %A Choi, Seon Young %A Hoq, Mozammel %A Munk, A. Christine %A Brettin, Thomas S. %A Bruce, David %A Challacombe, Jean F. %A Detter, J. Chris %A Han, Cliff S. %A Eisen, Jonathan A. %A Huq, Anwar %A Rita R Colwell %X Vibrio species are both ubiquitous and abundant in marine coastal waters, estuaries, ocean sediment, and aquaculture settings worldwide. We report here the isolation, characterization, and genome sequence of a novel Vibrio species, Vibrio antiquarius, isolated from a mesophilic bacterial community associated with hydrothermal vents located along the East Pacific Rise, near the southwest coast of Mexico. Genomic and phenotypic analysis revealed V. antiquarius is closely related to pathogenic Vibrio species, namely Vibrio alginolyticus, Vibrio parahaemolyticus, Vibrio harveyi, and Vibrio vulnificus, but sufficiently divergent to warrant a separate species status. The V. antiquarius genome encodes genes and operons with ecological functions relevant to the environment conditions of the deep sea and also harbors factors known to be involved in human disease caused by freshwater, coastal, and brackish water vibrios. The presence of virulence factors in this deep-sea Vibrio species suggests a far more fundamental role of these factors for their bacterial host. Comparative genomics revealed a variety of genomic events that may have provided an important driving force in V. antiquarius evolution, facilitating response to environmental conditions of the deep sea. %B Proceedings of the National Academy of Sciences %P E2813 - E2819 %8 Feb-05-2017 %G eng %U http://www.pnas.org/lookup/doi/10.1073/pnas.1503928112 %N 2144666966517 %! Proc Natl Acad Sci USA %R 10.1073/pnas.1503928112 %0 Journal Article %J mBio %D 2015 %T Hybrid Vibrio cholerae El Tor Lacking SXT Identified as the Cause of a Cholera Outbreak in the Philippines %A Klinzing, David C. %A Choi, Seon Young %A Hasan, Nur A. %A Matias, Ronald R. %A Tayag, Enrique %A Geronimo, Josefina %A Skowronski, Evan %A Rashed, Shah M. %A Kawashima, Kent %A Rosenzweig, C. Nicole %A Gibbons, Henry S. %A Torres, Brian C. %A Liles, Veni %A Alfon, Alicia C. %A Juan, Maria Luisa %A Natividad, Filipinas F. %A Cebula, Thomas A. %A Rita R Colwell %X Cholera continues to be a global threat, with high rates of morbidity and mortality. In 2011, a cholera outbreak occurred in Palawan, Philippines, affecting more than 500 people, and 20 individuals died. Vibrio cholerae O1 was confirmed as the etiological agent. Source attribution is critical in cholera outbreaks for proper management of the disease, as well as to control spread. In this study, three V. cholerae O1 isolates from a Philippines cholera outbreak were sequenced and their genomes analyzed to determine phylogenetic relatedness to V. cholerae O1 isolates from recent outbreaks of cholera elsewhere. The Philippines V. cholerae O1 isolates were determined to be V. cholerae O1 hybrid El Tor belonging to the seventh-pandemic clade. They clustered tightly, forming a monophyletic clade closely related to V. cholerae O1 hybrid El Tor from Asia and Africa. The isolates possess a unique multilocus variable-number tandem repeat analysis (MLVA) genotype (12-7-9-18-25 and 12-7-10-14-21) and lack SXT. In addition, they possess a novel 15-kb genomic island (GI-119) containing a predicted type I restriction-modification system. The CTXΦ-RS1 array of the Philippines isolates was similar to that of V. cholerae O1 MG116926, a hybrid El Tor strain isolated in Bangladesh in 1991. Overall, the data indicate that the Philippines V. cholerae O1 isolates are unique, differing from recent V. cholerae O1 isolates from Asia, Africa, and Haiti. Furthermore, the results of this study support the hypothesis that the Philippines isolates of V. cholerae O1 are indigenous and exist locally in the aquatic ecosystem of the Philippines. %B mBio %8 Jan-05-2015 %G eng %U http://mbio.asm.org/lookup/doi/10.1128/mBio.00047-15 %N 2 %! mBio %R 10.1128/mBio.00047-15 %0 Journal Article %J Journal of Clinical Microbiology %D 2015 %T Nontoxigenic Vibrio cholerae Non-O1/O139 Isolate from a Case of Human Gastroenteritis in the U.S. Gulf Coast %A Hasan, Nur A. %A Rezayat, Talayeh %A Blatz, Peter J. %A Choi, Seon Young %A Griffitt, Kimberly J. %A Rashed, Shah M. %A Huq, Anwar %A Conger, Nicholas G. %A Rita R Colwell %A Grimes, D. Jay %E Munson, E. %X An occurrence of Vibrio cholerae non-O1/O139 gastroenteritis in the U.S. Gulf Coast is reported here. Genomic analysis revealed that the isolate lacked known virulence factors associated with the clinical outcome of a V. cholerae infection but did contain putative genomic islands and other accessory virulence factors. Many of these factors are widespread among environmental strains of V. cholerae, suggesting that there might be additional virulence factors in non-O1/O139 V. cholerae yet to be determined. Phylogenetic analysis revealed that the isolate belonged to a phyletic lineage of environmental V. cholerae isolates associated with sporadic cases of gastroenteritis in the Western Hemisphere, suggesting a need to monitor non-O1/O139 V. cholerae in the interest of public health. %B Journal of Clinical Microbiology %P 9 - 14 %8 Jun-01-2016 %G eng %U http://jcm.asm.org/lookup/doi/10.1128/JCM.02187-14 %N 1 %! J. Clin. Microbiol. %R 10.1128/JCM.02187-14 %0 Journal Article %J Frontiers in Public Health %D 2015 %T Occurrence and Diversity of Clinically Important Vibrio Species in the Aquatic Environment of Georgia %A Kokashvili, Tamar %A Whitehouse, Chris A. %A Tskhvediani, Ana %A Grim, Christopher J. %A Elbakidze, Tinatin %A Mitaishvili, Nino %A Janelidze, Nino %A Jaiani, Ekaterine %A Haley, Bradd J. %A Lashkhi, Nino %A Huq, Anwar %A Rita R Colwell %A Tediashvili, Marina %B Frontiers in Public Health %8 10/2015 %G eng %U http://journal.frontiersin.org/Article/10.3389/fpubh.2015.00232/ %! Front. Public Health %R 10.3389/fpubh.2015.00232 %0 Journal Article %J Science %D 2015 %T A unified initiative to harness Earth's microbiomes %A Alivisatos, A. P. %A Blaser, M. J. %A Brodie, E. L. %A Chun, M. %A Dangl, J. L. %A Donohue, T. J. %A Dorrestein, P. C. %A Gilbert, J. A. %A Green, J. L. %A Jansson, J. K. %A Knight, R. %A Maxon, M. E. %A McFall-Ngai, M. J. %A Miller, J. F. %A Pollard, K. S. %A Ruby, E. G. %A Taha, S. A. %A Rita R Colwell %B Science %P 507 - 508 %8 Jun-10-2017 %G eng %U http://www.sciencemag.org/cgi/doi/10.1126/science.aac8480 %N 62607551614341176 %! Science %R 10.1126/science.aac8480 %0 Journal Article %J Journal of Environmental Informatics %D 2015 %T Use of Environmental Parameters to Model Pathogenic Vibrios in Chesapeake Bay %A Zaitchik, B. F. %A Guikema, S. D. %A Haley, B. J. %A Taviani, E. %A Chen, A. %A Brown, M.E. %A Huq, A. %A Rita R Colwell %X Although the transportation sector is a major contributor to urban air pollution and global climate change due to its substantial energy consumptions, previous studies for evacuation practices in this sector seldom took environmental consequences into account. As an attempt in event-related evacuation planning under uncertainty, this study proposed an emission-mitigation-oriented fuzzy evacuation management (emoFEM) model. Comprehensive considerations over system efficiency, environmental protection, economic cost and resource availability were incorporated within a general modeling formulation to facilitate evacuation management in a systematic and compromise manner. Vague and ambiguous information embedded within evacuation problems could be quantified and directly communicated into the optimization process, greatly improving conventional tools for evacuation management under uncertainty. The proposed emoFEM model was then applied to a hypothetic but representative case. Useful solutions were generated, which could help identify timely, safe and cost-effective evacuation schemes without significant disturbances over normal municipal traffic and environmental quality. The advantages of emoFEM were further revealed through comparing its solutions with those from its deterministic counterpart. %B Journal of Environmental Informatics %8 Jan-01-2015 %G eng %U http://www.iseis.org/jei/abstract.asp?no=201500307 %! J ENV INFORM %R 10.3808/jei.201500307 %0 Journal Article %J Frontiers in Microbiology %D 2014 %T Molecular diversity and predictability of Vibrio parahaemolyticus along the Georgian coastal zone of the Black Sea %A Haley, Bradd J. %A Kokashvili, Tamar %A Tskshvediani, Ana %A Janelidze, Nino %A Mitaishvili, Nino %A Grim, Christopher J. %A Constantin_de_Magny, Guillaume %A Chen, Arlene J. %A Taviani, Elisa %A Eliashvili, Tamar %A Tediashvili, Marina %A Whitehouse, Chris A. %A Rita R Colwell %A Huq, Anwar %X Vibrio parahaemolyticus is a leading cause of seafood-related gastroenteritis and is also an autochthonous member of marine and estuarine environments worldwide. One-hundred seventy strains of V. parahaemolyticus were isolated from water and plankton samples collected along the Georgian coast of the Black Sea during 28 months of sample collection. All isolated strains were tested for presence of tlh, trh, and tdh. A subset of strains were serotyped and tested for additional factors and markers of pandemicity. Twenty-six serotypes, five of which are clinically relevant, were identified. Although all 170 isolates were negative for tdh, trh, and the Kanagawa Phenomenon, 7 possessed the GS-PCR sequence and 27 the 850 bp sequence of V. parahaemolyticus pandemic strains. The V. parahaemolyticus population in the Black Sea was estimated to be genomically heterogeneous by rep-PCR and the serodiversity observed did not correlate with rep-PCR genomic diversity. Statistical modeling was used to predict presence of V. parahaemolyticus as a function of water temperature, with strongest concordance observed for Green Cape site samples (Percent of total variance = 70, P < 0.001). Results demonstrate a diverse population of V. parahaemolyticus in the Black Sea, some of which carry pandemic markers, with increased water temperature correlated to an increase in abundance of V. parahaemolyticus. %B Frontiers in Microbiology %V 5 %8 Jan-01-2014 %G eng %U http://journal.frontiersin.org/article/10.3389/fmicb.2014.00045 %! Front. Microbiol. %R 10.3389/fmicb.2014.00045 %0 Journal Article %J Molecular & Cellular Proteomics %D 2014 %T Stable isotope labeling of phosphoproteins for large-scale phosphorylation rate determination %A Molden, Rosalynn C. %A Goya, Jonathan %A Zia Khan %A Garcia, Benjamin A. %K DYNAMICS %K Phosphoproteins* %K Phosphoproteome %K Phosphorylation %K Post-translational modifications* %K Signal Transduction* %K turnover %X Signals that control response to stimuli and cellular function are transmitted through dynamic phosphorylation of thousands of proteins by protein kinases. Many techniques have been developed to study phosphorylation dynamics, including several mass spectrometry (MS)-based methods. Over the last few decades, substantial developments have been made in MS techniques for the large-scale identification of proteins and their post-translational modifications. Nevertheless, all of the current MS-based techniques for quantifying protein phosphorylation dynamics rely on the measurement of changes in peptide abundance levels and many methods suffer from low confidence in phosphopeptide identification due to poor fragmentation. Here we have optimized an approach for the Stable Isotope Labeling of Amino acids by Phosphate (SILAP) using [gamma-18O4]ATP in nucleo to determine global site-specific phosphorylation rates. The advantages of this metabolic labeling technique are: increased confidence in phosphorylated peptide identification, direct labeling of phosphorylation sites, measurement phosphorylation rates, and the identification of actively phosphorylated sites in a cell-like environment. In this study we calculated approximate rate constants for over 500 phosphorylation sites based on labeling progress curves. We measured a wide range of phosphorylation rate constants from 0.34 min-1 to 0.001 min-1. Finally, we applied SILAP to determine sites that have different phosphorylation kinetics during G1/S and M phase. We found that most sites have very similar phosphorylation rates under both conditions; however a small subset of sites on proteins involved in the mitotic spindle were more actively phosphorylated during M phase, while proteins involved in DNA replication and transcription were more actively phosphorylated during G1/S phase. %B Molecular & Cellular Proteomics %8 2014/02/16/ %@ 1535-9476, 1535-9484 %G eng %U http://www.mcponline.org/content/early/2014/02/16/mcp.O113.036145 %! Mol Cell Proteomics %0 Journal Article %J Microbial Ecology %D 2014 %T Viewing Marine Bacteria, Their Activity and Response to Environmental Drivers from Orbit %A Grimes, D. Jay %A Ford, Tim E. %A Rita R Colwell %A Baker-Austin, Craig %A Martinez-Urtaza, Jaime %A Subramaniam, Ajit %A Capone, Douglas G. %X Satellite-based remote sensing of marine microorganisms has become a useful tool in predicting human health risks associated with these microscopic targets. Early applications were focused on harmful algal blooms, but more recently methods have been developed to interrogate the ocean for bacteria. As satellite-based sensors have become more sophisticated and our ability to interpret information derived from these sensors has advanced, we have progressed from merely making fascinating pictures from space to developing process models with predictive capability. Our understanding of the role of marine microorganisms in primary production and global elemental cycles has been vastly improved as has our ability to use the combination of remote sensing data and models to provide early warning systems for disease outbreaks. This manuscript will discuss current approaches to monitoring cyanobacteria and vibrios, their activity and response to environmental drivers, and will also suggest future directions. %B Microbial Ecology %P 489 - 500 %8 Jan-04-2014 %G eng %U http://link.springer.com/10.1007/s00248-013-0363-4 %N 38 %! Microb Ecol %R 10.1007/s00248-013-0363-4 %0 Journal Article %J Environmental Microbiology Reports %D 2013 %T Detection of Vibrio cholerae in environmental waters including drinking water reservoirs of Azerbaijan %A Rashid, Ahmadov %A Haley, Bradd J. %A Rajabov, Mukhtar %A Ahmadova, Sevinj %A Gurbanov, Shair %A Rita R Colwell %A Huq, Anwar %B Environmental Microbiology Reports %P 30 - 38 %8 Jan-02-2013 %G eng %U https://onlinelibrary.wiley.com/doi/10.1111/j.1758-2229.2012.00369.x %N 1 %! Environmental Microbiology Reports %R 10.1111/j.1758-2229.2012.00369.x %0 Journal Article %J Applied and Environmental Microbiology %D 2013 %T Distribution of Virulence Genes in Clinical and Environmental Vibrio cholerae Strains in Bangladesh %A Hasan, Nur A. %A Ceccarelli, Daniela %A Grim, Christopher J. %A Taviani, Elisa %A Choi, Jinna %A Sadique, Abdus %A Alam, Munirul %A Siddique, Abul K. %A Sack, R. Bradley %A Huq, Anwar %A Rita R Colwell %X Vibrio cholerae, an environmental organism, is a facultative human pathogen. Here, we report the virulence profiles, comprising 18 genetic markers, of 102 clinical and 692 environmental V. cholerae strains isolated in Bangladesh between March 2004 and January 2006, showing the variability of virulence determinants within the context of public health. %B Applied and Environmental Microbiology %P 5782 - 5785 %8 Mar-09-2014 %G eng %U http://aem.asm.org/lookup/doi/10.1128/AEM.01113-13 %N 18 %! Appl. Environ. Microbiol. %R 10.1128/AEM.01113-13 %0 Journal Article %J Aquatic Biosystems %D 2013 %T Identification of bacteria in enrichment cultures of sulfate reducers in the Cariaco Basin water column employing Denaturing Gradient Gel Electrophoresis of 16S ribosomal RNA gene fragments %A Bozo-Hurtado, Lorelei %A García-Amado, M %A Chistoserdov, Andrei %A Varela, Ramon %A Narvaez, J %A Rita R Colwell %A Suárez, Paula %X Background The Cariaco Basin is characterized by pronounced and predictable vertical layering of microbial communities dominated by reduced sulfur species at and below the redox transition zone. Marine water samples were collected in May, 2005 and 2006, at the sampling stations A (10°30′ N, 64°40′ W), B (10°40′ N, 64°45′ W) and D (10°43’N, 64°32’W) from different depths, including surface, redox interface, and anoxic zones. In order to enrich for sulfate reducing bacteria (SRB), water samples were inoculated into anaerobic media amended with lactate or acetate as carbon source. To analyze the composition of enrichment cultures, we performed DNA extraction, PCR-DGGE, and sequencing of selected bands. Results DGGE results indicate that many bacterial genera were present that are associated with the sulfur cycle, including Desulfovibrio spp., as well as heterotrophs belonging to Vibrio, Enterobacter, Shewanella, Fusobacterium, Marinifilum, Mariniliabilia, and Spirochaeta. These bacterial populations are related to sulfur coupling and carbon cycles in an environment of variable redox conditions and oxygen availability. Conclusions In our studies, we found an association of SRB-like Desulfovibrio with Vibrio species and other genera that have a previously defined relevant role in sulfur transformation and coupling of carbon and sulfur cycles in an environment where there are variable redox conditions and oxygen availability. This study provides new information about microbial species that were culturable on media for SRB at anaerobic conditions at several locations and water depths in the Cariaco Basin. %B Aquatic Biosystems %V 9 %P 17 %8 Jan-01-2013 %G eng %U http://aquaticbiosystems.biomedcentral.com/articles/10.1186/2046-9063-9-17 %N 1 %! Aquat BiosystAquatic Biosystems %R 10.1186/2046-9063-9-17 %0 Journal Article %J CHI '13 Extended Abstracts on Human Factors in Computing Systems %D 2013 %T Personal informatics in the wild: hacking habits for health & happiness %A Li, Ian %A Jon Froehlich %A Larsen, Jakob E %A Grevet, Catherine %A Ramirez, Ernesto %X Abstract Personal informatics is a class of systems that help people collect personal information to improve self-knowledge. Improving self-knowledge can foster self-insight and promote positive behaviors, such as healthy living and energy conservation. The ... %B CHI '13 Extended Abstracts on Human Factors in Computing Systems %I SIGCHI, ACM Special Interest Group on Computer-Human InteractionACM %C New York, New York, USA %P 3179 - 3182 %8 2013/00/27 %@ 9781450319522 %G eng %U http://dl.acm.org/citation.cfm?doid=2468356.2479641 %! CHI EA '13 %R 10.1145/2468356.2479641 %0 Journal Article %J Science %D 2013 %T Primate Transcript and Protein Expression Levels Evolve Under Compensatory Selection Pressures %A Zia Khan %A Ford, Michael J. %A Cusanovich, Darren A. %A Mitrano, Amy %A Pritchard, Jonathan K. %A Gilad, Yoav %X Changes in gene regulation have likely played an important role in the evolution of primates. Differences in messenger RNA (mRNA) expression levels across primates have often been documented; however, it is not yet known to what extent measurements of divergence in mRNA levels reflect divergence in protein expression levels, which are probably more important in determining phenotypic differences. We used high-resolution, quantitative mass spectrometry to collect protein expression measurements from human, chimpanzee, and rhesus macaque lymphoblastoid cell lines and compared them to transcript expression data from the same samples. We found dozens of genes with significant expression differences between species at the mRNA level yet little or no difference in protein expression. Overall, our data suggest that protein expression levels evolve under stronger evolutionary constraint than mRNA levels.Don't Ape Protein Variation Changes in DNA and messenger RNA (mRNA) expression levels have been used to estimate evolutionary changes between species. However protein expression levels may better reflect selection on divergent and constrained phenotypes. Khan et al. (p. 1100, published online 17 October; see the Perspective by Vogel) measured the differences among and within species between mRNA expression and protein levels in humans, chimpanzees, and rhesus macaques, identifying protein transcripts that seem to be under lineage-specific constraint between humans and chimpanzees. %B Science %V 342 %P 1100 - 1104 %8 2013/11/29/ %@ 0036-8075, 1095-9203 %G eng %U http://www.sciencemag.org/content/342/6162/1100 %N 6162 %! Science %0 Journal Article %D 2013 %T Spoiler Alert: Machine Learning Approaches to Detect Social Media Posts with Revelatory Information %A Jordan Boyd-Graber %A Glasgow, K %A Zajac, J S %X ABSTRACT Spoilers—critical plot information about works of fiction that “spoil” a viewer's enjoyment—have prompted elaborate conventions on social media to allow readers to insulate themselves from spoilers. However, these solutions depend on the ... %8 2013/00/01 %G eng %U http://www.umiacs.umd.edu/~jbg/docs/2013_spoiler.pdf %0 Book Section %B Theory of Cryptography %D 2013 %T Why “Fiat-Shamir for Proofs” Lacks a Proof %A Bitansky, Nir %A Dana Dachman-Soled %A Garg, Sanjam %A Jain, Abhishek %A Kalai, Yael Tauman %A López-Alt, Adriana %A Wichs, Daniel %E Sahai, Amit %K Algorithm Analysis and Problem Complexity %K Computation by Abstract Devices %K Data Encryption %K Systems and Data Security %X The Fiat-Shamir heuristic [CRYPTO ’86] is used to convert any 3-message public-coin proof or argument system into a non-interactive argument, by hashing the prover’s first message to select the verifier’s challenge. It is known that this heuristic is sound when the hash function is modeled as a random oracle. On the other hand, the surprising result of Goldwasser and Kalai [FOCS ’03] shows that there exists a computationally sound argument on which the Fiat-Shamir heuristic is never sound, when instantiated with any actual efficient hash function. This leaves us with the following interesting possibility: perhaps we can securely instantiates the Fiat-Shamir heuristic for all 3-message public-coin statistically sound proofs, even if we must fail for some computationally sound arguments. Indeed, this has been conjectured to be the case by Barak, Lindell and Vadhan [FOCS ’03], but we do not have any provably secure instantiation under any “standard assumption”. In this work, we give a broad black-box separation result showing that the security of the Fiat-Shamir heuristic for statistically sound proofs cannot be proved under virtually any standard assumption via a black-box reduction. More precisely: –If we want to have a “universal” instantiation of the Fiat-Shamir heuristic that works for all 3-message public-coin proofs, then we cannot prove its security via a black-box reduction from any assumption that has the format of a “cryptographic game”. –For many concrete proof systems, if we want to have a “specific” instantiation of the Fiat-Shamir heuristic for that proof system, then we cannot prove its security via a black box reduction from any “falsifiable assumption” that has the format of a cryptographic game with an efficient challenger. %B Theory of Cryptography %S Lecture Notes in Computer Science %I Springer Berlin Heidelberg %P 182 - 201 %8 2013/01/01/ %@ 978-3-642-36593-5, 978-3-642-36594-2 %G eng %U http://link.springer.com/chapter/10.1007/978-3-642-36594-2_11 %0 Journal Article %J BMC bioinformatics %D 2012 %T AGORA: Assembly Guided by Optical Restriction Alignment %A Lin, H.C. %A Goldstein, S. %A Mendelowitz, L. %A Zhou, S. %A Wetzel, J. %A Schwartz, D.C. %A Pop, Mihai %X Genome assembly is difficult due to repeated sequences within the genome, which create ambiguities and cause the final assembly to be broken up into many separate sequences (contigs). Long range linking information, such as mate-pairs or mapping data, is necessary to help assembly software resolve repeats, thereby leading to a more complete reconstruction of genomes. Prior work has used optical maps for validating assemblies and scaffolding contigs, after an initial assembly has been produced. However, optical maps have not previously been used within the genome assembly process. Here, we use optical map information within the popular de Bruijn graph assembly paradigm to eliminate paths in the de Bruijn graph which are not consistent with the optical map and help determine the correct reconstruction of the genome.We developed a new algorithm called AGORA: Assembly Guided by Optical Restriction Alignment. AGORA is the first algorithm to use optical map information directly within the de Bruijn graph framework to help produce an accurate assembly of a genome that is consistent with the optical map information provided. Our simulations on bacterial genomes show that AGORA is effective at producing assemblies closely matching the reference sequences. Additionally, we show that noise in the optical map can have a strong impact on the final assembly quality for some complex genomes, and we also measure how various characteristics of the starting de Bruijn graph may impact the quality of the final assembly. Lastly, we show that a proper choice of restriction enzyme for the optical map may substantially improve the quality of the final assembly. Our work shows that optical maps can be used effectively to assemble genomes within the de Bruijn graph assembly framework. Our experiments also provide insights into the characteristics of the mapping data that most affect the performance of our algorithm, indicating the potential benefit of more accurate optical mapping technologies, such as nano-coding. %B BMC bioinformatics %V 13 %8 2012 %G eng %N 1 %0 Journal Article %J Autonomous Robots %D 2012 %T Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments %A Svec,Petr %A Gupta, Satyandra K. %K Computer science %X We address the problem of automated action selection policy synthesis for unmanned vehicles operating in adverse environments. We introduce a new evolutionary computation-based approach using which an initial version of the policy is automatically generated and then gradually refined by detecting and fixing its shortcomings. The synthesis technique consists of the automated extraction of the vehicle’s exception states and Genetic Programming (GP) for automated composition and optimization of corrective sequences of commands in the form of macro-actions to be applied locally. The focus is specifically on automated synthesis of a policy for Unmanned Surface Vehicle (USV) to efficiently block the advancement of an intruder boat toward a valuable target. This task requires the USV to utilize reactive planning complemented by short-term forward planning to generate specific maneuvers for blocking. The intruder is human-competitive and exhibits a deceptive behavior so that the USV cannot exploit regularity in its attacking behavior. We compared the performance of a hand-coded blocking policy to the performance of a policy that was automatically synthesized. Our results show that the performance of the automatically generated policy exceeds the performance of the hand-coded policy and thus demonstrates the feasibility of the proposed approach. %B Autonomous Robots %V 32 %P 149 - 164 %8 2012/// %@ 0929-5593 %G eng %U http://www.springerlink.com/content/664k84x080868141/abstract/ %N 2 %R 10.1007/s10514-011-9268-6 %0 Journal Article %J IEEE Transactions on Information Forensics & Security %D 2012 %T Automatic Authentication of Banknotes %A Roy,Ankush %A Halder,Biswaiit %A Garain,Utpal %A David Doermann %X In this paper, we address the problem of the automatic authentication of paper currency. Indian banknotes are used to show how a system can be developed for discriminating counterfeit notes from genuine notes. Image processing and pattern recognition techniques are designed to carefully analyze embedded security features. Experiments conducted on forensic samples show that a high precision low cost machine can be developed to address this problem. The analysis of current security features’ ability to protect against counterfeiting also suggest topics that should be considered in designing future currency notes. %B IEEE Transactions on Information Forensics & Security %8 2012/// %G eng %0 Journal Article %J Proceedings of the National Academy of Sciences %D 2012 %T BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection %A Lee, Song Hee %A Kalejta, Robert F. %A Kerry, Julie %A Semmes, Oliver John %A O’Connor, Christine M. %A Zia Khan %A Garcia, Benjamin A. %A Shenk, Thomas %A Murphy, Eain %K innate immunity %K intrinsic immunity %K miRNA %K Proteasome %K UL82 %X Cell proteins can restrict the replication of viruses. Here, we identify the cellular BclAF1 protein as a human cytomegalovirus restriction factor and describe two independent mechanisms the virus uses to decrease its steady-state levels. Immediately following infection, the viral pp71 and UL35 proteins, which are delivered to cells within virions, direct the proteasomal degradation of BclAF1. Although BclAF1 reaccumulates through the middle stages of infection, it is subsequently down-regulated at late times by miR-UL112-1, a virus-encoded microRNA. In the absence of BclAF1 neutralization, viral gene expression and replication are inhibited. These data identify two temporally and mechanistically distinct functions used by human cytomegalovirus to down-regulate a cellular antiviral protein. %B Proceedings of the National Academy of Sciences %V 109 %P 9575 - 9580 %8 2012/06/12/ %@ 0027-8424, 1091-6490 %G eng %U http://www.pnas.org/content/109/24/9575 %N 24 %! PNAS %0 Journal Article %J PLoS Computational Biology %D 2012 %T Bioinformatics for the Human Microbiome Project %A Gevers, Dirk %A Pop, Mihai %A Schloss, Patrick D. %A Huttenhower, Curtis %B PLoS Computational Biology %V 8 %P e1002779 %8 11/2012 %N 11 %R 10.1371/journal.pcbi.1002779 %0 Journal Article %J IEEE Transactions on Pattern Analysis and Machine Intelligence %D 2012 %T A Blur-robust Descriptor with Applications to Face Recognition %A Gopalan,R. %A Taheri, S. %A Turaga,P. %A Chellapa, Rama %K Blur %K convolution %K Face %K face recognition %K Grassmann manifold %K Kernel %K Manifolds %K NOISE %K PROBES %X Understanding the effect of blur is an important problem in unconstrained visual analysis. We address this problem in the context of image-based recognition, by a fusion of image-formation models, and differential geometric tools. First, we discuss the space spanned by blurred versions of an image and then under certain assumptions, provide a differential geometric analysis of that space. More specifically, we create a subspace resulting from convolution of an image with a complete set of orthonormal basis functions of a pre-specified maximum size (that can represent an arbitrary blur kernel within that size), and show that the corresponding subspaces created from a clean image and its blurred versions are equal under the ideal case of zero noise, and some assumptions on the properties of blur kernels. We then study the practical utility of this subspace representation for the problem of direct recognition of blurred faces, by viewing the subspaces as points on the Grassmann manifold and present methods to perform recognition for cases where the blur is both homogenous and spatially varying. We empirically analyze the effect of noise, as well as the presence of other facial variations between the gallery and probe images, and provide comparisons with existing approaches on standard datasets. %B IEEE Transactions on Pattern Analysis and Machine Intelligence %V PP %P 1 - 1 %8 2012/01/10/ %@ 0162-8828 %G eng %N 99 %R 10.1109/TPAMI.2012.15 %0 Book Section %B Theory of Cryptography %D 2012 %T Computational Extractors and Pseudorandomness %A Dana Dachman-Soled %A Gennaro, Rosario %A Krawczyk, Hugo %A Malkin, Tal %E Cramer, Ronald %K Algorithm Analysis and Problem Complexity %K Coding and Information Theory %K Computer Communication Networks %K Data Encryption %K Math Applications in Computer Science %K Systems and Data Security %X Computational extractors are efficient procedures that map a source of sufficiently high min-entropy to an output that is computationally indistinguishable from uniform. By relaxing the statistical closeness property of traditional randomness extractors one hopes to improve the efficiency and entropy parameters of these extractors, while keeping their utility for cryptographic applications. In this work we investigate computational extractors and consider questions of existence and inherent complexity from the theoretical and practical angles, with particular focus on the relationship to pseudorandomness. An obvious way to build a computational extractor is via the “extract-then-prg” method: apply a statistical extractor and use its output to seed a PRG. This approach carries with it the entropy cost inherent to implementing statistical extractors, namely, the source entropy needs to be substantially higher than the PRG’s seed length. It also requires a PRG and thus relies on one-way functions. We study the necessity of one-way functions in the construction of computational extractors and determine matching lower and upper bounds on the “black-box efficiency” of generic constructions of computational extractors that use a one-way permutation as an oracle. Under this efficiency measure we prove a direct correspondence between the complexity of computational extractors and that of pseudorandom generators, showing the optimality of the extract-then-prg approach for generic constructions of computational extractors and confirming the intuition that to build a computational extractor via a PRG one needs to make up for the entropy gap intrinsic to statistical extractors. On the other hand, we show that with stronger cryptographic primitives one can have more entropy- and computationally-efficient constructions. In particular, we show a construction of a very practical computational extractor from any weak PRF without resorting to statistical extractors. %B Theory of Cryptography %S Lecture Notes in Computer Science %I Springer Berlin Heidelberg %P 383 - 403 %8 2012/01/01/ %@ 978-3-642-28913-2, 978-3-642-28914-9 %G eng %U http://link.springer.com/chapter/10.1007/978-3-642-28914-9_22 %0 Journal Article %J Microbiology and Immunology %D 2012 %T Conversion of viable but nonculturable enteric bacteria to culturable by co‐culture with eukaryotic cells %A Senoh,Mitsutoshi %A Ghosh‐Banerjee,Jayeeta %A Ramamurthy,Thandavarayan %A Rita R Colwell %A Miyoshi,Shin-ichi %A Nair,G. Balakrish %A Takeda,Yoshifumi %K conversion to culturability %K enteric bacteria %K viable but nonculturable %X Viable but nonculturable (VBNC) Vibrio cholerae non-O1/non-O139, V. parahaemolyticus, enterohemorrhagic Escherichia coli, enterotoxigenic E. coli, enteropathogenic E. coli, Shigella flexneri, and Salmonella enterica were converted to the culturable state by co-culture with selected eukaryotic cells, e.g., HT-29, Caco-2, T84, HeLa, Intestine 407, and CHO cells. %B Microbiology and Immunology %V 56 %P 342 - 345 %8 2012/04/27/ %@ 1348-0421 %G eng %U http://onlinelibrary.wiley.com/doi/10.1111/j.1348-0421.2012.00440.x/abstract?userIsAuthenticated=false&deniedAccessCustomisedMessage= %N 5 %R 10.1111/j.1348-0421.2012.00440.x %0 Journal Article %J PloS one %D 2012 %T Deep Sequencing of the Oral Microbiome Reveals Signatures of Periodontal Disease %A Liu,B. %A Faller, L.L. %A Klitgord, N. %A Mazumdar, V. %A Ghodsi,M. %A Sommer, D.D. %A Gibbons, T.R. %A Treangen, T.J. %A Chang, Y.C. %A Li,S. %X The oral microbiome, the complex ecosystem of microbes inhabiting the human mouth, harbors several thousands of bacterial types. The proliferation of pathogenic bacteria within the mouth gives rise to periodontitis, an inflammatory disease known to also constitute a risk factor for cardiovascular disease. While much is known about individual species associated with pathogenesis, the system-level mechanisms underlying the transition from health to disease are still poorly understood. Through the sequencing of the 16S rRNA gene and of whole community DNA we provide a glimpse at the global genetic, metabolic, and ecological changes associated with periodontitis in 15 subgingival plaque samples, four from each of two periodontitis patients, and the remaining samples from three healthy individuals. We also demonstrate the power of whole-metagenome sequencing approaches in characterizing the genomes of key players in the oral microbiome, including an unculturable TM7 organism. We reveal the disease microbiome to be enriched in virulence factors, and adapted to a parasitic lifestyle that takes advantage of the disrupted host homeostasis. Furthermore, diseased samples share a common structure that was not found in completely healthy samples, suggesting that the disease state may occupy a narrow region within the space of possible configurations of the oral microbiome. Our pilot study demonstrates the power of high-throughput sequencing as a tool for understanding the role of the oral microbiome in periodontal disease. Despite a modest level of sequencing (~2 lanes Illumina 76 bp PE) and high human DNA contamination (up to ~90%) we were able to partially reconstruct several oral microbes and to preliminarily characterize some systems-level differences between the healthy and diseased oral microbiomes. %B PloS one %V 7 %8 2012 %G eng %N 6 %0 Journal Article %J Applied and Environmental Microbiology %D 2012 %T Ecology of Vibrio parahaemolyticus and Vibrio vulnificus in the Coastal and Estuarine Waters of Louisiana, Maryland, Mississippi, and Washington (United States) %A Johnson, Crystal N. %A Bowers, John C. %A Griffitt, Kimberly J. %A Molina, Vanessa %A Clostio, Rachel W. %A Pei, Shaofeng %A Laws, Edward %A Paranjpye, Rohinee N. %A Strom, Mark S. %A Chen, Arlene %A Hasan, Nur A. %A Huq, Anwar %A Noriea, Nicholas F. %A Grimes, D. Jay %A Rita R Colwell %X Vibrio parahaemolyticus and Vibrio vulnificus, which are native to estuaries globally, are agents of seafood-borne or wound infections, both potentially fatal. Like all vibrios autochthonous to coastal regions, their abundance varies with changes in environmental parameters. Sea surface temperature (SST), sea surface height (SSH), and chlorophyll have been shown to be predictors of zooplankton and thus factors linked to vibrio populations. The contribution of salinity, conductivity, turbidity, and dissolved organic carbon to the incidence and distribution of Vibrio spp. has also been reported. Here, a multicoastal, 21-month study was conducted to determine relationships between environmental parameters and V. parahaemolyticus and V. vulnificus populations in water, oysters, and sediment in three coastal areas of the United States. Because ecologically unique sites were included in the study, it was possible to analyze individual parameters over wide ranges. Molecular methods were used to detect genes for thermolabile hemolysin (tlh), thermostable direct hemolysin (tdh), and tdh-related hemolysin (trh) as indicators of V. parahaemolyticus and the hemolysin gene vvhA for V. vulnificus. SST and suspended particulate matter were found to be strong predictors of total and potentially pathogenic V. parahaemolyticus and V. vulnificus. Other predictors included chlorophyll a, salinity, and dissolved organic carbon. For the ecologically unique sites included in the study, SST was confirmed as an effective predictor of annual variation in vibrio abundance, with other parameters explaining a portion of the variation not attributable to SST. %B Applied and Environmental Microbiology %P 7249 - 7257 %8 Mar-10-2013 %G eng %U http://aem.asm.org/lookup/doi/10.1128/AEM.01296-12 %N 20 %! Appl. Environ. Microbiol. %R 10.1128/AEM.01296-12 %0 Journal Article %J arXiv:1201.5430 %D 2012 %T Efficient FMM accelerated vortex methods in three dimensions via the Lamb-Helmholtz decomposition %A Gumerov, Nail A. %A Duraiswami, Ramani %K Computer Science - Numerical Analysis %K Mathematical Physics %K Physics - Computational Physics %K Physics - Fluid Dynamics %X Vortex element methods are often used to efficiently simulate incompressible flows using Lagrangian techniques. Use of the FMM (Fast Multipole Method) allows considerable speed up of both velocity evaluation and vorticity evolution terms in these methods. Both equations require field evaluation of constrained (divergence free) vector valued quantities (velocity, vorticity) and cross terms from these. These are usually evaluated by performing several FMM accelerated sums of scalar harmonic functions. We present a formulation of the vortex methods based on the Lamb-Helmholtz decomposition of the velocity in terms of two scalar potentials. In its original form, this decomposition is not invariant with respect to translation, violating a key requirement for the FMM. One of the key contributions of this paper is a theory for translation for this representation. The translation theory is developed by introducing "conversion" operators, which enable the representation to be restored in an arbitrary reference frame. Using this form, extremely efficient vortex element computations can be made, which need evaluation of just two scalar harmonic FMM sums for evaluating the velocity and vorticity evolution terms. Details of the decomposition, translation and conversion formulae, and sample numerical results are presented. %B arXiv:1201.5430 %8 2012/01/25/ %G eng %U http://arxiv.org/abs/1201.5430 %0 Journal Article %J Proc. VLDB Endow. %D 2012 %T Efficient Verification of Web-content Searching Through Authenticated Web Crawlers %A Goodrich, Michael T. %A Charalampos Papamanthou %A Nguyen, Duy %A Tamassia, Roberto %A Lopes, Cristina Videira %A Ohrimenko, Olga %A Triandopoulos, Nikos %X We consider the problem of verifying the correctness and completeness of the result of a keyword search. We introduce the concept of an authenticated web crawler and present its design and prototype implementation. An authenticated web crawler is a trusted program that computes a specially-crafted signature over the web contents it visits. This signature enables (i) the verification of common Internet queries on web pages, such as conjunctive keyword searches---this guarantees that the output of a conjunctive keyword search is correct and complete; (ii) the verification of the content returned by such Internet queries---this guarantees that web data is authentic and has not been maliciously altered since the computation of the signature by the crawler. In our solution, the search engine returns a cryptographic proof of the query result. Both the proof size and the verification time are proportional only to the sizes of the query description and the query result, but do not depend on the number or sizes of the web pages over which the search is performed. As we experimentally demonstrate, the prototype implementation of our system provides a low communication overhead between the search engine and the user, and fast verification of the returned results by the user. %B Proc. VLDB Endow. %V 5 %P 920 - 931 %8 2012/06// %@ 2150-8097 %G eng %U http://dl.acm.org/citation.cfm?id=2336664.2336666 %N 10 %0 Journal Article %J Image Processing, IEEE Transactions on %D 2012 %T Face Identification Using Large Feature Sets %A Schwartz, W.R. %A Guo,Huimin %A Choi,Jonghyun %A Davis, Larry S. %K (mathematics); %K approximations;trees %K challenge %K data %K data;tree-based %K discriminative %K environments;face %K feature %K FERET;FRGC %K grand %K identification %K least %K recognition %K recognition;least %K sets;face %K sets;facial %K squares %K squares;training %K structure;uncontrolled %K task;face %K technology;multichannel %K weighting;partial %X With the goal of matching unknown faces against a gallery of known people, the face identification task has been studied for several decades. There are very accurate techniques to perform face identification in controlled environments, particularly when large numbers of samples are available for each face. However, face identification under uncontrolled environments or with a lack of training data is still an unsolved problem. We employ a large and rich set of feature descriptors (with more than 70 000 descriptors) for face identification using partial least squares to perform multichannel feature weighting. Then, we extend the method to a tree-based discriminative structure to reduce the time required to evaluate probe samples. The method is evaluated on Facial Recognition Technology (FERET) and Face Recognition Grand Challenge (FRGC) data sets. Experiments show that our identification method outperforms current state-of-the-art results, particularly for identifying faces acquired across varying conditions. %B Image Processing, IEEE Transactions on %V 21 %P 2245 - 2255 %8 2012/04// %@ 1057-7149 %G eng %N 4 %R 10.1109/TIP.2011.2176951 %0 Journal Article %J Nature %D 2012 %T A framework for human microbiome research %A Methé, B.A. %A Nelson,K. E %A Pop, Mihai %A Creasy, H.H. %A Giglio, M.G. %A Huttenhower, C. %A Gevers, D. %A Petrosino, J.F. %A Abubucker, S. %A Badger, J.H. %X A variety of microbial communities and their genes (the microbiome) exist throughout the human body, with fundamental roles in human health and disease. The National Institutes of Health (NIH)-funded Human Microbiome Project Consortium has established a population-scale framework to develop metagenomic protocols, resulting in a broad range of quality-controlled resources and data including standardized methods for creating, processing and interpreting distinct types of high-throughput metagenomic data available to the scientific community. Here we present resources from a population of 242 healthy adults sampled at 15 or 18 body sites up to three times, which have generated 5,177 microbial taxonomic profiles from 16S ribosomal RNA genes and over 3.5 terabases of metagenomic sequence so far. In parallel, approximately 800 reference strains isolated from the human body have been sequenced. Collectively, these data represent the largest resource describing the abundance and variety of the human microbiome, while providing a framework for current and future studies. %B Nature %V 486 %P 215 - 221 %8 2012 %G eng %0 Journal Article %J Cell Research %D 2012 %T Global secretome analysis identifies novel mediators of bone metastasis %A Blanco, Mario Andres %A LeRoy, Gary %A Zia Khan %A Alečković, Maša %A Zee, Barry M. %A Garcia, Benjamin A. %A Kang, Yibin %K bone %K cancer %K metastasis %K proteomics %K secretome %X Bone is the one of the most common sites of distant metastasis of solid tumors. Secreted proteins are known to influence pathological interactions between metastatic cancer cells and the bone stroma. To comprehensively profile secreted proteins associated with bone metastasis, we used quantitative and non-quantitative mass spectrometry to globally analyze the secretomes of nine cell lines of varying bone metastatic ability from multiple species and cancer types. By comparing the secretomes of parental cells and their bone metastatic derivatives, we identified the secreted proteins that were uniquely associated with bone metastasis in these cell lines. We then incorporated bioinformatic analyses of large clinical metastasis datasets to obtain a list of candidate novel bone metastasis proteins of several functional classes that were strongly associated with both clinical and experimental bone metastasis. Functional validation of selected proteins indicated that in vivo bone metastasis can be promoted by high expression of (1) the salivary cystatins CST1, CST2, and CST4; (2) the plasminogen activators PLAT and PLAU; or (3) the collagen functionality proteins PLOD2 and COL6A1. Overall, our study has uncovered several new secreted mediators of bone metastasis and therefore demonstrated that secretome analysis is a powerful method for identification of novel biomarkers and candidate therapeutic targets. %B Cell Research %V 22 %P 1339 - 1355 %8 2012/09// %@ 1001-0602 %G eng %U http://www.nature.com/cr/journal/v22/n9/abs/cr201289a.html %N 9 %! Cell Res %0 Journal Article %J IEEE Transactions on Image Processing %D 2012 %T Gradient-based Image Recovery Methods from Incomplete Fourier Measurements %A Patel, Vishal M. %A Maleh,R. %A Gilbert,A. C %A Chellapa, Rama %K Compressed sensing %K Fourier transforms %K Image coding %K Image edge detection %K Image reconstruction %K L1–minimization %K minimization %K Noise measurement %K OPTIMIZATION %K Poisson solver %K Sparse recovery %K Total variation %K TV %X A major problem in imaging applications such as Magnetic Resonance Imaging (MRI) and Synthetic Aperture Radar (SAR) is the task of trying to reconstruct an image with the smallest possible set of Fourier samples, every single one of which has a potential time and/or power cost. The theory of Compressive Sensing (CS) points to ways of exploiting inherent sparsity in such images in order to achieve accurate recovery using sub- Nyquist sampling schemes. Traditional CS approaches to this problem consist of solving total-variation minimization programs with Fourier measurement constraints or other variations thereof. This paper takes a different approach: Since the horizontal and vertical differences of a medical image are each more sparse or compressible than the corresponding total-variational image, CS methods will be more successful in recovering these differences individually. We develop an algorithm called GradientRec that uses a CS algorithm to recover the horizontal and vertical gradients and then estimates the original image from these gradients. We present two methods of solving the latter inverse problem: one based on least squares optimization and the other based on a generalized Poisson solver. After a thorough derivation of our complete algorithm, we present the results of various experiments that compare the effectiveness of the proposed method against other leading methods. %B IEEE Transactions on Image Processing %V PP %P 1 - 1 %8 2012/// %@ 1057-7149 %G eng %N 99 %R 10.1109/TIP.2011.2159803 %0 Conference Paper %D 2012 %T Gripper synthesis for indirect manipulation of cells using Holographic Optical Tweezers %A Chowdhury,Sagar %A Svec,Petr %A Wang,Chenlu %A Losert,Wolfgang %A Gupta, Satyandra K. %X Optical Tweezers (OT) are used for highly accurate manipulations of biological cells. However, the direct exposure of cells to focused laser beam may negatively influence their biological functions. In order to overcome this problem, we generate multiple optical traps to grab and move a 3D ensemble of inert particles such as silica microspheres to act as a reconfigurable gripper for a manipulated cell. The relative positions of the microspheres are important in order for the gripper to be robust against external environmental forces and the exposure of high intensity laser on the cell to be minimized. In this paper, we present results of different gripper configurations, experimentally tested using our OT setup, that provide robust gripping as well as minimize laser intensity experienced by the cell. We developed a computational approach that allowed us to perform preliminary modeling and synthesis of the gripper configurations. The gripper synthesis is cast as a multi-objective optimization problem. %P 2749 - 2754 %8 2012/05// %G eng %R 10.1109/ICRA.2012.6225153 %0 Journal Article %J Nucleic Acids Res %D 2012 %T InterPro in 2011: new developments in the family and domain prediction database. %A Hunter, Sarah %A Jones, Philip %A Mitchell, Alex %A Apweiler, Rolf %A Attwood, Teresa K %A Bateman, Alex %A Bernard, Thomas %A Binns, David %A Bork, Peer %A Burge, Sarah %A de Castro, Edouard %A Coggill, Penny %A Corbett, Matthew %A Das, Ujjwal %A Daugherty, Louise %A Duquenne, Lauranne %A Finn, Robert D %A Fraser, Matthew %A Gough, Julian %A Haft, Daniel %A Hulo, Nicolas %A Kahn, Daniel %A Kelly, Elizabeth %A Letunic, Ivica %A Lonsdale, David %A Lopez, Rodrigo %A Madera, Martin %A Maslen, John %A McAnulla, Craig %A McDowall, Jennifer %A McMenamin, Conor %A Mi, Huaiyu %A Mutowo-Muellenet, Prudence %A Mulder, Nicola %A Natale, Darren %A Orengo, Christine %A Pesseat, Sebastien %A Punta, Marco %A Quinn, Antony F %A Rivoire, Catherine %A Sangrador-Vegas, Amaia %A Jeremy D Selengut %A Sigrist, Christian J A %A Scheremetjew, Maxim %A Tate, John %A Thimmajanarthanan, Manjulapramila %A Thomas, Paul D %A Wu, Cathy H %A Yeats, Corin %A Yong, Siew-Yit %K Databases, Protein %K Protein Structure, Tertiary %K Proteins %K Sequence Analysis, Protein %K software %K Terminology as Topic %K User-Computer Interface %X
InterPro (http://www.ebi.ac.uk/interpro/) is a database that integrates diverse information about protein families, domains and functional sites, and makes it freely available to the public via Web-based interfaces and services. Central to the database are diagnostic models, known as signatures, against which protein sequences can be searched to determine their potential function. InterPro has utility in the large-scale analysis of whole genomes and meta-genomes, as well as in characterizing individual protein sequences. Herein we give an overview of new developments in the database and its associated software since 2009, including updates to database content, curation processes and Web and programmatic interfaces.
%B Nucleic Acids Res %V 40 %P D306-12 %8 2012 Jan %G eng %N Database issue %R 10.1093/nar/gkr948 %0 Journal Article %J Environmental Microbiology Reports %D 2012 %T Vibrio cholerae in a historically cholera-free country %A Haley, Bradd J. %A Chen, Arlene %A Grim, Christopher J. %A Clark, Philip %A Diaz, Celia M %A Taviani, Elisa %A Hasan, Nur A. %A Sancomb, Elizabeth %A Elnemr, Wessam M %A Islam, Muhammad A. %A Huq, Anwar %A Rita R Colwell %A Benediktsdóttir, Eva %X We report the autochthonous existence of Vibrio cholerae in coastal waters of Iceland, a geothermally active country where cholera is absent and has never been reported. Seawater, mussel and macroalgae samples were collected close to, and distant from, sites where geothermal activity causes a significant increase in water temperature during low tides. Vibrio cholerae was detected only at geothermal‐influenced sites during low‐tides. None of the V. cholerae isolates encoded cholera toxin (ctxAB) and all were non‐O1/non‐O139 serogroups. However, all isolates encoded other virulence factors that are associated with cholera as well as extra‐intestinal V. cholerae infections. The virulence factors were functional at temperatures of coastal waters of Iceland, suggesting an ecological role. It is noteworthy that V. cholerae was isolated from samples collected at sites distant from anthropogenic influence, supporting the conclusion that V. cholerae is autochthonous to the aquatic environment of Iceland. %B Environmental Microbiology Reports %P 381 - 389 %8 Jan-08-2012 %G eng %U http://doi.wiley.com/10.1111/j.1758-2229.2012.00332.x %N 4 %R 10.1111/j.1758-2229.2012.00332.x %0 Conference Paper %B Eight International Conference on Language Resources and Evaluation (LREC'12) %D 2012 %T Linguistic Resources for Handwriting Recognition and Translation Evaluation %A Song, Zhiyi %A Ismael, Safa %A Grimes, Stephen %A David Doermann %A Strassel,Stephanie %B Eight International Conference on Language Resources and Evaluation (LREC'12) %0 Conference Paper %B 6th ACM Conference on Recommender Systems (RecSys) %D 2012 %T Making Recommendations in a Microblog to Improve the Impact of a Focal User %A Wu,Shanchan %A Gong, Leanna %A Rand, William %A Raschid, Louiqa %X We present a microblog recommendation system that can help monitor users, track conversations, and potentially improve diffusion impact. Given a Twitter network of active users and their followers, and historical activity of tweets, retweets and mentions, we build upon a prediction tool to predict the Top K users who will retweet or mention a focal user, in the future [10]. We develop personalized recommendations for each focal user. We identify characteristics of focal users such as the size of the follower network, or the level of sentiment averaged over all tweets; both have an impact on the quality of personalized recommendations. We use (high) betweenness centrality as a proxy of attractive users to target when making recommendations. Our recommendations successfully identify a greater fraction of users with higher betweenness centrality, in comparison to the overall distribution of betweenness centrality of the ground truth users for some focal user. %B 6th ACM Conference on Recommender Systems (RecSys) %0 Journal Article %J Knowledge and Data Engineering, IEEE Transactions on %D 2012 %T Organizing User Search Histories %A Hwang,Heasoo %A Lauw,H. W %A Getoor, Lise %A Ntoulas,A. %K alteration;query %K analysis;user %K engines;search %K engines;text %K goal;textual %K group %K historical %K History %K identification;query %K information %K interfaces; %K log;sessionization;task-oriented %K organization;query %K processing;search %K query %K query;user %K quest;query %K ranking;search %K search %K search;long-term %K similarity;time %K suggestion;result %K threshold;user %K Web;collaborative %X Users are increasingly pursuing complex task-oriented goals on the web, such as making travel arrangements, managing finances, or planning purchases. To this end, they usually break down the tasks into a few codependent steps and issue multiple queries around these steps repeatedly over long periods of time. To better support users in their long-term information quests on the web, search engines keep track of their queries and clicks while searching online. In this paper, we study the problem of organizing a user's historical queries into groups in a dynamic and automated fashion. Automatically identifying query groups is helpful for a number of different search engine components and applications, such as query suggestions, result ranking, query alterations, sessionization, and collaborative search. In our approach, we go beyond approaches that rely on textual similarity or time thresholds, and we propose a more robust approach that leverages search query logs. We experimentally study the performance of different techniques, and showcase their potential, especially when combined together. %B Knowledge and Data Engineering, IEEE Transactions on %V 24 %P 912 - 925 %8 2012/05// %@ 1041-4347 %G eng %N 5 %R 10.1109/TKDE.2010.251 %0 Journal Article %J Synthesis Lectures on Data Mining and Knowledge Discovery %D 2012 %T Privacy in Social Networks %A Zheleva,E. %A Terzi,E. %A Getoor, Lise %B Synthesis Lectures on Data Mining and Knowledge Discovery %V 3 %P 1 - 85 %8 2012/// %G eng %N 1 %0 Journal Article %J Environmental Microbiology Reports %D 2012 %T Role of GbpA protein, an important virulence-related colonization factor, for Vibrio cholerae's survival in the aquatic environment %A Stauder, Monica %A Huq, Anwar %A Pezzati, Elisabetta %A Grim, Christopher J. %A Ramoino, Paola %A Pane, Luigi %A Rita R Colwell %A Pruzzo, Carla %A Vezzulli, Luigi %X Vibrio cholerae N‐acetyl glucosamine‐binding protein A (GbpA) is a chitin binding protein and a virulence factor involved in the colonization of human intestine. We investigated the distribution and genetic variations of gbpA in 488 V. cholerae strains of environmental and clinical origin, belonging to different serogroups and biotypes. We found that the gene is consistently present and highly conserved including an environmental V. cholerae‐related strain of ancestral origin. The gene was also consistently expressed in a number of representative V. cholerae strains cultured in laboratory aquatic microcosms under conditions simulating those found in temperate marine environments. Functional analysis carried out on V. cholerae O1 El Tor N16961 showed that GbpA is not involved in adhesion to inorganic surfaces but promotes interaction with environmental biotic substrates (plankton and bivalve hepatopancreas cells) representing known marine reservoir or host for the bacterium. It is suggested that the ability of GbpA to colonize human intestinal cells most probably originated from its primary function in the aquatic environment. %B Environmental Microbiology Reports %P 439 - 445 %8 Jan-08-2012 %G eng %U http://doi.wiley.com/10.1111/j.1758-2229.2012.00356.x %N 4 %R 10.1111/j.1758-2229.2012.00356.x %0 Journal Article %J Journal of Biological ChemistryJ. Biol. Chem. %D 2012 %T Rpn1 and Rpn2 coordinate ubiquitin processing factors at the proteasome %A Rosenzweig,Rina %A Bronner,Vered %A Zhang,Daoning %A Fushman, David %A Glickman,Michael H. %K deubiquitination %K Proteasome %K solenoid %K Surface plasmon resonance (SPR) %K ubiquitin %K Ubiquitin-dependent protease %X Substrates tagged with (poly)ubiquitin for degradation can be targeted directly to the 26S proteasome where they are proteolysed. Independently, ubiquitin-conjugates may also be delivered by bivalent shuttles. The majority of shuttles attach to the proteasome through a ubiquitin-like domain (UBL) while anchoring cargo at a C-terminal polyubiquitin-binding domain(s). We found that two shuttles of this class, Rad23 and Dsk2, dock at two different receptors embedded within a single subunit of the 19S proteasome regulatory particle (RP), Rpn1. Their association/dissociation constants and affinities for Rpn1 are similar. In contrast, another UBL-containing protein, the deubiquitinase Ubp6, is also anchored by Rpn1, yet dissociates slower, thus behaving as a sometimes proteasome subunit distinct from transiently-associated shuttles. Two neighboring subunits, Rpn10 and Rpn13, show a marked preference for polyubiquitin over UBLs. Rpn10 attaches to the central solenoid portion of Rpn1 although this association is stabilized by the presence of a third subunit, Rpn2. Rpn13 binds directly to the C-terminal portion of Rpn2. These intrinsic polyubiquitin receptors may compete with substrate shuttles for their polyubiquitin-conjugates, thereby aiding release of the emptied shuttles. By binding multiple ubiquitin-processing factors simultaneously, Rpn1 is uniquely suited to coordinate substrate recruitment, deubiquitination, and movement towards the catalytic core. The broad range of affinities for ubiquitin, ubiquitin-like, and non-ubiquitin signals by adjacent yet non-overlapping sites all within the Base illustrates a hub of activity that coordinates the intricate relay of substrates within the proteasome, and consequently influences substrate residency time and commitment to degradation. %B Journal of Biological ChemistryJ. Biol. Chem. %8 2012/02/08/ %@ 0021-9258, 1083-351X %G eng %U http://www.jbc.org/content/early/2012/02/08/jbc.M111.316323 %R 10.1074/jbc.M111.316323 %0 Journal Article %J Journal of Computing and Information Science in Engineering %D 2012 %T Speeding Up Particle Trajectory Simulations under Moving Force Fields using GPUs %A Patro,R. %A Dickerson,J. P. %A Bista,S. %A Gupta,S.K. %A Varshney, Amitabh %X In this paper, we introduce a GPU-based framework forsimulating particle trajectories under both static and dynamic force fields. By exploiting the highly parallel nature of the problem and making efficient use of the available hardware, our simulator exhibits a significant speedup over its CPU- based analog. We apply our framework to a specific experi- mental simulation: the computation of trapping probabilities associated with micron-sized silica beads in optical trapping workbenches. When evaluating large numbers of trajectories (4096), we see approximately a 356 times speedup of the GPU-based simulator over its CPU-based counterpart. %B Journal of Computing and Information Science in Engineering %8 2012/// %G eng %0 Journal Article %J Nature %D 2012 %T Structure, function and diversity of the healthy human microbiome %A Huttenhower, C. %A Gevers, D. %A Knight,R. %A Abubucker, S. %A Badger, J.H. %A Chinwalla, A.T. %A Creasy, H.H. %A Earl, A.M. %A Fitzgerald, M.G. %A Fulton, R.S. %A others %X Studies of the human microbiome have revealed that even healthy individuals differ remarkably in the microbes that occupy habitats such as the gut, skin and vagina. Much of this diversity remains unexplained, although diet, environment, host genetics and early microbial exposure have all been implicated. Accordingly, to characterize the ecology of human-associated microbial communities, the Human Microbiome Project has analysed the largest cohort and set of distinct, clinically relevant body habitats so far. We found the diversity and abundance of each habitat’s signature microbes to vary widely even among healthy subjects, with strong niche specialization both within and among individuals. The project encountered an estimated 81–99% of the genera, enzyme families and community configurations occupied by the healthy Western microbiome. Metagenomic carriage of metabolic pathways was stable among individuals despite variation in community structure, and ethnic/racial background proved to be one of the strongest associations of both pathways and microbes with clinical metadata. These results thus delineate the range of structural and functional configurations normal in the microbial communities of a healthy population, enabling future characterization of the epidemiology, ecology and translational applications of the human microbiome. %B Nature %V 486 %P 207 - 214 %8 2012 %G eng %0 Conference Paper %B the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12 %D 2012 %T Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions %A Martineau, Justin %A Mokashi,Ronil %A Chapman, David %A Grasso, Michael %A Brady,Mary %A Yesha,Yelena %A Yesha,Yaacov %A Cardone, Antonio %A Dima, Alden %Y Luo, Gang %Y Liu, Jiming %Y Nahapetian, Ani %Y Mahoui, Malika %B the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12 %I ACM Press %C Miami, Florida, USANew York, New York, USA %P 399 %@ 9781450307819 %! IHI '12 %R 10.1145/211036310.1145/2110363.2110409 %0 Journal Article %J IEEE Transactions on Knowledge and Data Engineering (TKDE) %D 2012 %T TACI: Taxonomy-Aware Catalog Integration %A Papadimitriou,P. %A Tsaparas,P. %A Fuxman,A. %A Getoor, Lise %X A fundamental data integration task faced by online commercial portals and commerce search engines is the integration of products coming from multiple providers to their product catalogs. In this scenario, the commercial portal has its own taxonomy (the “master taxonomy”), while each data provider organizes its products into a different taxonomy (the “provider taxonomy”). In this paper, we consider the problem of categorizing products from the data providers into the master taxonomy, while making use of the provider taxonomy information. Our approach is based on a taxonomy-aware processing step that adjusts the results of a text-based classifier to ensure that products that are close together in the provider taxonomy remain close in the master taxonomy. We formulate this intuition as a structured prediction optimization problem. To the best of our knowledge, this is the first approach that leverages the structure of taxonomies in order to enhance catalog integration. We propose algorithms that are scalable and thus applicable to the large datasets that are typical on the Web. We evaluate our algorithms on real-world data and we show that taxonomy-aware classification provides a significant improvement over existing approaches. %B IEEE Transactions on Knowledge and Data Engineering (TKDE) %8 2012/// %G eng %0 Journal Article %J Journal of Computer and System Sciences %D 2012 %T Two-server password-only authenticated key exchange %A Katz, Jonathan %A MacKenzie,Philip %A Taban,Gelareh %A Gligor,Virgil %K Key-exchange protocols %K passwords %X Typical protocols for password-based authentication assume a single server that stores all the information (e.g., the password) necessary to authenticate a user. An inherent limitation of this approach, assuming low-entropy passwords are used, is that the userʼs password is exposed if this server is ever compromised. To address this issue, it has been suggested to share a userʼs password information among multiple servers, and to have these servers cooperate (possibly in a threshold manner) when the user wants to authenticate. We show here a two-server version of the password-only key-exchange protocol of Katz, Ostrovsky, and Yung (the KOY protocol). Our work gives the first secure two-server protocol for the password-only setting (in which the user need remember only a password, and not the serversʼ public keys), and is the first two-server protocol (in any setting) with a proof of security in the standard model. Our work thus fills a gap left by the work of MacKenzie et al. (2006) [31] and Di Raimondo and Gennaro (2006) [16]. As an additional benefit of our work, we show modifications that improve the efficiency of the original KOY protocol. %B Journal of Computer and System Sciences %V 78 %P 651 - 669 %8 2012/03// %@ 0022-0000 %G eng %U http://www.sciencedirect.com/science/article/pii/S0022000011001048 %N 2 %R 10.1016/j.jcss.2011.09.005 %0 Journal Article %J arXiv:1204.5446 [cs] %D 2012 %T Verifying Search Results Over Web Collections %A Goodrich, Michael T. %A Nguyen, Duy %A Ohrimenko, Olga %A Charalampos Papamanthou %A Tamassia, Roberto %A Triandopoulos, Nikos %A Lopes, Cristina Videira %K Computer Science - Cryptography and Security %X Searching accounts for one of the most frequently performed computations over the Internet as well as one of the most important applications of outsourced computing, producing results that critically affect users' decision-making behaviors. As such, verifying the integrity of Internet-based searches over vast amounts of web contents is essential. We provide the first solution to this general security problem. We introduce the concept of an authenticated web crawler and present the design and prototype implementation of this new concept. An authenticated web crawler is a trusted program that computes a special "signature" $s$ of a collection of web contents it visits. Subject to this signature, web searches can be verified to be correct with respect to the integrity of their produced results. This signature also allows the verification of complicated queries on web pages, such as conjunctive keyword searches. In our solution, along with the web pages that satisfy any given search query, the search engine also returns a cryptographic proof. This proof, together with the signature $s$, enables any user to efficiently verify that no legitimate web pages are omitted from the result computed by the search engine, and that no pages that are non-conforming with the query are included in the result. An important property of our solution is that the proof size and the verification time both depend solely on the sizes of the query description and the query result, but not on the number or sizes of the web pages over which the search is performed. Our authentication protocols are based on standard Merkle trees and the more involved bilinear-map accumulators. As we experimentally demonstrate, the prototype implementation of our system gives a low communication overhead between the search engine and the user, and allows for fast verification of the returned results on the user side. %B arXiv:1204.5446 [cs] %8 2012/04/24/ %G eng %U http://arxiv.org/abs/1204.5446 %0 Conference Paper %B SIGCHI '12 %D 2012 %T You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home %A Marshini Chetty %A Banks, Richard %A Brush, A.J. %A Donner, Jonathan %A Grinter, Rebecca %K Bandwidth %K bandwidth cap %K data cap %K Internet %K metered use %K pricing %K usage-based billing %K usage-based pricing %X Bandwidth caps, a limit on the amount of data users can upload and download in a month, are common globally for both home and mobile Internet access. With caps, each bit of data consumed comes at a cost against a monthly quota or a running tab. Yet, relatively little work has considered the implications of this usage-based pricing model on the user experience. In this paper, we present results from a qualitative study of households living with bandwidth caps. Our findings suggest home users grapple with three uncertainties regarding their bandwidth usage: invisible balances, mysterious processes, and multiple users. We discuss how these uncertainties impact their usage and describe the potential for better tools to help monitor and manage data caps. We conclude that as a community we need to cater for users under Internet cost constraints. %B SIGCHI '12 %S CHI '12 %I ACM %P 3021 - 3030 %8 2012/// %@ 978-1-4503-1015-4 %G eng %U http://doi.acm.org/10.1145/2207676.2208714 %0 Journal Article %J ACM Transactions on Accessible Computing (TACCESS) %D 2011 %T Ability-based design: Concept, principles and examples %A Wobbrock,J.O. %A Kane,S.K. %A Gajos,K.Z. %A Harada,S. %A Jon Froehlich %B ACM Transactions on Accessible Computing (TACCESS) %V 3 %8 2011 %G eng %N 3 %0 Journal Article %J BMC Genomics %D 2011 %T Accurate and fast estimation of taxonomic profiles from metagenomic shotgun sequences %A Liu,Bo %A Gibbons,Theodore %A Ghodsi,Mohammad %A Treangen,Todd %A Pop, Mihai %X A major goal of metagenomics is to characterize the microbial composition of an environment. The most popular approach relies on 16S rRNA sequencing, however this approach can generate biased estimates due to differences in the copy number of the gene between even closely related organisms, and due to PCR artifacts. The taxonomic composition can also be determined from metagenomic shotgun sequencing data by matching individual reads against a database of reference sequences. One major limitation of prior computational methods used for this purpose is the use of a universal classification threshold for all genes at all taxonomic levels. %B BMC Genomics %V 12 %P S4 - S4 %8 2011/07/27/ %@ 1471-2164 %G eng %U http://www.biomedcentral.com/1471-2164/12/S2/S4 %N Suppl 2 %R 10.1186/1471-2164-12-S2-S4 %0 Conference Paper %B Person-Oriented Vision (POV), 2011 IEEE Workshop on %D 2011 %T Active inference for retrieval in camera networks %A Daozheng Chen %A Bilgic,M. %A Getoor, Lise %A Jacobs, David W. %A Mihalkova,L. %A Tom Yeh %K active %K annotation;probabilistic %K frame;cameras;inference %K inference;camera %K mechanisms;probability;search %K model;human %K model;retrieval %K network;graphical %K problem;video %K problems;video %K processing; %K retrieval;video %K signal %K system;searching %X We address the problem of searching camera network videos to retrieve frames containing specified individuals. We show the benefit of utilizing a learned probabilistic model that captures dependencies among the cameras. In addition, we develop an active inference framework that can request human input at inference time, directing human attention to the portions of the videos whose correct annotation would provide the biggest performance improvements. Our primary contribution is to show that by mapping video frames in a camera network onto a graphical model, we can apply collective classification and active inference algorithms to significantly increase the performance of the retrieval system, while minimizing the number of human annotations required. %B Person-Oriented Vision (POV), 2011 IEEE Workshop on %P 13 - 20 %8 2011/01// %G eng %R 10.1109/POV.2011.5712363 %0 Conference Paper %B Person-Oriented Vision (POV), 2011 IEEE Workshop on %D 2011 %T Active inference for retrieval in camera networks %A Daozheng Chen %A Bilgic,Mustafa %A Getoor, Lise %A Jacobs, David W. %A Mihalkova,Lilyana %A Tom Yeh %X We address the problem of searching camera network videos to retrieve frames containing specified individuals. We show the benefit of utilizing a learned probabilistic model that captures dependencies among the cameras. In addition, we develop an active inference framework that can request human input at inference time, directing human attention to the portions of the videos whose correct annotation would provide the biggest performance improvements. Our primary contribution is to show that by mapping video frames in a camera network onto a graphical model, we can apply collective classification and active inference algorithms to significantly increase the performance of the retrieval system, while minimizing the number of human annotations required. %B Person-Oriented Vision (POV), 2011 IEEE Workshop on %I IEEE %P 13 - 20 %8 2011/01// %@ 978-1-61284-036-9 %G eng %U http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5712363&tag=1 %R 10.1109/POV.2011.5712363 %0 Conference Paper %B Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems %D 2011 %T Active progress bars: facilitating the switch to temporary activities %A Hurter,Christophe %A Girouard,Audrey %A Riche,Nathalie %A Plaisant, Catherine %K Frustration %K participatory design %K progress bars %K task switching %X In this paper, we seek to find a better way of effective task management when a progress bar interrupts user's primary activity. We propose to augment progress bars with user controlled functionalities facilitating the switch to temporary activities. We detail a taxonomy of waiting period contexts and possible temporary tasks, then report on 5 participatory design, and a follow-up survey of 96 respondents. Finally we describe an early prototype of active progress bars, and report on initial use. %B Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems %S CHI EA '11 %I ACM %C New York, NY, USA %P 1963 - 1968 %8 2011/// %@ 978-1-4503-0268-5 %G eng %U http://doi.acm.org/10.1145/1979742.1979883 %R 10.1145/1979742.1979883 %0 Conference Paper %B Twenty-Second International Joint Conference on Artificial Intelligence %D 2011 %T Active Surveying: A Probabilistic Approach for Identifying Key Opinion Leaders %A Sharara,H. %A Getoor, Lise %A Norton,M. %X Opinion leaders play an important role in influenc- ing people’s beliefs, actions and behaviors. Al- though a number of methods have been proposed for identifying influentials using secondary sources of information, the use of primary sources, such as surveys, is still favored in many domains. In this work we present a new surveying method which combines secondary data with partial knowl- edge from primary sources to guide the information gathering process. We apply our proposed active surveying method to the problem of identifying key opinion leaders in the medical field, and show how we are able to accurately identify the opinion lead- ers while minimizing the amount of primary data required, which results in significant cost reduction in data acquisition without sacrificing its integrity. %B Twenty-Second International Joint Conference on Artificial Intelligence %8 2011/// %G eng %0 Journal Article %J Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing %D 2011 %T Adaptively secure broadcast, revisited %A Garay,J. A %A Katz, Jonathan %A Kumaresan,R. %A Zhou,H.S. %X We consider the classical problem of synchronous broadcast with dishonest majority, whena public-key infrastructure and digital signatures are available. In a surprising result, Hirt and Zikas (Eurocrypt 2010) recently observed that all existing protocols for this task are insecure against an adaptive adversary who can choose which parties to corrupt as the protocol progresses. Moreover, they prove an impossibility result for adaptively secure broadcast in their setting. We argue that the communication model adopted by Hirt and Zikas is unrealistically pes- simistic. We revisit the problem of adaptively secure broadcast in a more natural synchronous model (with rushing), and show that broadcast is possible in this setting for an arbitrary num- ber of corruptions. Our positive result holds under a strong, simulation-based definition in the universal-composability framework. We also study the impact of adaptive attacks on protocols for secure multi-party computation where broadcast is used as a sub-routine. %B Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing %8 2011/// %G eng %0 Journal Article %J Transportation Research Board 90th Annual Meeting Compendium of Papers %D 2011 %T Analyzing Incident Management Event Sequences with Interactive Visualization %A Guerra Gómez,J. %A Wongsuphasawat,K. %A Wang,T. D %A Pack,M. %A Plaisant, Catherine %X While traditional safety and incident analysis has mostly focused on incident attributesdata, such as the location and time of the incident, there are other aspects in incident response that are temporal in nature and are more difficult to analyze. We describe a visual analytics tool for temporal data exploration, called LifeFlow, used for the analysis of incident response data. LifeFlow provides user-controlled overviews of event sequences (e.g. notification, arrival, clearance etc). It allows analysts to interactively explore temporal patterns, find anomalies in sequences and compare management practices. This type of analysis can potentially lead to process improvements and save human lives. We used NCHRP traffic incident data with more than 200,000 incidents are reported by 8 different agencies in a period of about 28 months. Our experience suggest that even non expert analysts can spot many anomalies in the data using the LifeFlow overviews, and are able to rapidly ask many questions and find differences between agencies. %B Transportation Research Board 90th Annual Meeting Compendium of Papers %8 2011/// %G eng %0 Journal Article %J Epidemiological and Molecular Aspects on Cholera %D 2011 %T Aquatic Realm and Cholera %A Huq,A. %A Grim,C. J. %A Rita R Colwell %X Cholera is an ancient disease that can be severe and life threatening. It occurs predominantly in areas of the world where populations lack safe drinking water. Epidemics of cholera are linked with malnutrition, poor sanitation, and conditions resulting from natural disasters such as severe flooding. According to a report published by WHO in 2000 [1], cholera remains a major public health problem and is becoming increasingly important since the number of countries in which cholera is endemic continues to increase. Unfortunately, outbreaks of the disease continue into the twenty-first century with ominous portent in the wake of global climate change [1]. Yet cholera is a preventable disease if people have access to safe drinking water and are properly educated how to protect themselves from the risk of infection with vibrios. Cholera also is an easily treatable disease. Oral rehydration therapy, a solution containing glucose and appropriate salts, has proven to be effective for treatment of most cholera victims [2]. Nevertheless, each year, tens of thousands of people are victims of the disease, bringing this “curse of humankind” to modern civilization. Present understanding of cholera is based on studies conducted over the past three decades and significant new information has been gained concerning environmental factors associated with this disease, especially how to detect the bacterium and where it lives in the natural environment, outside the human gut, and what triggers the annual outbreaks that occur with remarkable regularity. Environmental research on Vibrio cholerae and cholera has provided insights for prediction and prevention of the disease it causes, while the race for effective vaccines against cholera continues. %B Epidemiological and Molecular Aspects on Cholera %P 311 - 339 %8 2011/// %G eng %R 10.1007/978-1-60327-265-0_18 %0 Journal Article %J SIGCOMM Comput. Commun. Rev. %D 2011 %T Architecting for innovation %A Koponen,Teemu %A Shenker,Scott %A Balakrishnan,Hari %A Feamster, Nick %A Ganichev,Igor %A Ghodsi,Ali %A Godfrey,P. Brighten %A McKeown,Nick %A Parulkar,Guru %A Raghavan,Barath %A Rexford,Jennifer %A Arianfar,Somaya %A Kuptsov,Dmitriy %K diversity %K Evolution %K innovation %K internet architecture %X We argue that the biggest problem with the current Internet architecture is not a particular functional deficiency, but its inability to accommodate innovation. To address this problem we propose a minimal architectural "framework" in which comprehensive architectures can reside. The proposed Framework for Internet Innovation (FII) --- which is derived from the simple observation that network interfaces should be extensible and abstract --- allows for a diversity of architectures to coexist, communicate, and evolve. We demonstrate FII's ability to accommodate diversity and evolution with a detailed examination of how information flows through the architecture and with a skeleton implementation of the relevant interfaces. %B SIGCOMM Comput. Commun. Rev. %V 41 %P 24 - 36 %8 2011/// %@ 0146-4833 %G eng %U http://doi.acm.org/10.1145/2002250.2002256 %N 3 %R 10.1145/2002250.2002256 %0 Journal Article %J Journal of Systems and Software %D 2011 %T An assessment of systems and software engineering scholars and institutions (2003–2007 and 2004–2008) %A Wong,W. Eric %A Tse,T.H. %A Glass,Robert L. %A Basili, Victor R. %A Chen,T.Y. %K Research publications %K Systems and software engineering %K Top institutions %K Top scholars %X An ongoing, annual survey of publications in systems and software engineering identifies the top 15 scholars and institutions in the field over a 5-year period. Each ranking is based on the weighted scores of the number of papers published in TSE, TOSEM, JSS, SPE, EMSE, IST, and Software of the corresponding period. This report summarizes the results for 2003–2007 and 2004–2008. The top-ranked institution is Korea Advanced Institute of Science and Technology, Korea for 2003–2007, and Simula Research Laboratory, Norway for 2004–2008, while Magne Jørgensen is the top-ranked scholar for both periods. %B Journal of Systems and Software %V 84 %P 162 - 168 %8 2011/01// %@ 0164-1212 %G eng %U http://www.sciencedirect.com/science/article/pii/S0164121210002682 %N 1 %R 10.1016/j.jss.2010.09.036 %0 Book Section %B New Horizons in Evolutionary Robotics %D 2011 %T Automated Planning Logic Synthesis for Autonomous Unmanned Vehicles in Competitive Environments with Deceptive Adversaries %A Svec,Petr %A Gupta, Satyandra K. %E Doncieux,Stéphane %E Bredèche,Nicolas %E Mouret,Jean-Baptiste %K engineering %X We developed a new approach for automated synthesis of a planning logic for autonomous unmanned vehicles. This new approach can be viewed as an automated iterative process during which an initial version of a logic is synthesized and then gradually improved by detecting and fixing its shortcomings. This is achieved by combining data mining for extraction of vehicle’s states of failure and Genetic Programming (GP) technique for synthesis of corresponding navigation code. We verified the feasibility of the approach using unmanned surface vehicles (USVs) simulation. Our focus was specifically on the generation of a planning logic used for blocking the advancement of an intruder boat towards a valuable target. Developing autonomy logic for this behavior is challenging as the intruder’s attacking logic is human-competitive with deceptive behavior so the USV is required to learn specific maneuvers for specific situations to do successful blocking. We compared the performance of the generated blocking logic to the performance of logic that was manually implemented. Our results show that the new approach was able to synthesize a blocking logic with performance closely approaching the performance of the logic coded by hand. %B New Horizons in Evolutionary Robotics %S Studies in Computational Intelligence %I Springer Berlin / Heidelberg %V 341 %P 171 - 193 %8 2011/// %@ 978-3-642-18271-6 %G eng %U http://www.springerlink.com/content/f454477212518671/abstract/ %0 Conference Paper %B Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security %D 2011 %T Boosting the scalability of botnet detection using adaptive traffic sampling %A Zhang,Junjie %A Luo,Xiapu %A Perdisci,Roberto %A Gu,Guofei %A Lee,Wenke %A Feamster, Nick %K adaptive sampling %K botnet %K intrusion detection %K NETWORK SECURITY %X Botnets pose a serious threat to the health of the Internet. Most current network-based botnet detection systems require deep packet inspection (DPI) to detect bots. Because DPI is a computational costly process, such detection systems cannot handle large volumes of traffic typical of large enterprise and ISP networks. In this paper we propose a system that aims to efficiently and effectively identify a small number of suspicious hosts that are likely bots. Their traffic can then be forwarded to DPI-based botnet detection systems for fine-grained inspection and accurate botnet detection. By using a novel adaptive packet sampling algorithm and a scalable spatial-temporal flow correlation approach, our system is able to substantially reduce the volume of network traffic that goes through DPI, thereby boosting the scalability of existing botnet detection systems. We implemented a proof-of-concept version of our system, and evaluated it using real-world legitimate and botnet-related network traces. Our experimental results are very promising and suggest that our approach can enable the deployment of botnet-detection systems in large, high-speed networks. %B Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security %S ASIACCS '11 %I ACM %C New York, NY, USA %P 124 - 134 %8 2011/// %@ 978-1-4503-0564-8 %G eng %U http://doi.acm.org/10.1145/1966913.1966930 %R 10.1145/1966913.1966930 %0 Book Section %B Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques %D 2011 %T A Canonical Form for Testing Boolean Function Properties %A Dana Dachman-Soled %A Servedio, Rocco A. %E Goldberg, Leslie Ann %E Jansen, Klaus %E Ravi, R. %E Rolim, José D. P. %K Algorithm Analysis and Problem Complexity %K Boolean functions %K Computation by Abstract Devices %K Computer Communication Networks %K Computer Graphics %K Data structures %K Discrete Mathematics in Computer Science %K property testing %X In a well-known result Goldreich and Trevisan (2003) showed that every testable graph property has a “canonical” tester in which a set of vertices is selected at random and the edges queried are the complete graph over the selected vertices. We define a similar-in-spirit canonical form for Boolean function testing algorithms, and show that under some mild conditions property testers for Boolean functions can be transformed into this canonical form. Our first main result shows, roughly speaking, that every “nice” family of Boolean functions that has low noise sensitivity and is testable by an “independent tester,” has a canonical testing algorithm. Our second main result is similar but holds instead for families of Boolean functions that are closed under ID-negative minors. Taken together, these two results cover almost all of the constant-query Boolean function testing algorithms that we know of in the literature, and show that all of these testing algorithms can be automatically converted into a canonical form. %B Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques %S Lecture Notes in Computer Science %I Springer Berlin Heidelberg %P 460 - 471 %8 2011/01/01/ %@ 978-3-642-22934-3, 978-3-642-22935-0 %G eng %U http://link.springer.com/chapter/10.1007/978-3-642-22935-0_39 %0 Journal Article %J Journal of mechanisms and robotics %D 2011 %T A Case Study in Optimization of Gait and Physical Parameters for a Snake-Inspired Robot Based on a Rectilinear Gait %A Hopkins,James K. %A Spranklin,Brent W. %A Gupta, Satyandra K. %X Physical parameters of the constituent modules and gait parameters affect the overall performance of snake-inspired robots. Hence, a system-level optimization model needs to concurrently optimize the module parameters and the gait. Incorporating a physics-based model of rectilinear gaits in the system-level optimization model is a computationally challenging problem. This paper presents a case study to illustrate how metamodels of the precomputed optimal rectilinear gaits can be utilized to reduce the complexity of the system-level optimization model. An example is presented to illustrate the importance of concurrently optimizing the module parameters and the gait to obtain the optimal performance for a given mission. %B Journal of mechanisms and robotics %V 3 %8 2011/// %@ 1942-4302 %G eng %U http://cat.inist.fr/?aModele=afficheN&cpsidt=23978760 %N 1 %0 Conference Paper %B Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining %D 2011 %T Collective graph identification %A Namata,Galileo Mark %A Kok,Stanley %A Getoor, Lise %K collective classification %K entity resolution %K link prediction %K semi-supervised learning %X Data describing networks (communication networks, transaction networks, disease transmission networks, collaboration networks, etc.) is becoming increasingly ubiquitous. While this observational data is useful, it often only hints at the actual underlying social or technological structures which give rise to the interactions. For example, an email communication network provides useful insight but is not the same as the "real" social network among individuals. In this paper, we introduce the problem of graph identification, i.e., the discovery of the true graph structure underlying an observed network. We cast the problem as a probabilistic inference task, in which we must infer the nodes, edges, and node labels of a hidden graph, based on evidence provided by the observed network. This in turn corresponds to the problems of performing entity resolution, link prediction, and node labeling to infer the hidden graph. While each of these problems have been studied separately, they have never been considered together as a coherent task. We present a simple yet novel approach to address all three problems simultaneously. Our approach, called C3, consists of Coupled Collective Classifiers that are iteratively applied to propagate information among solutions to the problems. We empirically demonstrate that C3 is superior, in terms of both predictive accuracy and runtime, to state-of-the-art probabilistic approaches on three real-world problems. %B Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining %S KDD '11 %I ACM %C New York, NY, USA %P 87 - 95 %8 2011/// %@ 978-1-4503-0813-7 %G eng %U http://doi.acm.org/10.1145/2020408.2020429 %R 10.1145/2020408.2020429 %0 Journal Article %J Journal of the ACM %D 2011 %T Complete Fairness in Secure Two-Party Computation %A Gordon,S. Dov %A Hazay,Carmit %A Katz, Jonathan %A Lindell,Yehuda %K cryptography %K fairness %K secure computation %X In the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such as privacy, correctness, and more. One desirable property is fairness which guarantees, informally, that if one party receives its output, then the other party does too. Cleve [1986] showed that complete fairness cannot be achieved in general without an honest majority. Since then, the accepted folklore has been that nothing non-trivial can be computed with complete fairness in the two-party setting. We demonstrate that this folklore belief is false by showing completely fair protocols for various nontrivial functions in the two-party setting based on standard cryptographic assumptions. We first show feasibility of obtaining complete fairness when computing any function over polynomial-size domains that does not contain an “embedded XOR”; this class of functions includes boolean AND/OR as well as Yao’s “millionaires’ problem”. We also demonstrate feasibility for certain functions that do contain an embedded XOR, though we prove a lower bound showing that any completely fair protocol for such functions must have round complexity super-logarithmic in the security parameter. Our results demonstrate that the question of completely fair secure computation without an honest majority is far from closed. %B Journal of the ACM %V 58 %P 24:1–24:37 - 24:1–24:37 %8 2011/12// %@ 0004-5411 %G eng %U http://doi.acm.org/10.1145/2049697.2049698 %N 6 %R 10.1145/2049697.2049698 %0 Journal Article %J Advanced Engineering Informatics %D 2011 %T A computational framework for authoring and searching product design specifications %A Weissman,Alexander %A Petrov,Martin %A Gupta, Satyandra K. %K Engineering design %K Product design specifications %K Requirements engineering %X The development of product design specifications (PDS) is an important part of the product development process. Incompleteness, ambiguity, or inconsistency in the PDS can lead to problems during the design process and may require unnecessary design iterations. This generally results in increased design time and cost. Currently, in many organizations, PDS are written using word processors. Since documents written by different authors can be inconsistent in style and word choice, it is difficult to automatically search for specific requirements. Moreover, this approach does not allow the possibility of automated design verification and validation against the design requirements and specifications.In this paper, we present a computational framework and a software tool based on this framework for writing, annotating, and searching computer-interpretable PDS. Our approach allows authors to write requirement statements in natural language to be consistent with the existing authoring practice. However, using mathematical expressions, keywords from predefined taxonomies, and other metadata the author of PDS can then annotate different parts of the requirement statements. This approach provides unambiguous meaning to the information contained in PDS, and helps to eliminate mistakes later in the process when designers must interpret requirements. Our approach also enables users to construct a new PDS document from the results of the search for requirements of similar devices and in similar contexts. This capability speeds up the process of creating PDS and helps authors write more detailed documents by utilizing previous, well written PDS documents. Our approach also enables checking for internal inconsistencies in the requirement statements. %B Advanced Engineering Informatics %V 25 %P 516 - 534 %8 2011/08// %@ 1474-0346 %G eng %U http://www.sciencedirect.com/science/article/pii/S1474034611000061 %N 3 %R 10.1016/j.aei.2011.02.001 %0 Report %D 2011 %T Countering Botnets: Anomaly-Based Detection, Comprehensive Analysis, and Efficient Mitigation %A Lee,Wenke %A Dagon,David %A Giffin,Jon %A Feamster, Nick %A Ollman,Gunter %A Westby,Jody %A Wesson,Rick %A Vixie,Paul %K *ELECTRONIC SECURITY %K *INFORMATION SECURITY %K *INTERNET %K *INTRUSION DETECTION(COMPUTERS) %K algorithms %K BGP ROUTE INJECTION %K BGP(BORDER GATEWAY PROTOCOLS) %K BOTNET DETECTION %K BOTNET TRACEBACK AND ATTRIBUTION %K BOTNETS(MALWARE) %K CLIENT SERVER SYSTEMS %K COMMUNICATIONS PROTOCOLS %K COMPUTER PROGRAMMING AND SOFTWARE %K COMPUTER SYSTEMS MANAGEMENT AND STANDARDS %K CYBER ATTACKS %K CYBER SECURITY %K CYBERNETICS %K CYBERTERRORISM %K CYBERWARFARE %K DATA PROCESSING SECURITY %K DNS BASED MONITORING %K DNS BASED REDIRECTION %K DNS(DOMAIN NAME SYSTEMS) %K INFORMATION SCIENCE %K INTERNET BROWSERS %K ISP(INTERNET SERVICE PROVIDERS) %K MALWARE %K MALWARE ANALYSIS %K Online Systems %K WUAFRLDHS1BOTN %X We cover five general areas: (1) botnet detection, (2) botnet analysis, (3) botnet mitigation, (4) add-on tasks to the original contract, including the Conficker Working Group Lessons Learned, Layer-8 Exploration of Botnet Organization, and DREN research, and (5) commercialization in this paper. We have successfully developed new botnet detection and analysis capabilities in this project. These algorithms have been evaluated using real-world data, and have been put into actual, deployed systems. The most significant technical developments include a new dynamic reputation systems for DNS domains, a scalable anomaly detection system for botnet detection in very large network, and a transparent malware analysis system. In addition, on several occasions we have used our botnet data and analysis to help law enforcement agencies arrest botmasters. We also have had great success transitioning technologies to commercial products that are now used by government agencies, ISPs, and major corporations. %I GEORGIA TECH RESEARCH CORP ATLANTA %8 2011/05// %G eng %U http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA543919 %0 Report %D 2011 %T Dataflow-Based Implementation of Layered Sensing Applications %A Bhattacharyya, Shuvra S. %A Chung-Ching Shen %A Plishker,William %A Sane, Nimish %A Wu, Hsiang-Huang %A Gu, Ruirui %K *COMPUTER AIDED DESIGN %K *DATA FUSION %K *DATAFLOW %K *LAYERS %K *SOFTWARE TOOLS %K COMPUTER PROGRAMMING AND SOFTWARE %K DETECTION %K High performance computing %K LAYERED SENSING %K OPTIMIZATION %K Signal processing %K synthesis %K T2KA %X This report describes a new dataflow-based technology and associated design tools for high-productivity design, analysis, and optimization of layered sensing software for signal processing systems. Our approach provides novel capabilities, based on the principles of task-level dataflow analysis, for exploring and optimizing interactions across application behavior; operational context; high performance embedded processing platforms, and implementation constraints. Particularly, we introduce and deliver novel software tools, called the targeted dataflow interchange format (TDIF) and Dataflow Interchange Format Markup Language (DIFML), for design and implementation of layered sensing and signal processing systems. The TDIF-CUDA (Compute Unified Device Architecture) environment is a graphics processing unit targeted software synthesis tool that provides a unique integration of dynamic dataflow modeling; retargetable actor construction; software synthesis; and instrumentation-based schedule evaluation and tuning. The DIFML package is a software package for the DIFML format, which is an Extensible Markup Language (XML)-based format for exchanging information between DIF and other tools. %8 2011 %G eng %0 Conference Paper %B 2011 IEEE 27th International Conference on Data Engineering Workshops (ICDEW) %D 2011 %T Declarative analysis of noisy information networks %A Moustafa,W. E %A Namata,G. %A Deshpande, Amol %A Getoor, Lise %K Cleaning %K Data analysis %K data cleaning operations %K data management system %K data mining %K Databases %K Datalog %K declarative analysis %K graph structure %K information networks %K Noise measurement %K noisy information networks %K Prediction algorithms %K semantics %K Syntactics %X There is a growing interest in methods for analyzing data describing networks of all types, including information, biological, physical, and social networks. Typically the data describing these networks is observational, and thus noisy and incomplete; it is often at the wrong level of fidelity and abstraction for meaningful data analysis. This has resulted in a growing body of work on extracting, cleaning, and annotating network data. Unfortunately, much of this work is ad hoc and domain-specific. In this paper, we present the architecture of a data management system that enables efficient, declarative analysis of large-scale information networks. We identify a set of primitives to support the extraction and inference of a network from observational data, and describe a framework that enables a network analyst to easily implement and combine new extraction and analysis techniques, and efficiently apply them to large observation networks. The key insight behind our approach is to decouple, to the extent possible, (a) the operations that require traversing the graph structure (typically the computationally expensive step), from (b) the operations that do the modification and update of the extracted network. We present an analysis language based on Datalog, and show how to use it to cleanly achieve such decoupling. We briefly describe our prototype system that supports these abstractions. We include a preliminary performance evaluation of the system and show that our approach scales well and can efficiently handle a wide spectrum of data cleaning operations on network data. %B 2011 IEEE 27th International Conference on Data Engineering Workshops (ICDEW) %I IEEE %P 106 - 111 %8 2011/04/11/16 %@ 978-1-4244-9195-7 %G eng %R 10.1109/ICDEW.2011.5767619 %0 Journal Article %J The International Journal of Advanced Manufacturing Technology %D 2011 %T Design and fabrication of miniature compliant hinges for multi-material compliant mechanisms %A Bejgerowski,Wojciech %A Gerdes,John %A Gupta, Satyandra K. %A Bruck,Hugh %K engineering %X Multi-material molding (MMM) enables the creation of multi-material mechanisms that combine compliant hinges, serving as revolute joints, and rigid links in a single part. There are three important challenges in creating these structures: (1) bonding between the materials used, (2) the ability of the hinge to transfer the required loads in the mechanism while allowing for the prescribed degree(s) of freedom, and (3) incorporating the process-specific requirements in the design stage. This paper presents the approach for design and fabrication of miniature compliant hinges in multi-material compliant mechanisms. The methodology described in this paper allows for the concurrent design of the part and the manufacturing process. For the first challenge, mechanical interlocking strategies are presented. For the second challenge, the development of a simulation-based optimization model of the hinge is presented, involving functional and manufacturing constrains. For the third challenge, the development of hinge positioning features and gate positioning constraints is presented. The developed MMM process is described, along with the main constraints and performance measures. This includes the process sequence, the mold cavity design, gate selection, and runner system development. A case study is presented to demonstrate the feasibility of creating multi-material mechanisms with miniature hinges serving as joints through MMM process. The approach described in this paper was utilized to design a drive mechanism for a flapping wing micro air vehicle. The methods described in this paper are applicable to any lightweight, load-bearing compliant mechanism manufactured using multi-material injection molding. %B The International Journal of Advanced Manufacturing Technology %V 57 %P 437 - 452 %8 2011/// %@ 0268-3768 %G eng %U http://www.springerlink.com/content/ul641k1v50360607/abstract/ %N 5 %R 10.1007/s00170-011-3301-y %0 Conference Paper %B 2011 IEEE 36th Conference on Local Computer Networks (LCN) %D 2011 %T Design methods for Wireless Sensor Network Building Energy Monitoring Systems %A Cho, Inkeun %A Chung-Ching Shen %A Potbhare, S. %A Bhattacharyya, Shuvra S. %A Goldsman,N. %K Analytical models %K application-level interfacing behavior %K building energy monitoring system %K Buildings %K dataflow technique %K embedded sensor node %K energy analysis method %K Energy consumption %K energy management systems %K Energy resolution %K IEEE 802.15.4 MAC functionality %K Monitoring %K OPTIMIZATION %K wireless sensor network %K Wireless sensor networks %K WSNBEMS %K Zigbee %X In this paper, we present a new energy analysis method for evaluating energy consumption of embedded sensor nodes at the application level and the network level. Then we apply the proposed energy analysis method to develop new energy management schemes in order to maximize lifetime for Wireless Sensor Network Building Energy Monitoring Systems (WSNBEMS). At the application level, we develop a new design approach that uses dataflow techniques to model the application-level interfacing behavior between the processor and sensors on an embedded sensor node. At the network level, we analyze the energy consumption of the IEEE 802.15.4 MAC functionality. Based on our techniques for modeling and energy analysis, we have implemented an optimized WSNBEMS for a real building, and validated our energy analysis techniques through measurements on this implementation. The performance of our implementation is also evaluated in terms of monitoring accuracy and energy consumption savings. We have demonstrated that by applying the proposed scheme, system lifetime can be improved significantly without affecting monitoring accuracy. %B 2011 IEEE 36th Conference on Local Computer Networks (LCN) %P 974 - 981 %8 2011 %G eng %0 Journal Article %J Journal of Mechanical Design %D 2011 %T Design of Revolute Joints for In-Mold Assembly Using Insert Molding %A Ananthanarayanan,A. %A Ehrlich,L. %A Desai,J. P. %A Gupta,S.K. %B Journal of Mechanical Design %V 133 %P 121010 - 121010 %8 2011/// %G eng %0 Conference Paper %B Fifth International AAAI Conference on Weblogs and Social Media %D 2011 %T Differential adaptive diffusion: Understanding diversity and learning whom to trust in viral marketing %A Sharara,H. %A Rand, William %A Getoor, Lise %X Viral marketing mechanisms use the existing social network between customers to spread information about products and encourage product adoption. Existing viral marketing models focus on the dynamics of the diffusion process, however they typically: (a) only consider a single product campaign and (b) fail to model the evolution of the social network, as the trust between individuals changes over time, during the course of multiple campaigns. In this work, we propose an adaptive vi- ral marketing model which captures: (1) multiple different product campaigns, (2) the diversity in customer preferences among different product categories, and (3) changing con- fidence in peers’ recommendations over time. By applying our model to a real-world network extracted from the Digg social news website, we provide insights into the effects of network dynamics on the different products’ adoption. Our experiments show that our proposed model outperforms ear- lier non-adaptive diffusion models in predicting future prod- uct adoptions. We also show how this model can be used to explore new viral marketing strategies that are more success- ful than classic strategies which ignore the dynamic nature of social networks. %B Fifth International AAAI Conference on Weblogs and Social Media %8 2011/// %G eng %0 Journal Article %J Nature Medicine %D 2011 %T Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization %A Korpal, Manav %A Ell, Brian J. %A Buffa, Francesca M. %A Ibrahim, Toni %A Blanco, Mario A. %A Celià-Terrassa, Toni %A Mercatali, Laura %A Zia Khan %A Goodarzi, Hani %A Hua, Yuling %A Wei, Yong %A Hu, Guohong %A Garcia, Benjamin A. %A Ragoussis, Jiannis %A Amadori, Dino %A Harris, Adrian L. %A Kang, Yibin %X Although the role of miR-200s in regulating E-cadherin expression and epithelial-to-mesenchymal transition is well established, their influence on metastatic colonization remains controversial. Here we have used clinical and experimental models of breast cancer metastasis to discover a pro-metastatic role of miR-200s that goes beyond their regulation of E-cadherin and epithelial phenotype. Overexpression of miR-200s is associated with increased risk of metastasis in breast cancer and promotes metastatic colonization in mouse models, phenotypes that cannot be recapitulated by E-cadherin expression alone. Genomic and proteomic analyses revealed global shifts in gene expression upon miR-200 overexpression toward that of highly metastatic cells. miR-200s promote metastatic colonization partly through direct targeting of Sec23a, which mediates secretion of metastasis-suppressive proteins, including Igfbp4 and Tinagl1, as validated by functional and clinical correlation studies. Overall, these findings suggest a pleiotropic role of miR-200s in promoting metastatic colonization by influencing E-cadherin–dependent epithelial traits and Sec23a-mediated tumor cell secretome.View full text %B Nature Medicine %V 17 %P 1101 - 1108 %8 2011/09// %@ 1078-8956 %G eng %U http://www.nature.com/nm/journal/v17/n9/abs/nm.2401.html %N 9 %! Nat Med %0 Journal Article %J IEEE Pervasive Computing %D 2011 %T Disaggregated End-Use Energy Sensing for the Smart Grid %A Jon Froehlich %A Larson,E. %A Gupta,S. %A Cohn,G. %A Reynolds,M. %A Patel,S. %K Calibration %K disaggregated end-use energy sensing %K Disaggregated energy sensing %K disaggregation data techniques %K Electricity %K Energy consumption %K Energy efficiency %K energy-consumption data %K Gas %K Home appliances %K Sensors %K Smart grid %K Smart grids %K smart power grids %K Sustainability %K Water %X This article surveys existing and emerging disaggregation techniques for energy-consumption data and highlights signal features that might be used to sense disaggregated data in an easily installed and cost-effective manner. %B IEEE Pervasive Computing %V 10 %P 28 - 39 %8 2011/03//Jan %@ 1536-1268 %G eng %N 1 %R 10.1109/MPRV.2010.74 %0 Journal Article %J BMC Bioinformatics %D 2011 %T DNACLUST: accurate and efficient clustering of phylogenetic marker genes %A Ghodsi,Mohammadreza %A Liu,Bo %A Pop, Mihai %X Clustering is a fundamental operation in the analysis of biological sequence data. New DNA sequencing technologies have dramatically increased the rate at which we can generate data, resulting in datasets that cannot be efficiently analyzed by traditional clustering methods. %B BMC Bioinformatics %V 12 %P 271 - 271 %8 2011/06/30/ %@ 1471-2105 %G eng %U http://www.biomedcentral.com/1471-2105/12/271 %N 1 %R 10.1186/1471-2105-12-271 %0 Conference Paper %B 2011 IEEE International Conference on Computer Vision (ICCV) %D 2011 %T Domain adaptation for object recognition: An unsupervised approach %A Gopalan,R. %A Ruonan Li %A Chellapa, Rama %K Data models %K data representations %K discriminative classifier %K Feature extraction %K Grassmann manifold %K image sampling %K incremental learning %K labeled source domain %K Manifolds %K measurement %K object category %K Object recognition %K Principal component analysis %K sampling points %K semisupervised adaptation %K target domain %K underlying domain shift %K unsupervised approach %K unsupervised domain adaptation %K Unsupervised learning %K vectors %X Adapting the classifier trained on a source domain to recognize instances from a new target domain is an important problem that is receiving recent attention. In this paper, we present one of the first studies on unsupervised domain adaptation in the context of object recognition, where we have labeled data only from the source domain (and therefore do not have correspondences between object categories across domains). Motivated by incremental learning, we create intermediate representations of data between the two domains by viewing the generative subspaces (of same dimension) created from these domains as points on the Grassmann manifold, and sampling points along the geodesic between them to obtain subspaces that provide a meaningful description of the underlying domain shift. We then obtain the projections of labeled source domain data onto these subspaces, from which a discriminative classifier is learnt to classify projected data from the target domain. We discuss extensions of our approach for semi-supervised adaptation, and for cases with multiple source and target domains, and report competitive results on standard datasets. %B 2011 IEEE International Conference on Computer Vision (ICCV) %I IEEE %P 999 - 1006 %8 2011/11/06/13 %@ 978-1-4577-1101-5 %G eng %R 10.1109/ICCV.2011.6126344 %0 Journal Article %J IEEE Transactions on Knowledge and Data Engineering %D 2011 %T A Dual Framework and Algorithms for Targeted Online Data Delivery %A Roitman,Haggai %A Gal,Avigdor %A Raschid, Louiqa %K client/server multitier systems %K distributed databases %K online data delivery. %K online information services %X A variety of emerging online data delivery applications challenge existing techniques for data delivery to human users, applications, or middleware that are accessing data from multiple autonomous servers. In this paper, we develop a framework for formalizing and comparing pull-based solutions and present dual optimization approaches. The first approach, most commonly used nowadays, maximizes user utility under the strict setting of meeting a priori constraints on the usage of system resources. We present an alternative and more flexible approach that maximizes user utility by satisfying all users. It does this while minimizing the usage of system resources. We discuss the benefits of this latter approach and develop an adaptive monitoring solution Satisfy User Profiles (SUPs). Through formal analysis, we identify sufficient optimality conditions for SUP. Using real (RSS feeds) and synthetic traces, we empirically analyze the behavior of SUP under varying conditions. Our experiments show that we can achieve a high degree of satisfaction of user utility when the estimations of SUP closely estimate the real event stream, and has the potential to save a significant amount of system resources. We further show that SUP can exploit feedback to improve user utility with only a moderate increase in resource utilization. %B IEEE Transactions on Knowledge and Data Engineering %V 23 %P 5 - 21 %8 2011/// %@ 1041-4347 %G eng %N 1 %R http://doi.ieeecomputersociety.org/10.1109/TKDE.2010.15 %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 2011 %T Dynamic Processing Allocation in Video %A Daozheng Chen %A Bilgic,M. %A Getoor, Lise %A Jacobs, David W. %K algorithms;digital %K allocation;video %K analysis;computer %K background %K detection;graphical %K detection;resource %K graphics;face %K model;resource %K processing; %K processing;face %K recognition;object %K signal %K subtraction;baseline %K video %X Large stores of digital video pose severe computational challenges to existing video analysis algorithms. In applying these algorithms, users must often trade off processing speed for accuracy, as many sophisticated and effective algorithms require large computational resources that make it impractical to apply them throughout long videos. One can save considerable effort by applying these expensive algorithms sparingly, directing their application using the results of more limited processing. We show how to do this for retrospective video analysis by modeling a video using a chain graphical model and performing inference both to analyze the video and to direct processing. We apply our method to problems in background subtraction and face detection, and show in experiments that this leads to significant improvements over baseline algorithms. %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %V 33 %P 2174 - 2187 %8 2011/11// %@ 0162-8828 %G eng %N 11 %R 10.1109/TPAMI.2011.55 %0 Journal Article %J SIGKDD Explor. Newsl. %D 2011 %T Eighth workshop on mining and learning with graphs %A Brefeld,Ulf %A Getoor, Lise %A Macskassy,Sofus A. %K data mining %K dynamic network analysis %K graph mining %K kernel methods %K link mining %K machine learning %K network analysis %K pattern recognition %K relational learning %K scalable graph mining %K statistical relational learning %X The Eighth Workshop on Mining and Learning with Graphs (MLG)1was held at KDD 2010 in Washington DC. It brought together a variete of researchers interested in analyzing data that is best represented as a graph. Examples include the WWW, social networks, biological networks, communication networks, and many others. The importance of being able to effectively mine and learn from such data is growing, as more and more structured and semi-structured data is becoming available. This is a problem across widely different fields such as economics, statistics, social science, physics and computer science, and is studied within a variety of sub-disciplines of machine learning and data mining including graph mining, graphical models, kernel theory, statistical relational learning, etc. The objective of this workshop was to bring together practitioners from these various fields and areas to foster a rich discussion of which problems we work on, how we frame them in the context of graphs, which tools and algorithms we apply and our general findings and lessons learned. This year's workshop was very successful with well over 100 attendees, excellent keynote speakers and papers. This is a rapidly growing area and we believe that this community is only in its infancy. We hope that the readers will join us next year for MLG 2011. %B SIGKDD Explor. Newsl. %V 12 %P 63 - 65 %8 2011/03// %@ 1931-0145 %G eng %U http://doi.acm.org/10.1145/1964897.1964915 %N 2 %R 10.1145/1964897.1964915 %0 Journal Article %J Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2011) %D 2011 %T Estimating Functional Agent-Based Models: An Application to Bid Shading in Online Markets Format %A Guo,Wei %A Jank,Wolfgang %A Rand, William %K Agent-based modeling %K business %K Calibration %K Genetic algorithms %K internet auctions %K simulation %X Bid shading is a common strategy in online auctions to avoid the "winner’s curse". While almost all bidders shade their bids, at least to some degree, it is impossible to infer the degree and volume of shaded bids directly from observed bidding data. In fact, most bidding data only allows us to observe the resulting price process, i.e. whether prices increase fast (due to little shading) or whether they slow down (when all bidders shade their bids). In this work, we propose an agent-based model that simulates bidders with different bidding strategies and their interaction with one another. We calibrate that model (and hence estimate properties about the propensity and degree of shaded bids) by matching the emerging simulated price process with that of the observed auction data using genetic algorithms. From a statistical point of view, this is challenging because we match functional draws from simulated and real price processes. We propose several competing fitness functions and explore how the choice alters the resulting ABM calibration. We apply our model to the context of eBay auctions for digital cameras and show that a balanced fitness function yields the best results. %B Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2011) %8 2011/// %G eng %U http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1846639 %0 Conference Paper %B 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC) %D 2011 %T Evaluating visual and statistical exploration of scientific literature networks %A Gove,R. %A Dunne,C. %A Shneiderman, Ben %A Klavans,J. %A Dorr, Bonnie J %K abstracting %K academic literature %K action science explorer %K automatic clustering %K citation analysis %K citation network visualization %K Communities %K Context %K custom exploration goal %K Data visualization %K Databases %K Document filtering %K document handling %K document ranking %K easy-to-understand metrics %K empirical evaluation %K Google %K Graphical user interfaces %K Information filtering %K Information Visualization %K Libraries %K literature exploration %K network statistics %K paper filtering %K paper ranking %K scientific literature network %K statistical exploration %K summarization technique %K user-defined tasks %K visual exploration %K Visualization %X Action Science Explorer (ASE) is a tool designed to support users in rapidly generating readily consumable summaries of academic literature. It uses citation network visualization, ranking and filtering papers by network statistics, and automatic clustering and summarization techniques. We describe how early formative evaluations of ASE led to a mature system evaluation, consisting of an in-depth empirical evaluation with four domain experts. The evaluation tasks were of two types: predefined tasks to test system performance in common scenarios, and user-defined tasks to test the system's usefulness for custom exploration goals. The primary contribution of this paper is a validation of the ASE design and recommendations to provide: easy-to-understand metrics for ranking and filtering documents, user control over which document sets to explore, and overviews of the document set in coordinated views along with details-on-demand of specific papers. We contribute a taxonomy of features for literature search and exploration tools and describe exploration goals identified by our participants. %B 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC) %I IEEE %P 217 - 224 %8 2011/09/18/22 %@ 978-1-4577-1246-3 %G eng %R 10.1109/VLHCC.2011.6070403 %0 Journal Article %J Journal of Signal Processing Systems %D 2011 %T Exploiting Statically Schedulable Regions in Dataflow Programs %A Gu, Ruirui %A Janneck, Jörn W. %A Raulet, Mickaël %A Bhattacharyya, Shuvra S. %K Cal %K Circuits and Systems %K Computer Imaging, Vision, Pattern Recognition and Graphics %K Dataflow %K DIF %K Electrical Engineering %K Image Processing and Computer Vision %K multicore processors %K pattern recognition %K Quasi-static scheduling %K Signal, Image and Speech Processing %X Dataflow descriptions have been used in a wide range of Digital Signal Processing (DSP) applications, such as multi-media processing, and wireless communications. Among various forms of dataflow modeling, Synchronous Dataflow (SDF) is geared towards static scheduling of computational modules, which improves system performance and predictability. However, many DSP applications do not fully conform to the restrictions of SDF modeling. More general dataflow models, such as CAL (Eker and Janneck 2003), have been developed to describe dynamically-structured DSP applications. Such generalized models can express dynamically changing functionality, but lose the powerful static scheduling capabilities provided by SDF. This paper focuses on the detection of SDF-like regions in dynamic dataflow descriptions—in particular, in the generalized specification framework of CAL. This is an important step for applying static scheduling techniques within a dynamic dataflow framework. Our techniques combine the advantages of different dataflow languages and tools, including CAL (Eker and Janneck 2003), DIF (Hsu et al. 2005) and CAL2C (Roquier et al. 2008). In addition to detecting SDF-like regions, we apply existing SDF scheduling techniques to exploit the static properties of these regions within enclosing dynamic dataflow models. Furthermore, we propose an optimized approach for mapping SDF-like regions onto parallel processing platforms such as multi-core processors. %B Journal of Signal Processing Systems %V 63 %P 129 - 142 %8 2011 %@ 1939-8018, 1939-8115 %G eng %U http://link.springer.com/article/10.1007/s11265-009-0445-1 %N 1 %! J Sign Process Syst %0 Conference Paper %B Proceedings of the fourth ACM international conference on Web search and data mining %D 2011 %T Exploiting statistical and relational information on the web and in social media %A Getoor, Lise %A Mihalkova,Lilyana %K graph analysis %K probabilistic inference %K query log data %K social media %K statistical relational learning %X The popularity of Web 2.0, characterized by a proliferation of social media sites, and Web 3.0, with more richly semantically annotated objects and relationships, brings to light a variety of important prediction, ranking, and extraction tasks. The input to these tasks is often best seen as a (noisy) multi-relational graph, such as the click graph, defined by user interactions with Web sites; and the social graph, defined by friendships and affiliations on social media sites. This tutorial will provide an overview of statistical relational learning and inference techniques, motivating and illustrating them using web and social media applications. We will start by briefly surveying some of the sources of statistical and relational information on the web and in social media and will then dedicate most of the tutorial time to an introduction to representations and techniques for learning and reasoning with multi-relational information, viewing them through the lens of web and social media domains. We will end with a discussion of current trends and related fields, such as privacy in social networks. %B Proceedings of the fourth ACM international conference on Web search and data mining %S WSDM '11 %I ACM %C New York, NY, USA %P 9 - 10 %8 2011/// %@ 978-1-4503-0493-1 %G eng %U http://doi.acm.org/10.1145/1935826.1935834 %R 10.1145/1935826.1935834 %0 Book Section %B Visual Analysis of HumansVisual Analysis of Humans %D 2011 %T Face Detection %A Gopalan,Raghuraman %A Schwartz,William R. %A Chellapa, Rama %A Srivastava,Ankur %E Moeslund,Thomas B. %E Hilton,Adrian %E Krüger,Volker %E Sigal,Leonid %X Face detection in still images and videos has been extensively studied over the last two decades. Attributed to the recent proliferation of cameras in consumer applications, research in face detection has gradually transformed into more unconstrained settings, with the goal of achieving performance close to humans. This presents two main challenges: (i) in addition to modeling the facial characteristics, understanding the information portrayed by the surrounding scene is important in resolving visual ambiguities, and (ii) the computational time needed for decision making should be compatible for real-time applications, since detection is primarily a front-end process on which additional knowledge extraction is built upon. This chapter begins with a review of recent work in modeling face-specific information, including appearance-based methods used by sliding window classifiers, concepts from learning and local interest-point descriptors, and then focuses on representing the contextual information shared by faces with the surrounding scene. To provide better understanding of working concepts, we discuss a method for learning the semantic context shared by the face with other human body parts that facilitates reasoning under occlusion, and then present an image representation which efficiently encodes contour information to enable fast detection of faces. We conclude the chapter by discussing some existing challenges. %B Visual Analysis of HumansVisual Analysis of Humans %I Springer London %P 71 - 90 %8 2011/// %@ 978-0-85729-997-0 %G eng %U http://dx.doi.org/10.1007/978-0-85729-997-0_5 %0 Book Section %B Multibiometrics for Human IdentificationMultibiometrics for Human Identification %D 2011 %T Face Tracking and Recognition in a Camera Network %A Bhanu,Bir %A Govindaraju,Venu %B Multibiometrics for Human IdentificationMultibiometrics for Human Identification %I Cambridge University Press %8 2011/// %@ 9780511921056 %G eng %U http://dx.doi.org/10.1017/CBO9780511921056 %0 Conference Paper %B Biometrics (IJCB), 2011 International Joint Conference on %D 2011 %T Face verification using large feature sets and one shot similarity %A Guo,Huimin %A Robson Schwartz,W. %A Davis, Larry S. %K analysis;set %K approximations;regression %K descriptor;labeled %K Face %K feature %K in %K information;face %K information;texture %K least %K LFW;PLS;PLS %K recognition;least %K regression;color %K sets;one %K shot %K similarity;partial %K squares %K squares;shape %K the %K theory; %K verification;facial %K wild;large %X We present a method for face verification that combines Partial Least Squares (PLS) and the One-Shot similarity model[28]. First, a large feature set combining shape, texture and color information is used to describe a face. Then PLS is applied to reduce the dimensionality of the feature set with multi-channel feature weighting. This provides a discriminative facial descriptor. PLS regression is used to compute the similarity score of an image pair by One-Shot learning. Given two feature vector representing face images, the One-Shot algorithm learns discriminative models exclusively for the vectors being compared. A small set of unlabeled images, not containing images belonging to the people being compared, is used as a reference (negative) set. The approach is evaluated on the Labeled Face in the Wild (LFW) benchmark and shows very comparable results to the state-of-the-art methods (achieving 86.12% classification accuracy) while maintaining simplicity and good generalization ability. %B Biometrics (IJCB), 2011 International Joint Conference on %P 1 - 8 %8 2011/10// %G eng %R 10.1109/IJCB.2011.6117498 %0 Conference Paper %B Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems %D 2011 %T From slacktivism to activism: participatory culture in the age of social media %A Rotman,Dana %A Vieweg,Sarah %A Yardi,Sarita %A Chi,Ed %A Preece,Jenny %A Shneiderman, Ben %A Pirolli,Peter %A Glaisyer,Tom %K activism %K change %K design %K participation %K slacktivism %K social media %X Social networking sites (e.g. Facebook), microblogging services (e.g. Twitter), and content-sharing sites (e.g. YouTube and Flickr) have introduced the opportunity for wide-scale, online social participation. Visibility of national and international priorities such as public health, political unrest, disaster relief, and climate change has increased, yet we know little about the benefits - and possible costs - of engaging in social activism via social media. These powerful social issues introduce a need for scientific research into technology mediated social participation. What are the actual, tangible benefits of "greening" Twitter profile pictures in support of the Iranian elections? Does cartooning a Facebook profile picture really raise awareness of child abuse? Are there unintended negative effects through low-risk, low-cost technology-mediated participation? And, is there a difference - in both outcome and engagement level - between different types of online social activism? This SIG will investigate technology mediated social participation through a critical lens, discussing both the potential positive and negative outcomes of such participation. Approaches to designing for increased participation, evaluating effects of participation, and next steps in scientific research directions will be discussed. %B Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems %S CHI EA '11 %I ACM %C New York, NY, USA %P 819 - 822 %8 2011/// %@ 978-1-4503-0268-5 %G eng %U http://doi.acm.org/10.1145/1979742.1979543 %R 10.1145/1979742.1979543 %0 Conference Paper %B Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on %D 2011 %T G-PARE: A visual analytic tool for comparative analysis of uncertain graphs %A Sharara,H. %A Sopan,A. %A Namata,G. %A Getoor, Lise %A Singh,L. %B Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on %P 61 - 70 %8 2011/// %G eng %0 Magazine Article %D 2011 %T Graph Analytics-Lessons Learned and Challenges Ahead %A Wong,Pak Chung %A Chen,Chaomei %A Gorg,Carsten %A Shneiderman, Ben %A Stasko,John %A Thomas,Jim %K citation analysis %K citespace %K Computer Graphics %K document analysis %K graphics and multimedia %K greengrid %K jigsaw system %K modeling %K power grid analysis %K semantic substrates %K simulation %K social networks %K text analysis %K Visualization %X Graph analytics is one of the most influential and important R&D topics in the visual analytics community. Researchers with diverse backgrounds from information visualization, human-computer interaction, computer graphics, graph drawing, and data mining have pursued graph analytics from scientific, technical, and social approaches. These studies have addressed both distinct and common challenges. Past successes and mistakes can provide valuable lessons for revising the research agenda. In this article, six researchers from four academic and research institutes identify graph analytics' fundamental challenges and present both insightful lessons learned from their experience and good practices in graph analytics research. The goal is to critically assess those lessons and shed light on how they can stimulate research and draw attention to grand challenges for graph analytics. The article also establishes principles that could lead to measurable standards and criteria for research. %B IEEE Computer Graphics and Applications %V 31 %P 18 - 29 %8 2011/// %@ 0272-1716 %G eng %N 5 %0 Conference Paper %B ACM SIGCOMM Workshop on Home Networks '11 %D 2011 %T Helping Users Shop for ISPs with Internet Nutrition Labels %A Sundaresan, Srikanth %A Feamster, Nick %A Teixeira, Renata %A Tang, Anthony %A Edwards, W. Keith %A Grinter, Rebecca E. %A Marshini Chetty %A de Donato, Walter %K access networks %K benchmarking %K bismark %K broadband networks %K gateway measurements %X When purchasing home broadband access from Internet service providers (ISPs), users must decide which service plans are most appropriate for their needs. Today, ISPs advertise their available service plans using only generic upload and download speeds. Unfortunately, these metrics do not always accurately reflect the varying performance that home users will experience for a wide range of applications. In this paper, we propose that each ISP service plan carry a "nutrition label" that conveys more comprehensive information about network metrics along many dimensions, including various aspects of throughput, latency, loss rate, and jitter. We first justify why these metrics should form the basis of a network nutrition label. Then, we demonstrate that current plans that are superficially similar with respect to advertised download rates may have different performance according to the label metrics. We close with a discussion of the challenges involved in presenting a nutrition label to users in a way that is both accurate and easy to understand. %B ACM SIGCOMM Workshop on Home Networks '11 %S HomeNets '11 %I ACM %P 13 - 18 %8 2011/// %@ 978-1-4503-0798-7 %G eng %U http://doi.acm.org/10.1145/2018567.2018571 %0 Journal Article %J Technical Reports from UMIACS %D 2011 %T A Hierarchical Algorithm for Fast Debye Summation with Applications to Small Angle Scattering %A Gumerov, Nail A. %A Berlin,Konstantin %A Fushman, David %A Duraiswami, Ramani %K Technical Report %X Debye summation, which involves the summation of sinc functions of distances between all pair of atoms in three dimensional space, arises in computations performed in crystallography, small/wide angle X-ray scattering (SAXS/WAXS) and small angle neutron scattering (SANS). Direct evaluation of Debye summation has quadratic complexity, which results in computational bottleneck when determining crystal properties, or running structure refinement protocols that involve SAXS or SANS, even for moderately sized molecules. We present a fast approximation algorithm that efficiently computes the summation to any prescribed accuracy epsilon in linear time. The algorithm is similar to the fast multipole method (FMM), and is based on a hierarchical spatial decomposition of the molecule coupled with local harmonic expansions and translation of these expansions. An even more efficient implementation is possible when the scattering profile is all that is required, as in small angle scattering reconstruction (SAS) of macromolecules. We examine the relationship of the proposed algorithm to existing approximate methods for profile computations, and provide detailed description of the algorithm, including error bounds and algorithms for stable computation of the translation operators. Our theoretical and computational results show orders of magnitude improvement in computation complexity over existing methods, while maintaining prescribed accuracy. %B Technical Reports from UMIACS %8 2011/09/01/ %G eng %U http://drum.lib.umd.edu/handle/1903/11857 %0 Journal Article %J 2011 10th International Conference on Machine Learning and Applications Workshops %D 2011 %T Improving Classifier Performance by Autonomously Collecting Background Knowledge from the Web %A Minton,S.N. %A Michelson,M. %A See,K. %A Macskassy,S. %A Gazen,B.C. %A Getoor, Lise %X Many websites allow users to tag data items to makethem easier to find. In this paper we consider the problem of classifying tagged data according to user-specified interests. We present an approach for aggregating background knowledge from the Web to improve the performance of a classier. In previous work, researchers have developed technology for extracting knowledge, in the form of relational tables, from semi- structured websites. In this paper we integrate this extraction technology with generic machine learning algorithms, showing that knowledge extracted from the Web can significantly benefit the learning process. Specifically, the knowledge can lead to better generalizations, reduce the number of samples required for supervised learning, and eliminate the need to retrain the system when the environment changes. We validate the approach with an application that classifies tagged Fickr data. %B 2011 10th International Conference on Machine Learning and Applications Workshops %P 1 - 6 %8 2011/// %G eng %0 Journal Article %J SIGCOMM Comput. Commun. Rev. %D 2011 %T Instrumenting home networks %A Calvert,Kenneth L. %A Edwards,W. Keith %A Feamster, Nick %A Grinter,Rebecca E. %A Deng,Ye %A Zhou,Xuzi %K home network management %K home network troubleshooting %X In managing and troubleshooting home networks, one of the challenges is in knowing what is actually happening. Availability of a record of events that occurred on the home network before trouble appeared would go a long way toward addressing that challenge. In this position/work-in-progress paper, we consider requirements for a general-purpose logging facility for home networks. Such a facility, if properly designed, would potentially have other uses. We describe several such uses and discuss requirements to be considered in the design of a logging platform that would be widely supported and accepted. We also report on our initial deployment of such a facility. %B SIGCOMM Comput. Commun. Rev. %V 41 %P 84 - 89 %8 2011/// %@ 0146-4833 %G eng %U http://doi.acm.org/10.1145/1925861.1925875 %N 1 %R 10.1145/1925861.1925875 %0 Journal Article %J Microbial ecology %D 2011 %T Interaction of Vibrio cholerae non-O1/non-O139 with Copepods, Cladocerans and Competing Bacteria in the Large Alkaline Lake Neusiedler See, Austria %A Kirschner,A. K. T. %A Schauer,S. %A Steinberger,B. %A Wilhartitz,I. %A Grim,C. J. %A Huq,A. %A Rita R Colwell %A Herzig,A. %A Sommer,R. %X Vibrio cholerae is a human pathogen and natural inhabitant of aquatic environments. Serogroups O1/O139 have been associated with epidemic cholera, while non-O1/non-O139 serogroups usually cause human disease other than classical cholera. V. cholerae non-O1/non-O139 from the Neusiedler See, a large Central European lake, have caused ear and wound infections, including one case of fatal septicaemia. Recent investigations demonstrated rapid planktonic growth of V. cholerae non-O1/non-O139 and correlation with zooplankton biomass. The aim of this study was to elucidate the interaction of autochthonous V. cholerae with two dominant crustacean zooplankton species in the lake and investigate the influence of the natural bacterial community on this interaction. An existing data set was evaluated for statistical relationships between zooplankton species and V. cholerae and co-culture experiments were performed in the laboratory. A new fluorescence in situ hybridisation protocol was applied for quantification of V. cholerae non-O1/non-O139 cells, which significantly reduced analysis time. The experiments clearly demonstrated a significant relationship of autochthonous V. cholerae non-O1/non-O139 with cladocerans by promoting growth of V. cholerae non-O1/non-O139 in the water and on the surfaces of the cladocerans. In contrast, copepods had a negative effect on the growth of V. cholerae non-O1/non-O139 via competing bacteria from their surfaces. Thus, beside other known factors, biofilm formation by V. cholerae on crustacean zooplankton appears to be zooplankton taxon specific and may be controlled by the natural bacterial community. %B Microbial ecology %V 61 %P 496 - 506 %8 2011/// %G eng %N 3 %R 10.1007/s00248-010-9764-9 %0 Conference Paper %B Twelfth Annual Conference of the International Speech Communication Association %D 2011 %T Kernel partial least squares for speaker recognition %A Srinivasan,B.V. %A Garcia-Romero,D. %A Zotkin,Dmitry N %A Duraiswami, Ramani %X I-vectors are a concise representation of speaker characteristics. Recent advances in speaker recognition have utilized their ability to capture speaker and channel variability to develop efficient recognition engines. Inter-speaker relationships in the i-vector space are non-linear. Accomplishing effective speaker recognition requires a good modeling of these non-linearities and can be cast as a machine learning problem. In this paper, we propose a kernel partial least squares (kernel PLS, or KPLS) framework for modeling speakers in the i-vectors space. The resulting recognition system is tested across several conditions of the NIST SRE 2010 extended core data set and compared against state-of-the-art systems: Joint Factor Analysis (JFA), Probabilistic Linear Discriminant Analysis (PLDA), and Cosine Distance Scoring (CDS) classifiers. Improvements are shown. %B Twelfth Annual Conference of the International Speech Communication Association %8 2011/// %G eng %0 Conference Paper %B Proceedings of the 2011 international conference on Management of data %D 2011 %T Learning statistical models from relational data %A Getoor, Lise %A Mihalkova,Lilyana %K machine learning %K probabilistic graphical models %K statistical relational learning %X Statistical Relational Learning (SRL) is a subarea of machine learning which combines elements from statistical and probabilistic modeling with languages which support structured data representations. In this survey, we will: 1) provide an introduction to SRL, 2) describe some of the distinguishing characteristics of SRL systems, including relational feature construction and collective classification, 3) describe three SRL systems in detail, 4) discuss applications of SRL techniques to important data management problems such as entity resolution, selectivity estimation, and information integration, and 5) discuss connections between SRL methods and existing database research such as probabilistic databases. %B Proceedings of the 2011 international conference on Management of data %S SIGMOD '11 %I ACM %C New York, NY, USA %P 1195 - 1198 %8 2011/// %@ 978-1-4503-0661-4 %G eng %U http://doi.acm.org/10.1145/1989323.1989451 %R 10.1145/1989323.1989451 %0 Journal Article %J Workshop on User Modeling for Web Applications (UMWA-11) %D 2011 %T Learning to predict web collaborations %A Mihalkova,L. %A Moustafa,W. %A Getoor, Lise %X Much of the knowledge available on the web today comes asa result of fruitful collaborations among large groups of peo- ple. One of the most striking examples of successful web col- laboration is the online encyclopedia Wikipedia. The web is used as a collaboration platform by highly specialized blog- ging communities and by the scientific community. An im- portant reason for the richness of content generated through web collaborations is that the participants in such collabo- rations are not constrained by geographic location. Thus, like-minded individuals from across the world can join their efforts. This also means, however, that web collaborators of- ten do not know each other, and, thus, finding collaborators on the web is more difficult than it is with more traditional forms of collaboration that are initiated based on acquain- tance. This difficulty is further exacerbated by the fact that web collaborations tend to be more dynamic as participants join and abandon communities. We consider the task of rec- ommending project-specific potential collaborators to web users and propose an approach that is based on statistical relational learning. Our proposed model thus has the ad- vantages that it can include complex features composed of multiple properties and relationships of the entities, it can handle the high levels of noise and uncertainty inherent in user actions, and it allows for joint decision-making, which leads to more accurate predictions. To ensure scalability, our model is trained in an online fashion. We demonstrate the effectiveness of our approach on a data set collected from Wikipedia. %B Workshop on User Modeling for Web Applications (UMWA-11) %8 2011/// %G eng %0 Conference Paper %D 2011 %T The Life Game: Cognitive Strategies for Repeated Stochastic Games %A Cheng,Kan-Leung %A Zuckerman,I. %A Nau, Dana S. %A Golbeck,J. %K adaptive model %K behavioral strategy %K bioevolutionary game theory %K cognitive agent model %K fine-grained opponent model %K game theory %K iteration %K iterative methods %K life game %K prisoner's dilemma %K repeated stochastic games %K social value orientation theory %K stag hunt %K stage game %K Stochastic processes %K trust behavior %X Standard models in bio-evolutionary game theory involve repetitions of a single stage game (e.g., the Prisoner's Dilemma or the Stag Hunt); but it is clear that repeatedly playing the same stage game is not an accurate model of most individuals' lives. Rather, individuals' interactions with others correspond to many different kinds of stage games. In this work, we concentrate on discovering behavioral strategies that are successful for the life game, in which the stage game is chosen stochastically at each iteration. We present a cognitive agent model based on Social Value Orientation (SVO) theory. We provide extensive evaluations of our model's performance, both against standard agents from the game theory literature and against a large set of life-game agents written by students in two different countries. Our empirical results suggest that for life-game strategies to be successful in environments with such agents, it is important (i) to be unforgiving with respect to trust behavior and (ii) to use adaptive, fine-grained opponent models of the other agents. %P 95 - 102 %8 2011/10// %G eng %R 10.1109/PASSAT/SocialCom.2011.62 %0 Conference Paper %B Proceedings of the 2011 annual conference on Human factors in computing systems %D 2011 %T LifeFlow: visualizing an overview of event sequences %A Wongsuphasawat,Krist %A Guerra Gómez,John Alexis %A Plaisant, Catherine %A Wang,Taowei David %A Taieb-Maimon,Meirav %A Shneiderman, Ben %K Information Visualization %K overview visualization %K temporal categorical data %K timestamped event sequences %X Event sequence analysis is an important task in many domains: medical researchers may study the patterns of transfers within the hospital for quality control; transportation experts may study accident response logs to identify best practices. In many cases they deal with thousands of records. While previous research has focused on searching and browsing, overview tasks are often overlooked. We introduce a novel interactive visual overview of event sequences called \emph{LifeFlow}. LifeFlow is scalable, can summarize all possible sequences, and represents the temporal spacing of the events within sequences. Two case studies with healthcare and transportation domain experts are presented to illustrate the usefulness of LifeFlow. A user study with ten participants confirmed that after 15 minutes of training novice users were able to rapidly answer questions about the prevalence and temporal characteristics of sequences, find anomalies, and gain significant insight from the data. %B Proceedings of the 2011 annual conference on Human factors in computing systems %S CHI '11 %I ACM %C New York, NY, USA %P 1747 - 1756 %8 2011/// %@ 978-1-4503-0228-9 %G eng %U http://doi.acm.org/10.1145/1978942.1979196 %R 10.1145/1978942.1979196 %0 Conference Paper %B Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems %D 2011 %T LifeFlow: visualizing an overview of event sequences (video preview) %A Wongsuphasawat,Krist %A Guerra Gómez,John Alexis %A Plaisant, Catherine %A Wang,Taowei %A Taieb-Maimon,Meirav %A Shneiderman, Ben %K emergency room %K healthcare %K Information Visualization %K overview visualization %K temporal categorical data %K timestamped event sequences %X Event sequence analysis is an important task in many domains: medical researchers may study the patterns of transfers within the hospital for quality control; transportation experts may study accident response logs to identify best practices. In many cases they deal with thousands of records. While previous research has focused on searching and browsing, overview tasks are often overlooked. We introduce a novel interactive visual overview of event sequences called LifeFlow. LifeFlow is scalable, can summarize all possible sequences, and represents the temporal spacing of the events within sequences. In this video, we show an example of patient transfer data and briefly demonstrate how to analyze them with LifeFlow. Please see [11] or visit http:www.cs.umd.eduhcillifeflow for more detail. %B Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems %S CHI EA '11 %I ACM %C New York, NY, USA %P 507 - 510 %8 2011/// %@ 978-1-4503-0268-5 %G eng %U http://doi.acm.org/10.1145/1979742.1979557 %R 10.1145/1979742.1979557 %0 Conference Paper %B Proceedings of the 16th ACM SIGPLAN international conference on Functional programming %D 2011 %T Lightweight monadic programming in ML %A Swamy,Nikhil %A Guts,Nataliya %A Leijen,Daan %A Hicks, Michael W. %K coercion %K coherence %K monad %K rewriting %K type %X Many useful programming constructions can be expressed as monads. Examples include probabilistic modeling, functional reactive programming, parsing, and information flow tracking, not to mention effectful functionality like state and I/O. In this paper, we present a type-based rewriting algorithm to make programming with arbitrary monads as easy as using ML's built-in support for state and I/O. Developers write programs using monadic values of type m τ as if they were of type τ, and our algorithm inserts the necessary binds, units, and monad-to-monad morphisms so that the program type checks. Our algorithm, based on Jones' qualified types, produces principal types. But principal types are sometimes problematic: the program's semantics could depend on the choice of instantiation when more than one instantiation is valid. In such situations we are able to simplify the types to remove any ambiguity but without adversely affecting typability; thus we can accept strictly more programs. Moreover, we have proved that this simplification is efficient (linear in the number of constraints) and coherent: while our algorithm induces a particular rewriting, all related rewritings will have the same semantics. We have implemented our approach for a core functional language and applied it successfully to simple examples from the domains listed above, which are used as illustrations throughout the paper. %B Proceedings of the 16th ACM SIGPLAN international conference on Functional programming %S ICFP '11 %I ACM %C New York, NY, USA %P 15 - 27 %8 2011/// %@ 978-1-4503-0865-6 %G eng %U http://doi.acm.org/10.1145/2034773.2034778 %R 10.1145/2034773.2034778 %0 Journal Article %J Theory of Cryptography %D 2011 %T Limits of computational differential privacy in the client/server setting %A Groce,A. %A Katz, Jonathan %A Yerukhimovich,A. %X Differential privacy is a well established definition guaranteeing that queries to a database do not reveal “too much” information about specific individuals who have contributed to the database. The standard definition of differential privacy is information theoretic in nature, but it is natural to consider computational relaxations and to explore what can be achieved with respect to such notions. Mironov et al. (Crypto 2009) and McGregor et al. (FOCS 2010) recently introduced and studied several variants of computational differential privacy, and show that in the two-party setting (where data is split between two parties) these relaxations can offer significant advantages.Left open by prior work was the extent, if any, to which computational differential privacy can help in the usual client/server setting where the entire database resides at the server, and the client poses queries on this data. We show, for queries with output in ℝ n (for constant n) and with respect to a large class of utilities, that any computationally private mechanism can be converted to a statistically private mechanism that is equally efficient and achieves roughly the same utility. %B Theory of Cryptography %P 417 - 431 %8 2011/// %G eng %R 10.1007/978-3-642-19571-6_25 %0 Journal Article %J IEEE Automatic Speech Recognition and Understanding Workshop %D 2011 %T Linear versus Mel Frequency Cepstral Coefficients for Speaker Recognition %A Zhou,X. %A Garcia-Romero,D. %A Duraiswami, Ramani %A Espy-Wilson,C. %A Shamma,S. %X Mel-frequency cepstral coefficients (MFCC) havebeen dominantly used in speaker recognition as well as in speech recognition. However, based on theories in speech production, some speaker characteristics associated with the structure of the vocal tract, particularly the vocal tract length, are reflected more in the high frequency range of speech. This insight suggests that a linear scale in frequency may provide some advantages in speaker recognition over the mel scale. Based on two state-of-the- art speaker recognition back-end systems (one Joint Factor Analysis system and one Probabilistic Linear Discriminant Analysis system), this study compares the performances between MFCC and LFCC (Linear frequency cepstral coefficients) in the NIST SRE (Speaker Recognition Evaluation) 2010 extended-core task. Our results in SRE10 show that, while they are complementary to each other, LFCC consistently outperforms MFCC, mainly due to its better performance in the female trials. This can be explained by the relatively shorter vocal tract in females and the resulting higher formant frequencies in speech. LFCC benefits more in female speech by better capturing the spectral characteristics in the high frequency region. In addition, our results show some advantage of LFCC over MFCC in reverberant speech. LFCC is as robust as MFCC in the babble noise, but not in the white noise. It is concluded that LFCC should be more widely used, at least for the female trials, by the mainstream of the speaker recognition community. %B IEEE Automatic Speech Recognition and Understanding Workshop %8 2011/// %G eng %0 Conference Paper %B FIRE %D 2011 %T Maryland at FIRE 2011: Retrieval of OCRed Bengali %A Garain,Utpal %A David Doermann %A Oard,Douglas D. %X In this year's Forum for Information Retrieval Evaluation (FIRE), the University of Maryland participated in the Retrieval of Indic Script OCRed Text (RISOT) task to experiment with the retrieval of Bengali script OCR’d documents. The experiments focused on evaluating a retrieval strategy motivated by recent work on Cross-Language Information Retrieval (CLIR), but which makes use of OCR error modeling rather than parallel text alignment. The approach obtains a probability distribution over substitutions for the actual query terms that possibly correspond to terms in the document representation. The results reported indicate that this is a promising way of using OCR error modeling to improve CLIR. %B FIRE %8 2011/// %G eng %0 Conference Paper %B Proceedings of the fourth ACM international conference on Web search and data mining %D 2011 %T Materializing multi-relational databases from the web using taxonomic queries %A Michelson,Matthew %A Macskassy,Sofus A. %A Minton,Steven N. %A Getoor, Lise %K discovering multi-relational data %K multirelational data %X Recently, much attention has been given to extracting tables from Web data. In this problem, the column definitions and tuples (such as what "company" is headquartered in what "city,") are extracted from Web text, structured Web data such as lists, or results of querying the deep Web, creating the table of interest. In this paper, we examine the problem of extracting and discovering multiple tables in a given domain, generating a truly multi-relational database as output. Beyond discovering the relations that define single tables, our approach discovers and leverages "within column" set membership relations, and discovers relations across the extracted tables (e.g., joins). By leveraging within-column relations our method can extract table instances that are ambiguous or rare, and by discovering joins, our method generates truly multi-relational output. Further, our approach uses taxonomic queries to bootstrap the extraction, rather than the more traditional "seed instances." Creating seeds often requires more domain knowledge than taxonomic queries, and previous work has shown that extraction methods may be sensitive to which input seeds they are given. We test our approach on two real world domains: NBA basketball and cancer information. Our results demonstrate that our approach generates databases of relevant tables from disparate Web information, and discovers the relations between them. Further, we show that by leveraging the "within column" relation our approach can identify a significant number of relevant tuples that would be difficult to do so otherwise. %B Proceedings of the fourth ACM international conference on Web search and data mining %S WSDM '11 %I ACM %C New York, NY, USA %P 355 - 364 %8 2011/// %@ 978-1-4503-0493-1 %G eng %U http://doi.acm.org/10.1145/1935826.1935885 %R 10.1145/1935826.1935885 %0 Journal Article %J Journal of Bioinformatics and Computational Biology %D 2011 %T A method for the detection of meaningful and reproducible group signatures from gene expression profiles %A Licamele,L. %A Getoor, Lise %X Gene expression microarrays are commonly used to detect the biological signature of a disease or to gain a better understanding of the underlying mechanism of how a group of drugs treat a specific disease. The outcome of such experiments, e.g. the signature, is a list of differentially expressed genes. Reproducibility across independent experiments remains a challenge. We are interested in creating a method that can detect the shared signature of a group of expression profiles, e.g. a group of samples from individuals with the same disease or a group of drugs that treat the same therapeutic indication. We have developed a novel Weighted Influence — Rank of Ranks (WIMRR) method, and we demonstrate its ability to produce both meaningful and reproducible group signatures. %B Journal of Bioinformatics and Computational Biology %V 9 %P 431 - 451 %8 2011/// %G eng %N 3 %0 Conference Paper %D 2011 %T Multi-material compliant mechanisms for mobile millirobots %A Vogtmann,Dana E. %A Gupta, Satyandra K. %A Bergbreiter,Sarah %X This paper describes a new process for fabricating planar, multi-material, compliant mechanisms, intended for use in small scale robotics. The process involves laser cutting the mechanism geometry from a rigid material, and refilling the joint areas with a second, elastomeric material. This method allows for a large set of potential materials, with a wide range of material properties, to be used in combination to create mechanisms with highly tailored mechanical properties. These multi-material compliant mechanisms have minimum feature sizes of approximately 100 #x00B5;m and have demonstrated long lifetimes, easily surviving 100,000 bending cycles. We also present the first use of these compliant mechanisms in a 2.5cm #x00D7; 2.5cm #x00D7; 7.5cm, 6g hexapod. This hexapod has been demonstrated moving at speeds up to 6 cm/s, with a predicted maximum speed of up to 17 cm/s. %P 3169 - 3174 %8 2011/05// %G eng %R 10.1109/ICRA.2011.5980543 %0 Conference Paper %B Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom) %D 2011 %T NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & Content %A Gove,R. %A Gramsky,N. %A Kirby,R. %A Sefer,E. %A Sopan,A. %A Dunne,C. %A Shneiderman, Ben %A Taieb-Maimon,M. %K business intelligence concept %K business intelligence entity %K competitive intelligence %K data visualisation %K dynamic networks %K dynamic social network %K heat map %K Heating %K Image color analysis %K Information Visualization %K Layout %K matrix visualization %K measurement %K NetVisia system %K network evolution %K network visualization %K node-link diagrams %K outlier node %K social network content %K Social network services %K social network statistics %K social networking (online) %K social networks %K static network visualization %K time period %K topological similarity %K Training %K usability %K user evaluation %K User interfaces %X Visualizations of static networks in the form of node-link diagrams have evolved rapidly, though researchers are still grappling with how best to show evolution of nodes over time in these diagrams. This paper introduces NetVisia, a social network visualization system designed to support users in exploring temporal evolution in networks by using heat maps to display node attribute changes over time. NetVisia's novel contributions to network visualizations are to (1) cluster nodes in the heat map by similar metric values instead of by topological similarity, and (2) align nodes in the heat map by events. We compare NetVisia to existing systems and describe a formative user evaluation of a NetVisia prototype with four participants that emphasized the need for tool tips and coordinated views. Despite the presence of some usability issues, in 30-40 minutes the user evaluation participants discovered new insights about the data set which had not been discovered using other systems. We discuss implemented improvements to NetVisia, and analyze a co-occurrence network of 228 business intelligence concepts and entities. This analysis confirms the utility of a clustered heat map to discover outlier nodes and time periods. %B Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom) %I IEEE %P 19 - 26 %8 2011/10/09/11 %@ 978-1-4577-1931-8 %G eng %R 10.1109/PASSAT/SocialCom.2011.216 %0 Journal Article %J arXiv:1110.3563 %D 2011 %T Network Clustering Approximation Algorithm Using One Pass Black Box Sampling %A DuBois,Thomas %A Golbeck,Jennifer %A Srinivasan, Aravind %K Computer Science - Social and Information Networks %K Physics - Physics and Society %X Finding a good clustering of vertices in a network, where vertices in the same cluster are more tightly connected than those in different clusters, is a useful, important, and well-studied task. Many clustering algorithms scale well, however they are not designed to operate upon internet-scale networks with billions of nodes or more. We study one of the fastest and most memory efficient algorithms possible - clustering based on the connected components in a random edge-induced subgraph. When defining the cost of a clustering to be its distance from such a random clustering, we show that this surprisingly simple algorithm gives a solution that is within an expected factor of two or three of optimal with either of two natural distance functions. In fact, this approximation guarantee works for any problem where there is a probability distribution on clusterings. We then examine the behavior of this algorithm in the context of social network trust inference. %B arXiv:1110.3563 %8 2011/10/16/ %G eng %U http://arxiv.org/abs/1110.3563 %0 Journal Article %J Approximation and Online Algorithms %D 2011 %T New models and algorithms for throughput maximization in broadcast scheduling %A Chekuri,C. %A Gal,A. %A Im,S. %A Khuller, Samir %A Li,J. %A McCutchen,R. %A Moseley,B. %A Raschid, Louiqa %B Approximation and Online Algorithms %P 71 - 82 %8 2011/// %G eng %0 Conference Paper %B Proceedings of the 42nd ACM technical symposium on Computer science education %D 2011 %T NSF/IEEE-TCPP curriculum initiative on parallel and distributed computing: core topics for undergraduates %A Prasad,S. K. %A Chtchelkanova,A. %A Das,S. %A Dehne,F. %A Gouda,M. %A Gupta,A. %A JaJa, Joseph F. %A Kant,K. %A La Salle,A. %A LeBlanc,R. %A others %B Proceedings of the 42nd ACM technical symposium on Computer science education %P 617 - 618 %8 2011/// %G eng %0 Journal Article %J EcoHealth %D 2011 %T Occurrence of Vibrio cholerae in Municipal and Natural Waters and Incidence of Cholera in Azerbaijan %A Gurbanov, Shair %A Akhmadov, Rashid %A Shamkhalova, Gulnara %A Akhmadova, Sevinj %A Haley, Bradd J. %A Rita R Colwell %A Huq, Anwar %X Cholera, a waterborne disease caused by Vibrio cholerae, is an autochthonous member of the aquatic environment and predominantly reported from developing countries. Technical reports and proceedings were reviewed to determine the relationship between occurrence of V. cholerae in natural waters, including sources of municipal water, and cases of cholera in Azerbaijan. Water samples collected from different environmental sources from 1970 to 1998 were tested for V. cholerae and 0.73% (864/117,893) were positive. The results showed that in April of each year, when the air temperature rose by approximately 5°C, V. cholerae could be isolated. With each increase in air temperature, 6–8 weeks after, impact on cases of cholera was recorded. The incidence of cholera peaked when the air temperature reached >25°C during the month of September. It is concluded that a distinct seasonality in cholera incidence exists in Azerbaijan, with increased occurrence during warmer months. %B EcoHealth %P 468 - 477 %8 Jan-12-2011 %G eng %U http://link.springer.com/10.1007/s10393-012-0756-8 %N 4 %! EcoHealth %R 10.1007/s10393-012-0756-8 %0 Conference Paper %B FIRE %D 2011 %T Overview of the FIRE 2011 RISOTTask %A Garain,Utpal %A Paik,Jiaul %A Pal,Tamaltaru %A Majumder,Prasenjit %A David Doermann %A Oard, Douglas %X RISOT was a pilot task in FIRE 2011 which focused on the retrieval of automatically recognized text from machine printed sources. The collection used for search was a subset of the FIRE 2008 and 2010 Bengali test collections that contained 92 topics and 62,825 documents. Two teams participated, submitting a total of 11 monolingual runs. %B FIRE %8 2011/// %G eng %0 Conference Paper %B Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on %D 2011 %T Piecing together the segmentation jigsaw using context %A Chen,Xi %A Jain, A. %A Gupta,A. %A Davis, Larry S. %K algorithms;image %K approximation %K formulation;greedy %K function %K information;cost %K manner;image %K programming;approximation %K recognition;image %K segmentation; %K segmentation;jigsaw %K segmentation;quadratic %K solution;contextual %K theory;greedy %X We present an approach to jointly solve the segmentation and recognition problem using a multiple segmentation framework. We formulate the problem as segment selection from a pool of segments, assigning each selected segment a class label. Previous multiple segmentation approaches used local appearance matching to select segments in a greedy manner. In contrast, our approach formulates a cost function based on contextual information in conjunction with appearance matching. This relaxed cost function formulation is minimized using an efficient quadratic programming solver and an approximate solution is obtained by discretizing the relaxed solution. Our approach improves labeling performance compared to other segmentation based recognition approaches. %B Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on %P 2001 - 2008 %8 2011/06// %G eng %R 10.1109/CVPR.2011.5995367 %0 Conference Paper %B Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom) %D 2011 %T Predicting Trust and Distrust in Social Networks %A DuBois,T. %A Golbeck,J. %A Srinivasan, Aravind %K distrust prediction %K Electronic publishing %K Encyclopedias %K graph theory %K inference algorithm %K Inference algorithms %K inference mechanisms %K Internet %K negative trust %K online social networks %K positive trust %K Prediction algorithms %K probability %K random graphs %K security of data %K social media %K social networking (online) %K spring-embedding algorithm %K Training %K trust inference %K trust probabilistic interpretation %K user behavior %K user satisfaction %K user-generated content %K user-generated interactions %X As user-generated content and interactions have overtaken the web as the default mode of use, questions of whom and what to trust have become increasingly important. Fortunately, online social networks and social media have made it easy for users to indicate whom they trust and whom they do not. However, this does not solve the problem since each user is only likely to know a tiny fraction of other users, we must have methods for inferring trust - and distrust - between users who do not know one another. In this paper, we present a new method for computing both trust and distrust (i.e., positive and negative trust). We do this by combining an inference algorithm that relies on a probabilistic interpretation of trust based on random graphs with a modified spring-embedding algorithm. Our algorithm correctly classifies hidden trust edges as positive or negative with high accuracy. These results are useful in a wide range of social web applications where trust is important to user behavior and satisfaction. %B Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom) %I IEEE %P 418 - 424 %8 2011/10/09/11 %@ 978-1-4577-1931-8 %G eng %R 10.1109/PASSAT/SocialCom.2011.56 %0 Journal Article %J Social Network Data Analytics %D 2011 %T Privacy in social networks: A survey %A Zheleva,E. %A Getoor, Lise %X In this chapter, we survey the literature on privacy in social networks. We focus both on online social networks and online affiliation networks. We formally define the possible privacy breaches and describe the privacy attacks that have been studied. We present definitions of privacy in the context of anonymization together with existing anonymization techniques. %B Social Network Data Analytics %P 277 - 306 %8 2011/// %G eng %R 10.1007/978-1-4419-8462-3_10 %0 Conference Paper %B Proceedings of the fourth ACM international conference on Web search and data mining %D 2011 %T A probabilistic approach for learning folksonomies from structured data %A Plangprasopchok,Anon %A Lerman,Kristina %A Getoor, Lise %K collective knowledge %K data mining %K folksonomies %K social information processing %K social metadata %K taxonomies %X Learning structured representations has emerged as an important problem in many domains, including document and Web data mining, bioinformatics, and image analysis. One approach to learning complex structures is to integrate many smaller, incomplete and noisy structure fragments. In this work, we present an unsupervised probabilistic approach that extends affinity propagation [7] to combine the small ontological fragments into a collection of integrated, consistent, and larger folksonomies. This is a challenging task because the method must aggregate similar structures while avoiding structural inconsistencies and handling noise. We validate the approach on a real-world social media dataset, comprised of shallow personal hierarchies specified by many individual users, collected from the photosharing website Flickr. Our empirical results show that our proposed approach is able to construct deeper and denser structures, compared to an approach using only the standard affinity propagation algorithm. Additionally, the approach yields better overall integration quality than a state-of-the-art approach based on incremental relational clustering. %B Proceedings of the fourth ACM international conference on Web search and data mining %S WSDM '11 %I ACM %C New York, NY, USA %P 555 - 564 %8 2011/// %@ 978-1-4503-0493-1 %G eng %U http://doi.acm.org/10.1145/1935826.1935905 %R 10.1145/1935826.1935905 %0 Journal Article %J University of Maryland, Human-Computer Interaction Lab Tech Report HCIL-2011 %D 2011 %T Rapid understanding of scientific paper collections: integrating statistics, text analysis, and visualization %A Dunne,C. %A Shneiderman, Ben %A Gove,R. %A Klavans,J. %A Dorr, Bonnie J %X Keeping up with rapidly growing research fields, especially when there aremultiple interdisciplinary sources, requires substantial effort for researchers, program managers, or venture capital investors. Current theories and tools are directed at finding a paper or website, not gaining an understanding of the key papers, authors, controversies, and hypotheses. This report presents an effort to integrate statistics, text analytics, and visualization in a multiple coordinated window environment that supports exploration. Our prototype system, Action Science Explorer (ASE), provides an environment for demon- strating principles of coordination and conducting iterative usability tests of them with interested and knowledgeable users. We developed an under- standing of the value of reference management, statistics, citation context extraction, natural language summarization for single and multiple docu- ments, filters to interactively select key papers, and network visualization to see citation patterns and identify clusters. The three-phase usability study guided our revisions to ASE and led us to improve the testing methods. %B University of Maryland, Human-Computer Interaction Lab Tech Report HCIL-2011 %8 2011/// %G eng %0 Journal Article %J Journal of Computing and Information Science in Engineering %D 2011 %T Real-time dynamics simulation of unmanned sea surface vehicle for virtual environments %A Thakur,A. %A Gupta,S.K. %B Journal of Computing and Information Science in Engineering %V 11 %P 031005 - 031005 %8 2011/// %G eng %0 Journal Article %J Journal of Computing and Information Science in Engineering %D 2011 %T Recent advances and future challenges in automated manufacturing planning %A Bourne,D. %A Corney,J. %A Gupta,S.K. %B Journal of Computing and Information Science in Engineering %V 11 %P 021006 - 021006 %8 2011/// %G eng %0 Journal Article %J Applied and Environmental Microbiology %D 2011 %T Role of Zooplankton Diversity in Vibrio Cholerae Population Dynamics and in the Incidence of Cholera in the Bangladesh Sundarbans %A De Magny,Guillaume Constantin %A Mozumder,Pronob K. %A Grim,Christopher J. %A Hasan,Nur A. %A Naser,M. Niamul %A Alam,Munirul %A Sack,R. Bradley %A Huq,Anwar %A Rita R Colwell %X Vibrio cholerae, a bacterium autochthonous to the aquatic environment, is the causative agent of cholera, a severe watery, life-threatening diarrheal disease occurring predominantly in developing countries. V. cholerae, including both serogroups O1 and O139, is found in association with crustacean zooplankton, mainly copepods, and notably in ponds, rivers, and estuarine systems globally. The incidence of cholera and occurrence of pathogenic V. cholerae strains with zooplankton were studied in two areas of Bangladesh: Bakerganj and Mathbaria. Chitinous zooplankton communities of several bodies of water were analyzed in order to understand the interaction of the zooplankton population composition with the population dynamics of pathogenic V. cholerae and incidence of cholera. Two dominant zooplankton groups were found to be consistently associated with detection of V. cholerae and/or occurrence of cholera cases, namely, rotifers and cladocerans, in addition to copepods. Local differences indicate there are subtle ecological factors that can influence interactions between V. cholerae, its plankton hosts, and the incidence of cholera. %B Applied and Environmental Microbiology %V 77 %P 6125 - 6132 %8 09/2011 %@ 0099-2240, 1098-5336 %G eng %U http://aem.asm.org/content/77/17/6125 %N 17 %R 10.1128/AEM.01472-10 %0 Conference Paper %B High Performance Computing, Networking, Storage and Analysis (SC), 2011 International Conference for %D 2011 %T Scalable fast multipole methods on distributed heterogeneous architectures %A Hu,Qi %A Gumerov, Nail A. %A Duraiswami, Ramani %K accelerators;OpenMP;analysis %K algorithm;iterative %K and %K architecture;CUDA;FMM %K architectures; %K architectures;divide-and-conquer %K based %K conquer %K CPU-GPU %K CPU;scalable %K data %K fast %K heterogeneous %K loop;data %K loop;multicore %K methods;graphics %K methods;multiprocessing %K methods;time %K multipole %K parts;distributed %K PROCESSING %K stepping %K structures;divide %K structures;GPU %K systems;parallel %K translation %K units;iterative %X We fundamentally reconsider implementation of the Fast Multipole Method (FMM) on a computing node with a heterogeneous CPU-GPU architecture with multicore CPU(s) and one or more GPU accelerators, as well as on an interconnected cluster of such nodes. The FMM is a divide- and-conquer algorithm that performs a fast N-body sum using a spatial decomposition and is often used in a time- stepping or iterative loop. Using the observation that the local summation and the analysis-based translation parts of the FMM are independent, we map these respectively to the GPUs and CPUs. Careful analysis of the FMM is performed to distribute work optimally between the multicore CPUs and the GPU accelerators. We first develop a single node version where the CPU part is parallelized using OpenMP and the GPU version via CUDA. New parallel algorithms for creating FMM data structures are presented together with load balancing strategies for the single node and distributed multiple-node versions. Our implementation can perform the N-body sum for 128M particles on 16 nodes in 4.23 seconds, a performance not achieved by others in the literature on such clusters. %B High Performance Computing, Networking, Storage and Analysis (SC), 2011 International Conference for %P 1 - 12 %8 2011/11// %G eng %0 Report %D 2011 %T Secure computation with sublinear amortized work %A Gordon,D. %A Katz, Jonathan %A Kolesnikov,V. %A Malkin,T. %A Raykova,M. %A Vahlis,Y. %X Traditional approaches to secure computation begin by representing the function f beingcomputed as a circuit. For any function f that depends on each of its inputs, this implies a protocol with complexity at least linear in the input size. In fact, linear running time is inherent for secure computation of non-trivial functions, since each party must “touch” every bit of their input lest information about other party’s input be leaked. This seems to rule out many interesting applications of secure computation in scenarios where at least one of the inputs is huge and sublinear-time algorithms can be utilized in the insecure setting; private database search is a prime example. We present an approach to secure two-party computation that yields sublinear-time proto- cols, in an amortized sense, for functions that can be computed in sublinear time on a random access machine (RAM). Furthermore, a party whose input is “small” is required to maintain only small state. We provide a generic protocol that achieves the claimed complexity, based on any oblivious RAM and any protocol for secure two-party computation. We then present an optimized version of this protocol, where generic secure two-party computation is used only for evaluating a small number of simple operations. %I Cryptology ePrint Archive, Report 2011/482 %8 2011/// %G eng %0 Conference Paper %B Proceedings of the 19th ACM international conference on Multimedia %D 2011 %T "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing %A Garg,Ravi %A Varna,Avinash L. %A M. Wu %K electric network frequency %K information forensics %K timestamp %K video authentication %X Electric Network Frequency (ENF) fluctuates slightly over time from its nominal value of 50 Hz/60 Hz. The fluctuations in the ENF remain consistent across the entire power grid even when measured at physically distant locations. The near-invisible flickering of fluorescent lights connected to the power mains reflect these fluctuations present in the ENF. In this paper, mechanisms using optical sensors and video cameras to record and validate the presence of the ENF fluctuations in fluorescent lighting are presented. Signal processing techniques are applied to demonstrate a high correlation between the fluctuations in the ENF signal captured from fluorescent lighting and the ENF signal captured directly from power mains supply. The proposed technique is then used to demonstrate the presence of the ENF signal in video recordings taken in various geographical areas. Experimental results show that the ENF signal can be used as a natural timestamp for optical sensor recordings and video surveillance recordings from indoor environments under fluorescent lighting. Application of the ENF signal analysis to tampering detection of surveillance video recordings is also demonstrated. %B Proceedings of the 19th ACM international conference on Multimedia %S MM '11 %I ACM %C New York, NY, USA %P 23 - 32 %8 2011/// %@ 978-1-4503-0616-4 %G eng %U http://doi.acm.org/10.1145/2072298.2072303 %R 10.1145/2072298.2072303 %0 Conference Paper %D 2011 %T Teaching cross-platform design and testing methods for embedded systems using DICE %A Bhattacharyya, Shuvra S. %A Plishker,William %A Gupta, Ayush %A Chung-Ching Shen %X DICE (the DSPCAD Integrative Command Line Environment) is a package of utilities that facilitates efficient management of software projects. Key areas of emphasis in DICE are cross-platform operation, support for projects that integrate heterogeneous programming languages, and support for applying and integrating different kinds of design and testing methodologies. The package is being developed at the University of Maryland to facilitate the research and teaching of methods for implementation, testing, evolution, and revision of engineering software. The platform- and language-independent focus of DICE makes it an effective vehicle for teaching high-productivity, high-reliability methods for design and implementation of embedded systems for a variety of courses. In this paper, we provide an overview of features of DICE --- particularly as they relate to testing driven design practices --- that are useful in embedded systems education, and discuss examples and experiences of applying the tool in courses at the University of Maryland aimed at diverse groups of students --- undergraduate programming concepts for engineers, graduate VLSI architectures (aimed at research-oriented students), and graduate FPGA system design (aimed at professional Master's students). %S WESE '11 %I ACM %P 38 - 45 %8 2011 %@ 978-1-4503-1046-8 %G eng %U http://doi.acm.org/10.1145/2077370.2077376 %0 Journal Article %J The ISME Journal %D 2011 %T Temperature regulation of virulence factors in the pathogen Vibrio coralliilyticus %A Kimes,Nikole E. %A Grim,Christopher J. %A Johnson,Wesley R. %A Hasan,Nur A. %A Tall,Ben D. %A Kothary,Mahendra H. %A Kiss,Hajnalka %A Munk,A. Christine %A Tapia,Roxanne %A Green,Lance %A Detter,Chris %A Bruce,David C. %A Brettin,Thomas S. %A Rita R Colwell %A Morris,Pamela J. %K ecophysiology %K ecosystems %K environmental biotechnology %K geomicrobiology %K ISME J %K microbe interactions %K microbial communities %K microbial ecology %K microbial engineering %K microbial epidemiology %K microbial genomics %K microorganisms %X Sea surface temperatures (SST) are rising because of global climate change. As a result, pathogenic Vibrio species that infect humans and marine organisms during warmer summer months are of growing concern. Coral reefs, in particular, are already experiencing unprecedented degradation worldwide due in part to infectious disease outbreaks and bleaching episodes that are exacerbated by increasing SST. For example, Vibrio coralliilyticus, a globally distributed bacterium associated with multiple coral diseases, infects corals at temperatures above 27 °C. The mechanisms underlying this temperature-dependent pathogenicity, however, are unknown. In this study, we identify potential virulence mechanisms using whole genome sequencing of V. coralliilyticus ATCC (American Type Culture Collection) BAA-450. Furthermore, we demonstrate direct temperature regulation of numerous virulence factors using proteomic analysis and bioassays. Virulence factors involved in motility, host degradation, secretion, antimicrobial resistance and transcriptional regulation are upregulated at the higher virulent temperature of 27 °C, concurrent with phenotypic changes in motility, antibiotic resistance, hemolysis, cytotoxicity and bioluminescence. These results provide evidence that temperature regulates multiple virulence mechanisms in V. coralliilyticus, independent of abundance. The ecological and biological significance of this temperature-dependent virulence response is reinforced by climate change models that predict tropical SST to consistently exceed 27 °C during the spring, summer and fall seasons. We propose V. coralliilyticus as a model Gram-negative bacterium to study temperature-dependent pathogenicity in Vibrio-related diseases. %B The ISME Journal %V 6 %P 835 - 846 %8 2011/12/08/ %@ 1751-7362 %G eng %U http://www.nature.com/ismej/journal/v6/n4/full/ismej2011154a.html %N 4 %R 10.1038/ismej.2011.154 %0 Journal Article %J Proceedings 67th Annual Forum of the American Helicopter Society %D 2011 %T Toward improved aeromechanics simulations using recent advancements in scientific computing %A Hu,Q. %A Syal,M. %A Gumerov, Nail A. %A Duraiswami, Ramani %A Leishman,J.G. %B Proceedings 67th Annual Forum of the American Helicopter Society %P 3 - 5 %8 2011/// %G eng %0 Conference Paper %D 2011 %T Trajectory planning with look-ahead for Unmanned Sea Surface Vehicles to handle environmental disturbances %A Svec,P. %A Schwartz,M. %A Thakur,A. %A Gupta,S.K. %P 1154 - 1159 %8 2011/// %G eng %U http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6048670 %0 Conference Paper %B 2011 IEEE Conference on Visual Analytics Science and Technology (VAST) %D 2011 %T TreeVersity: Comparing tree structures by topology and node's attributes differences %A Gomez,J.A.G. %A Buck-Coleman,A. %A Plaisant, Catherine %A Shneiderman, Ben %K Computer science %K data classification %K Data visualization %K Educational institutions %K hierarchy %K Image color analysis %K LifeFlow %K node attributes differences %K Pattern classification %K structural changes %K Topology %K topology attributes differences %K traffic agencies %K tree structures comparison %K trees (mathematics) %K TreeVersity %K Vegetation %K Visualization %X It is common to classify data in hierarchies, they provide a comprehensible way of understanding big amounts of data. From budgets to organizational charts or even the stock market, trees are everywhere and people find them easy to use. However when analysts need to compare two versions of the same tree structure, or two related taxonomies, the task is not so easy. Much work has been done on this topic, but almost all of it has been restricted to either compare the trees by topology, or by the node attribute values. With this project we are proposing TreeVersity, a framework for comparing tree structures, both by structural changes and by differences in the node attributes. This paper is based on our previous work on comparing traffic agencies using LifeFlow [1, 2] and on a first prototype of TreeVersity. %B 2011 IEEE Conference on Visual Analytics Science and Technology (VAST) %I IEEE %P 275 - 276 %8 2011/10/23/28 %@ 978-1-4673-0015-5 %G eng %R 10.1109/VAST.2011.6102471 %0 Conference Paper %B Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on %D 2011 %T TreeVersity: Comparing tree structures by topology and node's attributes differences %A Gomez,J.A.G. %A Buck-Coleman,A. %A Plaisant, Catherine %A Shneiderman, Ben %K (mathematics); %K agencies;tree %K attributes %K changes;topology %K classification;hierarchy;node %K classification;trees %K comparison;pattern %K differences;structural %K differences;traffic %K LifeFlow;TreeVersity;data %K STRUCTURES %X It is common to classify data in hierarchies, they provide a comprehensible way of understanding big amounts of data. From budgets to organizational charts or even the stock market, trees are everywhere and people find them easy to use. However when analysts need to compare two versions of the same tree structure, or two related taxonomies, the task is not so easy. Much work has been done on this topic, but almost all of it has been restricted to either compare the trees by topology, or by the node attribute values. With this project we are proposing TreeVersity, a framework for comparing tree structures, both by structural changes and by differences in the node attributes. This paper is based on our previous work on comparing traffic agencies using LifeFlow [1, 2] and on a first prototype of TreeVersity. %B Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on %P 275 - 276 %8 2011/10// %G eng %R 10.1109/VAST.2011.6102471 %0 Journal Article %J IEEE Computer Graphics and Applications %D 2011 %T Tutorial-Graph Analytics — Lessons Learned and Challenges Ahead %A Wong,P.C. %A Chen,C. %A Görg,C. %A Shneiderman, Ben %A Stasko,J. %A Thomas,J. %B IEEE Computer Graphics and Applications %V 31 %P 18 - 18 %8 2011/// %G eng %N 5 %0 Conference Paper %D 2011 %T A Two Degree of Freedom Nanopositioner With Electrothermal Actuator for Decoupled Motion %A Kim,Yong-Sik %A Dagalakis,Nicholas G. %A Gupta, Satyandra K. %X Building a two degree-of-freedom (2 DOF) MEMS nanopositioner with decoupled X-Y motion has been a challenge in nanopositioner design. In this paper a novel design concept on making the decoupled motion of the MEMS nanopositioner is suggested. The suggested nanopositioner has two electrothermal actuators and employs a fully nested motion platform with suspended anchors. The suggested MEMS nanopositioner is capable of delivering displacement from the electrothermal actuator to the motion platform without coupled motion between the two X-Y axes. The design concept, finite element analysis (FEA) results, fabrication procedures and the performance of the 2 DOF nanopositioner is presented. In order to test the nanopositioner moving platform decoupled motion, one actuator moves the platform by 60 µm, while the other actuator is kept at the same position. The platform position cross talk error was measured to be less than 1 µm standard deviation. %I ASME %P 447 - 457 %8 2011/// %@ 978-0-7918-5484-6 %G eng %U http://link.aip.org/link/ASMECP/v2011/i54846/p447/s1&Agg=doi %R 10.1115/DETC2011-48619 %0 Journal Article %J Social Network Analysis and Mining %D 2011 %T Understanding actor loyalty to event-based groups in affiliation networks %A Sharara,H. %A Singh,L. %A Getoor, Lise %A Mann,J. %X In this paper, we introduce a method for analyzing the temporal dynamics of affiliation networks. We define affiliation groups which describe temporally related subsets of actors and describe an approach for exploring changing memberships in these affiliation groups over time. To model the dynamic behavior in these networks, we consider the concept of loyalty and introduce a measure that captures an actor’s loyalty to an affiliation group as the degree of ‘commitment’ an actor shows to the group over time. We evaluate our measure using three real world affiliation networks: a publication network, a senate bill cosponsorship network, and a dolphin network. The results show the utility of our measure for analyzing the dynamic behavior of actors and quantifying their loyalty to different time-varying affiliation groups. %B Social Network Analysis and Mining %V 1 %P 115 - 126 %8 2011/// %G eng %N 2 %R 10.1007/s13278-010-0005-5 %0 Report %D 2011 %T Understanding Scientific Literature Networks: An Evaluation of Action Science Explorer %A Gove,R. %A Dunne,C. %A Shneiderman, Ben %A Klavans,J. %A Dorr, Bonnie J %X Action Science Explorer (ASE) is a tool designed to supportusers in rapidly generating readily consumable summaries of academic literature. The authors describe ASE and report on how early formative evaluations led to a mature system evaluation, consisting of an in-depth empirical evaluation with 4 domain expert participants. The user study tasks were of two types: predefined tasks to test system perfor- mance in common scenarios, and user-defined tasks to test the system’s usefulness for custom exploration goals. This paper concludes by describing ASE’s attribute ranking ca- pability which is a novel contribution for exploring scientific literature networks. It makes design recommendations to: give the users control over which documents to explore, easy- to-understand metrics for ranking documents, and overviews of the document set in coordinated views along with details- on-demand of specific papers. %I University of Maryland at College Park %8 2011/// %G eng %0 Journal Article %J American Journal of Preventive Medicine %D 2011 %T Usability and Accessibility in Consumer Health Informatics: Current Trends and Future Challenges %A Goldberg,Larry %A Lide,Bettijoyce %A Lowry,Svetlana %A Massett,Holly A. %A O'Connell,Trisha %A Preece,Jennifer %A Quesenbery,Whitney %A Shneiderman, Ben %X It is a truism that, for innovative eHealth systems to have true value and impact, they must first and foremost be usable and accessible by clinicians, consumers, and other stakeholders. In this paper, current trends and future challenges in the usability and accessibility of consumer health informatics will be described. Consumer expectations of their healthcare providers and healthcare records in this new era of consumer-directed care will be explored, and innovative visualizations, assistive technologies, and other ways that healthcare information is currently being provided and/or shared will be described. Challenges for ensuring the usability of current and future systems will also be discussed. An innovative model for conducting systematic, timely, user-centered research on consumer-facing websites at the National Cancer Institute (NCI) and the ongoing efforts at the National Institute of Standards and Technology (NIST) to promote health information technology (HIT) usability standards and evaluation criteria will also be presented. %B American Journal of Preventive Medicine %V 40 %P S187-S197 - S187-S197 %8 2011/05// %@ 0749-3797 %G eng %U http://www.sciencedirect.com/science/article/pii/S0749379711000869 %N 5, Supplement 2 %R 10.1016/j.amepre.2011.01.009 %0 Journal Article %J Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, ACM International Conference Proceedings Series %D 2011 %T Using classifier cascades for scalable e-mail classification %A Pujara,J. %A Daumé, Hal %A Getoor, Lise %X In many real-world scenarios, we must make judgments in the presence of computational constraints. One common computational constraint arises when the features used to make a judgment each have differing acquisition costs, but there is a fixed total budget for a set of judgments. Par- ticularly when there are a large number of classifications that must be made in a real-time, an intelligent strategy for optimizing accuracy versus computational costs is essential. E-mail classification is an area where accurate and timely results require such a trade-off. We identify two scenarios where intelligent feature acquisition can improve classifier performance. In granular classification we seek to clas- sify e-mails with increasingly specific labels structured in a hierarchy, where each level of the hierarchy requires a differ- ent trade-off between cost and accuracy. In load-sensitive classification, we classify a set of instances within an ar- bitrary total budget for acquiring features. Our method, Adaptive Classifier Cascades (ACC), designs a policy to combine a series of base classifiers with increasing compu- tational costs given a desired trade-off between cost and ac- curacy. Using this method, we learn a relationship between feature costs and label hierarchies, for granular classification and cost budgets, for load-sensitive classification. We eval- uate our method on real-world e-mail datasets with realistic estimates of feature acquisition cost, and we demonstrate su- perior results when compared to baseline classifiers that do not have a granular, cost-sensitive feature acquisition policy. %B Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, ACM International Conference Proceedings Series %8 2011/// %G eng %0 Journal Article %J Journal of Artificial Intelligence Research %D 2011 %T Value of information lattice: exploiting probabilistic independence for effective feature subset acquisition %A Bilgic,Mustafa %A Getoor, Lise %X We address the cost-sensitive feature acquisition problem, where misclassifying an instance is costly but the expected misclassification cost can be reduced by acquiring the values of the missing features. Because acquiring the features is costly as well, the objective is to acquire the right set of features so that the sum of the feature acquisition cost and misclassification cost is minimized. We describe the Value of Information Lattice (VOILA), an optimal and eficient feature subset acquisition framework. Unlike the common practice, which is to acquire features greedily, VOILA can reason with subsets of features. VOILA eficiently searches the space of possible feature subsets by discovering and exploiting conditional independence properties between the features and it reuses probabilistic inference computations to further speed up the process. Through empirical evaluation on five medical datasets, we show that the greedy strategy is often reluctant to acquire features, as it cannot forecast the benefit of acquiring multiple features in combination. %B Journal of Artificial Intelligence Research %V 41 %P 69 - 95 %8 2011/05// %@ 1076-9757 %G eng %U http://dl.acm.org/citation.cfm?id=2051237.2051240 %N 2 %0 Conference Paper %B 2011 18th IEEE International Conference on Image Processing (ICIP) %D 2011 %T Variable remapping of images from very different sources %A Wei Zhang %A Yanlin Guo %A Meth, R. %A Sokoloff, H. %A Pope, A. %A Strat, T. %A Chellapa, Rama %K automatic object identification %K Buildings %K CAMERAS %K Conferences %K constrained motion estimation %K coordinates system %K Estimation %K G-RANSAC framework %K image context enlargement %K Image Enhancement %K image registration %K image sequence registration %K Image sequences %K Motion estimation %K Robustness %K temporal integration %K variable image remapping %X We present a system which registers image sequences acquired by very different sources, so that multiple views could be transformed to the same coordinates system. This enables the functionality of automatic object identification and confirmation across views and platforms. The capability of the system comes from three ingredients: 1) image context enlargement through temporal integration; 2) robust motion estimation using the G-RANSAC framework with a relaxed correspondence criteria; 3) constrained motion estimation within the G-RANSAC framework. The proposed system has worked successfully on thousands of frames from multiple collections with significant variations in scale and resolution. %B 2011 18th IEEE International Conference on Image Processing (ICIP) %I IEEE %P 1501 - 1504 %8 2011/09/11/14 %@ 978-1-4577-1304-0 %G eng %R 10.1109/ICIP.2011.6115729 %0 Journal Article %J IEEE/ACM Transactions on Computational Biology and Bioinformatics %D 2011 %T Visual Exploration across Biomedical Databases %A Lieberman,M.D. %A Taheri, S. %A Guo,Huimin %A Mirrashed,F. %A Yahav,I. %A Aris,A. %A Shneiderman, Ben %K Bioinformatics %K Biomedical computing %K biomedical databases %K cross-database exploration %K Data exploration and discovery %K Data visualization %K database management systems %K Databases, Factual %K DNA %K graph theory %K Information Storage and Retrieval %K information visualization. %K Keyword search %K medical computing %K natural language processing %K Proteins %K semantic networks %K semantics %K sequences %K text mining %K User-Computer Interface %K user-defined semantics %K visual databases %X Though biomedical research often draws on knowledge from a wide variety of fields, few visualization methods for biomedical data incorporate meaningful cross-database exploration. A new approach is offered for visualizing and exploring a query-based subset of multiple heterogeneous biomedical databases. Databases are modeled as an entity-relation graph containing nodes (database records) and links (relationships between records). Users specify a keyword search string to retrieve an initial set of nodes, and then explore intra- and interdatabase links. Results are visualized with user-defined semantic substrates to take advantage of the rich set of attributes usually present in biomedical data. Comments from domain experts indicate that this visualization method is potentially advantageous for biomedical knowledge exploration. %B IEEE/ACM Transactions on Computational Biology and Bioinformatics %V 8 %P 536 - 550 %8 2011/04//March %@ 1545-5963 %G eng %N 2 %R 10.1109/TCBB.2010.1 %0 Journal Article %J The American Journal of Tropical Medicine and Hygiene %D 2011 %T Warming Oceans, Phytoplankton, and River Discharge: Implications for Cholera Outbreaks %A Jutla,Antarpreet S. %A Akanda,Ali S. %A Griffiths,Jeffrey K. %A Rita R Colwell %A Islam,Shafiqul %X Phytoplankton abundance is inversely related to sea surface temperature (SST). However, a positive relationship is observed between SST and phytoplankton abundance in coastal waters of Bay of Bengal. This has led to an assertion that in a warming climate, rise in SST may increase phytoplankton blooms and, therefore, cholera outbreaks. Here, we explain why a positive SST-phytoplankton relationship exists in the Bay of Bengal and the implications of such a relationship on cholera dynamics. We found clear evidence of two independent physical drivers for phytoplankton abundance. The first one is the widely accepted phytoplankton blooming produced by the upwelling of cold, nutrient-rich deep ocean waters. The second, which explains the Bay of Bengal findings, is coastal phytoplankton blooming during high river discharges with terrestrial nutrients. Causal mechanisms should be understood when associating SST with phytoplankton and subsequent cholera outbreaks in regions where freshwater discharge are a predominant mechanism for phytoplankton production. %B The American Journal of Tropical Medicine and Hygiene %V 85 %P 303 - 308 %8 08/2011 %@ 0002-9637, %G eng %U http://www.ajtmh.org/content/85/2/303 %N 2 %R 10.4269/ajtmh.2011.11-0181 %0 Conference Paper %B SIGCHI '11 %D 2011 %T Why is My Internet Slow?: Making Network Speeds Visible %A Marshini Chetty %A Haslem, David %A Baird, Andrew %A Ofoha, Ugochi %A Sumner, Bethany %A Grinter, Rebecca %K broadband speed %K broadband tools %K home networks %X With widespread broadband adoption, more households report experiencing sub-optimal speeds. Not only are slow speeds frustrating, they may indicate consumers are not receiving the services they are paying for from their internet service providers. Yet, determining the speed and source of slow-downs is difficult because few tools exist for broadband management. We report on results of a field trial with 10 households using a visual network probe designed to address these problems. We describe the results of the study and provide design implications for future tools. More importantly, we argue that tools like this can educate and empower consumers by making broadband speeds and sources of slow-downs more visible. %B SIGCHI '11 %S CHI '11 %I ACM %P 1889 - 1898 %8 2011/// %@ 978-1-4503-0228-9 %G eng %U http://doi.acm.org/10.1145/1978942.1979217 %0 Journal Article %J AAAI’10 %D 2010 %T Active inference for collective classification %A Bilgic,M. %A Getoor, Lise %X Labeling nodes in a network is an important problem that has seen a growing interest. A number of methods that exploit both local and relational information have been developed for this task. Acquiring the labels for a few nodes at inference time can greatly improve the ac- curacy, however the question of figuring out which node labels to acquire is challenging. Previous approaches have been based on simple structural properties. Here, we present a novel technique, which we refer to as re- flect and correct, that can learn and predict when the un- derlying classification system is likely to make mistakes and it suggests acquisitions to correct those mistakes. %B AAAI’10 %8 2010/// %G eng %0 Journal Article %J ICML’10 %D 2010 %T Active learning for networked data %A Bilgic,M. %A Mihalkova,L. %A Getoor, Lise %X We introduce a novel active learning algo-rithm for classification of network data. In this setting, training instances are connected by a set of links to form a network, the labels of linked nodes are correlated, and the goal is to exploit these dependencies and accu- rately label the nodes. This problem arises in many domains, including social and biologi- cal network analysis and document classifica- tion, and there has been much recent interest in methods that collectively classify the nodes in the network. While in many cases labeled examples are expensive, often network infor- mation is available. We show how an active learning algorithm can take advantage of net- work structure. Our algorithm effectively ex- ploits the links between instances and the in- teraction between the local and collective as- pects of a classifier to improve the accuracy of learning from fewer labeled examples. We ex- periment with two real-world benchmark col- lective classification domains, and show that we are able to achieve extremely accurate re- sults even when only a small fraction of the data is labeled. %B ICML’10 %8 2010/// %G eng %0 Journal Article %J AI Magazine %D 2010 %T AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead %A Horvitz,Eric %A Getoor, Lise %A Guestrin,Carlos %A Hendler,James %A Konstan,Joseph %A Subramanian,Devika %A Wellman,Michael %A Kautz,Henry %X AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead %B AI Magazine %V 31 %P 103 - 114 %8 2010/07/28/ %@ 0738-4602 %G eng %U http://www.aaai.org/ojs/index.php/aimagazine/article/viewArticle/2293 %N 3 %R 10.1609/aimag.v31i3.2293 %0 Journal Article %J BMC Bioinformatics %D 2010 %T Alignment and clustering of phylogenetic markers - implications for microbial diversity studies %A White,James R %A Navlakha,Saket %A Nagarajan,Niranjan %A Ghodsi,Mohammad-Reza %A Kingsford, Carl %A Pop, Mihai %X Molecular studies of microbial diversity have provided many insights into the bacterial communities inhabiting the human body and the environment. A common first step in such studies is a survey of conserved marker genes (primarily 16S rRNA) to characterize the taxonomic composition and diversity of these communities. To date, however, there exists significant variability in analysis methods employed in these studies. %B BMC Bioinformatics %V 11 %P 152 - 152 %8 2010/03/24/ %@ 1471-2105 %G eng %U http://www.biomedcentral.com/1471-2105/11/152 %N 1 %R 10.1186/1471-2105-11-152 %0 Book Section %B Computer Vision – ECCV 2010Computer Vision – ECCV 2010 %D 2010 %T Articulation-Invariant Representation of Non-planar Shapes %A Gopalan,Raghuraman %A Turaga,Pavan %A Chellapa, Rama %E Daniilidis,Kostas %E Maragos,Petros %E Paragios,Nikos %X Given a set of points corresponding to a 2D projection of a non-planar shape, we would like to obtain a representation invariant to articulations (under no self-occlusions). It is a challenging problem since we need to account for the changes in 2D shape due to 3D articulations, viewpoint variations, as well as the varying effects of imaging process on different regions of the shape due to its non-planarity. By modeling an articulating shape as a combination of approximate convex parts connected by non-convex junctions, we propose to preserve distances between a pair of points by (i) estimating the parts of the shape through approximate convex decomposition, by introducing a robust measure of convexity and (ii) performing part-wise affine normalization by assuming a weak perspective camera model, and then relating the points using the inner distance which is insensitive to planar articulations. We demonstrate the effectiveness of our representation on a dataset with non-planar articulations, and on standard shape retrieval datasets like MPEG-7. %B Computer Vision – ECCV 2010Computer Vision – ECCV 2010 %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 6313 %P 286 - 299 %8 2010/// %@ 978-3-642-15557-4 %G eng %U http://dx.doi.org/10.1007/978-3-642-15558-1_21 %0 Journal Article %J The Journal of the Acoustical Society of America %D 2010 %T Audio visual scene analysis using spherical arrays and cameras. %A O'donovan,Adam %A Duraiswami, Ramani %A Zotkin,Dmitry N %A Gumerov, Nail A. %X While audition and vision are used together by living beings to make sense of the world, the observation of the world using machines in applications such as surveillance and robotics has proceeded largely separately. We describe the use of spherical microphone arrays as “audio cameras” and spherical array of video cameras as a tool to perform multi‐modal scene analysis that attempts to answer questions such as “Who?,”, “What?,” “Where?,” and “Why?.” Signal processing algorithms to identify the number of people and their identities and to isolate and dereverberate their speech using multi‐modal processing will be described. The use of graphics processor based signal processing allows for real‐time implementation of these algorithms. [Work supported by ONR.] %B The Journal of the Acoustical Society of America %V 127 %P 1979 - 1979 %8 2010/// %G eng %U http://link.aip.org/link/?JAS/127/1979/3 %N 3 %R 10.1121/1.3385079 %0 Journal Article %J Stabilization, Safety, and Security of Distributed Systems %D 2010 %T Authenticated broadcast with a partially compromised public-key infrastructure %A Gordon,S. %A Katz, Jonathan %A Kumaresan,R. %A Yerukhimovich,A. %X Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all existing protocols, however, do not distinguish between corrupted parties (who do not follow the protocol), and honest parties whose secret (signing) keys have been compromised (but who continue to behave honestly). We explore conditions under which it is possible to construct broadcast protocols that still provide the usual guarantees (i.e., validity/agreement) to the latter.Consider a network of n parties, where an adversary has compromised the secret keys of up to t c honest parties and, in addition, fully controls the behavior of up to t a other parties. We show that for any fixed t c > 0, and any fixed t a , there exists an efficient protocol for broadcast if and only if 2t a + min (t a , t c ) < n. (When t c = 0, standard results imply feasibility.) We also show that if t c , t a are not fixed, but are only guaranteed to satisfy the bound above, then broadcast is impossible to achieve except for a few specific values of n; for these “exceptional” values of n, we demonstrate a broadcast protocol. Taken together, our results give a complete characterization of this problem. %B Stabilization, Safety, and Security of Distributed Systems %P 144 - 158 %8 2010/// %G eng %R 10.1007/978-3-642-16023-3_14 %0 Conference Paper %B 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP) %D 2010 %T Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation %A Gu, Ruirui %A Piat, J. %A Raulet, M. %A Janneck, J.W. %A Bhattacharyya, Shuvra S. %K automated generation %K automatic design flow %K CAL language %K CAL networks %K CAL-to-C translation %K CAL2C translation %K coarse-grain dataflow representations %K Computational modeling %K data flow computing %K dataflow information %K Dataflow programming %K decoding %K Digital signal processing %K Libraries %K MPEG-4 reconfigurable video coding decoder implementation %K parallel languages %K SDF detection %K synchronous dataflow detection %K TDP %K TDP-based static scheduling %K The Dataflow interchange format Package %K Transform coding %K user-friendly design %K video coding %K video processing systems %K XML %K XML format %X This paper proposes an automatic design flow from user-friendly design to efficient implementation of video processing systems. This design flow starts with the use of coarse-grain dataflow representations based on the CAL language, which is a complete language for dataflow programming of embedded systems. Our approach integrates previously developed techniques for detecting synchronous dataflow (SDF) regions within larger CAL networks, and exploiting the static structure of such regions using analysis tools in The Dataflow interchange format Package (TDP). Using a new XML format that we have developed to exchange dataflow information between different dataflow tools, we explore systematic implementation of signal processing systems using CAL, SDF-like region detection, TDP-based static scheduling, and CAL-to-C (CAL2C) translation. Our approach, which is a novel integration of three complementary dataflow tools - the CAL parser, TDP, and CAL2C - is demonstrated on an MPEG Reconfigurable Video Coding (RVC) decoder. %B 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP) %P 265 - 272 %8 2010 %G eng %0 Conference Paper %B Proceedings of the ACL 2010 System Demonstrations %D 2010 %T cdec: A decoder, alignment, and learning framework for finite-state and context-free translation models %A Dyer,C. %A Weese,J. %A Setiawan,H. %A Lopez,A. %A Ture,F. %A Eidelman,V. %A Ganitkevitch,J. %A Blunsom,P. %A Resnik, Philip %B Proceedings of the ACL 2010 System Demonstrations %P 7 - 12 %8 2010/// %G eng %0 Journal Article %J The Journal of the Acoustical Society of America %D 2010 %T Characterizing scattering coefficients numerically via the fast multipole accelerated boundary element method. %A Gumerov, Nail A. %A Duraiswami, Ramani %X Various panels are used in acoustical installations to provide desired characteristics to spaces to be used for listening. These panels have complex shapes with geometrical features that have sizes corresponding to wavelengths of sounds of interest. The complex interaction of acoustical waves with these shapes is what gives these surfaces their desirable properties. Experimental characterization of the acoustical properties of these surfaces under random and specular incidence is relatively time consuming. An alternate procedure is to numerically simulate the scattering behavior, and then computing the coefficients of interest from the simulation. A significant obstacle to such computations is the time taken for simulation. Fast multipole acceleration of boundary element methods [Gumerov & Duraiswami, J. Acoust. Soc. Am. 125 (2009)] is a promising approach to speeding up computations. We report on the application of this method to the computation of various scattering coefficients. %B The Journal of the Acoustical Society of America %V 127 %P 1751 - 1751 %8 2010/// %G eng %U http://link.aip.org/link/?JAS/127/1751/3 %N 3 %R 10.1121/1.3383664 %0 Conference Paper %B Proceedings of the 28th international conference on Human factors in computing systems %D 2010 %T Children's roles using keyword search interfaces at home %A Druin, Allison %A Foss,E. %A Hutchinson,H. %A Golub,E. %A Hatley,L. %B Proceedings of the 28th international conference on Human factors in computing systems %P 413 - 422 %8 2010/// %G eng %0 Conference Paper %B Proceedings of the 8th ACM Conference on Designing Interactive Systems %D 2010 %T Clear Panels: a technique to design mobile application interactivity %A Brown,Q. %A Bonsignore,E. %A Hatley,L. %A Druin, Allison %A Walsh,G. %A Foss,E. %A Brewer,R. %A Hammer,J. %A Golub,E. %B Proceedings of the 8th ACM Conference on Designing Interactive Systems %P 360 - 363 %8 2010/// %G eng %0 Journal Article %J Proceedings of the National Academy of SciencesPNAS %D 2010 %T Comparative Genomics of Clinical and Environmental Vibrio Mimicus %A Hasan,Nur A. %A Grim,Christopher J. %A Haley,Bradd J. %A Jongsik Chun %A Alam,Munirul %A Taviani,Elisa %A Mozammel Hoq %A Munk,A. Christine %A Rita R Colwell %X Whether Vibrio mimicus is a variant of Vibrio cholerae or a separate species has been the subject of taxonomic controversy. A genomic analysis was undertaken to resolve the issue. The genomes of V. mimicus MB451, a clinical isolate, and VM223, an environmental isolate, comprise ca. 4,347,971 and 4,313,453 bp and encode 3,802 and 3,290 ORFs, respectively. As in other vibrios, chromosome I (C-I) predominantly contains genes necessary for growth and viability, whereas chromosome II (C-II) bears genes for adaptation to environmental change. C-I harbors many virulence genes, including some not previously reported in V. mimicus, such as mannose-sensitive hemagglutinin (MSHA), and enterotoxigenic hemolysin (HlyA); C-II encodes a variant of Vibrio pathogenicity island 2 (VPI-2), and Vibrio seventh pandemic island II (VSP-II) cluster of genes. Extensive genomic rearrangement in C-II indicates it is a hot spot for evolution and genesis of speciation for the genus Vibrio. The number of virulence regions discovered in this study (VSP-II, MSHA, HlyA, type IV pilin, PilE, and integron integrase, IntI4) with no notable difference in potential virulence genes between clinical and environmental strains suggests these genes also may play a role in the environment and that pathogenic strains may arise in the environment. Significant genome synteny with prototypic pre-seventh pandemic strains of V. cholerae was observed, and the results of phylogenetic analysis support the hypothesis that, in the course of evolution, V. mimicus and V. cholerae diverged from a common ancestor with a prototypic sixth pandemic genomic backbone. %B Proceedings of the National Academy of SciencesPNAS %V 107 %P 21134 - 21139 %8 2010/12/07/ %@ 0027-8424, 1091-6490 %G eng %U http://www.pnas.org/content/107/49/21134 %N 49 %R 10.1073/pnas.1013825107 %0 Journal Article %J Computer Vision and Image Understanding %D 2010 %T Comparing and combining lighting insensitive approaches for face recognition %A Gopalan,Raghuraman %A Jacobs, David W. %K Classifier comparison and combination %K face recognition %K Gradient direction %K lighting %X Face recognition under changing lighting conditions is a challenging problem in computer vision. In this paper, we analyze the relative strengths of different lighting insensitive representations, and propose efficient classifier combination schemes that result in better recognition rates. We consider two experimental settings, wherein we study the performance of different algorithms with (and without) prior information on the different illumination conditions present in the scene. In both settings, we focus on the problem of having just one exemplar per person in the gallery. Based on these observations, we design algorithms for integrating the individual classifiers to capture the significant aspects of each representation. We then illustrate the performance improvement obtained through our classifier combination algorithms on the illumination subset of the PIE dataset, and on the extended Yale-B dataset. Throughout, we consider galleries with both homogenous and heterogeneous lighting conditions. %B Computer Vision and Image Understanding %V 114 %P 135 - 145 %8 2010/01// %@ 1077-3142 %G eng %U http://www.sciencedirect.com/science/article/pii/S1077314209001210 %N 1 %R 10.1016/j.cviu.2009.07.005 %0 Patent %D 2010 %T COMPRESSIVE SENSING SYSTEM AND METHOD FOR BEARING ESTIMATION OF SPARSE SOURCES IN THE ANGLE DOMAIN %A Cevher,Volkan %A Gurbuz,Ali Cafer %A McClellan,James H. %A Chellapa, Rama %X Compressive Sensing (CS) is an emerging area which uses a relatively small number of non-traditional samples in the form of randomized projections to reconstruct sparse or com-pressible signals. Direction-of-arrival (DOA) estimation is performed with an array of sensors using CS. Using random projections of the sensor data, along with a full waveform recording on one reference sensor, a sparse angle space scenario can be reconstructed, giving the number of sources and their DOA's. Signal processing algorithms are also developed and described herein for randomly deployable wireless sensor arrays that are severely constrained in communication bandwidth. There is a focus on the acoustic bearing estimation problem and it is shown that when the target bearings are modeled as a sparse vector in the angle space, functions of the low dimensional random projections of the microphone signals can be used to determine multiple source bearings as a solution of an 1]-norm minimization problem. %V 12/740,947 %8 2010/10/21/ %G eng %U http://www.google.com/patents?id=xDLYAAAAEBAJ %0 Journal Article %J The Journal of the Acoustical Society of America %D 2010 %T Computation of the head-related transfer function via the fast multipole accelerated boundary element method and its spherical harmonic representation %A Gumerov, Nail A. %A O'Donovan,Adam E. %A Duraiswami, Ramani %A Zotkin,Dmitry N %K auditory evoked potentials %K bioacoustics %K boundary-elements methods %K Ear %K Harmonic analysis %X The head-related transfer function (HRTF) is computed using the fast multipole accelerated boundary element method. For efficiency, the HRTF is computed using the reciprocity principle by placing a source at the ear and computing its field. Analysis is presented to modify the boundary value problem accordingly. To compute the HRTF corresponding to different ranges via a single computation, a compact and accurate representation of the HRTF, termed the spherical spectrum, is developed. Computations are reduced to a two stage process, the computation of the spherical spectrum and a subsequent evaluation of the HRTF. This representation allows easy interpolation and range extrapolation of HRTFs. HRTF computations are performed for the range of audible frequencies up to 20 kHz for several models including a sphere, human head models [the Neumann KU-100 (“Fritz”) and the Knowles KEMAR (“Kemar”) manikins], and head-and-torso model (the Kemar manikin). Comparisons between the different cases are provided. Comparisons with the computational data of other authors and available experimental data are conducted and show satisfactory agreement for the frequencies for which reliable experimental data are available. Results show that, given a good mesh, it is feasible to compute the HRTF over the full audible range on a regular personal computer. %B The Journal of the Acoustical Society of America %V 127 %P 370 - 386 %8 2010/// %G eng %U http://link.aip.org/link/?JAS/127/370/1 %N 1 %R 10.1121/1.3257598 %0 Conference Paper %D 2010 %T A Computational Framework for Real-Time Unmanned Sea Surface Vehicle Motion Simulation %A Thakur,Atul %A Gupta, Satyandra K. %X Unmanned Sea Surface Vehicle (USSV) motion simulation in time domain is an important component of USSV design and operation. This capability is needed for hull design, operator training, controller synthesis and testing. Many applications such as simulators for operator training require real-time performance. Traditional approaches based on strip theory, although fast, abstract hulls into slender bodies, making the simulation results insensitive to changes in geometry. Computational fluid dynamics (CFD) based approaches are accurate but very slow. Potential flow based approaches are sensitive to hull geometry and take lesser amount of time than CFD based approaches. The motion simulation using potential flow theory involves following four main operations: (1) computation of dynamic pressure head due to fluid flow around the hull under the ocean wave, (2) computation of wet surface, (3) computing surface integral of dynamic pressure head over wet surface, and (4) solving the rigid body dynamics equation. First three operations depend upon the boat geometry complexity and need to be performed at each time step, making the simulation run very slow. In this paper, we investigate the problem of model simplification for real-time simulation of USSV model in time domain using potential flow theory, with arbitrary geometry under ocean waves with inviscid and irrotational flow. Using clustering based simplification scheme and parallel computing we obtained real time simulation performance. %I ASME %C Montreal, Quebec, Canada %V 3 %P 51 - 61 %8 2010/// %@ 978-0-7918-4411-3 %G eng %U http://link.aip.org/link/ASMECP/v2010/i44113/p51/s1&Agg=doi %R 10.1115/DETC2010-28526 %0 Journal Article %J Advances in Neural Information Processing Systems (NIPS) %D 2010 %T Computing marginal distributions over continuous markov networks for statistical relational learning %A Bröcheler,M. %A Getoor, Lise %X Continuous Markov random fields are a general formalism to model joint proba-bility distributions over events with continuous outcomes. We prove that marginal computation for constrained continuous MRFs is #P-hard in general and present a polynomial-time approximation scheme under mild assumptions on the struc- ture of the random field. Moreover, we introduce a sampling algorithm to com- pute marginal distributions and develop novel techniques to increase its effi- ciency. Continuous MRFs are a general purpose probabilistic modeling tool and we demonstrate how they can be applied to statistical relational learning. On the problem of collective classification, we evaluate our algorithm and show that the standard deviation of marginals serves as a useful measure of confidence. %B Advances in Neural Information Processing Systems (NIPS) %8 2010/// %G eng %0 Journal Article %J Behaviour & Information Technology %D 2010 %T Connecting generations: developing co-design methods for older adults and children %A Xie,B. %A Druin, Allison %A Fails,J. %A Massey,S. %A Golub,E. %A Franckel,S. %A Schneider,K. %B Behaviour & Information Technology %V 99999 %P 1 - 11 %8 2010/// %G eng %N 1 %0 Conference Paper %B Proceedings of the 19th international conference on World wide web %D 2010 %T Constructing folksonomies by integrating structured metadata %A Plangprasopchok,Anon %A Lerman,Kristina %A Getoor, Lise %K collective knowledge %K data mining %K folksonomies %X Aggregating many personal hierarchies into a common taxonomy, also known as a folksonomy, presents several challenges due to its sparseness, ambiguity, noise, and inconsistency. We describe an approach to folksonomy learning based on relational clustering that addresses these challenges by exploiting structured metadata contained in personal hierarchies. Our approach clusters similar hierarchies using their structure and tag statistics, then incrementally weaves them into a deeper, bushier tree. We study folksonomy learning using social metadata extracted from the photo-sharing site Flickr. We evaluate the learned folksonomy quantitatively by automatically comparing it to a reference taxonomy created by the Open Directory Project. Our empirical results suggest that the proposed approach improves upon the state-of-the-art folksonomy learning method. %B Proceedings of the 19th international conference on World wide web %S WWW '10 %I ACM %C New York, NY, USA %P 1165 - 1166 %8 2010/// %@ 978-1-60558-799-8 %G eng %U http://doi.acm.org/10.1145/1772690.1772856 %R 10.1145/1772690.1772856 %0 Conference Paper %B Workshops at the Twenty-Fourth AAAI Conference on Artificial Intelligence %D 2010 %T Constructing Folksonomies by Integrating Structured Metadata with Relational Clustering %A Plangprasopchok,A. %A Lerman,K. %A Getoor, Lise %X Many social Web sites allow users to annotate the content with descriptive metadata, such as tags, and more recently also to organize content hierarchically. These types of struc- tured metadata provide valuable evidence for learning how a community organizes knowledge. For instance, we can ag- gregate many personal hierarchies into a common taxonomy, also known as a folksonomy, that will aid users in visual- izing and browsing social content, and also to help them in organizing their own content. However, learning from so- cial metadata presents several challenges: sparseness, ambi- guity, noise, and inconsistency. We describe an approach to folksonomy learning based on relational clustering that ad- dresses these challenges by exploiting structured metadata contained in personal hierarchies. Our approach clusters sim- ilar hierarchies using their structure and tag statistics, then incrementally weaves them into a deeper, bushier tree. We study folksonomy learning using social metadata extracted from the photo-sharing site Flickr. We evaluate the learned folksonomy quantitatively by automatically comparing it to a reference taxonomy. Our empirical results suggest that the proposed framework, which addresses the challenges listed above, improves on existing folksonomy learning methods. %B Workshops at the Twenty-Fourth AAAI Conference on Artificial Intelligence %8 2010/// %G eng %0 Patent %D 2010 %T Context-Aware Query Recommendations %A Ntoulas,Alexandros %A Hwang,Heasoo %A Getoor, Lise %A Paparizos,Stelios %A Lauw,Hady Wirawan %E Microsoft Corporation %X Described is a search-related technology in which context information regarding a user's prior search actions is used in making query recommendations for a current user action, such as a query or click. To determine whether each set or subset of context information is relevant to the user action, data obtained from a query log is evaluated. More particularly, a query transition (query-query) graph and a query click (query-URL) graph are extracted from the query log; vectors are computed for the current action and each context/sub-context and evaluated against vectors in the graphs to determine current action-to-context similarity. Also described is using similar context to provide the query recommendations, using parameters to control the similarity strictness, and/or whether more recent context information is more relevant than less recent context information, and using context information to distinguish between user sessions. %V 12/408,726 %8 2010/09/23/ %G eng %U http://www.google.com/patents?id=nubWAAAAEBAJ %0 Journal Article %J Microbiology and Immunology %D 2010 %T Conversion of viable but nonculturable Vibrio cholerae to the culturable state by co‐culture with eukaryotic cells %A Senoh,Mitsutoshi %A Ghosh‐Banerjee,Jayeeta %A Ramamurthy,Thandavarayan %A Hamabata,Takashi %A Kurakawa,Takashi %A Takeda,Makoto %A Rita R Colwell %A Nair,G. Balakrish %A Takeda,Yoshifumi %K conversion to culturability %K co‐culture %K eukaryotic cell %K viable but nonculturable (VBNC) Vibrio cholerae %X VBNC Vibrio cholerae O139 VC-280 obtained by incubation in 1% solution of artificial sea water IO at 4°C for 74 days converted to the culturable state when co-cultured with CHO cells. Other eukaryotic cell lines, including HT-29, Caco-2, T84, HeLa, and Intestine 407, also supported conversion of VBNC cells to the culturable state. Conversion of VBNC V. cholerae O1 N16961 and V. cholerae O139 VC-280/pG13 to the culturable state, under the same conditions, was also confirmed. When VBNC V. cholerae O139 VC-280 was incubated in 1% IO at 4°C for up to 91 days, the number of cells converted by co-culture with CHO cells declined with each additional day of incubation and after 91 days conversion was not observed. %B Microbiology and Immunology %V 54 %P 502 - 507 %8 2010/06/14/ %@ 1348-0421 %G eng %U http://onlinelibrary.wiley.com/doi/10.1111/j.1348-0421.2010.00245.x/full %N 9 %R 10.1111/j.1348-0421.2010.00245.x %0 Conference Paper %B SIGCHI '10 %D 2010 %T Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya %A Wyche, Susan P. %A Smyth, Thomas N. %A Marshini Chetty %A Aoki, Paul M. %A Grinter, Rebecca E. %K everyday technology %K hci4d %K Kenya %K urban computing %X We present results from a qualitative study examining how professionals living and working in Nairobi, Kenya regularly use ICT in their everyday lives. There are two contributions of this work for the HCI community. First, we provide empirical evidence demonstrating constraints our participants encountered when using technology in an infrastructure-poor setting. These constraints are limited bandwidth, high costs, differing perceptions of responsiveness, and threats to physical and virtual security. Second, we use our findings to critically evaluate the "access, anytime and anywhere" construct shaping the design of future technologies. We present an alternative vision called deliberate interactions--a planned and purposeful interaction style that involves offline preparation and discuss ways ICT can support this online usage behavior. %B SIGCHI '10 %S CHI '10 %I ACM %P 2593 - 2602 %8 2010/// %@ 978-1-60558-929-9 %G eng %U http://doi.acm.org/10.1145/1753326.1753719 %0 Conference Paper %D 2010 %T Design and Fabrication of a Multi-Material Compliant Flapping Wing Drive Mechanism for Miniature Air Vehicles %A Bejgerowski,Wojciech %A Gerdes,John W. %A Gupta, Satyandra K. %A Bruck,Hugh A. %A Wilkerson,Stephen %X Successful realization of a flapping wing micro air vehicle (MAV) requires development of a light weight drive mechanism converting the rotary motion of the motor into flapping motion of the wings. Low weight of the drive mechanism is required to maximize the payload and battery capacity. In order to make flapping wing MAVs attractive in search, rescue, and recovery missions, they should be disposable from the cost point of view. Injection molded compliant drive mechanisms are an attractive design option to satisfy the weight, efficiency and cost requirements. In the past, we have successfully used multi-piece molding to create mechanisms utilizing distributed compliance for smaller MAVs. However, as the size of the MAV increases, mechanisms with distributed compliance exhibit excessive deformation. Therefore localizing rather than distributing the compliance in the mechanism becomes a more attractive option. Local compliance can be realized through multimaterial designs. A multi-material injection molded mechanism additionally offers reduction in the number of parts. This paper describes an approach for determining the drive mechanism shape and size that meets both the functional design and multi-material molding requirements. The design generated by the approach described in this paper was utilized to realize a flapping wing MAV with significant enhancements in the payload capabilities. %I ASME %P 69 - 80 %8 2010/// %@ 978-0-7918-4410-6 %G eng %U http://link.aip.org/link/ASMECP/v2010/i44106/p69/s1&Agg=doi %R 10.1115/DETC2010-28519 %0 Journal Article %J Automation Science and Engineering, IEEE Transactions on %D 2010 %T Developing a Stochastic Dynamic Programming Framework for Optical Tweezer-Based Automated Particle Transport Operations %A Banerjee,A. G. %A Pomerance,A. %A Losert,W. %A Gupta,S.K. %K holographic tweezer set-up %K holography %K infinite-horizon partially observable Markov decision process algorithm %K Markov processes %K motion planning framework %K optical tweezer-based automated particle transport operations %K optical tweezers %K radiation pressure %K silica beads %K stochastic dynamic programming framework %K stochastic programming %X Automated particle transport using optical tweezers requires the use of motion planning to move the particle while avoiding collisions with randomly moving obstacles. This paper describes a stochastic dynamic programming based motion planning framework developed by modifying the discrete version of an infinite-horizon partially observable Markov decision process algorithm. Sample trajectories generated by this algorithm are presented to highlight effectiveness in crowded scenes and flexibility. The algorithm is tested using silica beads in a holographic tweezer set-up and data obtained from the physical experiments are reported to validate various aspects of the planning simulation framework. This framework is then used to evaluate the performance of the algorithm under a variety of operating conditions. %B Automation Science and Engineering, IEEE Transactions on %V 7 %P 218 - 227 %8 2010/04// %@ 1545-5955 %G eng %N 2 %R 10.1109/TASE.2009.2026056 %0 Report %D 2010 %T Developing Autonomy for Unmanned Surface Vehicles by Using Virtual Environments %A Kavetsky,R. %A Gupta,S.K. %X We address the problem of automated synthesis of an action selection policy for an unmanned vehicle operating in an environment with a deceptive adversary. We introduce a new synthesis approach using which an initial version of the policy is automatically generated and then gradually refined by detecting and fixing its shortcomings. Our focus is specifically on automated synthesis of a policy used for blocking the advancement of an intruder boat toward a valuable target. The USV must generate specific maneuvers for blocking. The intruder is human competitive and exhibits a deceptive behavior so that the USV cannot exploit regularity in its attacking behavior. We compared the performance of a hand coded USVs blocking policy to the performance of a policy that was automatically synthesized. Our results show that the performance of the automatically generated USVs policy exceed the performance of the hand coded policy and thus demonstrates the feasibility of the proposed approach. %I ENERGETICS TECHNOLOGY CENTER INC LA PLATA MD %8 2010/// %G eng %U http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA535105 %0 Journal Article %J FEMS Microbiology Letters %D 2010 %T Discovery of novel Vibrio cholerae VSP‐II genomic islands using comparative genomic analysis %A Taviani,Elisa %A Grim,Christopher J. %A Choi,Jinna %A Jongsik Chun %A Haley,Bradd %A Hasan,Nur A. %A Huq,Anwar %A Rita R Colwell %K Vibrio cholerae %K Vibrio mimicus %K VPS‐II %X This report describes Vibrio seventh pandemic island II (VSP-II) and three novel variants revealed by comparative genomics of 23 Vibrio cholerae strains and their presence among a large and diverse collection of V. cholerae isolates. Three VSP-II variants were reported previously and our results demonstrate the presence of three novel VSP-II in clinical and environmental V. cholerae marked by major deletions and genetic rearrangements. A new VSP-II cluster was found in the seventh pandemic V. cholerae O1 El Tor strain CIRS101, which is dominant (95%) among the recent (2004–2007) seven pandemic V. cholerae O1 El Tor isolates from two endemic sites, but was not found in older strains from the same region. Two other variants were found in V. cholerae TMA21 and RC385, two environmental strains from coastal Brazil and the Chesapeake Bay, respectively, the latter being prevalent among environmental V. cholerae non-O1/non-O139 and Vibrio mimicus. The results of this study indicate that the VSP-II island has undergone significant rearrangement through a complex evolutionary pathway in V. cholerae. Interestingly, one of the new VSP-II revealed the presence of ‘old’ and ‘new’V. cholerae O1 El Tor pandemic clones circulating in some of the areas where cholera is endemic. %B FEMS Microbiology Letters %V 308 %P 130 - 137 %8 2010/05/06/ %@ 1574-6968 %G eng %U http://onlinelibrary.wiley.com/doi/10.1111/j.1574-6968.2010.02008.x/full %N 2 %R 10.1111/j.1574-6968.2010.02008.x %0 Conference Paper %B Proceedings of the 10th annual conference on Internet measurement %D 2010 %T The effect of packet loss on redundancy elimination in cellular wireless networks %A Lumezanu,Cristian %A Guo,Katherine %A Spring, Neil %A Bhattacharjee, Bobby %K cellular networks %K loss %K redundancy elimination %X Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous work shows that RE can suppress the transmission of 20-50% bytes when deployed at ISP access links or between routers. In this paper, we focus on the challenges of deploying RE in cellular networks. The potential benefifit is substantial, since cellular networks have a growing subscriber base and network links, including wired backhaul, are often oversubscribed. Using three large traces captured at two North American and one European wireless network providers, we show that RE can reduce the bandwidth consumption of the majority of mobile users by at least 10%. However, cellular links have much higher packet loss rates than their wired counterparts, which makes applying RE much more difficult. Our experiments also show that the loss of only a few packets can disrupt RE and eliminate the bandwidth savings. We propose informed marking, a lightweight scheme that detects lost packets and prevents RE algorithms from using them for future encodings. We implement RE with informed marking and deploy it in a real-world cellular network. Our results show that with informed marking, more than 60% of the bandwidth savings of RE are preserved, even when packet loss rates are high. %B Proceedings of the 10th annual conference on Internet measurement %S IMC '10 %I ACM %C New York, NY, USA %P 294 - 300 %8 2010/// %@ 978-1-4503-0483-2 %G eng %U http://doi.acm.org/10.1145/1879141.1879179 %R 10.1145/1879141.1879179 %0 Journal Article %J ACM Trans. Sen. Netw. %D 2010 %T Energy-driven distribution of signal processing applications across wireless sensor networks %A Chung-Ching Shen %A Plishker, William L. %A Ko,Dong-Ik %A Bhattacharyya, Shuvra S. %A Goldsman,Neil %K DSP %K Energy efficiency %K network lifetime %K Speech recognition %K Wireless sensor networks %X Wireless sensor network (WSN) applications have been studied extensively in recent years. Such applications involve resource-limited embedded sensor nodes that have small size and low power requirements. Based on the need for extended network lifetimes in WSNs in terms of energy use, the energy efficiency of computation and communication operations in the sensor nodes becomes critical. Digital Signal Processing (DSP) applications typically require intensive data processing operations and as a result are difficult to implement directly in resource-limited WSNs. In this article, we present a novel design methodology for modeling and implementing computationally intensive DSP applications applied to wireless sensor networks. This methodology explores efficient modeling techniques for DSP applications, including data sensing and processing; derives formulations of Energy-Driven Partitioning (EDP) for distributing such applications across wireless sensor networks; and develops efficient heuristic algorithms for finding partitioning results that maximize the network lifetime. To address such an energy-driven partitioning problem, this article provides a new way of aggregating data and reducing communication traffic among nodes based on application analysis. By considering low data token delivery points and the distribution of computation in the application, our approach finds energy-efficient trade-offs between data communication and computation. %B ACM Trans. Sen. Netw. %V 6 %P 24:1 - 24:32 %8 2010 %@ 1550-4859 %G eng %U http://doi.acm.org/10.1145/1754414.1754420 %N 3 %0 Book Section %B Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera %D 2010 %T Evolutionary framework for Lepidoptera model systems %A Roe,A. %A Weller,S. %A Baixeras,J. %A Brown,J. W %A Cummings, Michael P. %A Davis,DR %A Horak,M %A Kawahara,A. Y %A Mitter,C %A Parr,C.S. %A Regier,J. C %A Rubinoff,D %A Simonsen,TJ %A Wahlberg,N %A Zwick,A. %E Goldsmith,M %E Marec,F %X “Model systems” are specific organisms upon which detailed studies have been conducted examining a fundamental biological question. If the studies are robust, their results can be extrapolated among an array of organisms that possess features in common with the subject organism. The true power of model systems lies in the ability to extrapolate these details across larger groups of organisms. In order to generalize these results, comparative studies are essential and require that model systems be placed into their evolutionary or phylogenetic context. This chapter examines model systems in the insect order Lepidoptera from the perspective of several different superfamilies. Historically, many species of Lepidoptera have been essential in the development of invaluable model systems in the fields of development biology, genetics, molecular biology, physiology, co-evolution, population dynamics, and ecology. %B Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera %I Taylor & Francis %C Boca Raton %P 1 - 24 %8 2010/// %G eng %0 Journal Article %J University of Maryland, Human-Computer Interaction Lab Tech Report HCIL-2010-01 %D 2010 %T Exploring distributions: design and evaluation %A Sopan,A. %A Freire,M. %A Taieb-Maimon,M. %A Golbeck,J. %A Shneiderman, Ben %X Visual overviews of tables of numerical and categorical data have been proposed for tables with a single value per cell.In this paper we address the problem of exploring tables including columns consisting of distributions, e.g. the distributions of movie ratings or trust ratings in recommender systems, age distributions in demographic data, usage distributions in logs of telephone calls etc. We propose a novel way of displaying and interacting with distribution data, and present the results of a usability study that demonstrates the benefits of the interface in providing an overview of the data and facilitating the discovery of interesting clusters, patterns, outliers and relationships between columns. %B University of Maryland, Human-Computer Interaction Lab Tech Report HCIL-2010-01 %8 2010/// %G eng %0 Journal Article %J Copper Mountain Conference on Iterative Methods %D 2010 %T Fast matrix-vector product based fgmres for kernel machines %A Srinivasan,B.V. %A Duraiswami, Ramani %A Gumerov, Nail A. %X Kernel based approaches for machine learning have gained huge interest in the past decades because of their robustness. In somealgorithms, the primary problem is the solution of a linear system involving the kernel matrix. Iterative Krylov approaches are often used to solve these efficiently [2, 3]. Fast matrix-vector products can be used to accelerate each Krylov iteration to further optimize the performance. In order to reduce the number of iterations of the Krylov approach, a preconditioner becomes necessary in many cases. Several researchers have proposed flexible preconditioning methods where the preconditioner changes with each iteration, and this class of preconditioners are shown to have good performance [6, 12]. In this paper, we use a Tikhonov regularized kernel matrix as a preconditioner for flexible GMRES [12] to solve kernel matrix based systems of equations. We use a truncated conjugate gradient (CG) method to solve the preconditioner system and further accelerate each CG iteration using fast matrix-vector products. The convergence of the proposed preconditioned GMRES is shown on synthetic data. The performance is further validated on problems in Gaussian process regression and radial basis function interpolation. Improvements are seen in each case. %B Copper Mountain Conference on Iterative Methods %V 2 %8 2010/// %G eng %0 Journal Article %J SIAM Journal on Scientific Computing %D 2010 %T Fast radial basis function interpolation via preconditioned Krylov iteration %A Gumerov, Nail A. %A Duraiswami, Ramani %X We consider a preconditioned Krylov subspace iterative algorithm presented by Faul,Goodsell, and Powell (IMA J. Numer. Anal. 25 (2005), pp. 1–24) for computing the coefficients of a radial basis function interpolant over N data points. This preconditioned Krylov iteration has been demonstrated to be extremely robust to the distribution of the points and the iteration rapidly convergent. However, the iterative method has several steps whose computational and memory costs scale as O(N2), both in preliminary computations that compute the preconditioner and in the matrix-vector product involved in each step of the iteration. We effectively accelerate the iterative method to achieve an overall cost of O(N log N). The matrix vector product is accelerated via the use of the fast multipole method. The preconditioner requires the computation of a set of closest points to each point. We develop an O(N log N) algorithm for this step as well. Results are presented for multiquadric interpolation in R2 and biharmonic interpolation in R3. A novel FMM algorithm for the evaluation of sums involving multiquadric functions in R2 is presented as well. %B SIAM Journal on Scientific Computing %V 29 %P 1876 - 1876 %8 2010/// %G eng %N 5 %0 Journal Article %J BMC Genomics %D 2010 %T Finishing genomes with limited resources: lessons from an ensemble of microbial genomes %A Nagarajan,Niranjan %A Cook,Christopher %A Di Bonaventura,Maria Pia %A Ge,Hong %A Richards,Allen %A Bishop-Lilly,Kimberly A %A DeSalle,Robert %A Read,Timothy D. %A Pop, Mihai %X While new sequencing technologies have ushered in an era where microbial genomes can be easily sequenced, the goal of routinely producing high-quality draft and finished genomes in a cost-effective fashion has still remained elusive. Due to shorter read lengths and limitations in library construction protocols, shotgun sequencing and assembly based on these technologies often results in fragmented assemblies. Correspondingly, while draft assemblies can be obtained in days, finishing can take many months and hence the time and effort can only be justified for high-priority genomes and in large sequencing centers. In this work, we revisit this issue in light of our own experience in producing finished and nearly-finished genomes for a range of microbial species in a small-lab setting. These genomes were finished with surprisingly little investments in terms of time, computational effort and lab work, suggesting that the increased access to sequencing might also eventually lead to a greater proportion of finished genomes from small labs and genomics cores. %B BMC Genomics %V 11 %P 242 - 242 %8 2010/04/16/ %@ 1471-2164 %G eng %U http://www.biomedcentral.com/1471-2164/11/242 %N 1 %R 10.1186/1471-2164-11-242 %0 Conference Paper %B ACM SIGPLAN Notices %D 2010 %T From program verification to program synthesis %A Srivastava,S. %A Gulwani,S. %A Foster, Jeffrey S. %B ACM SIGPLAN Notices %V 45 %P 313 - 326 %8 2010/// %G eng %0 Book Section %B Pervasive Computing %D 2010 %T GasSense: Appliance-Level, Single-Point Sensing of Gas Activity in the Home %A Cohn,Gabe %A Gupta,Sidhant %A Jon Froehlich %A Larson,Eric %A Patel,Shwetak %E Floréen,Patrik %E Krüger,Antonio %E Spasojevic,Mirjana %X This paper presents GasSense, a low-cost, single-point sensing solution for automatically identifying gas use down to its source (e.g., water heater, furnace, fireplace). This work adds a complementary sensing solution to the growing body of work in infrastructure-mediated sensing. GasSense analyzes the acoustic response of a home’s government mandated gas regulator, which provides the unique capability of sensing both the individual appliance at which gas is currently being consumed as well as an estimate of the amount of gas flow. Our approach provides a number of appealing features including the ability to be easily and safely installed without the need of a professional. We deployed our solution in nine different homes and initial results show that GasSense has an average accuracy of 95.2% in identifying individual appliance usage. %B Pervasive Computing %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 6030 %P 265 - 282 %8 2010 %@ 978-3-642-12653-6 %G eng %U http://dx.doi.org/10.1007/978-3-642-12654-3_16 %0 Journal Article %J Journal of BacteriologyJ. Bacteriol. %D 2010 %T Genome Sequence of Hybrid Vibrio Cholerae O1 MJ-1236, B-33, and CIRS101 and Comparative Genomics with V. Cholerae %A Grim,Christopher J. %A Hasan,Nur A. %A Taviani,Elisa %A Haley,Bradd %A Jongsik Chun %A Brettin,Thomas S. %A Bruce,David C. %A Detter,J. Chris %A Han,Cliff S. %A Chertkov,Olga %A Challacombe,Jean %A Huq,Anwar %A Nair,G. Balakrish %A Rita R Colwell %X The genomes of Vibrio cholerae O1 Matlab variant MJ-1236, Mozambique O1 El Tor variant B33, and altered O1 El Tor CIRS101 were sequenced. All three strains were found to belong to the phylocore group 1 clade of V. cholerae, which includes the 7th-pandemic O1 El Tor and serogroup O139 isolates, despite displaying certain characteristics of the classical biotype. All three strains were found to harbor a hybrid variant of CTXΦ and an integrative conjugative element (ICE), leading to their establishment as successful clinical clones and the displacement of prototypical O1 El Tor. The absence of strain- and group-specific genomic islands, some of which appear to be prophages and phage-like elements, seems to be the most likely factor in the recent establishment of dominance of V. cholerae CIRS101 over the other two hybrid strains. %B Journal of BacteriologyJ. Bacteriol. %V 192 %P 3524 - 3533 %8 2010/07/01/ %@ 0021-9193, 1098-5530 %G eng %U http://jb.asm.org/content/192/13/3524 %N 13 %R 10.1128/JB.00040-10 %0 Conference Paper %B Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on %D 2010 %T Gradient descent approach for secure localization in resource constrained wireless sensor networks %A Garg,R. %A Varna,A.L. %A M. Wu %K algorithms;resource %K approach;localization %K computational %K constrained %K descent %K localization;gradient %K methods;wireless %K networks; %K networks;secure %K resources;gradient %K sensor %K wireless %X Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able to autonomously determine their locations before they start sensing and transmitting data. Most localization algorithms rely on anchor nodes whose locations are known to determine the positions of the remaining nodes. In an adversarial scenario, some of these anchor nodes could be compromised and used to transmit misleading information aimed at preventing the accurate localization of the remaining sensors. In this paper, a computationally efficient algorithm to determine the location of sensors that can resist such attacks is described. The proposed algorithm combines gradient descent with a selective pruning of inconsistent measurements to achieve good localization accuracy. Simulation results show that the proposed algorithm has performance comparable to existing schemes while requiring less computational resources. %B Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on %P 1854 - 1857 %8 2010/03// %G eng %R 10.1109/ICASSP.2010.5495371 %0 Journal Article %J Advances in Intelligent Data Analysis IX: 9th International Symposium %D 2010 %T Graph Identification %A Getoor, Lise %X There is a growing amount of observational data describing networks– examples include social networks, communication networks, and biological networks. As the amount of available data increases, so has our interest in analyzing these networks in order to uncover (1) general laws that govern their structure and evolution, and (2) patterns and predictive models to develop better policies and practices. However, a fundamental challenge in dealing with this newly available observational data describing networks is that the data is often of dubious quality–it is noisy and incomplete–and before any analysis method can be applied, the data must be cleaned, missing information inferred and mistakes corrected. Skipping this cleaning step can lead to flawed conclusions for things as simple as degree distribution and centrality measures; for more complex analytic queries, the results are even more likely to be inaccurate and misleading. %B Advances in Intelligent Data Analysis IX: 9th International Symposium %P 6 - 6 %8 2010/// %G eng %R 10.1007/978-3-642-13062-5_2 %0 Journal Article %J Advances in Cryptology-ASIACRYPT 2010 %D 2010 %T A group signature scheme from lattice assumptions %A Gordon,S. %A Katz, Jonathan %A Vaikuntanathan,V. %X Group signature schemes allow users to sign messages on behalf of a group while (1) maintaining anonymity (within that group) with respect to an outside observer, yet (2) ensuring traceability of a signer (by the group manager) when needed. In this work we give the first construction of a group signature scheme based on lattices (more precisely, the learning with errors assumption), in the random oracle model. Towards our goal, we construct a new algorithm for sampling a basis for an orthogonal lattice, together with a trapdoor, that may be of independent interest. %B Advances in Cryptology-ASIACRYPT 2010 %P 395 - 412 %8 2010/// %G eng %R 10.1007/978-3-642-17373-8_23 %0 Conference Paper %B Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining %D 2010 %T Growing a tree in the forest: constructing folksonomies by integrating structured metadata %A Plangprasopchok,Anon %A Lerman,Kristina %A Getoor, Lise %K collective knowledge %K data mining %K folksonomies %K relational clustering %K social information processing %K social metadata %K taxonomies %X Many social Web sites allow users to annotate the content with descriptive metadata, such as tags, and more recently to organize content hierarchically. These types of structured metadata provide valuable evidence for learning how a community organizes knowledge. For instance, we can aggregate many personal hierarchies into a common taxonomy, also known as a folksonomy, that will aid users in visualizing and browsing social content, and also to help them in organizing their own content. However, learning from social metadata presents several challenges, since it is sparse, shallow, ambiguous, noisy, and inconsistent. We describe an approach to folksonomy learning based on relational clustering, which exploits structured metadata contained in personal hierarchies. Our approach clusters similar hierarchies using their structure and tag statistics, then incrementally weaves them into a deeper, bushier tree. We study folksonomy learning using social metadata extracted from the photo-sharing site Flickr, and demonstrate that the proposed approach addresses the challenges. Moreover, comparing to previous work, the approach produces larger, more accurate folksonomies, and in addition, scales better. %B Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining %S KDD '10 %I ACM %C New York, NY, USA %P 949 - 958 %8 2010/// %@ 978-1-4503-0055-1 %G eng %U http://doi.acm.org/10.1145/1835804.1835924 %R 10.1145/1835804.1835924 %0 Journal Article %J NIPS 2010 Workshop on Networks Across Disciplines: Theory and Applications, Whistler BC, Canada %D 2010 %T Higher-order graphical models for classification in social and affiliation networks %A Zheleva,E. %A Getoor, Lise %A Sarawagi,S. %X In this work we explore the application of higher-order Markov Random Fields(MRF) to classification in social and affiliation networks. We consider both friend- ship links and group membership for inferring hidden attributes in a collective inference framework. We explore different ways of using the social groups as ei- ther node features or to construct the graphical model structure. The bottleneck in applying higher-order MRFs to a domain with many overlapping large cliques is the complexity of inference which is exponential in the size of the largest clique. To circumvent the slow inference problem, we borrow recent advancements in the computer vision community to achieve fast approximate inference results. We provide preliminary results using a dataset from facebook which suggest that our higher-order MRF models are capturing the structural dependencies in the net- works and they yield higher accuracy than linear classifiers. %B NIPS 2010 Workshop on Networks Across Disciplines: Theory and Applications, Whistler BC, Canada %8 2010/// %G eng %0 Journal Article %J Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %D 2010 %T Identification of Pathogenic Vibrio Species by Multilocus PCR-Electrospray Ionization Mass Spectrometry and Its Application to Aquatic Environments of the Former Soviet Republic of Georgia %A Whitehouse,Chris A. %A Baldwin,Carson %A Sampath,Rangarajan %A Blyn,Lawrence B. %A Melton,Rachael %A Li,Feng %A Hall,Thomas A. %A Harpin,Vanessa %A Matthews,Heather %A Tediashvili,Marina %A Jaiani,Ekaterina %A Kokashvili,Tamar %A Janelidze,Nino %A Grim,Christopher %A Rita R Colwell %A Huq,Anwar %X The Ibis T5000 is a novel diagnostic platform that couples PCR and mass spectrometry. In this study, we developed an assay that can identify all known pathogenic Vibrio species and field-tested it using natural water samples from both freshwater lakes and the Georgian coastal zone of the Black Sea. Of the 278 total water samples screened, 9 different Vibrio species were detected, 114 (41%) samples were positive for V. cholerae, and 5 (0.8%) samples were positive for the cholera toxin A gene (ctxA). All ctxA-positive samples were from two freshwater lakes, and no ctxA-positive samples from any of the Black Sea sites were detected. %B Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %V 76 %P 1996 - 2001 %8 2010/03/15/ %@ 0099-2240, 1098-5336 %G eng %U http://aem.asm.org/content/76/6/1996 %N 6 %R 10.1128/AEM.01919-09 %0 Book Section %B Bioinformatics Research and Applications %D 2010 %T Identifying Differentially Abundant Metabolic Pathways in Metagenomic Datasets %A Liu,Bo %A Pop, Mihai %E Borodovsky,Mark %E Gogarten,Johann %E Przytycka,Teresa %E Rajasekaran,Sanguthevar %X Enabled by rapid advances in sequencing technology, metagenomic studies aim to characterize entire communities of microbes bypassing the need for culturing individual bacterial members. One major goal of such studies is to identify specific functional adaptations of microbial communities to their habitats. Here we describe a powerful analytical method (MetaPath) that can identify differentially abundant pathways in metagenomic data-sets, relying on a combination of metagenomic sequence data and prior metabolic pathway knowledge. We show that MetaPath outperforms other common approaches when evaluated on simulated datasets. We also demonstrate the power of our methods in analyzing two, publicly available, metagenomic datasets: a comparison of the gut microbiome of obese and lean twins; and a comparison of the gut microbiome of infant and adult subjects. We demonstrate that the subpathways identified by our method provide valuable insights into the biological activities of the microbiome. %B Bioinformatics Research and Applications %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 6053 %P 101 - 112 %8 2010/// %@ 978-3-642-13077-9 %G eng %U http://dx.doi.org/10.1007/978-3-642-13078-6_12 %0 Patent %D 2010 %T Identifying Modifiers in Web Queries Over Structured Data %A Paparizos,Stelios %A Joshi,Amrula Sadanand %A Getoor, Lise %A Ntoulas,Alexandros %E Microsoft Corporation %X Described is using modifiers in online search queries for queries that map to a database table. A modifier (e.g., an adjective or a preposition) specifies the intended meaning of a target, in which the target maps to a column in that table. The modifier thus corresponds to one or more functions that determine which rows of data in the column match the query, e.g., “cameras under $400” maps to a camera (or product) table, and “under” is the modifier that represents a function (less than) that is used to evaluate a “price” target/data column. Also described are different classes of modifiers, and generating the dictionaries for a domain (corresponding to a table) via query log mining. %V 12/473,286 %8 2010/12/02/ %G eng %U http://www.google.com/patents?id=gQTkAAAAEBAJ %0 Conference Paper %B Proceedings of the 1st ACM International Health Informatics Symposium %D 2010 %T Image classification of vascular smooth muscle cells %A Grasso,Michael A. %A Mokashi,Ronil %A Dalvi,Darshana %A Cardone, Antonio %A Dima,Alden A. %A Bhadriraju,Kiran %A Plant,Anne L. %A Brady,Mary %A Yesha,Yaacov %A Yesha,Yelena %K cell biology %K digital image processing %K machine learning %B Proceedings of the 1st ACM International Health Informatics Symposium %S IHI '10 %I ACM %C New York, NY, USA %P 484 - 486 %8 2010/// %@ 978-1-4503-0030-8 %G eng %U http://doi.acm.org/10.1145/1882992.1883068 %R 10.1145/1882992.1883068 %0 Journal Article %J SIGKDD explorations %D 2010 %T On the importance of sharing negative results %A Giraud-Carrier,C. %A Dunham,M.H. %A Atreya,A. %A Elkan,C. %A Perlich,C. %A Swirszcz,G. %A Shi,X. %A Philip,S.Y. %A Fürnkranz,J. %A Sima,J.F. %B SIGKDD explorations %V 12 %P 3 - 4 %8 2010/// %G eng %N 2 %0 Journal Article %J BMC bioinformatics %D 2010 %T Indirect two-sided relative ranking: a robust similarity measure for gene expression data %A Licamele,L. %A Getoor, Lise %X There is a large amount of gene expression data that exists in the public domain. This data has been generated under a variety of experimental conditions. Unfortunately, these experimental variations have generally prevented researchers from accurately comparing and combining this wealth of data, which still hides many novel insights. Results In this paper we present a new method, which we refer to as indirect two-sided relative ranking, for comparing gene expression profiles that is robust to variations in experimental conditions. This method extends the current best approach, which is based on comparing the correlations of the up and down regulated genes, by introducing a comparison based on the correlations in rankings across the entire database. Because our method is robust to experimental variations, it allows a greater variety of gene expression data to be combined, which, as we show, leads to richer scientific discoveries. Conclusions We demonstrate the benefit of our proposed indirect method on several datasets. We first evaluate the ability of the indirect method to retrieve compounds with similar therapeutic effects across known experimental barriers, namely vehicle and batch effects, on two independent datasets (one private and one public). We show that our indirect method is able to significantly improve upon the previous state-of-the-art method with a substantial improvement in recall at rank 10 of 97.03% and 49.44%, on each dataset, respectively. Next, we demonstrate that our indirect method results in improved accuracy for classification in several additional datasets. These datasets demonstrate the use of our indirect method for classifying cancer subtypes, predicting drug sensitivity/resistance, and classifying (related) cell types. Even in the absence of a known (i.e., labeled) experimental barrier, the improvement of the indirect method in each of these datasets is statistically significant. %B BMC bioinformatics %V 11 %P 137 - 137 %8 2010/// %G eng %N 1 %0 Journal Article %J In proceedings of AAAI Workshop on Statistical Relational AI %D 2010 %T Integrating structured metadata with relational affinity propagation %A Plangprasopchok,A. %A Lerman,K. %A Getoor, Lise %X Structured and semi-structured data describing entities, tax- onomies and ontologies appears in many domains. There is a huge interest in integrating structured information from multiple sources; however integrating structured data to in- fer complex common structures is a difficult task because the integration must aggregate similar structures while avoiding structural inconsistencies that may appear when the data is combined. In this work, we study the integration of struc- tured social metadata: shallow personal hierarchies specified by many individual users on the Social Web, and focus on in- ferring a collection of integrated, consistent taxonomies. We frame this task as an optimization problem with structural constraints. We propose a new inference algorithm, which we refer to as Relational Affinity Propagation (RAP) that ex- tends affinity propagation (Frey and Dueck 2007) by intro- ducing structural constraints. We validate the approach on a real-world social media dataset, collected from the photoshar- ing website Flickr. Our empirical results show that our pro- posed approach is able to construct deeper and denser struc- tures compared to an approach using only the standard affin- ity propagation algorithm. %B In proceedings of AAAI Workshop on Statistical Relational AI %8 2010/// %G eng %0 Journal Article %J Natural Language Engineering %D 2010 %T Interlingual Annotation of Parallel Text Corpora: A New Framework for Annotation and Evaluation %A Dorr, Bonnie J %A Passonneau,Rebecca J. %A Farwell,David %A Green,Rebecca %A Habash,Nizar %A Helmreich,Stephen %A Hovy,Eduard %A Levin,Lori %A Miller,Keith J. %A Mitamura,Teruko %A Rambow,Owen %A Siddharthan,Advaith %X This paper focuses on an important step in the creation of a system of meaning representation and the development of semantically annotated parallel corpora, for use in applications such as machine translation, question answering, text summarization, and information retrieval. The work described below constitutes the first effort of any kind to annotate multiple translations of foreign-language texts with interlingual content. Three levels of representation are introduced: deep syntactic dependencies (IL0), intermediate semantic representations (IL1), and a normalized representation that unifies conversives, nonliteral language, and paraphrase (IL2). The resulting annotated, multilingually induced, parallel corpora will be useful as an empirical basis for a wide range of research, including the development and evaluation of interlingual NLP systems and paraphrase-extraction systems as well as a host of other research and development efforts in theoretical and applied linguistics, foreign language pedagogy, translation studies, and other related disciplines. %B Natural Language Engineering %V 16 %P 197 - 243 %8 2010/// %G eng %N 03 %R 10.1017/S1351324910000070 %0 Conference Paper %B Proceedings of the 9th International Conference on Interaction Design and Children %D 2010 %T Investigating the impact of design processes on children %A Guha,M.L. %A Druin, Allison %A Fails,J. A %B Proceedings of the 9th International Conference on Interaction Design and Children %P 198 - 201 %8 2010/// %G eng %0 Journal Article %J Machine Learning and Knowledge Discovery in Databases %D 2010 %T Learning algorithms for link prediction based on chance constraints %A Doppa,J. %A Yu,J. %A Tadepalli,P. %A Getoor, Lise %X In this paper, we consider the link prediction problem, where we are given a partial snapshot of a network at some time and the goal is to predict the additional links formed at a later time. The accuracy of current prediction methods is quite low due to the extreme class skew and the large number of potential links. Here, we describe learning algorithms based on chance constrained programs and show that they exhibit all the properties needed for a good link predictor, namely, they allow preferential bias to positive or negative class; handle skewness in the data; and scale to large networks. Our experimental results on three real-world domains—co-authorship networks, biological networks and citation networks—show significant performance improvement over baseline algorithms. We conclude by briefly describing some promising future directions based on this work. %B Machine Learning and Knowledge Discovery in Databases %P 344 - 360 %8 2010/// %G eng %R 10.1007/978-3-642-15880-3_28 %0 Journal Article %J IEEE Transactions on Intelligent Transportation Systems %D 2010 %T A Learning Approach Towards Detection and Tracking of Lane Markings %A Gopalan,R. %A Hong, T. %A Shneier, M. %A Chellapa, Rama %K Boosting %K Context %K Context modeling %K Feature extraction %K lane marking detection %K outlier robustness %K Roads %K tracking and learning %K Training %K Vehicles %X Road scene analysis is a challenging problem that has applications in autonomous navigation of vehicles. An integral component of this system is the robust detection and tracking of lane markings. It is a hard problem primarily due to large appearance variations in lane markings caused by factors such as occlusion (traffic on the road), shadows (from objects like trees), and changing lighting conditions of the scene (transition from day to night). In this paper, we address these issues through a learning-based approach using visual inputs from a camera mounted in front of a vehicle. We propose the following: 1) a pixel-hierarchy feature descriptor to model the contextual information shared by lane markings with the surrounding road region; 2) a robust boosting algorithm to select relevant contextual features for detecting lane markings; and 3) particle filters to track the lane markings, without knowledge of vehicle speed, by assuming the lane markings to be static through the video sequence and then learning the possible road scene variations from the statistics of tracked model parameters. We investigate the effectiveness of our algorithm on challenging daylight and night-time road video sequences. %B IEEE Transactions on Intelligent Transportation Systems %V PP %P 1 - 12 %8 2010/02/17/ %@ 1524-9050 %G eng %N 99 %R 10.1109/TITS.2012.2184756 %0 Journal Article %J Computer Vision–ECCV 2010 %D 2010 %T Learning what and how of contextual models for scene labeling %A Jain, A. %A Gupta,A. %A Davis, Larry S. %X We present a data-driven approach to predict the importance of edges and construct a Markov network for image analysis based on statistical models of global and local image features. We also address the coupled problem of predicting the feature weights associated with each edge of a Markov network for evaluation of context. Experimental results indicate that this scene dependent structure construction model eliminates spurious edges and improves performance over fully-connected and neighborhood connected Markov network. %B Computer Vision–ECCV 2010 %P 199 - 212 %8 2010/// %G eng %0 Journal Article %J IEEE transactions on audio, speech, and language processing %D 2010 %T Loudspeaker and Microphone Array Signal Processing-Plane-Wave Decomposition of Acoustical Scenes Via Spherical and Cylindrical Microphone Arrays %A Zotkin,Dmitry N %A Duraiswami, Ramani %A Gumerov, Nail A. %B IEEE transactions on audio, speech, and language processing %V 20 %P 2 - 2 %8 2010/// %G eng %N 1 %0 Journal Article %J arXiv:1007.3611 %D 2010 %T LP-rounding algorithms for facility-location problems %A Byrka,Jaroslaw %A Ghodsi,Mohammadreza %A Srinivasan, Aravind %K Computer Science - Data Structures and Algorithms %X We study LP-rounding approximation algorithms for metric uncapacitated facility-location problems. We first give a new analysis for the algorithm of Chudak and Shmoys, which differs from the analysis of Byrka and Aardal in that now we do not need any bound based on the solution to the dual LP program. Besides obtaining the optimal bifactor approximation as do Byrka and Aardal, we can now also show that the algorithm with scaling parameter equaling 1.58 is, in fact, an 1.58-approximation algorithm. More importantly, we suggest an approach based on additional randomization and analyses such as ours, which could achieve or approach the conjectured optimal 1.46...--approximation for this basic problem. Next, using essentially the same techniques, we obtain improved approximation algorithms in the 2-stage stochastic variant of the problem, where we must open a subset of facilities having only stochastic information about the future demand from the clients. For this problem we obtain a 2.2975-approximation algorithm in the standard setting, and a 2.4957-approximation in the more restricted, per-scenario setting. We then study robust fault-tolerant facility location, introduced by Chechik and Peleg: solutions here are designed to provide low connection cost in case of failure of up to $k$ facilities. Chechik and Peleg gave a 6.5-approximation algorithm for $k=1$ and a ($7.5k + 1.5$)-approximation algorithm for general $k$. We improve this to an LP-rounding $(k+5+4/k)$-approximation algorithm. We also observe that in case of oblivious failures the expected approximation ratio can be reduced to $k + 1.5$, and that the integrality gap of the natural LP-relaxation of the problem is at least $k + 1$. %B arXiv:1007.3611 %8 2010/07/21/ %G eng %U http://arxiv.org/abs/1007.3611 %0 Conference Paper %B Proceedings of the 28th international conference on Human factors in computing systems %D 2010 %T ManyNets: an interface for multiple network analysis and visualization %A Freire,Manuel %A Plaisant, Catherine %A Shneiderman, Ben %A Golbeck,Jen %K exploratory analysis %K graphical user interface %K Information Visualization %K interaction %K network analysis %K table interface %X Traditional network analysis tools support analysts in studying a single network. ManyNets offers these analysts a powerful new approach that enables them to work on multiple networks simultaneously. Several thousand networks can be presented as rows in a tabular visualization, and then inspected, sorted and filtered according to their attributes. The networks to be displayed can be obtained by subdivision of larger networks. Examples of meaningful subdivisions used by analysts include ego networks, community extraction, and time-based slices. Cell visualizations and interactive column overviews allow analysts to assess the distribution of attributes within particular sets of networks. Details, such as traditional node-link diagrams, are available on demand. We describe a case study analyzing a social network geared towards film recommendations by means of decomposition. A small usability study provides feedback on the use of the interface on a set of tasks issued from the case study. %B Proceedings of the 28th international conference on Human factors in computing systems %S CHI '10 %I ACM %C New York, NY, USA %P 213 - 222 %8 2010/// %@ 978-1-60558-929-9 %G eng %U http://doi.acm.org/10.1145/1753326.1753358 %R 10.1145/1753326.1753358 %0 Conference Paper %B Proceedings of the 7th USENIX conference on Networked systems design and implementation %D 2010 %T Maranello: practical partial packet recovery for 802.11 %A Han,Bo %A Schulman,Aaron %A Gringoli,Francesco %A Spring, Neil %A Bhattacharjee, Bobby %A Nava,Lorenzo %A Ji,Lusheng %A Lee,Seungjoon %A Miller,Robert %X Partial packet recovery protocols attempt to repair corrupted packets instead of retransmitting them in their entirety. Recent approaches have used physical layer confidence estimates or additional error detection codes embedded in each transmission to identify corrupt bits, or have applied forward error correction to repair without such explicit knowledge. In contrast to these approaches, our goal is a practical design that simultaneously: (a) requires no extra bits in correct packets, (b) reduces recovery latency, except in rare instances, (c) remains compatible with existing 802.11 devices by obeying timing and backoff standards, and (d) can be incrementally deployed on widely available access points and wireless cards. In this paper, we design, implement, and evaluate Maranello, a novel partial packet recovery mechanism for 802.11. In Maranello, the receiver computes checksums over blocks in corrupt packets and bundles these checksums into a negative acknowledgment sent when the sender expects to receive an acknowledgment. The sender then retransmits only those blocks for which the checksum is incorrect, and repeats this partial retransmission until it receives an acknowledgment. Successful transmissions are not burdened by additional bits and the receiver needs not infer which bits were corrupted. We implemented Maranello using OpenFWWF (open source firmware for Broadcom wireless cards) and deployed it in a small testbed. We compare Maranello to alternative recovery protocols using a trace-driven simulation and to 802.11 using a live implementation under various channel conditions. To our knowledge, Maranello is the first partial packet recovery design to be implemented in commonly available firmware. %B Proceedings of the 7th USENIX conference on Networked systems design and implementation %S NSDI'10 %I USENIX Association %C Berkeley, CA, USA %P 14 - 14 %8 2010/// %G eng %U http://dl.acm.org/citation.cfm?id=1855711.1855725 %0 Journal Article %J ACM Transactions on Applied Perception (TAP) %D 2010 %T Mesh saliency and human eye fixations %A Kim,Youngmin %A Varshney, Amitabh %A Jacobs, David W. %A Guimbretière,François %K eye-tracker %K mesh saliency %K Visual perception %X Mesh saliency has been proposed as a computational model of perceptual importance for meshes, and it has been used in graphics for abstraction, simplification, segmentation, illumination, rendering, and illustration. Even though this technique is inspired by models of low-level human vision, it has not yet been validated with respect to human performance. Here, we present a user study that compares the previous mesh saliency approaches with human eye movements. To quantify the correlation between mesh saliency and fixation locations for 3D rendered images, we introduce the normalized chance-adjusted saliency by improving the previous chance-adjusted saliency measure. Our results show that the current computational model of mesh saliency can model human eye movements significantly better than a purely random model or a curvature-based model. %B ACM Transactions on Applied Perception (TAP) %V 7 %P 12:1–12:13 - 12:1–12:13 %8 2010/02// %@ 1544-3558 %G eng %U http://doi.acm.org/10.1145/1670671.1670676 %N 2 %R 10.1145/1670671.1670676 %0 Conference Paper %B 2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) %D 2010 %T MetaPhyler: Taxonomic profiling for metagenomic sequences %A Liu,Bo %A Gibbons,T. %A Ghodsi,M. %A Pop, Mihai %K Bioinformatics %K CARMA comparison %K Databases %K Genomics %K Linear regression %K marker genes %K matching length %K Megan comparison %K metagenomic sequences %K metagenomics %K MetaPhyler %K microbial diversity %K microorganisms %K molecular biophysics %K molecular configurations %K Pattern classification %K pattern matching %K phylogenetic classification %K Phylogeny %K PhymmBL comparison %K reference gene database %K Sensitivity %K sequence matching %K taxonomic classifier %K taxonomic level %K taxonomic profiling %K whole metagenome sequencing data %X A major goal of metagenomics is to characterize the microbial diversity of an environment. The most popular approach relies on 16S rRNA sequencing, however this approach can generate biased estimates due to differences in the copy number of the 16S rRNA gene between even closely related organisms, and due to PCR artifacts. The taxonomic composition can also be determined from whole-metagenome sequencing data by matching individual sequences against a database of reference genes. One major limitation of prior methods used for this purpose is the use of a universal classification threshold for all genes at all taxonomic levels. We propose that better classification results can be obtained by tuning the taxonomic classifier to each matching length, reference gene, and taxonomic level. We present a novel taxonomic profiler MetaPhyler, which uses marker genes as a taxonomic reference. Results on simulated datasets demonstrate that MetaPhyler outperforms other tools commonly used in this context (CARMA, Megan and PhymmBL). We also present interesting results obtained by applying MetaPhyler to a real metagenomic dataset. %B 2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) %I IEEE %P 95 - 100 %8 2010/12/18/21 %@ 978-1-4244-8306-8 %G eng %R 10.1109/BIBM.2010.5706544 %0 Patent %D 2010 %T Method for concealing data in curves of an image %A M. Wu %A Gou,Hongmei %E University of Maryland %X A method of concealing data in images imperceptibly alters curves therein, such as through adding a value representing the data to be hidden to each of a number of B-spline control points representing the original curve. The altered control points characterize the imperceptibly altered curve, which replaces the original curve in the image. The altered control points may be later extracted from the image and compared with the original control points to determine the hidden value. Prudent selection of the values altering the control points as well as an iterative alignment-minimization algorithm in the detection process provides protection against numerous techniques for preventing the hidden values from being recovered. %V : 11/221,727 %8 2010/10/19/ %G eng %U http://www.google.com/patents?id=USnYAAAAEBAJ %N 7817817 %0 Patent %D 2010 %T Method for measurement of head related transfer functions %A Duraiswami, Ramani %A Gumerov, Nail A. %E University of Maryland %X Head Related Transfer Functions (HRTFs) of an individual are measured in rapid fashion in an arrangement where a sound source is positioned in the individual's ear channel, while microphones are arranged in the microphone array enveloping the individual's head. The pressure waves generated by the sounds emanating from the sound source reach the microphones and are converted into corresponding electrical signals which are further processed in a processing system to extract HRTFs, which may then be used to synthesize a spatial audio scene. The acoustic field generated by the sounds from the sound source can be evaluated at any desired point inside or outside the microphone array. %V 10/702,465 %8 2010/05/18/ %G eng %U http://www.google.com/patents?id=JHrQAAAAEBAJ %N 7720229 %0 Conference Paper %B 2010 IEEE International Conference on Control Applications (CCA) %D 2010 %T Methods for efficient implementation of Model Predictive Control on multiprocessor systems %A Gu, Ruirui %A Bhattacharyya, Shuvra S. %A Levine,W. S %K Computational modeling %K COMPUTERS %K Equations %K Hardware %K Linear systems %K Mathematical model %K model predictive control %K MPC algorithms %K Multiprocessing systems %K Multiprocessor systems %K parallel computers %K predictive control %K Program processors %X Model Predictive Control (MPC) has been used in a wide range of application areas including chemical engineering, food processing, automotive engineering, aerospace, and metallurgy. An important limitation on the application of MPC is the difficulty in completing the necessary computations within the sampling interval. Recent trends in computing hardware towards greatly increased parallelism offer a solution to this problem. This paper describes modeling and analysis tools to facilitate implementing the MPC algorithms on parallel computers, thereby greatly reducing the time needed to complete the calculations. The use of these tools is illustrated by an application to a class of MPC problems. %B 2010 IEEE International Conference on Control Applications (CCA) %P 1357 - 1362 %8 2010 %G eng %0 Conference Paper %B Proceedings of the 9th International Conference on Interaction Design and Children %D 2010 %T Mobile collaboration: collaboratively reading and creating children's stories on mobile devices %A Fails,J. A %A Druin, Allison %A Guha,M.L. %B Proceedings of the 9th International Conference on Interaction Design and Children %P 20 - 29 %8 2010/// %G eng %0 Conference Paper %B Proceedings of the 17th ACM conference on Computer and communications security %D 2010 %T A new framework for efficient password-based authenticated key exchange %A Groce,Adam %A Katz, Jonathan %K exchange %K key %K password-based %X Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The challenge in designing such protocols is that they must be immune to off-line dictionary attacks in which an eavesdropping adversary exhaustively enumerates the dictionary of likely passwords in an attempt to match a password to the set of observed transcripts. To date, few general frameworks for constructing PAKE protocols in the standard model are known. Here, we abstract and generalize a protocol by Jiang and Gong to give a new methodology for realizing PAKE without random oracles, in the common reference string model. In addition to giving a new approach to the problem, the resulting construction off ers several advantages over prior work. We also describe an extension of our protocol that is secure within the universal composability (UC) framework and, when instantiated using El Gamal encryption, is more efficient than a previous protocol of Canetti et al. %B Proceedings of the 17th ACM conference on Computer and communications security %S CCS '10 %I ACM %C New York, NY, USA %P 516 - 525 %8 2010/// %@ 978-1-4503-0245-6 %G eng %U http://doi.acm.org/10.1145/1866307.1866365 %R 10.1145/1866307.1866365 %0 Journal Article %J ACM CCCS 2010 %D 2010 %T A New Framework for Password-Based Authenticated Key Exchange %A Groce,Adam %A Katz, Jonathan %K Cryptographic protocols %K password-based key exchange %X Protocols for password-based authenticated key exchange (PAKE) allowtwo users who share only a short, low-entropy password to agree on a cryptographically strong session key. The challenge in designing such protocols is that they must be immune to off-line dictionary attacks in which an eavesdropping adversary exhaustively enumerates the dictionary of likely passwords in an attempt to match a password to the set of observed transcripts. To date, few general frameworks for constructing PAKE protocols in the standard model are known. Here, we abstract and generalize a protocol by Jiang and Gong to give a new methodology for realizing PAKE without random oracles, in the common reference string model. In addition to giving a new approach to the problem, the resulting construction offers several advantages over prior work. We also describe an extension of our protocol that is secure within the universal composability~(UC) framework and, when instantiated using El Gamal encryption, is more efficient than a previous protocol of Canetti et al. %B ACM CCCS 2010 %8 2010/// %G eng %U http://eprint.iacr.org/2010/147 %0 Patent %D 2010 %T Object Classification Using Taxonomies %A Tsaparas,Panayiotis %A Papadimitriou,Panagiotis %A Fuxman,Ariel D. %A Getoor, Lise %A Agrawal,Rakesh %E Microsoft Corporation %X As provided herein objects from a source catalog, such as a provider's catalog, can be added to a target catalog, such as an enterprise master catalog, in a scalable manner utilizing catalog taxonomies. A baseline classifier determines probabilities for source objects to target catalog classes. Source objects can be assigned to those classes with probabilities that meet a desired threshold and meet a desired rate. A classification cost for target classes can be determined for respective unassigned source objects, which can comprise determining an assignment cost and separation cost for the source objects for respective desired target classes. The separation and assignment costs can be combined to determine the classification cost, and the unassigned source objects can be assigned to those classes having a desired classification cost. %V 12/414,065 %8 2010/07/22/ %G eng %U http://www.google.com/patents?id=oXDSAAAAEBAJ %0 Journal Article %J OMICS: A Journal of Integrative Biology %D 2010 %T Occurrence of the Vibrio cholerae seventh pandemic VSP-I island and a new variant %A Grim,Christopher J. %A Choi,Jinna %A Jongsik Chun %A Jeon,Yoon-Seong %A Taviani,Elisa %A Hasan,Nur A. %A Haley,Bradd %A Huq,Anwar %A Rita R Colwell %B OMICS: A Journal of Integrative Biology %V 14 %P 1 - 7 %8 2010/02// %@ 1536-2310, 1557-8100 %G eng %U http://online.liebertpub.com/doi/abs/10.1089/omi.2009.0087 %N 1 %R 10.1089/omi.2009.0087 %0 Conference Paper %D 2010 %T One experience collecting sensitive mobile data %A Niu, Y. %A Elaine Shi %A Chow, R. %A Golle, P. %A Jakobsson, M. %X We report on our efforts to collect behavioral data basedon activities recorded by phones. We recruited Android de- vice owners and offered entry into a raffle for participants. Our application was distributed from the Android Market, and its placement there unexpectedly helped us find par- ticipants from casual users browsing for free applications. We collected data from 267 total participants who gave us varying amounts of data. %8 2010 %G eng %U http://www2.parc.com/csl/members/eshi/docs/users.pdf %0 Journal Article %J ACM Transactions on Autonomous and Adaptive Systems (TAAS) %D 2010 %T Parsimonious rule generation for a nature-inspired approach to self-assembly %A Grushin,A. %A Reggia, James A. %B ACM Transactions on Autonomous and Adaptive Systems (TAAS) %V 5 %P 1 - 24 %8 2010/// %G eng %N 3 %0 Journal Article %J Advances in Cryptology–EUROCRYPT 2010 %D 2010 %T Partial fairness in secure two-party computation %A Gordon,S. %A Katz, Jonathan %X A seminal result of Cleve (STOC ’86) is that complete fairness is impossible to achieve in two-party computation. In light of this, various techniques for obtaining partial fairness have been suggested in the literature. We propose a definition of partial fairness within the standard real-/ideal-world paradigm that addresses deficiencies of prior definitions. We also show broad feasibility results with respect to our definition: partial fairness is possible for any (randomized) functionality f:X ×Y →Z 1 ×Z 2 at least one of whose domains or ranges is polynomial in size. Our protocols are always private, and when one of the domains has polynomial size our protocols also simultaneously achieve the usual notion of security with abort. In contrast to some prior work, we rely on standard assumptions only.We also show that, as far as general feasibility is concerned, our results are optimal (with respect to our definition). %B Advances in Cryptology–EUROCRYPT 2010 %P 157 - 176 %8 2010/// %G eng %R 10.1007/978-3-642-13190-5_8 %0 Journal Article %J IEEE Transactions on Audio, Speech, and Language Processing %D 2010 %T Plane-Wave Decomposition of Acoustical Scenes Via Spherical and Cylindrical Microphone Arrays %A Zotkin,Dmitry N %A Duraiswami, Ramani %A Gumerov, Nail A. %K Acoustic fields %K acoustic position measurement %K acoustic signal processing %K acoustic waves %K acoustical scene analysis %K array signal processing %K circular arrays %K cylindrical microphone arrays %K direction-independent acoustic behavior %K microphone arrays %K orthogonal basis functions %K plane-wave decomposition %K Position measurement %K signal reconstruction %K sound field reconstruction %K sound field representation %K source localization %K spatial audio playback %K spherical harmonics based beamforming algorithm %K spherical microphone arrays %X Spherical and cylindrical microphone arrays offer a number of attractive properties such as direction-independent acoustic behavior and ability to reconstruct the sound field in the vicinity of the array. Beamforming and scene analysis for such arrays is typically done using sound field representation in terms of orthogonal basis functions (spherical/cylindrical harmonics). In this paper, an alternative sound field representation in terms of plane waves is described, and a method for estimating it directly from measurements at microphones is proposed. It is shown that representing a field as a collection of plane waves arriving from various directions simplifies source localization, beamforming, and spatial audio playback. A comparison of the new method with the well-known spherical harmonics based beamforming algorithm is done, and it is shown that both algorithms can be expressed in the same framework but with weights computed differently. It is also shown that the proposed method can be extended to cylindrical arrays. A number of features important for the design and operation of spherical microphone arrays in real applications are revealed. Results indicate that it is possible to reconstruct the sound scene up to order p with p2 microphones spherical array. %B IEEE Transactions on Audio, Speech, and Language Processing %V 18 %P 2 - 16 %8 2010/01// %@ 1558-7916 %G eng %N 1 %R 10.1109/TASL.2009.2022000 %0 Journal Article %J Environmental Microbiology Reports %D 2010 %T The pre‐seventh pandemic Vibrio cholerae BX 330286 El Tor genome: evidence for the environment as a genome reservoir %A Haley,Bradd J. %A Grim,Christopher J. %A Hasan,Nur A. %A Taviani,Elisa %A Jongsik Chun %A Brettin,Thomas S. %A Bruce,David C. %A Challacombe,Jean F. %A Detter,J. Chris %A Han,Cliff S. %A Huq,Anwar %A Nair,G. Balakrish %A Rita R Colwell %X Vibrio cholerae O1 El Tor BX 330286 was isolated from a water sample in Australia in 1986, 9 years after an indigenous outbreak of cholera occurred in that region. This environmental strain encodes virulence factors highly similar to those of clinical strains, suggesting an ability to cause disease in humans. We demonstrate its high similarity in gene content and genome-wide nucleotide sequence to clinical V. cholerae strains, notably to pre-seventh pandemic O1 El Tor strains isolated in 1910 (V. cholerae NCTC 8457) and 1937 (V. cholerae MAK 757), as well as seventh pandemic strains isolated after 1960 globally. Here we demonstrate that this strain represents a transitory clone with shared characteristics between pre-seventh and seventh pandemic strains of V. cholerae. Interestingly, this strain was isolated 25 years after the beginning of the seventh pandemic, suggesting the environment as a genome reservoir in areas where cholera does not occur in sporadic, endemic or epidemic form. %B Environmental Microbiology Reports %V 2 %P 208 - 216 %8 2010/02/01/ %@ 1758-2229 %G eng %U http://onlinelibrary.wiley.com/doi/10.1111/j.1758-2229.2010.00141.x/abstract?userIsAuthenticated=false&deniedAccessCustomisedMessage= %N 1 %R 10.1111/j.1758-2229.2010.00141.x %0 Journal Article %J Proceedings of the Conference on Uncertainty in Artificial Intelligence %D 2010 %T Probabilistic similarity logic %A Bröcheler,M. %A Mihalkova,L. %A Getoor, Lise %X Many machine learning applications require theability to learn from and reason about noisy multi-relational data. To address this, several ef- fective representations have been developed that provide both a language for expressing the struc- tural regularities of a domain, and principled sup- port for probabilistic inference. In addition to these two aspects, however, many applications also involve a third aspect–the need to reason about similarities–which has not been directly supported in existing frameworks. This paper introduces probabilistic similarity logic (PSL), a general-purpose framework for joint reason- ing about similarity in relational domains that incorporates probabilistic reasoning about sim- ilarities and relational structure in a principled way. PSL can integrate any existing domain- specific similarity measures and also supports reasoning about similarities between sets of en- tities. We provide efficient inference and learn- ing techniques for PSL and demonstrate its ef- fectiveness both in common relational tasks and in settings that require reasoning about similarity. %B Proceedings of the Conference on Uncertainty in Artificial Intelligence %8 2010/// %G eng %0 Journal Article %J Proc. VLDB Endow. %D 2010 %T Read-once functions and query evaluation in probabilistic databases %A Sen,Prithviraj %A Deshpande, Amol %A Getoor, Lise %X Probabilistic databases hold promise of being a viable means for large-scale uncertainty management, increasingly needed in a number of real world applications domains. However, query evaluation in probabilistic databases remains a computational challenge. Prior work on efficient exact query evaluation in probabilistic databases has largely concentrated on query-centric formulations (e.g., safe plans, hierarchical queries), in that, they only consider characteristics of the query and not the data in the database. It is easy to construct examples where a supposedly hard query run on an appropriate database gives rise to a tractable query evaluation problem. In this paper, we develop efficient query evaluation techniques that leverage characteristics of both the query and the data in the database. We focus on tuple-independent databases where the query evaluation problem is equivalent to computing marginal probabilities of Boolean formulas associated with the result tuples. This latter task is easy if the Boolean formulas can be factorized into a form that has every variable appearing at most once (called read-once). However, a naive approach that directly uses previously developed Boolean formula factorization algorithms is inefficient, because those algorithms require the input formulas to be in the disjunctive normal form (DNF). We instead develop novel, more efficient factorization algorithms that directly construct the read-once expression for a result tuple Boolean formula (if one exists), for a large subclass of queries (specifically, conjunctive queries without self-joins). We empirically demonstrate that (1) our proposed techniques are orders of magnitude faster than generic inference algorithms for queries where the result Boolean formulas can be factorized into read-once expressions, and (2) for the special case of hierarchical queries, they rival the efficiency of prior techniques specifically designed to handle such queries. %B Proc. VLDB Endow. %V 3 %P 1068 - 1079 %8 2010/09// %@ 2150-8097 %G eng %U http://dl.acm.org/citation.cfm?id=1920841.1920975 %N 1-2 %0 Journal Article %J AI Magazine %D 2010 %T REPORTS AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead %A Horvitz,E. %A Getoor, Lise %A Guestrin,C. %A Hendler,J. %A Kautz,H. %A Konstan,J. %A Subramanian,D. %A Wellman,M. %B AI Magazine %V 31 %P 87 - 87 %8 2010/// %G eng %N 3 %0 Conference Paper %D 2010 %T A Review of Bird-Inspired Flapping Wing Miniature Air Vehicle Designs %A Gerdes,John W. %A Gupta, Satyandra K. %A Wilkerson,Stephen A. %X Physical and aerodynamic characteristics of the bird in flight may offer benefits over typical propeller or rotor driven miniature air vehicle (MAV) locomotion designs in certain types of scenarios. A number of research groups and companies have developed flapping wing vehicles that attempt to harness these benefits. The purpose of this paper is to report different types of flapping wing designs and compare their salient characteristics. For each category, advantages and disadvantages will be discussed. The discussion presented will be limited to miniature-sized flapping wing air vehicles, defined as 10–100 grams total weight. The discussion will be focused primarily on ornithopters which have performed at least one successful test flight. Additionally, this paper is intended to provide a representation of the field of current technology, rather than providing a comprehensive listing of all possible designs. This paper will familiarize a newcomer to the field with existing designs and their distinguishing features. By studying existing designs, future designers will be able to adopt features from other successful designs. This paper also summarizes the design challenges associated with the further advancement of the field and deploying flapping wing vehicles in practice. %I ASME %C Montreal, Quebec, Canada %V 2 %P 57 - 67 %8 2010/// %@ 978-0-7918-4410-6 %G eng %U http://link.aip.org/link/ASMECP/v2010/i44106/p57/s1&Agg=doi %R 10.1115/DETC2010-28513 %0 Journal Article %J Computer Vision–ECCV 2010 %D 2010 %T A robust and scalable approach to face identification %A Schwartz,W. %A Guo,H. %A Davis, Larry S. %X The problem of face identification has received significant attention over the years. For a given probe face, the goal of face identification is to match this unknown face against a gallery of known people. Due to the availability of large amounts of data acquired in a variety of conditions, techniques that are both robust to uncontrolled acquisition conditions and scalable to large gallery sizes, which may need to be incrementally built, are challenges. In this work we tackle both problems. Initially, we propose a novel approach to robust face identification based on Partial Least Squares (PLS) to perform multi-channel feature weighting. Then, we extend the method to a tree-based discriminative structure aiming at reducing the time required to evaluate novel probe samples. The method is evaluated through experiments on FERET and FRGC datasets. In most of the comparisons our method outperforms state-of-art face identification techniques. Furthermore, our method presents scalability to large datasets. %B Computer Vision–ECCV 2010 %P 476 - 489 %8 2010/// %G eng %0 Journal Article %J Public Key Cryptography–PKC 2010 %D 2010 %T Secure network coding over the integers %A Gennaro,R. %A Katz, Jonathan %A Krawczyk,H. %A Rabin,T. %X Network coding offers the potential to increase throughput and improve robustness without any centralized control. Unfortunately, network coding is highly susceptible to “pollution attacks” in which malicious nodes modify packets improperly so as to prevent message recovery at the recipient(s); such attacks cannot be prevented using standard end-to-end cryptographic authentication because network coding mandates that intermediate nodes modify data packets in transit.Specialized “network coding signatures” addressing this problem have been developed in recent years using homomorphic hashing and homomorphic signatures. We contribute to this area in several ways: • We show the first homomorphic signature scheme based on the RSA assumption (in the random oracle model). • We give a homomorphic hashing scheme that is more efficient than existing schemes, and which leads to network coding signatures based on the hardness of factoring (in the standard model). • We describe variants of existing schemes that reduce the communication overhead for moderate-size networks, and improve computational efficiency (in some cases quite dramatically – e.g., we achieve a 20-fold speedup in signature generation at intermediate nodes). Underlying our techniques is a modified approach to random linear network coding where instead of working in a vector space over a field, we work in a module over the integers (with small coefficients). %B Public Key Cryptography–PKC 2010 %P 142 - 160 %8 2010/// %G eng %R 10.1007/978-3-642-13013-7_9 %0 Journal Article %J Journal of Computing and Information Science in Engineering %D 2010 %T Stochastic simulations with graphics hardware: Characterization of accuracy and performance %A Balijepalli,A. %A LeBrun,T. W. %A Gupta,S.K. %B Journal of Computing and Information Science in Engineering %V 10 %P 011010 - 011010 %8 2010/// %G eng %0 Conference Paper %D 2010 %T Strategy generation in multi-agent imperfect-information pursuit games %A Raboin,Eric %A Nau, Dana S. %A Kuter,Ugur %A Gupta, Satyandra K. %A Svec,Petr %K game tree search %K multi-agent planning %K visibility-based pursuit-evasion games %X We describe a formalism and algorithms for game-tree search in partially-observable Euclidean space, and implementation and tests in a scenario where a multi-agent team, called tracking agents, pursues a target agent that wants to evade the tracking agents. Our contributions include--- • A formalism that combines geometric elements (agents' locations and trajectories and observable regions, and obstacles that restrict mobility and observability) with game-theoretic elements (information sets, utility functions, and strategies). • A recursive formula for information-set minimax values based on our formalism, and a implementation of the formula in a game-tree search algorithm. • A heuristic evaluation function for use at the leaf nodes of the game-tree search. It works by doing a quick lookahead search of its own, in a relaxed version of the problem. • Experimental results in 500 randomly generated trials. With the strategies generated by our heuristic, the tracking agents were more than twice as likely to know the target agent's location at the end of the game than with the strategies generated by heuristics that compute estimates of the target's possible locations. %S AAMAS '10 %I International Foundation for Autonomous Agents and Multiagent Systems %C Richland, SC %P 947 - 954 %8 2010/// %@ 978-0-9826571-1-9 %G eng %U http://dl.acm.org/citation.cfm?id=1838206.1838333 %0 Journal Article %J ACM SIGKDD Explorations Newsletter %D 2010 %T Summary of the first ACM SIGKDD workshop on knowledge discovery from uncertain data (U'09) %A Pei,Jian %A Getoor, Lise %A de Keijzer,Ander %B ACM SIGKDD Explorations Newsletter %V 11 %P 90 - 91 %8 2010/05// %@ 1931-0145 %G eng %U http://doi.acm.org/10.1145/1809400.1809419 %N 2 %R 10.1145/1809400.1809419 %0 Journal Article %J Link Mining: Models, Algorithms, and Applications %D 2010 %T A survey of link mining tasks for analyzing noisy and incomplete networks %A Namata,G.M. %A Sharara,H. %A Getoor, Lise %X Many data sets of interest today are best described as networks or graphs of interlinked entities. Examples include Web and text collections, social networks and social media sites, information, transaction and communication networks, and all manner of scientific networks, including biological networks. Unfortunately, often the data collection and extraction process for gathering these network data sets is imprecise, noisy, and/or incomplete. In this chapter, we review a collection of link mining algorithms that are well suited to analyzing and making inferences about networks, especially in the case where the data is noisy or missing. %B Link Mining: Models, Algorithms, and Applications %P 107 - 133 %8 2010/// %G eng %R 10.1007/978-1-4419-6515-8_4 %0 Patent %D 2010 %T System and Method for Confidentiality-Preserving Rank-Ordered Search %A Swaminathan,Ashwin %A Mao,Yinian %A Su,Guan-Ming %A Gou,Hongmei %A Varna,Avinash L. %A He,Shan %A M. Wu %A Oard, Douglas %X A confidentiality preserving system and method for performing a rank-ordered search and retrieval of contents of a data collection. The system includes at least one computer system including a search and retrieval algorithm using term frequency and/or similar features for rank-ordering selective contents of the data collection, and enabling secure retrieval of the selective contents based on the rank-order. The search and retrieval algorithm includes a baseline algorithm, a partially server oriented algorithm, and/or a fully server oriented algorithm. The partially and/or fully server oriented algorithms use homomorphic and/or order preserving encryption for enabling search capability from a user other than an owner of the contents of the data collection. The confidentiality preserving method includes using term frequency for rank-ordering selective contents of the data collection, and retrieving the selective contents based on the rank-order. %V 12/608,724 %8 2010/06/10/ %G eng %U http://www.google.com/patents?id=kInVAAAAEBAJ %0 Conference Paper %D 2010 %T A Systematic Methodology for Accurate Design-Stage Estimation of Energy Consumption for Injection Molded Parts %A Weissman,A. %A Ananthanarayanan,A. %A Gupta,S.K. %A Sriram,R.D. %X Today's ubiquitous use of plastics in product designand manufacturing presents significant environmental and human health challenges. Injection molding, one of the most commonly used processes for making plastic products, consumes a significant amount of energy. A methodology for accurately estimating the energy consumed to injection-mold a part would enable environmentally conscious decision making during the product design. Unfortunately, only limited information is available at the design stage. Therefore, accurately estimating energy consumption before the part has gone into production can be challenging. In this paper, we describe a methodology for energy estimation that works with the limited amount of data available during the design stage, namely the CAD model of the part, the material name, and the production requirements. This methodology uses this data to estimate the parameters of the runner system and an appropriately sized molding machine. It then uses these estimates to compute the machine setup time and the cycle time required for the injection molding operation. This is done by appropriately abstracting information available from the mold flow simulation tools and analytical models that are traditionally used during the manufacturing stage. These times are then multiplied by the power consumed by the appropriately sized machine during each stage of the molding cycle to compute the estimated energy consumption per part. %8 2010/// %G eng %U http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.165.4139&rep=rep1&type=pdf %0 Conference Paper %B Proceedings of the 28th international conference on Human factors in computing systems %D 2010 %T Toque: designing a cooking-based programming language for and with children %A Tarkan,S. %A Sazawal,V. %A Druin, Allison %A Golub,E. %A Bonsignore,E. M %A Walsh,G. %A Atrash,Z. %B Proceedings of the 28th international conference on Human factors in computing systems %P 2417 - 2426 %8 2010/// %G eng %0 Conference Paper %B Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems %D 2010 %T On trade-offs in event delivery systems %A Roitman,H. %A Gal,A. %A Raschid, Louiqa %B Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems %P 116 - 127 %8 2010/// %G eng %0 Journal Article %J Advances in Social Network Mining and Analysis %D 2010 %T Using friendship ties and family circles for link prediction %A Zheleva,E. %A Getoor, Lise %A Golbeck,J. %A Kuter,U. %X Social networks can capture a variety of relationships among the participants. Both friendship and family ties are commonly studied, but most existing work studies them in isolation. Here, we investigate how these networks can be overlaid, and propose a feature taxonomy for link prediction. We show that when there are tightly-knit family circles in a social network, we can improve the accuracy of link prediction models. This is done by making use of the family circle features based on the likely structural equivalence of family members. We investigated the predictive power of overlaying friendship and family ties on three real-world social networks. Our experiments demonstrate significantly higher prediction accuracy (between 15% and 30% more accurate) compared to using more traditional features such as descriptive node attributes and structural features. The experiments also show that a combination of all three types of attributes results in the best precision-recall trade-off. %B Advances in Social Network Mining and Analysis %P 97 - 113 %8 2010/// %G eng %R 10.1007/978-3-642-14929-0_6 %0 Journal Article %J Hydrobiologia %D 2010 %T Validating the systematic position of ıt Plationus Segers, Murugan & Dumont, 1993 (Rotifera: Brachionidae) using sequences of the large subunit of the nuclear ribosomal DNA and of cytochrome C oxidase %A Reyna-Fabian,ME %A Laclette,J. P %A Cummings, Michael P. %A García-Varela,M %K Cox1; %K likelihood; %K LSU; %K maximum %K Phylogeny %K Plationus; %X Members of the family Brachionidae are free-living organisms that range in size from 170 to 250 microns. They comprise part of the zooplankton in freshwater and marine systems worldwide. Morphologically, members of the family are characterized by a single piece loricated body without furrows, grooves, sulci or dorsal head shields, and a malleate trophi. Differences in these structures have been traditionally used to recognize 217 species that are classified into seven genera. However, the validity of the species, Plationus patulus, P. patulus macracanthus P. polyacanthus, and P. felicitas have been confused because they were alternatively assigned in Brachionus or Platyias, when considering only morphological and ecological characters. Based on scanning electron microscope (SEM) images of the trophi, these taxa were assigned in a new genus, Plationus. In this study, we examined the systematic position of P. patulus and P. patulus macracanthus using DNA sequences of two genes: the cytochrome oxidase subunit 1 (cox1) and domains D2 and D3 of the large subunit of the nuclear ribosomal RNA (LSU). In addition, the cox1 and LSU sequences representing five genera of Brachionidae (Anuraeopsis, Brachionus, Keratella, Plationus, and Platyias) plus four species of three families from the order Ploima were used as the outgroup. The maximum likelihood (ML) analyses were conducted for each individual gene as well as for the combined (cox1 + LSU) data set. The ML tree from the combined data set yielded the family Brachionidae as a monophyletic group with weak bootstrap support (< 50%). Five main clades in this tree had high (> 85%) bootstrap support. The first clade was composed of three populations of P. patulus + P. patulus macracanthus. The second clade was composed of a single species of Platyias. The third clade was composed of six species of Brachionus. The fourth clade included a single species of the genus Anuraeopsis, and the fifth clade was composed of three species of the genus Keratella. The genetic divergence between Plationus and Platyias ranged from 18.4 to 19.2% for cox1, and from 4.5 to 4.9% for LSU, and between Brachionus and Plationus, it ranged from 16.9 to 23.1% (cox1), and from 7.3 to 9.1% (LSU). Morphological evidence, the amount of genetic divergence, the systematic position of Plationus within the family Brachionidae, and the position of Plationus as a sister group of Brachionus and Platyias support the validity of Plationus patulus and P. patulus macracanthus into the genus Plationus. %B Hydrobiologia %V 644 %P 361 - 370 %8 2010/05// %G eng %N 1 %R DOI 10.1007/s10750-010-0203-1 %0 Conference Paper %B Visual Analytics Science and Technology (VAST), 2010 IEEE Symposium on %D 2010 %T VAST 2010 Challenge: Arms dealings and pandemics %A Grinstein,G. %A Konecni,S. %A Scholtz,J. %A Whiting,M. %A Plaisant, Catherine %K 2010 %K administrative %K admission;intelligence %K analysis;interactive %K analysis;medical %K challenge;arms %K challenge;hospital %K data %K data;grand %K dealings;bioinformatics;dangerous %K mutations;death %K processing;weapons; %K records;genetic %K reports;bioinformatics;data %K VAST %K viral %K visualizations;minichallenge;pandemics;text %X The 5th VAST Challenge consisted of three mini-challenges that involved both intelligence analysis and bioinformatics. Teams could solve one, two or all three mini-challenges and assess the overall situation to enter the Grand Challenge. Mini-challenge one involved text reports about people and events giving information about arms dealers, situations in various countries and linkages between different countries. Mini-challenge two involved hospital admission and death records from various countries providing information about the spread of a world wide pandemic. Mini-challenge three involved genetic data to be used to identify the origin of the pandemic and the most dangerous viral mutations. The Grand Challenge was to determine how these various mini-challenges were connected. As always the goal was to analyze the data and provide novel interactive visualizations useful in the analytic process. We received 58 submissions in total and gave 15 awards. %B Visual Analytics Science and Technology (VAST), 2010 IEEE Symposium on %P 263 - 264 %8 2010/10// %G eng %R 10.1109/VAST.2010.5649054 %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 2010 %T Video Metrology Using a Single Camera %A Guo,Feng %A Chellapa, Rama %K camera;vanishing %K circles;uncalibrated %K concentric %K image-based %K information;vehicle %K line %K measurement;video %K metrology;cameras;image %K processing; %K segment;multiple %K segmentation;video %K signal %K single %K techniques;line %K wheelbase %X This paper presents a video metrology approach using an uncalibrated single camera that is either stationary or in planar motion. Although theoretically simple, measuring the length of even a line segment in a given video is often a difficult problem. Most existing techniques for this task are extensions of single image-based techniques and do not achieve the desired accuracy especially in noisy environments. In contrast, the proposed algorithm moves line segments on the reference plane to share a common endpoint using the vanishing line information followed by fitting multiple concentric circles on the image plane. A fully automated real-time system based on this algorithm has been developed to measure vehicle wheelbases using an uncalibrated stationary camera. The system estimates the vanishing line using invariant lengths on the reference plane from multiple frames rather than the given parallel lines, which may not exist in videos. It is further extended to a camera undergoing a planar motion by automatically selecting frames with similar vanishing lines from the video. Experimental results show that the measurement results are accurate enough to classify moving vehicles based on their size. %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %V 32 %P 1329 - 1335 %8 2010/07// %@ 0162-8828 %G eng %N 7 %R 10.1109/TPAMI.2010.26 %0 Journal Article %J Artificial Intelligence %D 2010 %T When is it better not to look ahead? %A Nau, Dana S. %A Luštrek,Mitja %A Parker,Austin %A Bratko,Ivan %A Gams,Matjaž %K Game-tree search %K Lookahead pathology %K minimax %X In situations where one needs to make a sequence of decisions, it is often believed that looking ahead will help produce better decisions. However, it was shown 30 years ago that there are “pathological” situations in which looking ahead is counterproductive. Two long-standing open questions are (a) what combinations of factors have the biggest influence on whether lookahead pathology occurs, and (b) whether it occurs in real-world decision-making.This paper includes simulation results for several synthetic game-tree models, and experimental results for three well-known board games: two chess endgames, kalah (with some modifications to facilitate experimentation), and the 8-puzzle. The simulations show the interplay between lookahead pathology and several factors that affect it; and the experiments confirm the trends predicted by the simulation models. The experiments also show that lookahead pathology is more common than has been thought: all three games contain situations where it occurs. %B Artificial Intelligence %V 174 %P 1323 - 1338 %8 2010/11// %@ 0004-3702 %G eng %U http://www.sciencedirect.com/science/article/pii/S0004370210001402 %N 16–17 %R 10.1016/j.artint.2010.08.002 %0 Conference Paper %B SIGCHI '10 %D 2010 %T Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home %A Marshini Chetty %A Banks, Richard %A Harper, Richard %A Regan, Tim %A Sellen, Abigail %A Gkantsidis, Christos %A Karagiannis, Thomas %A Key, Peter %K bandwidth monitoring %K home broadband %K home networks %X As more technologies enter the home, householders are burdened with the task of digital housekeeping-managing and sharing digital resources like bandwidth. In response to this, we created and evaluated a domestic tool for bandwidth management called Home Watcher. Our field trial showed that when resource contention amongst different household members is made visible, people's understanding of bandwidth changes and household politics are revealed. In this paper, we describe the consequences of showing real time resource usage in a home, and how this varies depending on the social make up of the household. %B SIGCHI '10 %S CHI '10 %I ACM %P 659 - 668 %8 2010/// %@ 978-1-60558-929-9 %G eng %U http://doi.acm.org/10.1145/1753326.1753423 %0 Journal Article %J Information VisualizationInformation Visualization %D 2009 %T Advancing User-Centered Evaluation of Visual Analytic Environments Through Contests %A Costello,Loura %A Grinstein,Georges %A Plaisant, Catherine %A Scholtz,Jean %K metrics %K synthetic data %K user-centered evaluation %K visual analytics %X In this paper, the authors describe the Visual Analytics Science and Technology (VAST) Symposium contests run in 2006 and 2007 and the VAST 2008 and 2009 challenges. These contests were designed to provide researchers with a better understanding of the tasks and data that face potential end users. Access to these end users is limited because of time constraints and the classified nature of the tasks and data. In that respect, the contests serve as an intermediary, with the metrics and feedback serving as measures of utility to the end users. The authors summarize the lessons learned and the future directions for VAST Challenges. %B Information VisualizationInformation Visualization %V 8 %P 230 - 238 %8 2009/09/21/ %@ 1473-8716, 1473-8724 %G eng %U http://ivi.sagepub.com/content/8/3/230 %N 3 %R 10.1057/ivs.2009.16 %0 Conference Paper %B Data Engineering, 2009. ICDE '09. IEEE 25th International Conference on %D 2009 %T Aggregate Query Answering under Uncertain Schema Mappings %A Gal,A. %A Martinez,M. V %A Simari,G. I %A V.S. Subrahmanian %K aggregate %K algorithm;probabilistic %K answering;by-table %K complexity;data %K complexity;distributed %K database;polynomial %K databases; %K databases;probability;query %K integration;distribution %K mapping;computational %K mapping;query %K processing;range %K processing;statistical %K query %K schema %K semantics;by-tuple %K semantics;computational %K semantics;expected %K semantics;multiple %K semantics;uncertain %K TIME %K value %X Recent interest in managing uncertainty in data integration has led to the introduction of probabilistic schema mappings and the use of probabilistic methods to answer queries across multiple databases using two semantics: by-table and by-tuple. In this paper, we develop three possible semantics for aggregate queries: the range, distribution, and expected value semantics, and show that these three semantics combine with the by-table and by-tuple semantics in six ways. We present algorithms to process COUNT, AVG, SUM, MIN, and MAX queries under all six semantics and develop results on the complexity of processing such queries under all six semantics. We show that computing COUNT is in PTIME for all six semantics and computing SUM is in PTIME for all but the by-tuple/distribution semantics. Finally, we show that AVG, MIN, and MAX are PTIME computable for all by-table semantics and for the by-tuple/range semantics.We developed a prototype implementation and experimented with both real-world traces and simulated data. We show that, as expected, naive processing of aggregates does not scale beyond small databases with a small number of mappings. The results also show that the polynomial time algorithms are scalable up to several million tuples as well as with a large number of mappings. %B Data Engineering, 2009. ICDE '09. IEEE 25th International Conference on %P 940 - 951 %8 2009/04/29/2 %G eng %R 10.1109/ICDE.2009.55 %0 Journal Article %J Journal of Computing and Information Science in Engineering %D 2009 %T Algorithms for extraction of nanowire lengths and positions from optical section microscopy image sequence %A Peng,T. %A Balijepalli,A. %A Gupta,S.K. %A LeBrun,T. W. %B Journal of Computing and Information Science in Engineering %V 9 %P 041007 - 041007 %8 2009/// %G eng %0 Journal Article %J Robotics and Computer-Integrated Manufacturing %D 2009 %T Algorithms for generating multi-stage molding plans for articulated assemblies %A Priyadarshi,Alok K. %A Gupta, Satyandra K. %K In-mold assembly %K mold design %K Process planning %X Multi-stage molding is capable of producing better-quality articulated products at a lower cost. During the multi-stage molding process, assembly operations are performed along with the molding operations. Hence, it gives rise to a new type of planning problem. It is difficult to perform the planning manually because it involves evaluating large number of combinations and solving complex geometric reasoning problems. This paper investigates the problem of generating multi-stage molding plans for articulated assemblies. We present a planning framework that allows us to utilize constraints from experimentally proven molding plans. As a part of the planning problem, we determine the molding sequence and intermediate assembly configurations. We present algorithms for all the steps in the planning problem and characterize their computational complexities. Finally, we illustrate our approach with representative examples. %B Robotics and Computer-Integrated Manufacturing %V 25 %P 91 - 106 %8 2009/02// %@ 0736-5845 %G eng %U http://www.sciencedirect.com/science/article/pii/S0736584507001044 %N 1 %R 10.1016/j.rcim.2007.10.002 %0 Conference Paper %B Proceedings of the fourth international conference on Communities and technologies %D 2009 %T Analyzing (social media) networks with NodeXL %A Smith,Marc A. %A Shneiderman, Ben %A Milic-Frayling,Natasa %A Mendes Rodrigues,Eduarda %A Barash,Vladimir %A Dunne,Cody %A Capone,Tony %A Perer,Adam %A Gleave,Eric %K excel %K network analysis %K social media %K social network %K spreadsheet %K Visualization %X We present NodeXL, an extendible toolkit for network overview, discovery and exploration implemented as an add-in to the Microsoft Excel 2007 spreadsheet software. We demonstrate NodeXL data analysis and visualization features with a social media data sample drawn from an enterprise intranet social network. A sequence of NodeXL operations from data import to computation of network statistics and refinement of network visualization through sorting, filtering, and clustering functions is described. These operations reveal sociologically relevant differences in the patterns of interconnection among employee participants in the social media space. The tool and method can be broadly applied. %B Proceedings of the fourth international conference on Communities and technologies %S C&T '09 %I ACM %C New York, NY, USA %P 255 - 264 %8 2009/// %@ 978-1-60558-713-4 %G eng %U http://doi.acm.org/10.1145/1556460.1556497 %R 10.1145/1556460.1556497 %0 Conference Paper %B Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$ %D 2009 %T Arabic Cross-Document Coreference Resolution %A Sayeed,A. %A Elsayed,T. %A Garera,N. %A Alexander,D. %A Xu,T. %A Oard, Douglas %A Yarowsky,D. %A Piatko,C. %B Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$ %P 357 - 360 %8 2009/// %G eng %0 Journal Article %J Journal of Systems and Software %D 2009 %T An assessment of systems and software engineering scholars and institutions (2002–2006) %A Wong,W. Eric %A Tse,T.H. %A Glass,Robert L. %A Basili, Victor R. %A Chen,T.Y. %K Research publications %K Systems and software engineering %K Top institutions %K Top scholars %X This paper summarizes a survey of publications in the field of systems and software engineering from 2002 to 2006. The survey is an ongoing, annual event that identifies the top 15 scholars and institutions over a 5-year period. The rankings are calculated based on the number of papers published in TSE, TOSEM, JSS, SPE, EMSE, IST, and Software. The top-ranked institution is Korea Advanced Institute of Science and Technology, Korea, and the top-ranked scholar is Magne Jørgensen of Simula Research Laboratory, Norway. %B Journal of Systems and Software %V 82 %P 1370 - 1373 %8 2009/08// %@ 0164-1212 %G eng %U http://www.sciencedirect.com/science/article/pii/S0164121209001265 %N 8 %R 10.1016/j.jss.2009.06.018 %0 Conference Paper %B Proceedings of the 16th ACM conference on Computer and communications security %D 2009 %T Attacking cryptographic schemes based on "perturbation polynomials" %A Albrecht,Martin %A Gentry,Craig %A Halevi,Shai %A Katz, Jonathan %K pairwise key establishment %K random perturbation polynomial %K sensor network security %X We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use "perturbation polynomials" to add "noise" to polynomialbased systems that offer information-theoretic security, in an attempt to increase the resilience threshold while maintaining efficiency. We show that the heuristic security arguments given for these modified schemes do not hold, and that they can be completely broken once we allow even a slight extension of the parameters beyond those achieved by the underlying information-theoretic schemes. Our attacks apply to the key predistribution scheme of Zhang et al. (MobiHoc 2007), the access-control schemes of Subramanian et al. (PerCom 2007), and the authentication schemes of Zhang et al. (INFOCOM 2008). Our results cast doubt on the viability of using "perturbation polynomials" for designing secure cryptographic schemes. %B Proceedings of the 16th ACM conference on Computer and communications security %S CCS '09 %I ACM %C New York, NY, USA %P 1 - 10 %8 2009/// %@ 978-1-60558-894-0 %G eng %U http://doi.acm.org/10.1145/1653662.1653664 %R 10.1145/1653662.1653664 %0 Conference Paper %B Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence %D 2009 %T Bisimulation-based approximate lifted inference %A Sen,Prithviraj %A Deshpande, Amol %A Getoor, Lise %X There has been a great deal of recent interest in methods for performing lifted inference; however, most of this work assumes that the first-order model is given as input to the system. Here, we describe lifted inference algorithms that determine symmetries and automatically lift the probabilistic model to speedup inference. In particular, we describe approximate lifted inference techniques that allow the user to trade off inference accuracy for computational efficiency by using a handful of tunable parameters, while keeping the error bounded. Our algorithms are closely related to the graph-theoretic concept of bisimulation. We report experiments on both synthetic and real data to show that in the presence of symmetries, run-times for inference can be improved significantly, with approximate lifted inference providing orders of magnitude speedup over ground inference. %B Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence %S UAI '09 %I AUAI Press %C Arlington, Virginia, United States %P 496 - 505 %8 2009/// %@ 978-0-9749039-5-8 %G eng %U http://dl.acm.org/citation.cfm?id=1795114.1795172 %0 Journal Article %J The Journal of the Acoustical Society of America %D 2009 %T A broadband fast multipole accelerated boundary element method for the three dimensional Helmholtz equation %A Gumerov, Nail A. %A Duraiswami, Ramani %K acoustic wave scattering %K boundary-elements methods %K boundary-value problems %K Helmholtz equations %K iterative methods %X The development of a fast multipole method (FMM) accelerated iterative solution of the boundary element method (BEM) for the Helmholtz equations in three dimensions is described. The FMM for the Helmholtz equation is significantly different for problems with low and high kD (where k is the wavenumber and D the domain size), and for large problems the method must be switched between levels of the hierarchy. The BEM requires several approximate computations (numerical quadrature, approximations of the boundary shapes using elements), and these errors must be balanced against approximations introduced by the FMM and the convergence criterion for iterative solution. These different errors must all be chosen in a way that, on the one hand, excess work is not done and, on the other, that the error achieved by the overall computation is acceptable. Details of translation operators for low and high kD, choice of representations, and BEM quadrature schemes, all consistent with these approximations, are described. A novel preconditioner using a low accuracy FMM accelerated solver as a right preconditioner is also described. Results of the developed solvers for large boundary value problems with 0.0001≲kD≲500 are presented and shown to perform close to theoretical expectations. %B The Journal of the Acoustical Society of America %V 125 %P 191 - 205 %8 2009/// %G eng %U http://link.aip.org/link/?JAS/125/191/1 %N 1 %R 10.1121/1.3021297 %0 Journal Article %J Proceedings of Workshop on Analyzing Networks and Learning with Graphs at NIPS Conference %D 2009 %T Chance-constrained programs for link prediction %A Doppa,J.R. %A Yu,J. %A Tadepalli,P. %A Getoor, Lise %X In this paper, we consider the link prediction problem, where we are given a par-tial snapshot of a network at some time and the goal is to predict additional links at a later time. The accuracy of the current prediction methods is quite low due to the extreme class skew and the large number of potential links. In this paper, we describe learning algorithms based on chance constrained programs and show that they exhibit all the properties needed for a good link predictor, namely, al- low preferential bias to positive or negative class; handle skewness in the data; and scale to large networks. Our experimental results on three real-world co- authorship networks show significant improvement in prediction accuracy over baseline algorithms. %B Proceedings of Workshop on Analyzing Networks and Learning with Graphs at NIPS Conference %8 2009/// %G eng %0 Journal Article %J North American Manufacturing Research Institute %D 2009 %T Characterization and control of pin diameter during in-mold assembly of mesoscale revolute joints %A Ananthanarayanan,A. %A Gupta,S.K. %A Bruck,H. A. %X Macro-scale revolute joints can be formed byfirst molding the hole and then molding the pin inside the hole. As the pin shrinks during the solidification process, it moves away from the hole and provides the clearance for the joint to function. The value of clearance in the macro- scale joint can be controlled by carefully selecting the process parameters and the material for the pin. However, in order for this strategy to work at the mesoscale, it requires the use of very thin cores to form sub-millimeter holes. Such thin cores are very difficult to make, are easily damaged during the molding process, and very difficult to retract from the hole. Our previous work has shown that making the pins first and then creating holes on the top of pins leads to successful mesoscale joints. This strategy is counter intuitive based on our experiences at the macro-scale. At the macroscale, as the hole shrinks on top of the pin, the joint is jammed. So a fundamental question is why this counter-intuitive strategy works at the mesoscale. In this paper we show that at the mesoscale, the joint jamming is prevented because of the deformation of the pin under the compressive loading during the second stage molding. We also describe features in the mold that can control the pin deformation and hence control the joint parameters. We present experimental data and computational models to show how mesoscale revolute joints can be formed. %B North American Manufacturing Research Institute %V 37 %8 2009/// %G eng %U http://web.mit.edu/arvinda/www/NAMRI_2009_draft.pdf %0 Conference Paper %B Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining %D 2009 %T Co-evolution of social and affiliation networks %A Zheleva,Elena %A Sharara,Hossam %A Getoor, Lise %K affiliation network %K Evolution %K graph generator %K groups %K social network %X In our work, we address the problem of modeling social network generation which explains both link and group formation. Recent studies on social network evolution propose generative models which capture the statistical properties of real-world networks related only to node-to-node link formation. We propose a novel model which captures the co-evolution of social and affiliation networks. We provide surprising insights into group formation based on observations in several real-world networks, showing that users often join groups for reasons other than their friends. Our experiments show that the model is able to capture both the newly observed and previously studied network properties. This work is the first to propose a generative model which captures the statistical properties of these complex networks. The proposed model facilitates controlled experiments which study the effect of actors' behavior on the evolution of affiliation networks, and it allows the generation of realistic synthetic datasets. %B Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining %S KDD '09 %I ACM %C New York, NY, USA %P 1007 - 1016 %8 2009/// %@ 978-1-60558-495-9 %G eng %U http://doi.acm.org/10.1145/1557019.1557128 %R 10.1145/1557019.1557128 %0 Book Section %B Text Mining: Classification, Clustering, and ApplicationsText Mining: Classification, Clustering, and Applications %D 2009 %T Collective classification for text classification %A Namata,G. %A Sen,P. %A Bilgic,M. %A Getoor, Lise %B Text Mining: Classification, Clustering, and ApplicationsText Mining: Classification, Clustering, and Applications %P 51 - 69 %8 2009/// %G eng %0 Book Section %B Constrained Clustering: Advances in Algorithms, Theory, and ApplicationsConstrained Clustering: Advances in Algorithms, Theory, and Applications %D 2009 %T Collective relational clustering %A Bhattacharya,I. %A Getoor, Lise %B Constrained Clustering: Advances in Algorithms, Theory, and ApplicationsConstrained Clustering: Advances in Algorithms, Theory, and Applications %P 221 - 244 %8 2009/// %G eng %0 Journal Article %J Schizophrenia Research %D 2009 %T Common effect of antipsychotics on the biosynthesis and regulation of fatty acids and cholesterol supports a key role of lipid homeostasis in schizophrenia %A Polymeropoulos,Mihael H. %A Licamele,Louis %A Volpi,Simona %A Mack,Kendra %A Mitkus,Shruti N. %A Carstea,Eugene D. %A Getoor, Lise %A Thompson,Andrew %A Lavedan,Christian %K Antipsychotic action %K Gene expression %K Lipid homeostasis %K Pathogenesis %X For decades, the dopamine hypothesis has gained the most attention in an attempt to explain the origin and the symptoms of schizophrenia. While this hypothesis offers an explanation for the relationship between psychotic symptoms and dopamine kinetics, it does not provide a direct explanation of the etiology of schizophrenia which remains poorly understood. Consequently, current antipsychotics that target neurotransmitter receptors, have limited and inconsistent efficacy. To gain insights into the mechanism of action of these drugs, we studied the expression profile of 12,490 human genes in a cell line treated with 18 antipsychotics, and compared it to that of a library of 448 other compounds used in a variety of disorders. Analysis reveals a common effect of antipsychotics on the biosynthesis and regulation of fatty acids and cholesterol, which is discussed in the context of a lipid hypothesis where alterations in lipid homeostasis might underlie the pathogenesis of schizophrenia. This finding may help research aimed at the development of novel treatments for this devastating disease. %B Schizophrenia Research %V 108 %P 134 - 142 %8 2009/03// %@ 0920-9964 %G eng %U http://www.sciencedirect.com/science/article/pii/S0920996408005306 %N 1–3 %R 10.1016/j.schres.2008.11.025 %0 Journal Article %J Proceedings of the National Academy of Sciences %D 2009 %T Comparative genomics reveals mechanism for short-term and long-term clonal transitions in pandemic Vibrio cholerae %A Chun,J. %A Grim,C. J. %A Hasan,N. A. %A Lee,J. H. %A Choi,S. Y. %A Haley,B. J. %A Taviani,E. %A Jeon,Y. S. %A Kim,D.W. %A Lee,J. H. %A Rita R Colwell %X Vibrio cholerae, the causative agent of cholera, is a bacterium autochthonous to the aquatic environment, and a serious public health threat. V. cholerae serogroup O1 is responsible for the previous two cholera pandemics, in which classical and El Tor biotypes were dominant in the sixth and the current seventh pandemics, respectively. Cholera researchers continually face newly emerging and reemerging pathogenic clones carrying diverse combinations of phenotypic and genotypic properties, which significantly hampered control of the disease. To elucidate evolutionary mechanisms governing genetic diversity of pandemic V. cholerae, we compared the genome sequences of 23 V. cholerae strains isolated from a variety of sources over the past 98 years. The genome-based phylogeny revealed 12 distinct V. cholerae lineages, of which one comprises both O1 classical and El Tor biotypes. All seventh pandemic clones share nearly identical gene content. Using analogy to influenza virology, we define the transition from sixth to seventh pandemic strains as a “shift” between pathogenic clones belonging to the same O1 serogroup, but from significantly different phyletic lineages. In contrast, transition among clones during the present pandemic period is characterized as a “drift” between clones, differentiated mainly by varying composition of laterally transferred genomic islands, resulting in emergence of variants, exemplified by V. cholerae O139 and V. cholerae O1 El Tor hybrid clones. Based on the comparative genomics it is concluded that V. cholerae undergoes extensive genetic recombination via lateral gene transfer, and, therefore, genome assortment, not serogroup, should be used to define pathogenic V. cholerae clones. %B Proceedings of the National Academy of Sciences %V 106 %P 15442 - 15447 %8 2009/// %@ 0027-8424, 1091-6490 %G eng %U http://www.pnas.org/content/106/36/15442 %N 36 %R 10.1073/pnas.0907787106 %0 Journal Article %J Theory of Cryptography %D 2009 %T Complete fairness in multi-party computation without an honest majority %A Gordon,S. %A Katz, Jonathan %X Gordon et al. recently showed that certain (non-trivial) functions can be computed with complete fairness in the two-party setting. Motivated by their results, we initiate a study of complete fairness in the multi-party case and demonstrate the first completely-fair protocols for non-trivial functions in this setting. We also provide evidence that achieving fairness is “harder” in the multi-party setting, at least with regard to round complexity. %B Theory of Cryptography %P 19 - 35 %8 2009/// %G eng %R 10.1007/978-3-642-00457-5_2 %0 Journal Article %J Engineering Analysis with Boundary Elements %D 2009 %T Computation of singular and hypersingular boundary integrals by Green identity and application to boundary value problems %A Seydou,F. %A Duraiswami, Ramani %A Seppänen,T. %A Gumerov, Nail A. %K Bounday integral method %K Green identity %K Hypersingular integrals %K Nyström method %K Singular integrals %X The problem of computing singular and hypersingular integrals involved in a large class of boundary value problems is considered. The method is based on Green's theorem for calculating the diagonal elements of the resulting discretized matrix using the Nyström discretization method. The method is successfully applied to classical boundary value problems. Convergence of the method is also discussed. %B Engineering Analysis with Boundary Elements %V 33 %P 1124 - 1131 %8 2009/08// %@ 0955-7997 %G eng %U http://www.sciencedirect.com/science/article/pii/S0955799709000447 %N 8–9 %R 10.1016/j.enganabound.2009.02.004 %0 Journal Article %J Technical Reports from UMIACS UMIACS-TR-2009-06 %D 2009 %T Computation of the head-related transfer function via the boundary element method and representation via the spherical harmonic spectrum %A Gumerov, Nail A. %A O'donovan,Adam %A Duraiswami, Ramani %A Zotkin,Dmitry N %K Technical Report %X The head-related transfer function (HRTF) is computed using the fast multipole accelerated boundary element method. For efficiency, the HRTF is computed using the reciprocity principle, by placing a source at the ear and computing its field. Analysis is presented to modify the boundary value problem accordingly. To compute the HRTF corresponding to different ranges via a single computation, a compact and accurate representation of the HRTF, termed the spherical spectrum, is developed. Computations are reduced to a two stage process, the computation of the spherical spectrum and a subsequent evaluation of the HRTF. This representation allows easy interpolation and range extrapolation of HRTFs.HRTF computations are performed for the range of audible frequencies up to 20 kHz for several models including a sphere, human head models (for the “Fritz” and “Kemar”), and head and torso model (the Kemar manikin). Comparisons between the different cases and analysis of limiting cases is provided. Comparisons with the computational data of other authors and available experimental data are conducted and show satisfactory agreement for the frequencies for which reliable experimental data is available. Our results show that, given a good mesh it is feasible to compute the HRTF over the full audible range on a regular personal computer. %B Technical Reports from UMIACS UMIACS-TR-2009-06 %8 2009/05/15/ %G eng %U http://drum.lib.umd.edu/handle/1903/9085 %0 Conference Paper %B SIGCHI '09 %D 2009 %T Computer Help at Home: Methods and Motivations for Informal Technical Support %A Poole, Erika Shehan %A Marshini Chetty %A Morgan, Tom %A Grinter, Rebecca E. %A Edwards, W. Keith %K help-giving %K help-seeking %K Home computing %K identity management %K social networks %X Prior research suggests that people may ask their family and friends for computer help. But what influences whether and how a "helper" will provide help? To answer this question, we conducted a qualitative investigation of people who participated in computer support activities with family and friends in the past year. We describe how factors including maintenance of one's personal identity as a computer expert and accountability to one's social network determine who receives help and the quality of help provided. We also discuss the complex, fractured relationship between the numerous stakeholders involved in the upkeep of home computing infrastructures. Based on our findings, we provide implications for the design of systems to support informal help-giving in residential settings. %B SIGCHI '09 %S CHI '09 %I ACM %P 739 - 748 %8 2009/// %@ 978-1-60558-246-7 %G eng %U http://doi.acm.org/10.1145/1518701.1518816 %0 Conference Paper %D 2009 %T Controlling data in the cloud: outsourcing computation without outsourcing control %A Chow, Richard %A Golle, Philippe %A Jakobsson, Markus %A Elaine Shi %A Staddon, Jessica %A Masuoka, Ryusuke %A Molina,Jesus %K Cloud computing %K privacy %K Security %X Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we characterize the problems and their impact on adoption. In addition, and equally importantly, we describe how the combination of existing research thrusts has the potential to alleviate many of the concerns impeding adoption. In particular, we argue that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today. %S CCSW '09 %I ACM %P 85 - 90 %8 2009 %@ 978-1-60558-784-4 %G eng %U http://doi.acm.org/10.1145/1655008.1655020 %0 Conference Paper %B INFOCOM 2009, IEEE %D 2009 %T CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast %A Gopalakrishnan,V. %A Bhattacharjee, Bobby %A Ramakrishnan,K.K. %A Jana,R. %A Srivastava,D. %K assists;multicast;peer-to-peer %K communication;peer-to-peer %K computing;video %K CPM;cooperative %K demand; %K on %K parameters;video-on-demand;multicast %K peer %K schemes;synthetic %X We present CPM, a unified approach that exploits server multicast, assisted by peer downloads, to provide efficient video-on-demand (VoD) in a service provider environment. We describe our architecture and show how CPM is designed to dynamically adapt to a wide range of situations including highly different peer-upload bandwidths, content popularity, user request arrival patterns, video library size, and subscriber population. We demonstrate the effectiveness of CPM using simulations (based on an actual implementation codebase) across the range of situations described above and show that CPM does significantly better than traditional unicast, different forms of multicast, as well as peer-to-peer schemes. Along with synthetic parameters, we augment our experiments using data from a deployed VoD service to evaluate the performance of CPM. %B INFOCOM 2009, IEEE %P 91 - 99 %8 2009/04// %G eng %R 10.1109/INFCOM.2009.5061910 %0 Conference Paper %B AAAI Spring Symposium on Learning by Reading and Learning to Read %D 2009 %T Cross-document coreference resolution: A key technology for learning by reading %A Mayfield,J. %A Alexander,D. %A Dorr, Bonnie J %A Eisner,J. %A Elsayed,T. %A Finin,T. %A Fink,C. %A Freedman,M. %A Garera,N. %A McNamee,P. %A others %B AAAI Spring Symposium on Learning by Reading and Learning to Read %8 2009/// %G eng %0 Conference Paper %D 2009 %T A Decoupled and Prioritized Stochastic Dynamic Programming Approach for Automated Transport of Multiple Particles Using Optical Tweezers %A Banerjee,Ashis Gopal %A Losert,Wolfgang %A Gupta, Satyandra K. %X Automated transport of multiple particles using optical tweezers requires the use of motion planning to move them simultaneously while avoiding collisions amongst themselves and with randomly moving obstacles. This paper develops a decoupled and prioritized stochastic dynamic programming based motion planning framework by sequentially applying a partially observable Markov decision process algorithm on every particle that needs to be transported. An iterative version of a maximum bipartite graph matching algorithm is used to assign given goal locations to such particles. The algorithm for individual particle transport is validated using silica beads in a holographic tweezer set-up. Once the individual plans are computed, a three-step method consisting of clustering, classification, and branch and bound optimization is employed to determine the final collision-free paths. Simulation results in the form of sample trajectories and performance characterization plots are presented to illustrate the usefulness of the developed approach. %I ASME %C San Diego, California, USA %V 6 %P 785 - 796 %8 2009/// %@ 978-0-7918-4903-3 %G eng %U http://link.aip.org/link/ASMECP/v2009/i49033/p785/s1&Agg=doi %R 10.1115/DETC2009-87113 %0 Conference Paper %B Proceedings of the 18th conference on USENIX security symposium %D 2009 %T Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine %A Hao,Shuang %A Syed,Nadeem Ahmed %A Feamster, Nick %A Gray,Alexander G. %A Krasser,Sven %X Users and network administrators need ways to filter email messages based primarily on the reputation of the sender. Unfortunately, conventional mechanisms for sender reputation--notably, IP blacklists--are cumbersome to maintain and evadable. This paper investigates ways to infer the reputation of an email sender based solely on network-level features, without looking at the contents of a message. First, we study first-order properties of network-level features that may help distinguish spammers from legitimate senders. We examine features that can be ascertained without ever looking at a packet's contents, such as the distance in IP space to other email senders or the geographic distance between sender and receiver. We derive features that are lightweight, since they do not require seeing a large amount of email from a single IP address and can be gleaned without looking at an email's contents--many such features are apparent from even a single packet. Second, we incorporate these features into a classification algorithm and evaluate the classifier's ability to automatically classify email senders as spammers or legitimate senders. We build an automated reputation engine, SNARE, based on these features using labeled data from a deployed commercial spam-filtering system. We demonstrate that SNARE can achieve comparable accuracy to existing static IP blacklists: about a 70%detection rate for less than a 0.3%false positive rate. Third, we show how SNARE can be integrated into existing blacklists, essentially as a first-pass filter. %B Proceedings of the 18th conference on USENIX security symposium %S SSYM'09 %I USENIX Association %C Berkeley, CA, USA %P 101 - 118 %8 2009/// %G eng %U http://dl.acm.org/citation.cfm?id=1855768.1855775 %0 Journal Article %J Environmental Microbiology Reports %D 2009 %T Detection of toxigenic Vibrio cholerae O1 in freshwater lakes of the former Soviet Republic of Georgia %A Grim,Christopher J. %A Jaiani,Ekaterina %A Whitehouse,Chris A. %A Janelidze,Nino %A Kokashvili,Tamuna %A Tediashvili,Marina %A Rita R Colwell %A Huq,Anwar %X Three freshwater lakes, Lisi Lake, Kumisi Lake and Tbilisi Sea, near Tbilisi, Georgia, were studied from January 2006 to December 2007 to determine the presence of Vibrio cholerae employing both bacteriological culture method and direct detection methods, namely PCR and direct fluorescent antibody (DFA). For PCR, DNA extracted from water samples was tested for presence of V. cholerae and genes coding for selected virulence factors. Vibrio cholerae non-O1/non-O139 was routinely isolated by culture from all three lakes; whereas V. cholerae O1 and O139 were not. Water samples collected during the summer months from Lisi Lake and Kumisi Lake were positive for both V. cholerae and V. cholerae ctxA, tcpA, zot, ompU and toxR by PCR. Water samples collected during the same period from both Lisi and Kumisi Lake were also positive for V. cholerae serogroup O1 by DFA. All of the samples were negative for V. cholerae serotype O139. The results of this study provide evidence for an environmental presence of toxigenic V. cholerae O1, which may represent a potential source of illness as these lakes serve as recreational water in Tbilisi, Georgia. %B Environmental Microbiology Reports %V 2 %P 2 - 6 %8 2009/09/03/ %@ 1758-2229 %G eng %U http://onlinelibrary.wiley.com/doi/10.1111/j.1758-2229.2009.00073.x/abstract?userIsAuthenticated=false&deniedAccessCustomisedMessage= %N 1 %R 10.1111/j.1758-2229.2009.00073.x %0 Journal Article %J Proceedings of the ICWSM %D 2009 %T Distinguishing knowledge vs social capital in social media with roles and context %A Barash,V. %A Smith,M. %A Getoor, Lise %A Welser,H. T %X Social media communities (e.g. Wikipedia, Flickr, Live Q&A) give rise to distinct types of content, foremost among which are relational content (discussion, chat) and factual content (answering questions, problem-solving). Both users and researchers are increasingly interested in developing strategies that can rapidly distinguish these types of content. While many text-based and structural strategies are possible, we extend two bodies of research that show how social context, and the social roles of answerers can predict content type. We test our framework on a dataset of manually labeled contributions to Microsoft's Live Q&A and find that it reliably extracts factual and relational messages from the data. %B Proceedings of the ICWSM %V 9 %8 2009/// %G eng %0 Journal Article %J Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %D 2009 %T Diversity and Seasonality of Bioluminescent Vibrio Cholerae Populations in Chesapeake Bay %A Zo,Young-Gun %A Chokesajjawatee,Nipa %A Grim,Christopher %A Arakawa,Eiji %A Watanabe,Haruo %A Rita R Colwell %X Association of luminescence with phenotypic and genotypic traits and with environmental parameters was determined for 278 strains of Vibrio cholerae isolated from the Chesapeake Bay during 1998 to 2000. Three clusters of luminescent strains (A, B, and C) and two nonluminescent clusters (X and Y) were identified among 180 clonal types. V. cholerae O1 strains isolated during pandemics and endemic cholera in the Ganges Delta were related to cluster Y. Heat-stable enterotoxin (encoded by stn) and the membrane protein associated with bile resistance (encoded by ompU) were found to be linked to luminescence in strains of cluster A. Succession from nonluminescent to luminescent populations of V. cholerae occurred during spring to midsummer. Occurrence of cluster A strains in water with neutral pH was contrasted with that of cluster Y strains in water with a pH of >8. Cluster A was found to be associated with a specific calanoid population cooccurring with cyclopoids. Cluster B was related to cluster Y, with its maximal prevalence at pH 8. Occurrence of cluster B strains was more frequent with warmer water temperatures and negatively correlated with maturity of the copepod community. It is concluded that each cluster of luminescent V. cholerae strains occupies a distinct ecological niche. Since the dynamics of these niche-specific subpopulations are associated with zooplankton community composition, the ecology of luminescent V. cholerae is concluded to be related to its interaction with copepods and related crustacean species. %B Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %V 75 %P 135 - 146 %8 2009/01/01/ %@ 0099-2240, 1098-5336 %G eng %U http://aem.asm.org/content/75/1/135 %N 1 %R 10.1128/AEM.02894-07 %0 Conference Paper %B Social Network Analysis and Mining, 2009. ASONAM '09. International Conference on Advances in %D 2009 %T The Dynamics of Actor Loyalty to Groups in Affiliation Networks %A Sharara,H. %A Singh,L. %A Getoor, Lise %A Mann,J. %K actor %K bill %K co-sponsorship %K dynamics;social %K groups;affiliation %K loyalty;affiliation %K network;senate %K network;temporal %K networks;dolphin %K sciences; %X In this paper, we introduce a method for analyzing the temporal dynamics of affiliation networks. We define affiliation groups which describe temporally related subsets of actors and describe an approach for exploring changing memberships in these affiliation groups over time. To model the dynamic behavior in these networks, we consider the concept of loyalty and introduce a measure that captures an actorpsilas loyalty to an affiliation group as the degree of dasiacommitmentpsila an actor shows to the group over time. We evaluate our measure using two real world affiliation networks: a senate bill co-sponsorship network and a dolphin network. The results show how the behavior of actors in different affiliation groups change dynamically over time, reinforcing the utility of our measure for understanding the loyalty of actors to time-varying affiliation groups. %B Social Network Analysis and Mining, 2009. ASONAM '09. International Conference on Advances in %P 101 - 106 %8 2009/07// %G eng %R 10.1109/ASONAM.2009.27 %0 Journal Article %J Jisuanji Gongcheng/ Computer Engineering %D 2009 %T Encryption Algorithm Based on Circle Property %A Ge,L.N. %A He,Z.H. %A Zhuolin Jiang %B Jisuanji Gongcheng/ Computer Engineering %V 35 %P 180 - 182 %8 2009/// %G eng %N 4 %0 Conference Paper %D 2009 %T Enhanced force measurement techniques to extend optical trapping towards nanoscale manipulation %A Balijepalli,A. %A LeBrun,T. W. %A Gorman,J. J. %A Gupta,S.K. %K Brownian motion %K extend optical trapping %K Fokker-Planck equation %K force measurement %K inflection point %K linear trap stiffness %K nanoparticle %K nanoparticles %K nanoscale manipulation %K nanotechnology %K optical trapping force %K power series expansion %K radiation pressure %K random thermal motion %X We have developed a new force measurement technique based on the random thermal motion of a nanoparticle in an optical trap. We demonstrate this method, in one-dimension, through numerical simulations and laboratory experiments. We show that computer simulations successfully recover the profile of the optical trapping force, beyond the inflection point of the trapping potential for a range of particle sizes. We show, through laboratory experiments, that this technique is effective in recovering higher order terms, in a power series expansion of the trapping force, beyond the widely reported linear trap stiffness. We also show that the first order (stiffness) term in our series expansion is consistent with values reported in the literature. %P 13 - 16 %8 2009/07// %G eng %0 Conference Paper %B IEEE INFOCOM 2009 %D 2009 %T Fighting Spam with the NeighborhoodWatch DHT %A Bender,A. %A Sherwood,R. %A Monner,D. %A Goergen,N. %A Spring, Neil %A Bhattacharjee, Bobby %K Communications Society %K computer crime %K cryptography %K Databases %K IP addresses %K IP networks %K on-line trusted authority %K Peer to peer computing %K peer-to-peer computing %K peer-to-peer distributed hash table %K Postal services %K Relays %K Resilience %K Routing %K Security %K table size routing %K Unsolicited electronic mail %X In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based blacklists (DNSBLs) of IP addresses of mail relays that forward spam. Implementing a blacklist on a DHT improves resilience to DoS attacks and secures message delivery, when compared to DNSBLs. However, due to the sensitive nature of the blacklist, storing the data in a peer-to-peer DHT would invite attackers to infiltrate the system. Typical DHTs can withstand fail-stop failures, but malicious nodes may provide incorrect routing information, refuse to return published items, or simply ignore certain queries. The neighborhoodwatch DHT is resilient to malicious nodes and maintains the O(logiV) bounds on routing table size and expected lookup time. NeighborhoodWatch depends on two assumptions in order to make these guarantees: (1) the existence of an on-line trusted authority that periodically contacts and issues signed certificates to each node, and (2) for every sequence of k + 1 consecutive nodes in the ID space, at least one is alive and non-malicious. We show how NeighborhoodWatch maintains many of its security properties even when the second assumption is violated. Honest nodes in NeighborhoodWatch can detect malicious behavior and expel the responsible nodes from the DHT. %B IEEE INFOCOM 2009 %I IEEE %P 1755 - 1763 %8 2009/04/19/25 %@ 978-1-4244-3512-8 %G eng %R 10.1109/INFCOM.2009.5062095 %0 Conference Paper %D 2009 %T Formal Representation of Product Design Specifications for Validating Product Design %A Weissman,Alexander %A Gupta, Satyandra K. %A Fiorentini,Xenia %A Sudarsan,Rachuri %A Sriram,Ram %X As collaborative efforts in electro-mechanical design have scaled to large, distributed groups working for years on a single product, an increasingly large gulf has developed between the original stated goals of the project and the final design solution. It has thus become necessary to validate the final design solution against a set of requirements to ensure that these goals have, in fact, been met. This process has become tedious for complex products with hundreds of design aspects and requirements. By formalizing the representation of requirements and the design solution, tools can be developed to a large extent automatically perform this validation. In this paper, we propose a formal approach for relating product requirements to the design solution. First, we present a formal model for representing product requirements. Then, we introduce the Core Product Model (CPM) and the Open Assembly Model (OAM) for representing the design solution. Finally, we link these models formally and provide an example with an actual consumer device. %I ASME %P 1411 - 1422 %8 2009/// %@ 978-0-7918-4899-9 %G eng %U http://link.aip.org/link/ASMECP/v2009/i48999/p1411/s1&Agg=doi %R 10.1115/DETC2009-87307 %0 Journal Article %J Proceedings of the 9th SIAM International Conference on Data Mining %D 2009 %T FutureRank: Ranking scientific articles by predicting their future PageRank %A Sayyadi,H. %A Getoor, Lise %X The dynamic nature of citation networks makes the taskof ranking scientific articles hard. Citation networks are continually evolving because articles obtain new citations every day. For ranking scientific articles, we can define the popularity or prestige of a paper based on the number of past citations at the user query time; however, we argue that what is most useful is the expected future references. We define a new measure, FutureRank, which is the expected future PageRank score based on citations that will be obtained in the future. In addition to making use of the citation network, FutureRank uses the authorship network and the publication time of the article in order to predict future citations. Our experiments compare FutureRank with existing approaches, and show that FutureRank is accurate and useful for finding and ranking publications. %B Proceedings of the 9th SIAM International Conference on Data Mining %P 533 - 544 %8 2009/// %G eng %0 Journal Article %J Journal of Computing and Information Science in Engineering %D 2009 %T Generating simplified trapping probability models from simulation of optical tweezers system %A Banerjee,A. G. %A Balijepalli,A. %A Gupta,S.K. %A LeBrun,T. W. %B Journal of Computing and Information Science in Engineering %V 9 %P 021003 - 021003 %8 2009/// %G eng %0 Book Section %B Practical handbook of microbiologyPractical handbook of microbiology %D 2009 %T The Genus Vibrio and Related Genera %A Rita R Colwell %A Chun,J. %E Goldman,Emanuel %E Green,Lorrence H. %B Practical handbook of microbiologyPractical handbook of microbiology %I CRC Press %P 267 - 267 %8 2009/// %@ 9780849393655 %G eng %0 Journal Article %J Managing and Mining Uncertain Data %D 2009 %T Graphical models for uncertain data %A Deshpande, Amol %A Getoor, Lise %A Sen,P. %B Managing and Mining Uncertain Data %P 77 - 77 %8 2009/// %G eng %0 Journal Article %J The fourth paradigm: data-intensive scientific discovery %D 2009 %T HEALTH AND WELLBEING %A Gillam,M. %A Feied,C. %A MOODY,E. %A Shneiderman, Ben %A Smith,M. %A DICKASON,J. %B The fourth paradigm: data-intensive scientific discovery %P 57 - 57 %8 2009/// %G eng %0 Conference Paper %B Proceedings of the 8th International Conference on Interaction Design and Children %D 2009 %T How children search the internet with keyword interfaces %A Druin, Allison %A Foss,E. %A Hatley,L. %A Golub,E. %A Guha,M.L. %A Fails,J. %A Hutchinson,H. %B Proceedings of the 8th International Conference on Interaction Design and Children %P 89 - 96 %8 2009/// %G eng %0 Conference Paper %B Proceedings of the 1st ACM SIGKDD Workshop on Knowledge Discovery from Uncertain Data %D 2009 %T Identifying graphs from noisy and incomplete data %A Namata,Jr.,Galileo Mark S. %A Getoor, Lise %K classification %K data mining %K entity resolution %K link prediction %K social networks %K statistical relational learning %X There is a growing wealth of data describing networks of various types, including social networks, physical networks such as transportation or communication networks, and biological networks. At the same time, there is a growing interest in analyzing these networks, in order to uncover general laws that govern their structure and evolution, and patterns and predictive models to develop better policies and practices. However, a fundamental challenge in dealing with this newly available observational data describing networks is that the data is often of dubious quality -- it is noisy and incomplete -- and before any analysis method can be applied, the data must be cleaned, and missing information inferred. In this paper, we introduce the notion of graph identification, which explicitly models the inference of a "cleaned" output network from a noisy input graph. It is this output network that is appropriate for further analysis. We present an illustrative example and use the example to explore the types of inferences involved in graph identification, as well as the challenges and issues involved in combining those inferences. We then present a simple, general approach to combining the inferences in graph identification and experimentally show the utility of our combined approach and how the performance of graph identification is sensitive to the inter-dependencies among these inferences. %B Proceedings of the 1st ACM SIGKDD Workshop on Knowledge Discovery from Uncertain Data %S U '09 %I ACM %C New York, NY, USA %P 23 - 29 %8 2009/// %@ 978-1-60558-675-5 %G eng %U http://doi.acm.org/10.1145/1610555.1610559 %R 10.1145/1610555.1610559 %0 Journal Article %J The Journal of the Acoustical Society of America %D 2009 %T Imaging room acoustics with the audio camera. %A O'donovan,Adam %A Duraiswami, Ramani %A Gumerov, Nail A. %A Zotkin,Dmitry N %X Using a spherical microphone array and real time signal processing using a graphical processing unit (GPU), an audio camera has been developed. This device provides images of the intensity of the sound field arriving at a point from a specified direction to the spherical array. Real‐time performance is achieved via use of GPUs. The intensity can be displayed integrated over the whole frequency band of the array, or in false color, with different frequency bands mapped to different color bands. The resulting audio camera may be combined with video cameras to achieve multimodal scene capture and analysis. A theory of registration of audio camera images with video camera images is developed, and joint analysis of audio and video images performed. An interesting application of the audio camera is the imaging of concert hall acoustics. The individual reflections that constitute the impulse response measured at a particular seat may be imaged, and their spatial origin determined. Other applications of the audio camera to people tracking, noise suppression, and camera pointing are also presented. [Work partially supported by NVIDIA and the VA.] %B The Journal of the Acoustical Society of America %V 125 %P 2544 - 2544 %8 2009/// %G eng %U http://link.aip.org/link/?JAS/125/2544/2 %N 4 %0 Conference Paper %D 2009 %T Implicit authentication for mobile devices %A Jakobsson, Markus %A Elaine Shi %A Golle, Philippe %A Chow, Richard %X We introduce the notion of implicit authentication - the ability to authenticate mobile users based on actions they would carry out anyway. We develop a model for how to perform implicit authentication, and describe experiments aimed at assessing the benefits of our techniques. Our preliminary findings support that this is a meaningful approach, whether used to increase usability or increase security. %S HotSec'09 %I USENIX Association %P 9 - 9 %8 2009 %G eng %U http://dl.acm.org/citation.cfm?id=1855628.1855637 %0 Journal Article %J Recommender Systems & the Social Web %D 2009 %T Improving recommendation accuracy by clustering social networks with trust %A DuBois,T. %A Golbeck,J. %A Kleint,J. %A Srinivasan, Aravind %X Social trust relationships between users in social networksspeak to the similarity in opinions between the users, both in general and in important nuanced ways. They have been used in the past to make recommendations on the web. New trust metrics allow us to easily cluster users based on trust. In this paper, we investigate the use of trust clusters as a new way of improving recommendations. Previous work on the use of clusters has shown the technique to be relatively un- successful, but those clusters were based on similarity rather than trust. Our results show that when trust clusters are integrated into memory-based collaborative filtering algo- rithms, they lead to statistically significant improvements in accuracy. In this paper we discuss our methods, experi- ments, results, and potential future applications of the tech- nique. %B Recommender Systems & the Social Web %P 1 - 8 %8 2009/// %G eng %0 Book Section %B Advances in Mathematical Modeling and Experimental Methods for Materials and Structures %D 2009 %T In Situ Characterization and Modeling of Strains near Embedded Electronic Components During Processing and Break-in for Multifunctional Polymer Structures %A Gershon,Alan L. %A Gyger,Lawrence S. %A Bruck,Hugh A. %A Gupta, Satyandra K. %E Gilat,Rivka %E Banks-Sills,Leslie %E Gladwell,G. M. L. %K engineering %X Emerging molding concepts, such as in-mold assembly, are enabling electronic structures to be directly embedded in thermoplastic polymers to provide integrated packaging for better protection and a more multifunctional structure in “in-mold assembly processes”. During the molding process, stress can develop at the interface of the polymer and embedded electronic component due to shrinkage of the polymer that precipitates fracture or fatigue during the life cycle of the product. Additionally, the interaction between a mold and the polymer melt is altered in a multi-stage molding process where a polymer for superior impact protection can be molded over another polymer that is more compatible with the embedded electronic component. Currently, we do not fully understand the impact of various parameters governing the in-mold assembly process on the residual strains that develop in polymers around embedded electronic components in order to develop process models. Therefore, in this chapter experiments are presented that are designed and executed to measure the strains involved and the manner in which they develop. An in situ open mold experiment is employed using the full-field deformation technique of Digital Image Correlation (DIC) to characterize the displacement and corresponding strain fields that evolve near embedded electronic elements as the polymer shrinks from the molten to the solid state during processes and during break-in of the electronic component. It was determined that the use of multi-stage molding may reduce the residual stresses in addition to providing superior impact protection. However, there was a higher concentration of strain near the polymer-component interface during break-due to lower thermal conductivity. Experimental data was consistent with a thermomechanical model up until the point of failure. %B Advances in Mathematical Modeling and Experimental Methods for Materials and Structures %S Solid Mechanics and Its Applications %I Springer Netherlands %V 168 %P 145 - 159 %8 2009/// %@ 978-90-481-3467-0 %G eng %U http://www.springerlink.com/content/lh52x2475g7x00k7/abstract/ %0 Journal Article %J Proceedings of the VLDB Endowment %D 2009 %T Index interactions in physical design tuning: modeling, analysis, and applications %A Schnaitter,Karl %A Polyzotis,Neoklis %A Getoor, Lise %X One of the key tasks of a database administrator is to optimize the set of materialized indices with respect to the current workload. To aid administrators in this challenging task, commercial DBMSs provide advisors that recommend a set of indices based on a sample workload. It is left for the administrator to decide which of the recommended indices to materialize and when. This decision requires some knowledge of how the indices benefit the workload, which may be difficult to understand if there are any dependencies or interactions among indices. Unfortunately, advisors do not provide this crucial information as part of the recommendation. Motivated by this shortcoming, we propose a framework and associated tools that can help an administrator understand the interactions within the recommended set of indices. We formalize the notion of index interactions and develop a novel algorithm to identify the interaction relationships that exist within a set of indices. We present experimental results with a prototype implementation over IBM DB2 that demonstrate the efficiency of our approach. We also describe two new database tuning tools that utilize information about index interactions. The first tool visualizes interactions based on a partitioning of the index-set into non-interacting subsets, and the second tool computes a schedule that materializes the indices over several maintenance windows with maximal overall benefit. In both cases, we provide strong analytical results showing that index interactions can enable enhanced functionality. %B Proceedings of the VLDB Endowment %V 2 %P 1234 - 1245 %8 2009/08// %@ 2150-8097 %G eng %U http://dl.acm.org/citation.cfm?id=1687627.1687766 %N 1 %0 Conference Paper %B IEEE International Conference on Bioinformatics and Biomedicine, 2009. BIBM '09 %D 2009 %T Inexact Local Alignment Search over Suffix Arrays %A Ghodsi,M. %A Pop, Mihai %K bacteria %K Bioinformatics %K biology computing %K Computational Biology %K Costs %K DNA %K DNA homology searches %K DNA sequences %K Educational institutions %K generalized heuristic %K genes %K Genetics %K genome alignment %K Genomics %K human %K inexact local alignment search %K inexact seeds %K local alignment %K local alignment tools %K memory efficient suffix array %K microorganisms %K molecular biophysics %K mouse %K Organisms %K Sensitivity and Specificity %K sequences %K suffix array %K USA Councils %X We describe an algorithm for finding approximate seeds for DNA homology searches. In contrast to previous algorithms that use exact or spaced seeds, our approximate seeds may contain insertions and deletions. We present a generalized heuristic for finding such seeds efficiently and prove that the heuristic does not affect sensitivity. We show how to adapt this algorithm to work over the memory efficient suffix array with provably minimal overhead in running time. We demonstrate the effectiveness of our algorithm on two tasks: whole genome alignment of bacteria and alignment of the DNA sequences of 177 genes that are orthologous in human and mouse. We show our algorithm achieves better sensitivity and uses less memory than other commonly used local alignment tools. %B IEEE International Conference on Bioinformatics and Biomedicine, 2009. BIBM '09 %I IEEE %P 83 - 87 %8 2009/11/01/4 %@ 978-0-7695-3885-3 %G eng %R 10.1109/BIBM.2009.25 %0 Conference Paper %D 2009 %T Inexact Local Alignment Search over Suffix Arrays %A Ghodsi,M. %A Pop, Mihai %P 83 - 87 %8 2009 %G eng %0 Journal Article %J ACM Trans. Comput.-Hum. Interact. %D 2009 %T The Ins and Outs of Home Networking: The Case for Useful and Usable Domestic Networking %A Grinter, Rebecca E. %A Edwards, W. Keith %A Marshini Chetty %A Poole, Erika S. %A Sung, Ja-Young %A Yang, Jeonghwa %A Crabtree, Andy %A Tolmie, Peter %A Rodden, Tom %A Greenhalgh, Chris %A Benford, Steve %K home networking %K Human computer interaction %X Householders are increasingly adopting home networking as a solution to the demands created by the presence of multiple computers, devices, and the desire to access the Internet. However, current network solutions are derived from the world of work (and initially the military) and provide poor support for the needs of the home. We present the key findings to emerge from empirical studies of home networks in the UK and US. The studies reveal two key kinds of work that effective home networking relies upon: one, the technical work of setting up and maintaining the home network, and the other, the collaborative and socially organized work of the home which the network is embedded in and supports. The two are thoroughly intertwined and rely upon one another for their realization, yet neither is adequately supported by current networking technologies and applications. Explication of the “work to make the home network work” opens up the design space for the continued integration of the home network in domestic life and elaboration of future support. Key issues for development include the development of networking facilities that do not require advanced networking knowledge, that are flexible and support the local social order of the home and the evolution of its routines, and which ultimately make the home network visible and accountable to household members. %B ACM Trans. Comput.-Hum. Interact. %V 16 %P 8:1 - 8:28 %8 2009/06// %@ 1073-0516 %G eng %U http://doi.acm.org/10.1145/1534903.1534905 %N 2 %0 Journal Article %J Journal of Mechanical Design %D 2009 %T Integrated product and process design for a flapping wing drive mechanism %A Bejgerowski,W. %A Ananthanarayanan,A. %A Mueller,D. %A Gupta,S.K. %B Journal of Mechanical Design %V 131 %P 061006 - 061006 %8 2009/// %G eng %0 Book Section %B Multilingual FrameNets in Computational LexicographyMultilingual FrameNets in Computational Lexicography %D 2009 %T Interlingual annotation of multilingual text corpora and FrameNet %A Farwell,David %A Dorr, Bonnie J %A Habash,Nizar %A Helmreich,Stephen %A Hovy,Eduard %A Green,Rebecca %A Levin,Lori %A Miller,Keith %A Mitamura,Teruko %A Rambow,Owen %A Reeder,Flo %A Siddharthan,Advaith %E Bisang,Walter %E Hock,Hans Henrich %E Winter,Werner %E Boas,Hans C. %B Multilingual FrameNets in Computational LexicographyMultilingual FrameNets in Computational Lexicography %I Mouton de Gruyter %C Berlin, New York %V 200 %P 287 - 318 %8 2009/07/14/ %@ 978-3-11-021296-9, 978-3-11-021297-6 %G eng %U http://www.degruyter.com/view/books/9783110212976/9783110212976.4.287/9783110212976.4.287.xml %0 Journal Article %J Information Forensics and Security, IEEE Transactions on %D 2009 %T Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images %A Gou,Hongmei %A Swaminathan,A. %A M. Wu %K analysis;image %K camera-taken %K cameras;digital %K denoising;intrinsic %K denoising;wavelet %K features;natural %K forensics;scanned %K graphics;digital %K identifier;wavelet %K images;digital %K images;scanner %K NOISE %K photographs;computer-generated %K prediction;nonintrusive %K reproduction;forensic %K scanner %K scenes;neighborhood %K sensor %K transforms; %X A large portion of digital images available today are acquired using digital cameras or scanners. While cameras provide digital reproduction of natural scenes, scanners are often used to capture hard-copy art in a more controlled environment. In this paper, new techniques for nonintrusive scanner forensics that utilize intrinsic sensor noise features are proposed to verify the source and integrity of digital scanned images. Scanning noise is analyzed from several aspects using only scanned image samples, including through image denoising, wavelet analysis, and neighborhood prediction, and then obtain statistical features from each characterization. Based on the proposed statistical features of scanning noise, a robust scanner identifier is constructed to determine the model/brand of the scanner used to capture a scanned image. Utilizing these noise features, we extend the scope of acquisition forensics to differentiating scanned images from camera-taken photographs and computer-generated graphics. The proposed noise features also enable tampering forensics to detect postprocessing operations on scanned images. Experimental results are presented to demonstrate the effectiveness of employing the proposed noise features for performing various forensic analysis on scanners and scanned images. %B Information Forensics and Security, IEEE Transactions on %V 4 %P 476 - 491 %8 2009/09// %@ 1556-6013 %G eng %N 3 %R 10.1109/TIFS.2009.2026458 %0 Journal Article %J NIPS Workshop on Analyzing Networks and Learning with Graphs %D 2009 %T Link-based active learning %A Bilgic,M. %A Getoor, Lise %X Supervised and semi-supervised data mining techniques require labeled data.However, labeling examples is costly for many real-world applications. To ad- dress this problem, active learning techniques have been developed to guide the labeling process in an effort to minimize the amount of labeled data without sac- rificing much from the quality of the learned models. Yet, most of the active learning methods to date have remained relatively agnostic to the rich structure offered by network data, often ignoring the relationships between the nodes of a network. On the other hand, the relational learning community has shown that the relationships can be very informative for various prediction tasks. In this paper, we propose different ways of adapting existing active learning work to network data while utilizing links to select better examples to label. %B NIPS Workshop on Analyzing Networks and Learning with Graphs %8 2009/// %G eng %0 Journal Article %J Journal of education for library and information science %D 2009 %T The Maryland Modular Method: An Approach to Doctoral Education in Information Studies %A Druin, Allison %A Jaeger,P. T %A Golbeck,J. %A Fleischmann,K.R. %A Jimmy Lin %A Qu,Y. %A Wang,P. %A Xie,B. %B Journal of education for library and information science %V 50 %P 293 - 301 %8 2009/// %G eng %N 4 %0 Conference Paper %B Proceedings of the 18th ACM conference on Information and knowledge management %D 2009 %T Matching person names through name transformation %A Gong,Jun %A Wang,Lidan %A Oard, Douglas %K name matching %K string distance metrics %K string similarity %X Matching person names plays an important role in many applications, including bibliographic databases and indexing systems. Name variations and spelling errors make exact string matching problematic; therefore, it is useful to develop methodologies that can handle variant forms for the same named entity. In this paper, a novel person name matching model is presented. Common name variations in the English speaking world are formalized, and the concept of name transformation paths is introduced; name similarity is measured after the best transformation path has been selected. Supervised techniques are used to learn a similarity function and a decision rule. Experiments with three datasets show the method to be effective. %B Proceedings of the 18th ACM conference on Information and knowledge management %S CIKM '09 %I ACM %C New York, NY, USA %P 1875 - 1878 %8 2009/// %@ 978-1-60558-512-3 %G eng %U http://doi.acm.org/10.1145/1645953.1646253 %R 10.1145/1645953.1646253 %0 Journal Article %J 2009 SIAM International Conference on Data Mining (SDM09) %D 2009 %T On maximum coverage in the streaming model & application to multi-topic blog-watch %A Saha,B. %A Getoor, Lise %X We generalize the graph streaming model to hypergraphs.In this streaming model, hyperedges are arriving online and any computation has to be done on-the-fly using a small amount of space. Each hyperedge can be viewed as a set of elements (nodes), so we refer to our proposed model as the “set-streaming” model of computation. We consider the problem of “maximum coverage”, in which k sets have to be selected that maximize the total weight of the covered elements. In the set-streaming model of computation, we show that our algorithm for maximum- coverage achieves an approximation factor of 1 . When multiple passes are allowed, we also provide a Θ(log n) approximation algorithm for the set-cover. We next consider a multi-topic blog-watch application, an extension of blog- alert like applications for handling simultaneous multiple- topic requests. We show how the problems of maximum- coverage and set-cover in the set-streaming model can be utilized to give efficient online solutions to this problem. We verify the effectiveness of our methods both on synthetic and real weblog data. %B 2009 SIAM International Conference on Data Mining (SDM09) %8 2009/// %G eng %0 Conference Paper %B Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics %D 2009 %T More than words: Syntactic packaging and implicit sentiment %A Greene,S. %A Resnik, Philip %B Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics %P 503 - 511 %8 2009/// %G eng %0 Journal Article %J Circuits and Systems for Video Technology, IEEE Transactions on %D 2009 %T Moving Object Verification in Airborne Video Sequences %A Yue,Zhanfeng %A Guarino, D. %A Chellapa, Rama %K airborne %K database;homography-based %K databases; %K matcher;color %K matcher;image %K matching;image %K method;infrared %K object %K sequences;color %K sequences;distance %K sequences;moving %K sequences;video %K synthesis %K system;exemplar %K transforms;end-to-end %K verification;spatial-feature %K video %K view %X This paper presents an end-to-end system for moving object verification in airborne video sequences. Using a sample selection module, the system first selects frames from a short sequence and stores them in an exemplar database. To handle appearance change due to potentially large aspect angle variations, a homography-based view synthesis method is then used to generate a novel view of each image in the exemplar database at the same pose as the testing object in each frame of a testing video segment. A rotationally invariant color matcher and a spatial-feature matcher based on distance transforms are combined using a weighted average rule to compare the novel view and the testing object. After looping over all testing frames, the set of match scores is passed to a temporal analysis module to examine the behavior of the testing object, and calculate a final likelihood. Very good verification performance is achieved over thousands of trials for both color and infrared video sequences using the proposed system. %B Circuits and Systems for Video Technology, IEEE Transactions on %V 19 %P 77 - 89 %8 2009/01// %@ 1051-8215 %G eng %N 1 %R 10.1109/TCSVT.2008.2009243 %0 Conference Paper %B Proceedings of the 18th international conference on World wide web %D 2009 %T Network-aware forward caching %A Erman,Jeffrey %A Gerber,Alexandre %A Hajiaghayi, Mohammad T. %A Pei,Dan %A Spatscheck,Oliver %K caching %K Web %X This paper proposes and evaluates a Network Aware Forward Caching approach for determining the optimal deployment strategy of forward caches to a network. A key advantage of this approach is that we can reduce the network costs associated with forward caching to maximize the benefit obtained from their deployment. We show in our simulation that a 37% increase to net benefits could be achieved over the standard method of full cache deployment to cache all POPs traffic. In addition, we show that this maximal point occurs when only 68% of the total traffic is cached. Another contribution of this paper is the analysis we use to motivate and evaluate this problem. We characterize the Internet traffic of 100K subscribers of a US residential broadband provider. We use both layer 4 and layer 7 analysis to investigate the traffic volumes of the flows as well as study the general characteristics of the applications used. We show that HTTP is a dominant protocol and account for 68% of the total downstream traffic and that 34% of that traffic is multimedia. In addition, we show that multimedia content using HTTP exhibits a 83% annualized growth rate and other HTTP traffic has a 53% growth rate versus the 26% over all annual growth rate of broadband traffic. This shows that HTTP traffic will become ever more dominent and increase the potential caching opportunities. Furthermore, we characterize the core backbone traffic of this broadband provider to measure the distance travelled by content and traffic. We find that CDN traffic is much more efficient than P2P content and that there is large skew in the Air Miles between POP in a typical network. Our findings show that there are many opportunties in broadband provider networks to optimize how traffic is delivered and cached. %B Proceedings of the 18th international conference on World wide web %S WWW '09 %I ACM %C New York, NY, USA %P 291 - 300 %8 2009/// %@ 978-1-60558-487-4 %G eng %U http://doi.acm.org/10.1145/1526709.1526749 %R 10.1145/1526709.1526749 %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 2009 %T Observing Human-Object Interactions: Using Spatial and Functional Compatibility for Recognition %A Gupta,A. %A Kembhavi,A. %A Davis, Larry S. %K Automated;Recognition (Psychology);Video Recording; %K Bayesian approach;functional compatibility;human perception;human-object interactions;objects recognition;psychological studies;spatial compatibility;Bayes methods;behavioural sciences;human factors;image recognition;motion estimation;object recognition;A %K Biological;Movement;Pattern Recognition %K Computer-Assisted;Models %X Interpretation of images and videos containing humans interacting with different objects is a daunting task. It involves understanding scene or event, analyzing human movements, recognizing manipulable objects, and observing the effect of the human movement on those objects. While each of these perceptual tasks can be conducted independently, recognition rate improves when interactions between them are considered. Motivated by psychological studies of human perception, we present a Bayesian approach which integrates various perceptual tasks involved in understanding human-object interactions. Previous approaches to object and action recognition rely on static shape or appearance feature matching and motion analysis, respectively. Our approach goes beyond these traditional approaches and applies spatial and functional constraints on each of the perceptual elements for coherent semantic interpretation. Such constraints allow us to recognize objects and actions when the appearances are not discriminative enough. We also demonstrate the use of such constraints in recognition of actions from static images without using any motion information. %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %V 31 %P 1775 - 1789 %8 2009/10// %@ 0162-8828 %G eng %N 10 %R 10.1109/TPAMI.2009.83 %0 Conference Paper %B Proceedings of the 2009 Workshop on Graph-based Methods for Natural Language Processing %D 2009 %T Opinion graphs for polarity and discourse classification %A Somasundaran,Swapna %A Namata,Galileo %A Getoor, Lise %A Wiebe,Janyce %X This work shows how to construct discourse-level opinion graphs to perform a joint interpretation of opinions and discourse relations. Specifically, our opinion graphs enable us to factor in discourse information for polarity classification, and polarity information for discourse-link classification. This inter-dependent framework can be used to augment and improve the performance of local polarity and discourse-link classifiers. %B Proceedings of the 2009 Workshop on Graph-based Methods for Natural Language Processing %S TextGraphs-4 %I Association for Computational Linguistics %C Stroudsburg, PA, USA %P 66 - 74 %8 2009/// %@ 978-1-932432-54-1 %G eng %U http://dl.acm.org/citation.cfm?id=1708124.1708138 %0 Journal Article %J The VLDB Journal %D 2009 %T P r DB: managing and exploiting rich correlations in probabilistic databases %A Sen,P. %A Deshpande, Amol %A Getoor, Lise %X Due to numerous applications producing noisy data, e.g., sensor data, experimental data, data from uncurated sources, information extraction, etc., there has been a surge of interest in the development of probabilistic databases. Most probabilistic database models proposed to date, however, fail to meet the challenges of real-world applications on two counts: (1) they often restrict the kinds of uncertainty that the user can represent; and (2) the query processing algorithms often cannot scale up to the needs of the application. In this work, we define a probabilistic database model, PrDB, that uses graphical models, a state-of-the-art probabilistic modeling technique developed within the statistics and machine learning community, to model uncertain data. We show how this results in a rich, complex yet compact probabilistic database model, which can capture the commonly occurring uncertainty models (tuple uncertainty, attribute uncertainty), more complex models (correlated tuples and attributes) and allows compact representation (shared and schema-level correlations). In addition, we show how query evaluation in PrDB translates into inference in an appropriately augmented graphical model. This allows us to easily use any of a myriad of exact and approximate inference algorithms developed within the graphical modeling community. While probabilistic inference provides a generic approach to solving queries, we show how the use of shared correlations, together with a novel inference algorithm that we developed based on bisimulation, can speed query processing significantly. We present a comprehensive experimental evaluation of the proposed techniques and show that even with a few shared correlations, significant speedups are possible. %B The VLDB Journal %V 18 %P 1065 - 1090 %8 2009/// %G eng %N 5 %R 10.1007/s00778-009-0153-2 %0 Journal Article %J The VLDB Journal %D 2009 %T PrDB: managing and exploiting rich correlations in probabilistic databases %A Sen,Prithviraj %A Deshpande, Amol %A Getoor, Lise %X Due to numerous applications producing noisy data, e.g., sensor data, experimental data, data from uncurated sources, information extraction, etc., there has been a surge of interest in the development of probabilistic databases. Most probabilistic database models proposed to date, however, fail to meet the challenges of real-world applications on two counts: (1) they often restrict the kinds of uncertainty that the user can represent; and (2) the query processing algorithms often cannot scale up to the needs of the application. In this work, we define a probabilistic database model, P r DB, that uses graphical models, a state-of-the-art probabilistic modeling technique developed within the statistics and machine learning community, to model uncertain data. We show how this results in a rich, complex yet compact probabilistic database model, which can capture the commonly occurring uncertainty models (tuple uncertainty, attribute uncertainty), more complex models (correlated tuples and attributes) and allows compact representation (shared and schema-level correlations). In addition, we show how query evaluation in P r DB translates into inference in an appropriately augmented graphical model. This allows us to easily use any of a myriad of exact and approximate inference algorithms developed within the graphical modeling community. While probabilistic inference provides a generic approach to solving queries, we show how the use of shared correlations, together with a novel inference algorithm that we developed based on bisimulation, can speed query processing significantly. We present a comprehensive experimental evaluation of the proposed techniques and show that even with a few shared correlations, significant speedups are possible. %B The VLDB Journal %V 18 %P 1065 - 1090 %8 2009/// %@ 1066-8888 %G eng %U http://dx.doi.org/10.1007/s00778-009-0153-2 %N 5 %0 Book Section %B Scalable Uncertainty ManagementScalable Uncertainty Management %D 2009 %T PrDB: Managing Large-Scale Correlated Probabilistic Databases (Abstract) %A Deshpande, Amol %E Godo,Lluís %E Pugliese,Andrea %X Increasing numbers of real-world application domains are generating data that is inherently noisy, incomplete, and probabilistic in nature. Statistical inference and probabilistic modeling often introduce another layer of uncertainty on top of that. Examples of such data include measurement data collected by sensor networks, observation data in the context of social networks, scientific and biomedical data, and data collected by various online cyber-sources. Over the last few years, numerous approaches have been proposed, and several systems built, to integrate uncertainty into databases. However, these approaches typically make simplistic and restrictive assumptions concerning the types of uncertainties that can be represented. Most importantly, they often make highly restrictive independence assumptions, and cannot easily model rich correlations among the tuples or attribute values. Furthermore, they typically lack support for specifying uncertainties at different levels of abstractions, needed to handle large-scale uncertain datasets. %B Scalable Uncertainty ManagementScalable Uncertainty Management %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 5785 %P 1 - 1 %8 2009/// %@ 978-3-642-04387-1 %G eng %U http://dx.doi.org/10.1007/978-3-642-04388-8_1 %0 Journal Article %J IEEE transactions on pattern analysis and machine intelligence %D 2009 %T Probabilistic graphical models %A Gupta,A. %A Kembhavi,A. %A Davis, Larry S. %B IEEE transactions on pattern analysis and machine intelligence %V 31 %P 1775 - 1789 %8 2009/// %G eng %N 10 %0 Book %D 2009 %T Proceedings of the 1st ACM SIGKDD Workshop on Knowledge Discovery from Uncertain Data %E Pei,Jian %E Getoor, Lise %E de Keijzer,Ander %X The importance of uncertain data is growing quickly in many essential applications such as environmental surveillance, mobile object tracking and data integration. Recently, storing, collecting, processing, and analyzing uncertain data has attracted increasing attention from both academia and industry. Analyzing and mining uncertain data needs collaboration and joint effort from multiple research communities including reasoning under uncertainty, uncertain databases and mining uncertain data. For example, statistics and probabilistic reasoning can provide support with models for representing uncertainty. The uncertain database community can provide methods for storing and managing uncertain data, while research in mining uncertain data can provide data analysis tasks and methods. It is important to build connections among those communities to tackle the overall problem of analyzing and mining uncertain data. There are many common challenges among the communities. One is to understand the different modeling assumptions made, and how they impact the methods, both in terms of accuracy and efficiency. Different researchers hold different assumptions and this is one of the major obstacles in the research of mining uncertain data. Another is the scalability of proposed management and analysis methods. Finally, to make analysis and mining useful and practical, we need real data sets for testing. Unfortunately, uncertain data sets are often hard to get. The goal of the First ACM SIGKDD Workshop on Knowledge Discovery from Uncertain Data (U'09) is to discuss in depth the challenges, opportunities and techniques on the topic of analyzing and mining uncertain data. The theme of this workshop is to make connections among the research areas of uncertain databases, probabilistic reasoning, and data mining, as well as to build bridges among the aspects of models, data, applications, novel mining tasks and effective solutions. By making connections among different communities, we aim at understanding each other in terms of scientific foundation as well as commonality and differences in research methodology. The workshop program is very stimulating and exciting. We are pleased to feature two invited talks by pioneers in mining uncertain data. Christopher Jermaine will give an invited talk titled "Managing and Mining Uncertain Data: What Might We Do Better?" Matthias Renz will address the topic "Querying and Mining Uncertain Data: Methods, Applications, and Challenges". Moreover, 8 accepted papers in 4 full presentations and 4 concise presentations will cover a bunch of interesting topics and on-going research projects about uncertain data mining. %I ACM %C New York, NY, USA %8 2009/// %@ 978-1-60558-675-5 %G eng %0 Conference Paper %B Proceedings of the seventh ACM conference on Creativity and cognition %D 2009 %T Promoting social creativity: a component of a national initiative for social participation %A Shneiderman, Ben %A Churchill,Elizabeth %A Fischer,Gerhard %A Goldberg,Ken %K research agenda %K social creativity %K social participation %X This panel will discuss group processes that promote social creativity in science, engineering, arts, and humanities. We will offer positive and negative examples of social creativity projects, while suggesting research directions for dramatically increased social participation. The goal is to develop strategies that would expand resources and opportunities for research and education in social creativity. This requires our community to develop a unified position, then reach out to national science funding agencies, while building the case for the importance of this topic beyond our own community. How can social creativity, collaborative discovery, distributed innovation, and collective intelligence be framed as an international priority to cope with the problems of the 21st century and how can we identify a clear set of research challenges? The theme of technology-mediated social participation is outlined in the white paper for a National Initiative for Social Participation (http://iparticipate.wikispaces.com). The white paper suggests that successful research challenges should have three key elements: (1) compelling national need (healthcare, national security, community safety, education, innovation, cultural heritage, energy sustainability, environmental protection, etc.), (2) scientific foundation based on established theories and well-defined research questions (privacy, reciprocity, trust, motivation, recognition, etc.), and (3) computer science research challenges (security, privacy protection, scalability, visualization, end-user development, distributed data handling for massive user-generated content, network analysis of community evolution, cross network comparison, etc.). We seek recommendations for ways to increase the resources and attention for this field. We hope to inspire: universities to change course content, add courses, and offer new degree programs industry to help researchers on social creativity government to support these ideas and try them out in government applications scientists and artists to open themselves to more social/collaborative approaches %B Proceedings of the seventh ACM conference on Creativity and cognition %S C&C '09 %I ACM %C New York, NY, USA %P 7 - 8 %8 2009/// %@ 978-1-60558-865-0 %G eng %U http://doi.acm.org/10.1145/1640233.1640237 %R 10.1145/1640233.1640237 %0 Journal Article %J Proceedings of the National Academy of Sciences %D 2009 %T Protein quantification across hundreds of experimental conditions %A Zia Khan %A Bloom, Joshua S. %A Garcia, Benjamin A. %A Singh, Mona %A Kruglyak, Leonid %K kd-tree %K orthogonal range query %K quantitative proteomics %K space partitioning data structures %K tandem mass spectrometry %X Quantitative studies of protein abundance rarely span more than a small number of experimental conditions and replicates. In contrast, quantitative studies of transcript abundance often span hundreds of experimental conditions and replicates. This situation exists, in part, because extracting quantitative data from large proteomics datasets is significantly more difficult than reading quantitative data from a gene expression microarray. To address this problem, we introduce two algorithmic advances in the processing of quantitative proteomics data. First, we use space-partitioning data structures to handle the large size of these datasets. Second, we introduce techniques that combine graph-theoretic algorithms with space-partitioning data structures to collect relative protein abundance data across hundreds of experimental conditions and replicates. We validate these algorithmic techniques by analyzing several datasets and computing both internal and external measures of quantification accuracy. We demonstrate the scalability of these techniques by applying them to a large dataset that comprises a total of 472 experimental conditions and replicates. %B Proceedings of the National Academy of Sciences %V 106 %P 15544 - 15548 %8 2009/09/15/ %@ 0027-8424, 1091-6490 %G eng %U http://www.pnas.org/content/106/37/15544 %N 37 %! PNAS %0 Conference Paper %B Proceedings of the 23rd Annual Conference on Neural Information Processing Systems %D 2009 %T Reading tea leaves: How humans interpret topic models %A Chang,J. %A Jordan Boyd-Graber %A Gerrish,S. %A Wang,C. %A Blei,D.M. %X Probabilistic topic models are a popular tool for the unsupervised analysis of text, providing both a predictive model of future text and a latent topic representation of the corpus. Practitioners typically assume that the latent space is semantically meaningful. It is used to check models, summarize the corpus, and guide explo- ration of its contents. However, whether the latent space is interpretable is in need of quantitative evaluation. In this paper, we present new quantitative methods for measuring semantic meaning in inferred topics. We back these measures with large-scale user studies, showing that they capture aspects of the model that are undetected by previous measures of model quality based on held-out likelihood. Surprisingly, topic models which perform better on held-out likelihood may infer less semantically meaningful topics. %B Proceedings of the 23rd Annual Conference on Neural Information Processing Systems %V 31 %8 2009/// %G eng %0 Journal Article %J ACM Transactions on Knowledge Discovery from Data (TKDD) %D 2009 %T Reflect and correct: A misclassification prediction approach to active inference %A Bilgic,Mustafa %A Getoor, Lise %K active inference %K collective classification %K information diffusion %K label acquisition %K viral marketing %X Information diffusion, viral marketing, graph-based semi-supervised learning, and collective classification all attempt to model and exploit the relationships among nodes in a network to improve the performance of node labeling algorithms. However, sometimes the advantage of exploiting the relationships can become a disadvantage. Simple models like label propagation and iterative classification can aggravate a misclassification by propagating mistakes in the network, while more complex models that define and optimize a global objective function, such as Markov random fields and graph mincuts, can misclassify a set of nodes jointly. This problem can be mitigated if the classification system is allowed to ask for the correct labels for a few of the nodes during inference. However, determining the optimal set of labels to acquire is intractable under relatively general assumptions, which forces us to resort to approximate and heuristic techniques. We describe three such techniques in this article. The first one is based on directly approximating the value of the objective function of label acquisition and greedily acquiring the label that provides the most improvement. The second technique is a simple technique based on the analogy we draw between viral marketing and label acquisition. Finally, we propose a method, which we refer to as reflect and correct, that can learn and predict when the classification system is likely to make mistakes and suggests acquisitions to correct those mistakes. We empirically show on a variety of synthetic and real-world datasets that the reflect and correct method significantly outperforms the other two techniques, as well as other approaches based on network structural measures such as node degree and network clustering. %B ACM Transactions on Knowledge Discovery from Data (TKDD) %V 3 %P 20:1–20:32 - 20:1–20:32 %8 2009/12// %@ 1556-4681 %G eng %U http://doi.acm.org/10.1145/1631162.1631168 %N 4 %R 10.1145/1631162.1631168 %0 Conference Paper %B IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 2009. WASPAA '09 %D 2009 %T Regularized HRTF fitting using spherical harmonics %A Zotkin,Dmitry N %A Duraiswami, Ramani %A Gumerov, Nail A. %K Acoustic applications %K acoustic field %K Acoustic fields %K acoustic intensity measurement %K Acoustic measurements %K acoustic signal processing %K Acoustic testing %K acoustic waves %K array signal processing %K audio acoustics %K circular arrays %K computational analysis %K Ear %K ear location %K head-related transfer function %K Helmholtz reciprocity principle %K HRTF %K HRTF fitting %K Loudspeakers %K Microphones %K Position measurement %K signal reconstruction %K spatial audio %K spectral reconstruction %K spherical harmonics %K Transfer functions %X By the Helmholtz reciprocity principle, the head-related transfer function (HRTF) is equivalent to an acoustic field created by a transmitter placed at the ear location. Therefore, it can be represented as a spherical harmonics spectrum - a weighted sum of spherical harmonics. Such representations are useful in theoretical and computational analysis. Many different (often severely undersampled) grids are used for HRTF measurement, making the spectral reconstruction difficult. In this paper, two methods of obtaining the spectrum are presented and analyzed both on synthetic (ground-truth data available) and real HRTF measurements. %B IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 2009. WASPAA '09 %I IEEE %P 257 - 260 %8 2009/10// %@ 978-1-4244-3678-1 %G eng %R 10.1109/ASPAA.2009.5346521 %0 Conference Paper %B IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies, 2009. WI-IAT '09 %D 2009 %T Rigorous Probabilistic Trust-Inference with Applications to Clustering %A DuBois,Thomas %A Golbeck,Jennifer %A Srinivasan, Aravind %K Clustering algorithms %K Conferences %K Educational institutions %K Extraterrestrial measurements %K Inference algorithms %K Intelligent agent %K random graphs %K Social network services %K trust inferrence %K Visualization %K Voting %K Web sites %X The World Wide Web has transformed into an environment where users both produce and consume information. In order to judge the validity of information, it is important to know how trustworthy its creator is. Since no individual can have direct knowledge of more than a small fraction of information authors, methods for inferring trust are needed. We propose a new trust inference scheme based on the idea that a trust network can be viewed as a random graph, and a chain of trust as a path in that graph. In addition to having an intuitive interpretation, our algorithm has several advantages, noteworthy among which is the creation of an inferred trust-metric space where the shorter the distance between two people, the higher their trust. Metric spaces have rigorous algorithms for clustering, visualization, and related problems, any of which is directly applicable to our results. %B IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies, 2009. WI-IAT '09 %I IEEE %V 1 %P 655 - 658 %8 2009/09/15/18 %@ 978-0-7695-3801-3 %G eng %R 10.1109/WI-IAT.2009.109 %0 Journal Article %J Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %D 2009 %T RNA Colony Blot Hybridization Method for Enumeration of Culturable Vibrio Cholerae and Vibrio Mimicus Bacteria %A Grim,Christopher J. %A Zo,Young-Gun %A Hasan,Nur A. %A Ali,Afsar %A Chowdhury,Wasimul B. %A Islam,Atiqul %A Rashid,Mohammed H. %A Alam,Munirul %A Morris,J. Glenn %A Huq,Anwar %A Rita R Colwell %X A species-specific RNA colony blot hybridization protocol was developed for enumeration of culturable Vibrio cholerae and Vibrio mimicus bacteria in environmental water samples. Bacterial colonies on selective or nonselective plates were lysed by sodium dodecyl sulfate, and the lysates were immobilized on nylon membranes. A fluorescently labeled oligonucleotide probe targeting a phylogenetic signature sequence of 16S rRNA of V. cholerae and V. mimicus was hybridized to rRNA molecules immobilized on the nylon colony lift blots. The protocol produced strong positive signals for all colonies of the 15 diverse V. cholerae-V. mimicus strains tested, indicating 100% sensitivity of the probe for the targeted species. For visible colonies of 10 nontarget species, the specificity of the probe was calculated to be 90% because of a weak positive signal produced by Grimontia (Vibrio) hollisae, a marine bacterium. When both the sensitivity and specificity of the assay were evaluated using lake water samples amended with a bioluminescent V. cholerae strain, no false-negative or false-positive results were found, indicating 100% sensitivity and specificity for culturable bacterial populations in freshwater samples when G. hollisae was not present. When the protocol was applied to laboratory microcosms containing V. cholerae attached to live copepods, copepods were found to carry approximately 10,000 to 50,000 CFU of V. cholerae per copepod. The protocol was also used to analyze pond water samples collected in an area of cholera endemicity in Bangladesh over a 9-month period. Water samples collected from six ponds demonstrated a peak in abundance of total culturable V. cholerae bacteria 1 to 2 months prior to observed increases in pathogenic V. cholerae and in clinical cases recorded by the area health clinic. The method provides a highly specific and sensitive tool for monitoring the dynamics of V. cholerae in the environment. The RNA blot hybridization protocol can also be applied to detection of other gram-negative bacteria for taxon-specific enumeration. %B Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %V 75 %P 5439 - 5444 %8 2009/09/01/ %@ 0099-2240, 1098-5336 %G eng %U http://aem.asm.org/content/75/17/5439 %N 17 %R 10.1128/AEM.02007-08 %0 Journal Article %J Proceedings of the Third International Conference on Advances in Biometrics %D 2009 %T Robust human detection under occlusion by integrating face and person detectors %A Schwartz, W.R. %A Gopalan,R. %A Chellapa, Rama %A Davis, Larry S. %X Human detection under occlusion is a challenging problemin computer vision. We address this problem through a framework which integrates face detection and person detection. We first investigate how the response of a face detector is correlated with the response of a person detector. From these observations, we formulate hypotheses that capture the intuitive feedback between the responses of face and person detectors and use it to verify if the individual detectors’ outputs are true or false. We illustrate the performance of our integration framework on challeng- ing images that have considerable amount of occlusion, and demonstrate its advantages over individual face and person detectors. %B Proceedings of the Third International Conference on Advances in Biometrics %P 970 - 979 %8 2009/// %G eng %0 Journal Article %J Proceedings of the International Conference on Computer Vision %D 2009 %T Scene it or not? incremental multiple kernel learning for object detection %A Kembhavi,A. %A Siddiquie,B. %A Miezianko,R. %A McCloskey,S. %A Davis, Larry S. %A Schwartz, W.R. %A Harwood,D. %A Gupta,A. %A Farrell,R. %A Luo,Y. %A others %B Proceedings of the International Conference on Computer Vision %8 2009/// %G eng %0 Conference Paper %B Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures %D 2009 %T Scheduling to minimize staleness and stretch in real-time data warehouses %A Bateni,M. H %A Golab,L. %A Hajiaghayi, Mohammad T. %A Karloff,H. %B Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures %P 29 - 38 %8 2009/// %G eng %0 Conference Paper %B Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval %D 2009 %T Selecting hierarchical clustering cut points for web person-name disambiguation %A Gong,Jun %A Oard, Douglas %K clustering %K person-name disambiguation %X Hierarchical clustering is often used to cluster person-names referring to the same entities. Since the correct number of clusters for a given person-name is not known a priori, some way of deciding where to cut the resulting dendrogram to balance risks of over- or under-clustering is needed. This paper reports on experiments in which outcome-specific and result-set measures are used to learn a global similarity threshold. Results on the Web People Search (WePS)-2 task indicate that approximately 85% of the optimal F1 measure can be achieved on held-out data. %B Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval %S SIGIR '09 %I ACM %C New York, NY, USA %P 778 - 779 %8 2009/// %@ 978-1-60558-483-6 %G eng %U http://doi.acm.org/10.1145/1571941.1572124 %R 10.1145/1571941.1572124 %0 Journal Article %J SCALE summer workshop final report, Human Language Technology Center Of Excellence %D 2009 %T Semantically informed machine translation (SIMT) %A Baker,K. %A Bethard,S. %A Bloodgood,M. %A Brown,R. %A Callison-Burch,C. %A Coppersmith,G. %A Dorr, Bonnie J %A Filardo,W. %A Giles,K. %A Irvine,A. %A others %B SCALE summer workshop final report, Human Language Technology Center Of Excellence %8 2009/// %G eng %0 Journal Article %J Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %D 2009 %T Serogroup, Virulence, and Genetic Traits of Vibrio Parahaemolyticus in the Estuarine Ecosystem of Bangladesh %A Alam,Munirul %A Chowdhury,Wasimul B. %A Bhuiyan,N. A. %A Islam,Atiqul %A Hasan,Nur A. %A Nair,G. Balakrish %A Watanabe,H. %A Siddique,A. K. %A Huq,Anwar %A Sack,R. Bradley %A Akhter,M. Z. %A Grim,Christopher J. %A Kam,K.-M. %A Luey,C. K. Y. %A Endtz,Hubert P. %A Cravioto,Alejandro %A Rita R Colwell %X Forty-two strains of Vibrio parahaemolyticus were isolated from Bay of Bengal estuaries and, with two clinical strains, analyzed for virulence, phenotypic, and molecular traits. Serological analysis indicated O8, O3, O1, and K21 to be the major O and K serogroups, respectively, and O8:K21, O1:KUT, and O3:KUT to be predominant. The K antigen(s) was untypeable, and pandemic serogroup O3:K6 was not detected. The presence of genes toxR and tlh were confirmed by PCR in all but two strains, which also lacked toxR. A total of 18 (41%) strains possessed the virulence gene encoding thermostable direct hemolysin (TDH), and one had the TDH-related hemolysin (trh) gene, but not tdh. Ten (23%) strains exhibited Kanagawa phenomenon that surrogates virulence, of which six, including the two clinical strains, possessed tdh. Of the 18 tdh-positive strains, 17 (94%), including the two clinical strains, had the seromarker O8:K21, one was O9:KUT, and the single trh-positive strain was O1:KUT. None had the group-specific or ORF8 pandemic marker gene. DNA fingerprinting employing pulsed-field gel electrophoresis (PFGE) of SfiI-digested DNA and cluster analysis showed divergence among the strains. Dendrograms constructed using PFGE (SfiI) images from a soft database, including those of pandemic and nonpandemic strains of diverse geographic origin, however, showed that local strains formed a cluster, i.e., “clonal cluster,” as did pandemic strains of diverse origin. The demonstrated prevalence of tdh-positive and diarrheagenic serogroup O8:K21 strains in coastal villages of Bangladesh indicates a significant human health risk for inhabitants. %B Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %V 75 %P 6268 - 6274 %8 2009/10/01/ %@ 0099-2240, 1098-5336 %G eng %U http://aem.asm.org/content/75/19/6268 %N 19 %R 10.1128/AEM.00266-09 %0 Thesis %D 2009 %T Shape Identification in Temporal Data Sets %A Gregory,M.B. %A Shneiderman, Ben %X Shapes are a concise way to describe temporal variable behaviors.Some commonly used shapes are spikes, sinks, rises, and drops. A spike describes a set of variable values that rapidly increase, then immediately rapidly decrease. The variable may be the value of a stock or a person’s blood sugar levels. Shapes are abstract. Details such as the height of spike or its rate increase, are lost in the ab- straction. These hidden details make it difficult to define shapes and compare one to another. For example, what attributes of a spike determine its “spikiness”? The ability to define and com- pare shapes is important because it allows shapes to be identified and ranked, according to an attribute of interest. Work has been done in the area of shape identification through pattern matching and other data mining techniques, but ideas combining the identifi- cation and comparison of shapes have received less attention. This paper fills the gap by presenting a set of shapes and the attributes by which they can identified, compared, and ranked. Neither the set of shapes, nor their attributes presented in this paper are exhaustive, but it provides an example of how a shape’s attributes can be used for identification and comparison. The intention of this paper is not to replace any particular mathematical method of identifying a par- ticular behavior, but to provide a toolset for knowledge discovery and an intuitive method of data mining for novices. Spikes, sinks, rises, drops, lines, plateaus, valleys, and gaps are the shapes pre- sented in this paper. Several attributes for each shape are defined. These attributes will be the basis for constructing definitions that allow the shapes to be identified and ranked. The second contri- bution is an information visualization tool, TimeSearcher: Shape Search Edition (SSE), which allows users to explore data sets using the identification and ranking ideas in this paper. %I Master’s thesis, University of Maryland %8 2009/// %G eng %0 Journal Article %J Knowledge and Data Engineering, IEEE Transactions on %D 2009 %T SPOT Databases: Efficient Consistency Checking and Optimistic Selection in Probabilistic Spatial Databases %A Parker,A. %A Infantes,G. %A Grant,J. %A V.S. Subrahmanian %K Cartesian %K checking;database %K database;data %K databases; %K databases;visual %K indexing;inference %K indexing;linear %K integrity;database %K mechanisms;linear %K probabilistic %K problem;spatial %K problems;temporal %K processing;search %K program;optimistic %K programming;probability;query %K query;probabilistic %K reasoning;search %K selection %K selection;consistency %K space;cautious %K temporal %X Spatial probabilistic temporal (SPOT) databases are a paradigm for reasoning with probabilistic statements about where a vehicle may be now or in the future. They express statements of the form "Object O is in spatial region R at some time t with some probability in the interval [L,U]." Past work on SPOT databases has developed selection operators based on selecting SPOT atoms that are entailed by the SPOT database-we call this "cautious" selection. In this paper, we study several problems. First, we note that the runtime of consistency checking and cautious selection algorithms in past work is influenced greatly by the granularity of the underlying Cartesian space. In this paper, we first introduce the notion of "optimistic" selection, where we are interested in returning all SPOT atoms in a database that are consistent with respect to a query, rather than having an entailment relationship. We then develop an approach to scaling SPOT databases that has three main contributions: 1) We develop methods to eliminate variables from the linear programs used in past work, thus greatly reducing the size of the linear programs used-the resulting advances apply to consistency checking, optimistic selection, and cautious selection. 2) We develop a host of theorems to show how we can prune the search space when we are interested in optimistic selection. 3) We use the above contributions to build an efficient index to execute optimistic selection queries over SPOT databases. Our approach is superior to past work in two major respects: First, it makes fewer assumptions than all past works on this topic except that in. Second, our experiments, which are based on real-world data about ship movements, show that our algorithms are much more efficient than those in. %B Knowledge and Data Engineering, IEEE Transactions on %V 21 %P 92 - 107 %8 2009/01// %@ 1041-4347 %G eng %N 1 %R 10.1109/TKDE.2008.93 %0 Conference Paper %B Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics %D 2009 %T Streaming for large scale NLP: Language modeling %A Goyal,A. %A Daumé, Hal %A Venkatasubramanian,S. %B Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics %P 512 - 520 %8 2009/// %G eng %0 Conference Paper %B Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1 %D 2009 %T Supervised and unsupervised methods in employing discourse relations for improving opinion polarity classification %A Somasundaran,Swapna %A Namata,Galileo %A Wiebe,Janyce %A Getoor, Lise %X This work investigates design choices in modeling a discourse scheme for improving opinion polarity classification. For this, two diverse global inference paradigms are used: a supervised collective classification framework and an unsupervised optimization framework. Both approaches perform substantially better than baseline approaches, establishing the efficacy of the methods and the underlying discourse scheme. We also present quantitative and qualitative analyses showing how the improvements are achieved. %B Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1 %S EMNLP '09 %I Association for Computational Linguistics %C Stroudsburg, PA, USA %P 170 - 179 %8 2009/// %@ 978-1-932432-59-6 %G eng %U http://dl.acm.org/citation.cfm?id=1699510.1699533 %0 Journal Article %J Computer-Aided Design %D 2009 %T A survey of CAD model simplification techniques for physics-based simulation applications %A Thakur,Atul %A Banerjee,Ashis Gopal %A Gupta, Satyandra K. %K CAD model simplification %K Physics-based simulation %X Automated CAD model simplification plays an important role in effectively utilizing physics-based simulation during the product realization process. Currently a rich body of literature exists that describe many successful techniques for fully-automatic or semi-automatic simplification of CAD models for a wide variety of applications. The purpose of this paper is to compile a list of the techniques that are relevant for physics-based simulations problems and to characterize them based on their attributes. We have classified them into the following four categories: techniques based on surface entity based operators, volume entity based operators, explicit feature based operators, and dimension reduction operators. This paper also presents the necessary background information in the CAD model representation to assist the new readers. We conclude the paper by outlining open research directions in this field. %B Computer-Aided Design %V 41 %P 65 - 80 %8 2009/02// %@ 0010-4485 %G eng %U http://www.sciencedirect.com/science/article/pii/S0010448508002285 %N 2 %R 10.1016/j.cad.2008.11.009 %0 Journal Article %J Bioinspiration & Biomimetics %D 2009 %T A survey of snake-inspired robot designs %A Hopkins,James K. %A Spranklin,Brent W. %A Gupta, Satyandra K. %X Body undulation used by snakes and the physical architecture of a snake body may offer significant benefits over typical legged or wheeled locomotion designs in certain types of scenarios. A large number of research groups have developed snake-inspired robots to exploit these benefits. The purpose of this review is to report different types of snake-inspired robot designs and categorize them based on their main characteristics. For each category, we discuss their relative advantages and disadvantages. This review will assist in familiarizing a newcomer to the field with the existing designs and their distinguishing features. We hope that by studying existing robots, future designers will be able to create new designs by adopting features from successful robots. The review also summarizes the design challenges associated with the further advancement of the field and deploying snake-inspired robots in practice. %B Bioinspiration & Biomimetics %V 4 %P 021001 - 021001 %8 2009/06/01/ %@ 1748-3182, 1748-3190 %G eng %U http://iopscience.iop.org/1748-3182/4/2/021001 %N 2 %R 10.1088/1748-3182/4/2/021001 %0 Journal Article %J Journal of Mechanical Design %D 2009 %T A systematic approach for designing multifunctional thermally conducting polymer structures with embedded actuators %A Bejgerowski,W. %A Gupta,S.K. %A Bruck,H. A. %B Journal of Mechanical Design %V 131 %P 111009 - 111009 %8 2009/// %G eng %0 Journal Article %J Appl Environ Microbiol %D 2009 %T Three genomes from the phylum Acidobacteria provide insight into the lifestyles of these microorganisms in soils. %A Ward, Naomi L %A Challacombe, Jean F %A Janssen, Peter H %A Henrissat, Bernard %A Coutinho, Pedro M %A Wu, Martin %A Xie, Gary %A Haft, Daniel H %A Sait, Michelle %A Badger, Jonathan %A Barabote, Ravi D %A Bradley, Brent %A Brettin, Thomas S %A Brinkac, Lauren M %A Bruce, David %A Creasy, Todd %A Daugherty, Sean C %A Davidsen, Tanja M %A DeBoy, Robert T %A Detter, J Chris %A Dodson, Robert J %A Durkin, A Scott %A Ganapathy, Anuradha %A Gwinn-Giglio, Michelle %A Han, Cliff S %A Khouri, Hoda %A Kiss, Hajnalka %A Kothari, Sagar P %A Madupu, Ramana %A Nelson, Karen E %A Nelson, William C %A Paulsen, Ian %A Penn, Kevin %A Ren, Qinghu %A Rosovitz, M J %A Jeremy D Selengut %A Shrivastava, Susmita %A Sullivan, Steven A %A Tapia, Roxanne %A Thompson, L Sue %A Watkins, Kisha L %A Yang, Qi %A Yu, Chunhui %A Zafar, Nikhat %A Zhou, Liwei %A Kuske, Cheryl R %K Anti-Bacterial Agents %K bacteria %K Biological Transport %K Carbohydrate Metabolism %K Cyanobacteria %K DNA, Bacterial %K Fungi %K Genome, Bacterial %K Macrolides %K Molecular Sequence Data %K Nitrogen %K Phylogeny %K Proteobacteria %K Sequence Analysis, DNA %K sequence homology %K Soil Microbiology %XThe complete genomes of three strains from the phylum Acidobacteria were compared. Phylogenetic analysis placed them as a unique phylum. They share genomic traits with members of the Proteobacteria, the Cyanobacteria, and the Fungi. The three strains appear to be versatile heterotrophs. Genomic and culture traits indicate the use of carbon sources that span simple sugars to more complex substrates such as hemicellulose, cellulose, and chitin. The genomes encode low-specificity major facilitator superfamily transporters and high-affinity ABC transporters for sugars, suggesting that they are best suited to low-nutrient conditions. They appear capable of nitrate and nitrite reduction but not N(2) fixation or denitrification. The genomes contained numerous genes that encode siderophore receptors, but no evidence of siderophore production was found, suggesting that they may obtain iron via interaction with other microorganisms. The presence of cellulose synthesis genes and a large class of novel high-molecular-weight excreted proteins suggests potential traits for desiccation resistance, biofilm formation, and/or contribution to soil structure. Polyketide synthase and macrolide glycosylation genes suggest the production of novel antimicrobial compounds. Genes that encode a variety of novel proteins were also identified. The abundance of acidobacteria in soils worldwide and the breadth of potential carbon use by the sequenced strains suggest significant and previously unrecognized contributions to the terrestrial carbon cycle. Combining our genomic evidence with available culture traits, we postulate that cells of these isolates are long-lived, divide slowly, exhibit slow metabolic rates under low-nutrient conditions, and are well equipped to tolerate fluctuations in soil hydration.
%B Appl Environ Microbiol %V 75 %P 2046-56 %8 2009 Apr %G eng %N 7 %R 10.1128/AEM.02294-08 %0 Conference Paper %B Proceedings of the 18th international conference on World wide web %D 2009 %T To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles %A Zheleva,Elena %A Getoor, Lise %K attribute inference %K groups %K privacy %K social networks %X In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an online social network with a mixture of public and private user profiles to predict the private attributes of users. We map this problem to a relational classification problem and we propose practical models that use friendship and group membership information (which is often not hidden) to infer sensitive attributes. The key novel idea is that in addition to friendship links, groups can be carriers of significant information. We show that on several well-known social media sites, we can easily and accurately recover the information of private-profile users. To the best of our knowledge, this is the first work that uses link-based and group-based classification to study privacy implications in social networks with mixed public and private user profiles. %B Proceedings of the 18th international conference on World wide web %S WWW '09 %I ACM %C New York, NY, USA %P 531 - 540 %8 2009/// %@ 978-1-60558-487-4 %G eng %U http://doi.acm.org/10.1145/1526709.1526781 %R 10.1145/1526709.1526781 %0 Journal Article %J Molecular Cell %D 2009 %T Together, Rpn10 and Dsk2 Can Serve as a Polyubiquitin Chain-Length Sensor %A Zhang,Daoning %A Chen,Tony %A Ziv,Inbal %A Rosenzweig,Rina %A Matiuhin,Yulia %A Bronner,Vered %A Glickman,Michael H. %A Fushman, David %K Proteins %K signaling %X SummaryAs a signal for substrate targeting, polyubiquitin meets various layers of receptors upstream to the 26S proteasome. We obtained structural information on two receptors, Rpn10 and Dsk2, alone and in complex with (poly)ubiquitin or with each other. A hierarchy of affinities emerges with Dsk2 binding monoubiquitin tighter than Rpn10 does, whereas Rpn10 prefers the ubiquitin-like domain of Dsk2 to monoubiquitin, with increasing affinities for longer polyubiquitin chains. We demonstrated the formation of ternary complexes of both receptors simultaneously with (poly)ubiquitin and found that, depending on the ubiquitin chain length, the orientation of the resulting complex is entirely different, providing for alternate signals. Dynamic rearrangement provides a chain-length sensor, possibly explaining how accessibility of Dsk2 to the proteasome is limited unless it carries a properly tagged cargo. We propose a mechanism for a malleable ubiquitin signal that depends both on chain length and combination of receptors to produce tetraubiquitin as an efficient signal threshold. %B Molecular Cell %V 36 %P 1018 - 1033 %8 2009/12/24/ %@ 1097-2765 %G eng %U http://www.sciencedirect.com/science/article/pii/S1097276509008260 %N 6 %R 10.1016/j.molcel.2009.11.012 %0 Conference Paper %B Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on %D 2009 %T Understanding videos, constructing plots learning a visually grounded storyline model from annotated videos %A Gupta,A. %A Srinivasan,P. %A Shi,Jianbo %A Davis, Larry S. %K (artificial %K action %K activity %K analysis;integer %K AND-OR %K annotation;video %K coding; %K constraint;video %K construction;semantic %K extraction;graph %K framework;plots %K graph;encoding;human %K grounded %K intelligence);spatiotemporal %K learning %K meaning;spatio-temporal %K model %K phenomena;video %K Programming %K programming;learning %K recognition;human %K representation;integer %K storyline %K theory;image %K understanding;visually %X Analyzing videos of human activities involves not only recognizing actions (typically based on their appearances), but also determining the story/plot of the video. The storyline of a video describes causal relationships between actions. Beyond recognition of individual actions, discovering causal relationships helps to better understand the semantic meaning of the activities. We present an approach to learn a visually grounded storyline model of videos directly from weakly labeled data. The storyline model is represented as an AND-OR graph, a structure that can compactly encode storyline variation across videos. The edges in the AND-OR graph correspond to causal relationships which are represented in terms of spatio-temporal constraints. We formulate an Integer Programming framework for action recognition and storyline extraction using the storyline model and visual groundings learned from training data. %B Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on %P 2012 - 2019 %8 2009/06// %G eng %R 10.1109/CVPR.2009.5206492 %0 Journal Article %J ACM Computing Surveys %D 2009 %T Using formal specifications to support testing %A Hierons,Robert M. %A Krause,Paul %A Lüttgen,Gerald %A Simons,Anthony J. H. %A Vilkomir,Sergiy %A Woodward,Martin R. %A Zedan,Hussein %A Bogdanov,Kirill %A Bowen,Jonathan P. %A Cleaveland, Rance %A Derrick,John %A Dick,Jeremy %A Gheorghe,Marian %A Harman,Mark %A Kapoor,Kalpesh %B ACM Computing Surveys %V 41 %P 1 - 76 %8 2009/02/01/ %@ 03600300 %G eng %U http://dl.acm.org/citation.cfm?id=1459352.1459354 %R 10.1145/1459352.1459354 %0 Conference Paper %B Visual Analytics Science and Technology, 2009. VAST 2009. IEEE Symposium on %D 2009 %T VAST 2009 challenge: An insider threat %A Grinstein,G. %A Scholtz,J. %A Whiting,M. %A Plaisant, Catherine %K 2009 %K analytics;data %K analytics;geospatial %K challenge;cyber %K data;security %K information %K information;human %K interaction;network %K interfaces; %K network;visual %K traffic %K user %K VAST %K video;social %K visualisation;graphical %X The 4th VAST Challenge centered on a cyber analytics scenario and offered three mini-challenges with datasets of badge and network traffic data, a social network including geospatial information, and security video. Teams could also enter the Grand challenge which combined all three datasets. In this paper, we summarize the dataset, the overall scenario and the questions asked in the challenges. We describe the judging process and new infrastructure developed to manage the submissions and compute accuracy measures in the social network mini challenge. We received 49 entries from 30 teams, and gave 23 different awards to a total of 16 teams. %B Visual Analytics Science and Technology, 2009. VAST 2009. IEEE Symposium on %P 243 - 244 %8 2009/10// %G eng %R 10.1109/VAST.2009.5334454 %0 Book %D 2009 %T Video-based Lane Detection using Boosting Principles %A Gopalan,R. %A Hong, T. %A Shneier, M. %A Chellapa, Rama %X Autonomous navigation of road vehicles is a challenging problem that has widespread applications in intelligent systems, and robotics. An integral componentof such a system is to understand how the road is structured. Detection of road lane markings assumes importance in this regard, and this problem has been approached with different visual input- based inference algorithms ([1], [2]), besides other sensing modalities such as the GPS sensor and the internal vehicle- state sensors. But the challenge still remains when there is considerable amount of shadows on the road, variations in outdoor lighting conditions of the scene (transition from day to night), among others. To address such issues, we propose a machine learning approach based on Real Adaboost [3], and train linear classifiers for both the appearance and edge cues of the training examplars. Additionally, we incorporate prior knowledge about the relative importance of the training samples by computing their weights using kernel discriminant analysis [4], before learning the classification function through boosting. The regions identified as lane markings are then analyzed for gradient direction consistency before making the final detection decision. We illustrate the effectiveness of our algorithm on challenging daylight and night- time road scenarios. %I Snowbird %8 2009/// %G eng %0 Conference Paper %B Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on %D 2009 %T Visibility constraints on features of 3D objects %A Basri,R. %A Felzenszwalb,P. F %A Girshick,R. B %A Jacobs, David W. %A Klivans,C. J %K 3D %K algorithms;synthetic %K complexity;iterative %K constraints;computational %K data;synthetic %K dataset;NP-hard;image-based %K features;COIL %K framework;iterative %K images;three-dimensional %K methods;object %K object %K recognition; %K recognition;viewing %K sphere;visibility %X To recognize three-dimensional objects it is important to model how their appearances can change due to changes in viewpoint. A key aspect of this involves understanding which object features can be simultaneously visible under different viewpoints. We address this problem in an image-based framework, in which we use a limited number of images of an object taken from unknown viewpoints to determine which subsets of features might be simultaneously visible in other views. This leads to the problem of determining whether a set of images, each containing a set of features, is consistent with a single 3D object. We assume that each feature is visible from a disk of viewpoints on the viewing sphere. In this case we show the problem is NP-hard in general, but can be solved efficiently when all views come from a circle on the viewing sphere. We also give iterative algorithms that can handle noisy data and converge to locally optimal solutions in the general case. Our techniques can also be used to recover viewpoint information from the set of features that are visible in different images. We show that these algorithms perform well both on synthetic data and images from the COIL dataset. %B Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on %P 1231 - 1238 %8 2009/06// %G eng %R 10.1109/CVPR.2009.5206726 %0 Journal Article %J Computer Graphics and Applications, IEEE %D 2009 %T Visual-Analytics Evaluation %A Plaisant, Catherine %A Grinstein,G. %A Scholtz,J. %K analytic %K analytics %K evaluation;cognition;data %K generation;user %K interactive %K interfaces;synthetic-data-set %K reasoning;visual %K systems; %K tools;visual %K visual %K visualisation;interactive %X Visual analytics (VA) is the science of analytical reasoning facilitated by interactive visual interfaces. Assessing VA technology's effectiveness is challenging because VA tools combine several disparate components, both low and high level, integrated in complex interactive systems used by analysts, emergency responders, and others. These components include analytical reasoning, visual representations, computer-human interaction techniques, data representations and transformations, collaboration tools, and especially tools for communicating the results of their use. VA tool users' activities can be exploratory and can take place over days, weeks, or months. Users might not follow a predefined or even linear work flow. They might work alone or in groups. To understand these complex behaviors, an evaluation can target the component level, the system level, or the work environment level, and requires realistic data and tasks. Traditional evaluation metrics such as task completion time, number of errors, or recall and precision are insufficient to quantify the utility of VA tools, and new research is needed to improve our VA evaluation methodology. %B Computer Graphics and Applications, IEEE %V 29 %P 16 - 17 %8 2009/06//may %@ 0272-1716 %G eng %N 3 %R 10.1109/MCG.2009.56 %0 Conference Paper %B IEEE 25th International Conference on Data Engineering, 2009. ICDE '09 %D 2009 %T Web Monitoring 2.0: Crossing Streams to Satisfy Complex Data Needs %A Roitman,H. %A Gal,A. %A Raschid, Louiqa %K Bandwidth %K complex client information need %K Data Delivery %K Data engineering %K database management systems %K Educational institutions %K Internet %K Mashups %K mashups generation %K Monitoring %K multiple information source %K offline algorithmic solution %K Portals %K PROBES %K Profiles %K Query processing %K scalability %K scheduling %K volatile information stream %K Web 2.0 %K Web Monitoring %X Web monitoring 2.0 supports the complex information needs of clients who probe multiple information sources and generate mashups by integrating across these volatile streams. A proxy that aims at satisfying multiple customized client profiles will face a scalability challenge in trying to maximize the number of clients served while at the same time fully satisfying complex client needs. In this paper, we introduce an abstraction of complex execution intervals, a combination of time intervals and information streams, to capture complex client needs. Given some budgetary constraints (e.g., bandwidth), we present offline algorithmic solutions for the problem of maximizing completeness of capturing complex profiles. %B IEEE 25th International Conference on Data Engineering, 2009. ICDE '09 %I IEEE %P 1215 - 1218 %8 2009/04/29/March %@ 978-1-4244-3422-0 %G eng %R 10.1109/ICDE.2009.204 %0 Journal Article %J The Journal of the Acoustical Society of America %D 2009 %T Wideband fast multipole accelerated boundary element methods for the three-dimensional Helmholtz equation. %A Gumerov, Nail A. %A Duraiswami, Ramani %X The development of a fast multipole method (FMM) accelerated iterative solution of the boundary element method (BEM) for the Helmholtz equations in three dimensions is described. The FMM for the Helmholtz equation is significantly different for problems with low and high kD, where k is the wave number and D the domain size, and for large problems, the method must be switched between levels of the hierarchy. The BEM requires several approximate computations: numerical quadrature and approximations of the boundary shapes using elements. These errors must be balanced against approximations introduced by the FMM and the convergence criterion for an iterative solution. These different errors must all be chosen in a way that, on the one hand, excess work is not done and, on the other, that the error achieved by the overall computation is acceptable. Details of translation operators for low and high kD choice of representations and BEM quadrature schemes, all consistent with these approximations, are described. A novel preconditioner using a low accuracy FMM accelerated solver as a right preconditioner is also described. Results of the developed solvers for large boundary value problems with 0.0001⩽kD⩽500 are presented and shown to perform close to theoretical expectations. %B The Journal of the Acoustical Society of America %V 125 %P 2566 - 2566 %8 2009/// %G eng %U http://link.aip.org/link/?JAS/125/2566/4 %N 4 %0 Journal Article %J Proc. of the 6th International Conference on Language Resources and Evaluation Conference (LREC’08) %D 2008 %T The acl anthology reference corpus: A reference dataset for bibliographic research in computational linguistics %A Bird,S. %A Dale,R. %A Dorr, Bonnie J %A Gibson,B. %A Joseph,M.T. %A Kan,M.Y. %A Lee,D. %A Powley,B. %A Radev,D.R. %A Tan,Y.F. %X The ACL Anthology is a digital archive of conference and journal papers in natural language processing and computational linguistics.Its primary purpose is to serve as a reference repository of research results, but we believe that it can also be an object of study and a platform for research in its own right. We describe an enriched and standardized reference corpus derived from the ACL Anthology that can be used for research in scholarly document processing. This corpus, which we call the ACL Anthology Reference Corpus (ACL ARC), brings together the recent activities of a number of research groups around the world. Our goal is to make the corpus widely available, and to encourage other researchers to use it as a standard testbed for experiments in both bibliographic and bibliometric research. %B Proc. of the 6th International Conference on Language Resources and Evaluation Conference (LREC’08) %P 1755 - 1759 %8 2008/// %G eng %0 Journal Article %J Artificial Intelligence %D 2008 %T Active logic semantics for a single agent in a static world %A Anderson,Michael L. %A Gomaa,Walid %A Grant,John %A Perlis, Don %K Active logic %K Autonomous agents %K Brittleness %K Logic %K Nonmonotonic logic %K Paraconsistent logic %K semantics %K Soundness %K TIME %X For some time we have been developing, and have had significant practical success with, a time-sensitive, contradiction-tolerant logical reasoning engine called the active logic machine (ALMA). The current paper details a semantics for a general version of the underlying logical formalism, active logic. Central to active logic are special rules controlling the inheritance of beliefs in general (and of beliefs about the current time in particular), very tight controls on what can be derived from direct contradictions (P&¬P), and mechanisms allowing an agent to represent and reason about its own beliefs and past reasoning. Furthermore, inspired by the notion that until an agent notices that a set of beliefs is contradictory, that set seems consistent (and the agent therefore reasons with it as if it were consistent), we introduce an "apperception function" that represents an agent's limited awareness of its own beliefs, and serves to modify inconsistent belief sets so as to yield consistent sets. Using these ideas, we introduce a new definition of logical consequence in the context of active logic, as well as a new definition of soundness such that, when reasoning with consistent premises, all classically sound rules remain sound in our new sense. However, not everything that is classically sound remains sound in our sense, for by classical definitions, all rules with contradictory premises are vacuously sound, whereas in active logic not everything follows from a contradiction. %B Artificial Intelligence %V 172 %P 1045 - 1063 %8 2008/05// %@ 0004-3702 %G eng %U http://www.sciencedirect.com/science/article/pii/S0004370207001993 %N 8-9 %R 16/j.artint.2007.11.005 %0 Conference Paper %B Proceedings of the 23rd national conference on Artificial intelligence %D 2008 %T An AGM-based belief revision mechanism for probabilistic spatio-temporal logics %A Parker,A. %A Infantes,G. %A V.S. Subrahmanian %A Grant,J. %B Proceedings of the 23rd national conference on Artificial intelligence %P 511 - 516 %8 2008/// %G eng %0 Journal Article %J Journal of Computing and Information Science in Engineering %D 2008 %T Algorithms for Generating Adaptive Projection Patterns for 3D Shape Measurement %A Peng,T. %A Gupta,S.K. %B Journal of Computing and Information Science in Engineering %V 8 %P 031009 - 031009 %8 2008/// %G eng %0 Journal Article %J Journal of Systems and Software %D 2008 %T An assessment of systems and software engineering scholars and institutions (2001–2005) %A Wong,W. Eric %A Tse,T.H. %A Glass,Robert L. %A Basili, Victor R. %A Chen,T.Y. %K Research publications %K Systems and software engineering %K Top institutions %K Top scholars %X This paper presents the findings of a five-year study of the top scholars and institutions in the systems and software engineering field, as measured by the quantity of papers published in the journals of the field in 2001–2005. The top scholar is Magne Jørgensen of Simula Research Laboratory, Norway, and the top institution is Korea Advanced Institute of Science and Technology, Korea.This paper is part of an ongoing study, conducted annually, that identifies the top 15 scholars and institutions in the most recent five-year period. %B Journal of Systems and Software %V 81 %P 1059 - 1062 %8 2008/06// %@ 0164-1212 %G eng %U http://www.sciencedirect.com/science/article/pii/S0164121207002300 %N 6 %R 10.1016/j.jss.2007.09.018 %0 Journal Article %J Lecture Notes in Computer Science %D 2008 %T Athos: Efficient Authentication of Outsourced File Systems: Information Security %A Triandopoulos, Nikolaos %A Goodrich, Michael T. %A Charalampos Papamanthou %A Tamassia, Roberto %B Lecture Notes in Computer Science %P 80 - 96 %8 2008/// %@ 03029743 %G eng %0 Patent %D 2008 %T Audio Camera Using Microphone Arrays for Real Time Capture of Audio Images ... %A Duraiswami, Ramani %A O'donovan,Adam %A Neumann, Jan %A Gumerov, Nail A. %X Spherical microphone arrays provide an ability to compute the acoustical intensity corresponding to different spatial directions in a given frame of audio data. These intensities may be exhibited as an image and these images are generated at a high frame rate to achieve a video image if the data capture and intensity computations can be performed sufficiently quickly, thereby creating a frame-rate audio camera. A description is provided herein regarding how such a camera is built and the processing done sufficiently quickly using graphics processors. The joint processing of and captured frame-rate audio and video images enables applications such as visual identification of noise sources, beamforming and noise-suppression in video conferenceing and others, by accounting for the spatial differences in the location of the audio and the video cameras. Based on the recognition that the spherical array can be viewed as a central projection camera, such joint analysis can be performed. %V 12/127,451 %8 2008/05// %G eng %U http://www.google.com/patents?id=gWKzAAAAEBAJ %0 Journal Article %J Robotics and Autonomous Systems %D 2008 %T Automated design of distributed control rules for the self-assembly of prespecified artificial structures %A Grushin,Alexander %A Reggia, James A. %K Collective problem solving %K Coordination %K Self-assembly %K Stigmergy %K Swarm intelligence %X The self-assembly problem involves the design of agent-level control rules that will cause the agents to form some desired, target structure, subject to environmental constraints. This paper describes a fully automated rule generation procedure that allows structures to successfully self-assemble in a simulated environment with constrained, continuous motion. This environment implicitly imposes ordering constraints on the self-assembly process, where certain parts of the target structure must be assembled before others, and where it may be necessary to assemble (and subsequently disassemble) temporary structures such as staircases. A provably correct methodology is presented for computing a partial order on the self-assembly process, and for generating rules that enforce this order at runtime. The assembly and disassembly of structures is achieved by generating another set of rules, which are inspired by construction behavior among certain species of social insects. Computational experiments verify the effectiveness of the approach on a diverse set of target structures. %B Robotics and Autonomous Systems %V 56 %P 334 - 359 %8 2008/04/30/ %@ 0921-8890 %G eng %U http://www.sciencedirect.com/science/article/pii/S092188900700111X %N 4 %R 10.1016/j.robot.2007.08.006 %0 Journal Article %J Computer Vision–ECCV 2008 %D 2008 %T Beyond nouns: Exploiting prepositions and comparative adjectives for learning visual classifiers %A Gupta,A. %A Davis, Larry S. %X Learning visual classifiers for object recognition from weakly labeled data requires determining correspondence between image regions and semantic object classes. Most approaches use co-occurrence of “nouns” and image features over large datasets to determine the correspondence, but many correspondence ambiguities remain. We further constrain the correspondence problem by exploiting additional language constructs to improve the learning process from weakly labeled data. We consider both “prepositions” and “comparative adjectives” which are used to express relationships between objects. If the models of such relationships can be determined, they help resolve correspondence ambiguities. However, learning models of these relationships requires solving the correspondence problem. We simultaneously learn the visual features defining “nouns” and the differential visual features defining such “binary-relationships” using an EM-based approach. %B Computer Vision–ECCV 2008 %P 16 - 29 %8 2008/// %G eng %0 Journal Article %J Current Opinion in Biotechnology %D 2008 %T Biofilms in water, its role and impact in human disease transmission %A Huq,Anwar %A Whitehouse,Chris A. %A Grim,Christopher J. %A Alam,Munirul %A Rita R Colwell %X Understanding the mechanism of biofilm formation is the first step in determining its function and, thereby, its impact and role in the environment. Extensive studies accomplished during the past few years have elucidated the genetics and biochemistry of biofilm formation. Cell-to-cell communication, that is, quorum sensing, is a key factor in the initiation of biofilm. Occurrence of viable but nonculturable bacteria, including Vibrio cholerae in biofilms has been reported and most likely such cells were overlooked previously because appropriate methods of detection were not employed. For this reason discovery and investigation of this important bacterial ecological niche in the environment were impeded. %B Current Opinion in Biotechnology %V 19 %P 244 - 247 %8 2008/06// %@ 0958-1669 %G eng %U http://www.sciencedirect.com/science/article/pii/S0958166908000505 %N 3 %R 10.1016/j.copbio.2008.04.005 %0 Book Section %B Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques %D 2008 %T Budgeted Allocations in the Full-Information Setting %A Srinivasan, Aravind %E Goel,Ashish %E Jansen,Klaus %E Rolim,José %E Rubinfeld,Ronitt %X We build on the work of Andelman & Mansour and Azar, Birnbaum, Karlin, Mathieu & Thach Nguyen to show that the full-information (i.e., offline) budgeted-allocation problem can be approximated to within 4/3: we conduct a rounding of the natural LP relaxation, for which our algorithm matches the known lower-bound on the integrality gap. %B Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 5171 %P 247 - 253 %8 2008/// %@ 978-3-540-85362-6 %G eng %U http://dx.doi.org/10.1007/978-3-540-85363-3_20 %0 Conference Paper %B Proceedings of the 39th SIGCSE technical symposium on Computer science education %D 2008 %T Can great research be taught?: independent research with cross-disciplinary thinking and broader impact %A Feamster, Nick %A Gray,Alexander %K graduate education %K ph.d. %K research %X This paper describes a course we have developed for preparing new Ph.D. students in computer science for a career in research. The course is intended to teach the skills needed for research and independent work, prepare students psychologically and socially for years lying before them, and help them find a good Ph.D. topic by providing principles and examples. In this course, we emphasize and encourage impact through cross-disciplinary research and broader societal outreach. To our knowledge, the course represents a first-of-its-kind systematic introduction to a graduate research career. This paper describes our high-level goals for this curricular initiative, the structure of the course (including lecture components and assignments), and the challenges we faced in developing this course. As we continue to develop this course, which is now in its second year, we hope it will serve as a model "introduction of Ph.D. research" course for other computer science departments. %B Proceedings of the 39th SIGCSE technical symposium on Computer science education %S SIGCSE '08 %I ACM %C New York, NY, USA %P 471 - 475 %8 2008/// %@ 978-1-59593-799-5 %G eng %U http://doi.acm.org/10.1145/1352135.1352294 %R 10.1145/1352135.1352294 %0 Conference Paper %B Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on %D 2008 %T Capturing Approximated Data Delivery Tradeoffs %A Roitman,H. %A Gal,A. %A Raschid, Louiqa %K approximation scheme %K approximation theory %K biobjective optimization problem %K Middleware %K middleware data delivery tradeoffs %K mobile networks %K Pareto optimisation %K Pareto set %K proxy dilemma problem %K sensor networks %X This paper presents a middleware data delivery setting with a proxy that is required to maximize the completeness of captured updates, specified in its clients' profiles, while minimizing at the same time the delay in delivering the updates to clients. The two objectives may conflict when the monitoring budget is limited. Therefore, any solution should consider this tradeoff in satisfying both objectives. We term this problem the "proxy dilemma" and formalize it as a biobjective optimization problem. Such problem occurs in many contemporary applications, such as mobile and sensor networks, and poses scalability challenges in delivering up-to-date data from remote resources to meet client specifications. We present a Pareto set as a formal solution to the proxy dilemma. We discuss the complexity of generating a Pareto set for the proxy dilemma and suggest an approximation scheme to this problem. %B Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on %P 1471 - 1473 %8 2008/04// %G eng %R 10.1109/ICDE.2008.4497593 %0 Book %D 2008 %T On classification, ranking, and probability estimation %A Flach,P. %A Matsubara,E.T. %A De Raedt,L. %A Dietterich,T. %A Getoor, Lise %A Kersting,K. %A Muggleton,S. H %X Given a binary classification task, a ranker is an algorithm that can sort a set of instances from highest to lowest expectation that the instance is positive. In contrast to a classifier, a ranker does not output class predictions – although it can be turned into a classifier with help of an additional procedure to split the ranked list into two. A straightforward way to compute rankings is to train a scoring classifier to assign numerical scores to instances, for example the predicted odds that an instance is positive. However, rankings can be computed without scores, as we demonstrate in this paper. We propose a lexicographic ranker, LexRank , whose rankings are derived not from scores, but from a simple ranking of attribute values obtained from the training data. Although various metrics can be used, we show that by using the odds ratio to rank the attribute values we obtain a ranker that is conceptually close to the naive Bayes classifier, in the sense that for every instance of LexRank there exists an instance of naive Bayes that achieves the same ranking. However, the reverse is not true, which means that LexRank is more biased than naive Bayes. We systematically develop the relationships and differences between classification, ranking, and probability estimation, which leads to a novel connection between the Brier score and ROC curves. Combining LexRank with isotonic regression, which derives probability estimates from the ROC convex hull, results in the lexicographic probability estimator LexProb. %S Dagstuhl Seminar Proceedings %I Internationales Begegnungs- und Forschungszentrum fur Informatik (IBFI), Schloss Dagstuhl, Germany %8 2008/// %G eng %0 Journal Article %J AI Magazine %D 2008 %T Collective Classification in Network Data %A Sen,Prithviraj %A Namata,Galileo %A Bilgic,Mustafa %A Getoor, Lise %A Galligher,Brian %A Eliassi-Rad,Tina %X Collective Classification in Network Data %B AI Magazine %V 29 %P 93 - 93 %8 2008/09/06/ %@ 0738-4602 %G eng %U http://www.aaai.org/ojs/index.php/aimagazine/article/viewArticle/2157 %N 3 %R 10.1609/aimag.v29i3.2157 %0 Conference Paper %D 2008 %T Combining Domain-Independent Planning and HTN Planning: The Duet Planner %A Gerevini,Alfonso %A Kuter,Ugur %A Nau, Dana S. %A Saetti,Alessandro %A Waisbrot,Nathaniel %X Despite the recent advances in planning for classical domains, the question of how to use domain knowledge in planning is yet to be completely and clearly answered. Some of the existing planners use domain-independent search heuristics, and some others depend on intensively-engineered domain-specific knowledge to guide the planning process. In this paper, we describe an approach to combine ideas from both of the above schools of thought. We present Duet, our planning system that incorporates the ability of using hierarchical domain knowledge in the form of Hierarchical Task Networks (HTNs) as in SHOP2 [14] and using domain-independent local search techniques as in LPG [8]. In our experiments, Duet was able to solve much larger problems than LPG could solve, with only minimal domain knowledge encoded in HTNs (much less domain knowledge than SHOP2 needed to solve those problems by itself). %I IOS Press %C Amsterdam, The Netherlands, The Netherlands %P 573 - 577 %8 2008/// %@ 978-1-58603-891-5 %G eng %U http://dl.acm.org/citation.cfm?id=1567281.1567406 %0 Journal Article %J Proceedings of the 5th International ISCRAM Conference %D 2008 %T Community response grid (CRG) for a university campus: Design requirements and implications %A Wu,P.F. %A Qu,Y. %A Preece,J. %A Fleischmann,K. %A Golbeck,J. %A Jaeger,P. %A Shneiderman, Ben %X This paper describes the initial stages of the participatory design of a community-oriented emergency responsesystem for a university campus. After reviewing related work and the current University emergency response system, this paper describes our participatory design process, discusses initial findings from a design requirement survey and from our interactions with different stakeholders, and proposes a Web interface design for a community response grid system. The prototyping of the system demonstrates the possibility of fostering a social-network-based community participation in emergency response, and also identifies concerns raised by potential users and by the professional responder community. %B Proceedings of the 5th International ISCRAM Conference %P 34 - 43 %8 2008/// %G eng %0 Conference Paper %B Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on %D 2008 %T Compressive wireless arrays for bearing estimation %A Cevher, V. %A Gurbuz, A.C. %A McClellan, J.H. %A Chellapa, Rama %K acoustic %K algorithms;sparse %K arrays;acoustic %K arrays;hypothesis %K bandwidth;compressive %K bearing %K Estimation %K estimation;signal %K estimation;sparse %K matrices;vectors;wireless %K minimization %K networks; %K problem;communication %K problem;microphone %K problems;joint %K PROCESSING %K processing;array %K processing;direction-of-arrival %K processing;l1-norm %K sensor %K signal %K signals;parameter %K Testing %K vector;wireless %K wireless %X Joint processing of sensor array outputs improves the performance of parameter estimation and hypothesis testing problems beyond the sum of the individual sensor processing results. When the sensors have high data sampling rates, arrays are tethered, creating a disadvantage for their deployment and also limiting their aperture size. In this paper, we develop the signal processing algorithms for randomly deployable wireless sensor arrays that are severely constrained in communication bandwidth. We focus on the acoustic bearing estimation problem and show that when the target bearings are modeled as a sparse vector in the angle space, low dimensional random projections of the microphone signals can be used to determine multiple source bearings by solving an l 1-norm minimization problem. Field data results are shown where only 10 bits of information is passed from each microphone to estimate multiple target bearings. %B Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on %P 2497 - 2500 %8 2008/04/31/4 %G eng %R 10.1109/ICASSP.2008.4518155 %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 2008 %T Constraint Integration for Efficient Multiview Pose Estimation with Self-Occlusions %A Gupta,A. %A Mittal,A. %A Davis, Larry S. %K Automated;Posture;Reproducibility of Results;Sensitivity and Specificity;Video Recording;Whole Body Imaging; %K automatic initialization;constraint integration;graphical structure;human pose tracking;kinematic constraint;likelihood measure;location probability distribution;multiview pose estimation;nonparametric belief propagation;optimization;pose configuration;se %K Computer-Assisted;Imaging %K Three-Dimensional;Pattern Recognition %X Automatic initialization and tracking of human pose is an important task in visual surveillance. We present a part-based approach that incorporates a variety of constraints in a unified framework. These constraints include the kinematic constraints between parts that are physically connected to each other, the occlusion of one part by another, and the high correlation between the appearance of certain parts, such as the arms. The location probability distribution of each part is determined by evaluating appropriate likelihood measures. The graphical (nontree) structure representing the interdependencies between parts is utilized to "connect" such part distributions via nonparametric belief propagation. Methods are also developed to perform this optimization efficiently in the large space of pose configurations. %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %V 30 %P 493 - 506 %8 2008/03// %@ 0162-8828 %G eng %N 3 %R 10.1109/TPAMI.2007.1173 %0 Journal Article %J Computer-Aided Design %D 2008 %T Content-based assembly search: A step towards assembly reuse %A Deshmukh,Abhijit S. %A Banerjee,Ashis Gopal %A Gupta, Satyandra K. %A Sriram,Ram D. %K Assembly characteristics %K Assembly mating conditions %K Content-based assembly search %K Graph compatibility %X The increased use of CAD systems by product development organizations has resulted in the creation of large databases of assemblies. This explosion of assembly data is likely to continue in the future. In many situations, a text-based search alone may not be sufficient to search for assemblies and it may be desirable to search for assemblies based on the content of the assembly models. The ability to perform content-based searches on these databases is expected to help the designers in the following two ways. First, it can facilitate the reuse of existing assembly designs, thereby reducing the design time. Second, a lot of useful designs for manufacturing, and assembly knowledge are implicitly embedded in existing assemblies. Therefore a capability to locate existing assemblies and examine them can be used as a learning tool by designers to learn from the existing assembly designs. This paper describes a system for performing content-based searches on assembly databases. We identify templates for comprehensive search definitions and describe algorithms to perform content-based searches for mechanical assemblies. We also illustrate the capabilities of our system through several examples. %B Computer-Aided Design %V 40 %P 244 - 261 %8 2008/02// %@ 0010-4485 %G eng %U http://www.sciencedirect.com/science/article/pii/S0010448507002424 %N 2 %R 10.1016/j.cad.2007.10.012 %0 Conference Paper %B Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on %D 2008 %T Context and observation driven latent variable model for human pose estimation %A Gupta,A. %A Chen,T. %A Chen,F. %A Kimber,D. %A Davis, Larry S. %K estimation; %K estimation;image %K Gaussian %K gestures;pose %K latent %K learning;parameterized %K model;human %K observations;integrated %K pose %K process %K processes;gesture %K processing;pose %K recognition;image %K tracking;Gaussian %K variable %X Current approaches to pose estimation and tracking can be classified into two categories: generative and discriminative. While generative approaches can accurately determine human pose from image observations, they are computationally expensive due to search in the high dimensional human pose space. On the other hand, discriminative approaches do not generalize well, but are computationally efficient. We present a hybrid model that combines the strengths of the two in an integrated learning and inference framework. We extend the Gaussian process latent variable model (GPLVM) to include an embedding from observation space (the space of image features) to the latent space. GPLVM is a generative model, but the inclusion of this mapping provides a discriminative component, making the model observation driven. Observation Driven GPLVM (OD-GPLVM) not only provides a faster inference approach, but also more accurate estimates (compared to GPLVM) in cases where dynamics are not sufficient for the initialization of search in the latent space. We also extend OD-GPLVM to learn and estimate poses from parameterized actions/gestures. Parameterized gestures are actions which exhibit large systematic variation in joint angle space for different instances due to difference in contextual variables. For example, the joint angles in a forehand tennis shot are function of the height of the ball (Figure 2). We learn these systematic variations as a function of the contextual variables. We then present an approach to use information from scene/objects to provide context for human pose estimation for such parameterized actions. %B Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on %P 1 - 8 %8 2008/06// %G eng %R 10.1109/CVPR.2008.4587511 %0 Journal Article %J Algorithmica %D 2008 %T Cost-Sharing Mechanisms for Network Design %A Gupta,Anupam %A Srinivasan, Aravind %A Tardos,Éva %X We consider a single-source network design problem from a game-theoretic perspective. Gupta, Kumar and Roughgarden (Proc. 35th Annual ACM STOC, pp. 365–372, 2003 ) developed a simple method for a single-source rent-or-buy problem that also yields the best-known approximation ratio for the problem. We show how to use a variant of this method to develop an approximately budget-balanced and group strategyproof cost-sharing method for the problem. The novelty of our approach stems from our obtaining the cost-sharing methods for the rent-or-buy problem by carefully combining cost-shares for the simpler Steiner tree problem. Our algorithm is conceptually simpler than the previous such cost-sharing method due to Pál and Tardos (Proc. 44th Annual FOCS, pp. 584–593, 2003 ), and improves the previously-known approximation factor of 15 to 4.6. %B Algorithmica %V 50 %P 98 - 119 %8 2008/// %@ 0178-4617 %G eng %U http://dx.doi.org/10.1007/s00453-007-9065-y %N 1 %0 Book Section %B Automata, Languages and Programming %D 2008 %T Delegating Capabilities in Predicate Encryption Systems %A Elaine Shi %A Waters,Brent %E Aceto,Luca %E Damgård,Ivan %E Goldberg,Leslie %E Halldórsson,Magnús %E Ingólfsdóttir,Anna %E Walukiewicz,Igor %K Computer science %X In predicate encryption systems, given a capability, one can evaluate one or more predicates on the plaintext encrypted, while all other information about the plaintext remains hidden. We consider the role of delegation in such predicate encryption systems. Suppose Alice has a capability, and she wishes to delegate to Bob a more restrictive capability allowing the decryption of a subset of the information Alice can learn about the plaintext encrypted. We formally define delegation in predicate encryption systems, propose a new security definition for delegation, and give an efficient construction supporting conjunctive queries. The security of our construction can be reduced to the general 3-party Bilinear Diffie-Hellman assumption, and the Bilinear Decisional Diffie-Hellman assumption in composite order bilinear groups. %B Automata, Languages and Programming %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 5126 %P 560 - 578 %8 2008 %@ 978-3-540-70582-6 %G eng %U http://www.springerlink.com/content/w320422h15050004/abstract/ %0 Journal Article %J Jisuanji Gongcheng/ Computer Engineering %D 2008 %T Design and implementation of blackboard-based system for human detection %A Zhuolin Jiang %A Li,S.F. %A Gao,D.F. %B Jisuanji Gongcheng/ Computer Engineering %V 34 %8 2008/// %G eng %N 2 %0 Journal Article %J Proceedings of the American Society for Information Science and Technology %D 2008 %T Designing community-based emergency communication system: A preliminary study %A Fei Wu,P. %A Qu,Y. %A Fleischmann,K. %A Golbeck,J. %A Jaeger,P. %A Preece,J. %A Shneiderman, Ben %B Proceedings of the American Society for Information Science and Technology %V 45 %P 1 - 3 %8 2008/// %G eng %N 1 %0 Journal Article %J Transactions of North American Manufacturing Research Institution of SME %D 2008 %T Development of a multi-piece multi-gate mold for manufacturing a flapping wing drive-mechanism %A Ananthanarayanan,A. %A Bejgerowski,W. %A Mueller,D. %A Gupta,S.K. %X Successful realization a flapping wing microair vehicle (MAV) requires development of a light weight drive-mechanism that can convert the continuous rotary motion to oscillatory flapping motion. Molded compliant drive-mechanisms are an attractive design option because of manufacturing scalability and reduction in the number of parts. The unique characteristics of this mechanism require development of a complex multi-piece multi-gate mold design. This paper describes a systematic approach for determining the part shape and size, optimizing the mold pieces, and placing the gates on the multi-piece mold. The novel aspects of this work include (1) selecting non-critical shape features to optimize the mold design and (2) the use of sacrificial structural elements to reduce the impact of the weld lines on the structural performance. The mold developed using our approach was utilized to realize a working flapping wing MAV. %B Transactions of North American Manufacturing Research Institution of SME %V 36 %8 2008/// %G eng %U http://web.mit.edu/arvinda/www/NAMRI_2008_Draft.pdf %0 Journal Article %J Current Opinion in Biotechnology %D 2008 %T Dual role colonization factors connecting Vibrio cholerae's lifestyles in human and aquatic environments open new perspectives for combating infectious diseases %A Vezzulli,Luigi %A Guzmán,Carlos A %A Rita R Colwell %A Pruzzo,Carla %X Vibrio cholerae exhibits two distinctive lifestyles, one inside the milieu of the human intestine and the other in the aquatic environment. Recently, the existence of V. cholerae ligands involved in colonization of both human intestine and environmental chitin surfaces via the same binding specificity has been shown. Such molecules, here named ‘dual role colonization factors (DRCFs)’, are example of a tight connection between the two V. cholerae's lifestyles. It is suggested that DRCFs and, more generally, bacterial factors and pathways having roles in pathogenesis and in the out of the human body life may be promising targets for development of novel prophylactic or therapeutic interventions that may also affect V. cholerae fitness in its environmental reservoirs. %B Current Opinion in Biotechnology %V 19 %P 254 - 259 %8 2008/06// %@ 0958-1669 %G eng %U http://www.sciencedirect.com/science/article/pii/S0958166908000426 %N 3 %R 10.1016/j.copbio.2008.04.002 %0 Journal Article %J Computational Intelligence %D 2008 %T THE EFFECT OF NETWORK STRUCTURE ON DYNAMIC TEAM FORMATION IN MULTI‐AGENT SYSTEMS %A Gaston,Matthew E. %A desJardins, Marie %K dynamics of networked systems %K multi‐agent systems %K network structure %K team formation %X Previous studies of team formation in multi-agent systems have typically assumed that the agent social network underlying the agent organization is either not explicitly described or the social network is assumed to take on some regular structure such as a fully connected network or a hierarchy. However, recent studies have shown that real-world networks have a rich and purposeful structure, with common properties being observed in many different types of networks. As multi-agent systems continue to grow in size and complexity, the network structure of such systems will become increasing important for designing efficient, effective agent communities.We present a simple agent-based computational model of team formation, and analyze the theoretical performance of team formation in two simple classes of networks (ring and star topologies). We then give empirical results for team formation in more complex networks under a variety of conditions. From these experiments, we conclude that a key factor in effective team formation is the underlying agent interaction topology that determines the direct interconnections among agents. Specifically, we identify the property of diversity support as a key factor in the effectiveness of network structures for team formation. Scale-free networks, which were developed as a way to model real-world networks, exhibit short average path lengths and hub-like structures. We show that these properties, in turn, result in higher diversity support; as a result, scale-free networks yield higher organizational efficiency than the other classes of networks we have studied. %B Computational Intelligence %V 24 %P 122 - 157 %8 2008/05/01/ %@ 1467-8640 %G eng %U http://onlinelibrary.wiley.com/doi/10.1111/j.1467-8640.2008.00325.x/abstract %N 2 %R 10.1111/j.1467-8640.2008.00325.x %0 Conference Paper %B Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining %D 2008 %T Effective label acquisition for collective classification %A Bilgic,Mustafa %A Getoor, Lise %K active inference %K collective classification %K label acquisition %X Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes. A variety of techniques have been introduced and methods that combine attribute information and neighboring label information have been shown to be effective for collective labeling of the nodes in a network. However, in part because of the correlation between node labels that the techniques exploit, it is easy to find cases in which, once a misclassification is made, incorrect information propagates throughout the network. This problem can be mitigated if the system is allowed to judiciously acquire the labels for a small number of nodes. Unfortunately, under relatively general assumptions, determining the optimal set of labels to acquire is intractable. Here we propose an acquisition method that learns the cases when a given collective classification algorithm makes mistakes, and suggests acquisitions to correct those mistakes. We empirically show on both real and synthetic datasets that this method significantly outperforms a greedy approximate inference approach, a viral marketing approach, and approaches based on network structural measures such as node degree and network clustering. In addition to significantly improving accuracy with just a small amount of labeled data, our method is tractable on large networks. %B Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining %S KDD '08 %I ACM %C New York, NY, USA %P 43 - 51 %8 2008/// %@ 978-1-60558-193-4 %G eng %U http://doi.acm.org/10.1145/1401890.1401901 %R 10.1145/1401890.1401901 %0 Book Section %B Visualization for Computer Security %D 2008 %T Effective Visualization of File System Access-Control %A Heitzmann, Alexander %A Palazzi, Bernardo %A Charalampos Papamanthou %A Tamassia, Roberto %E Goodall, John R. %E Conti, Gregory %E Ma, Kwan-Liu %K Computer Communication Networks %K Computer Imaging, Vision, Pattern Recognition and Graphics %K data mining and knowledge discovery %K Data Structures, Cryptology and Information Theory %K Visualization %X In this paper, we present a visual representation of access control permissions in a standard hierarchical file system. Our visualization of file permissions leverages treemaps, a popular graphical representation of hierarchical data. In particular, we present a visualization of access control for the NTFS file system that can help a non-expert user understand and manipulate file system permissions in a simple and effective way. While our examples are based on NTFS, our approach can be used for many other hierarchical file systems as well. %B Visualization for Computer Security %S Lecture Notes in Computer Science %I Springer Berlin Heidelberg %P 18 - 25 %8 2008/01/01/ %@ 978-3-540-85931-4, 978-3-540-85933-8 %G eng %U http://link.springer.com/chapter/10.1007/978-3-540-85933-8_2 %0 Journal Article %J Proceedings of the National Academy of Sciences %D 2008 %T Environmental signatures associated with cholera epidemics %A Constantin de Magny,G. %A Murtugudde,R. %A Sapiano,M. R. P. %A Nizam,A. %A Brown,C. W. %A Busalacchi,A. J. %A Yunus,M. %A Nair,G. B. %A Gil,A. I. %A Lanata,C. F. %A Rita R Colwell %X The causative agent of cholera, Vibrio cholerae, has been shown to be autochthonous to riverine, estuarine, and coastal waters along with its host, the copepod, a significant member of the zooplankton community. Temperature, salinity, rainfall and plankton have proven to be important factors in the ecology of V. cholerae, influencing the transmission of the disease in those regions of the world where the human population relies on untreated water as a source of drinking water. In this study, the pattern of cholera outbreaks during 1998–2006 in Kolkata, India, and Matlab, Bangladesh, and the earth observation data were analyzed with the objective of developing a prediction model for cholera. Satellite sensors were used to measure chlorophyll a concentration (CHL) and sea surface temperature (SST). In addition, rainfall data were obtained from both satellite and in situ gauge measurements. From the analyses, a statistically significant relationship between the time series for cholera in Kolkata, India, and CHL and rainfall anomalies was determined. A statistically significant one month lag was observed between CHL anomaly and number of cholera cases in Matlab, Bangladesh. From the results of the study, it is concluded that ocean and climate patterns are useful predictors of cholera epidemics, with the dynamics of endemic cholera being related to climate and/or changes in the aquatic ecosystem. When the ecology of V. cholerae is considered in predictive models, a robust early warning system for cholera in endemic regions of the world can be developed for public health planning and decision making.ecology epidemiology microbiology remote sensing %B Proceedings of the National Academy of Sciences %V 105 %P 17676 - 17676 %8 2008/// %@ 0027-8424, 1091-6490 %G eng %U http://www.pnas.org/content/105/46/17676 %N 46 %R 10.1073/pnas.0809654105 %0 Journal Article %J Computer Graphics and Applications, IEEE %D 2008 %T Evaluating Visual Analytics at the 2007 VAST Symposium Contest %A Plaisant, Catherine %A Grinstein,G. %A Scholtz,J. %A Whiting,M. %A O'Connell,T. %A Laskowski,S. %A Chien,L. %A Tat,A. %A Wright,W. %A Gorg,C. %A Zhicheng Liu %A Parekh,N. %A Singhal,K. %A Stasko,J. %K 2007 %K analytics %K analytics;data %K and %K Contest;Visual %K Science %K Symposium %K Technology;data %K VAST %K visualisation; %K visualization;visual %X In this article, we report on the contest's data set and tasks, the judging criteria, the winning tools, and the overall lessons learned in the competition. We believe that by organizing these contests, we're creating useful resources for researchers and are beginning to understand how to better evaluate VA tools. Competitions encourage the community to work on difficult problems, improve their tools, and develop baselines for others to build or improve upon. We continue to evolve a collection of data sets, scenarios, and evaluation methodologies that reflect the richness of the many VA tasks and applications. %B Computer Graphics and Applications, IEEE %V 28 %P 12 - 21 %8 2008/04//march %@ 0272-1716 %G eng %N 2 %R 10.1109/MCG.2008.27 %0 Journal Article %J Probabilistic, Logical and Relational Learning - A Further Synthesis %D 2008 %T Exploiting Prior Knowledge in Intelligent Assistants: Combining Relational Models with Hierarchies %A Natarajan,S. %A Tadepalli,P. %A Fern,A. %A De Raedt,L. %A Dietterich,T. %A Getoor, Lise %A Kersting,K. %A Muggleton,S. H %X Statitsical relational models have been successfully used to model static probabilistic relationships between the entities of the domain. In this talk, we illustrate their use in a dynamic decison-theoretic setting where the task is to assist a user by inferring his intentional structure and taking appropriate assistive actions. We show that the statistical relational models can be used to succintly express the system's prior knowledge about the user's goal-subgoal structure and tune it with experience. As the system is better able to predict the user's goals, it improves the effectiveness of its assistance. We show through experiments that both the hierarchical structure of the goals and the parameter sharing facilitated by relational models significantly improve the learning speed. %B Probabilistic, Logical and Relational Learning - A Further Synthesis %8 2008/// %G eng %0 Journal Article %J Proceedings of the VLDB Endowment %D 2008 %T Exploiting shared correlations in probabilistic databases %A Sen,Prithviraj %A Deshpande, Amol %A Getoor, Lise %X There has been a recent surge in work in probabilistic databases, propelled in large part by the huge increase in noisy data sources --- from sensor data, experimental data, data from uncurated sources, and many others. There is a growing need for database management systems that can efficiently represent and query such data. In this work, we show how data characteristics can be leveraged to make the query evaluation process more efficient. In particular, we exploit what we refer to as shared correlations where the same uncertainties and correlations occur repeatedly in the data. Shared correlations occur mainly due to two reasons: (1) Uncertainty and correlations usually come from general statistics and rarely vary on a tuple-to-tuple basis; (2) The query evaluation procedure itself tends to re-introduce the same correlations. Prior work has shown that the query evaluation problem on probabilistic databases is equivalent to a probabilistic inference problem on an appropriately constructed probabilistic graphical model (PGM). We leverage this by introducing a new data structure, called the random variable elimination graph (rv-elim graph) that can be built from the PGM obtained from query evaluation. We develop techniques based on bisimulation that can be used to compress the rv-elim graph exploiting the presence of shared correlations in the PGM, the compressed rv-elim graph can then be used to run inference. We validate our methods by evaluating them empirically and show that even with a few shared correlations significant speed-ups are possible. %B Proceedings of the VLDB Endowment %V 1 %P 809 - 820 %8 2008/08// %@ 2150-8097 %G eng %U http://dx.doi.org/10.1145/1453856.1453944 %N 1 %R 10.1145/1453856.1453944 %0 Journal Article %J The Journal of the Acoustical Society of America %D 2008 %T Fast multipole accelerated boundary element method (FMBEM) for solution of 3D scattering problems %A Gumerov, Nail A. %A Duraiswami, Ramani %X Wideband FMBEM codes are challenging to implement since there are problems at both very low and high frequencies. Substantially different schemes for function representation and translation are efficient for low and high frequency ranges. We present a method which is suitable for solution both high and low frequency problems since it implements a switch between different representations and uses fast translation methods appropriate to each representation. For a high frequency problem the switch between representations may occur at some intermediate levels of hierarchical space subdivision of the FMM. We also present an FMM‐based preconditioner used in the flexible GMRES iterative solver for scattering problems and discuss example problems computed in range 0.001Since different feature-based models are created in different coordinate systems, in order to compute distance between two sets of features, one needs to include geometric transformations for aligning features. Optimal alignment is the alignment that results in the minimum distance between two sets of features. In general, features can be viewed as attributed points in space. Hence, we need to develop techniques for aligning attributed points in space.
This report introduces iterative strategies for optimally aligning attributed points in space. Iterative strategies presented in this report involve successively applying algorithms that perform alignment under restricted rigid body transformations (e.g., rotations only or translations only) to solve point alignment problems that require higher dimension transformations (e.g., combinations rotations and translations). Our preliminary experimental results show that the idea of using of iterative strategies to solve higher dimension attributed point alignment problems is promising and can be used to perform feature-based shape similarity assessment. %I Institute for Systems Research, University of Maryland, College Park %V ISR-TR-2005-2 %8 2005/// %G eng %U http://drum.lib.umd.edu//handle/1903/6467 %0 Journal Article %J Web Information Systems Engineering – WISE 2005 %D 2005 %T Using Non-random Associations for Predicting Latency in WANs %A Raschid, Louiqa %A Ye,Q. %A Zadorozhny,V. %A Gal,A. %A Murthy,H. %X In this paper, we propose a scalable performance management tool for Wide Area Applications. Our objective is to scalably identify non-random associations between pairs of individual Latency Profiles (iLPs) (i.e., latency distributions experienced by clients when connecting to a server) and exploit them in latency prediction. Our approach utilizes Relevance Networks (RNs) to manage tens of thousands of iLPs. Non-random associations between iLPs can be identified by topology-independent measures such as correlation and mutual information. We demonstrate that these non-random associations do indeed have a significant impact in improving the error of latency prediction. %B Web Information Systems Engineering – WISE 2005 %8 2005/// %G eng %R 10.1007/11581062_48 %0 Conference Paper %B Proc. CIDR %D 2005 %T Using probabilistic models for data management in acquisitional environments %A Deshpande, Amol %A Guestrin,C. %A Madden,S. %B Proc. CIDR %P 317 - 328 %8 2005/// %G eng %0 Book Section %B The Semantic Web – ISWC 2005 %D 2005 %T Web Service Composition with Volatile Information %A Au,Tsz-Chiu %A Kuter,Ugur %A Nau, Dana S. %E Gil,Yolanda %E Motta,Enrico %E Benjamins,V. %E Musen,Mark %K Computer science %X In many Web service composition problems, information may be needed from Web services during the composition process. Existing research on Web service composition (WSC) procedures has generally assumed that this information will not change. We describe two ways to take such WSC procedures and systematically modify them to deal with volatile information. The black-box approach requires no knowledge of the WSC procedure’s internals: it places a wrapper around the WSC procedure to deal with volatile information. The gray-box approach requires partial information of those internals, in order to insert coding to perform certain bookkeeping operations. We show theoretically that both approaches work correctly. We present experimental results showing that the WSC procedures produced by the gray-box approach can run much faster than the ones produced by the black-box approach. %B The Semantic Web – ISWC 2005 %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 3729 %P 52 - 66 %8 2005/// %@ 978-3-540-29754-3 %G eng %U http://www.springerlink.com/content/y105x8464k54l760/abstract/ %0 Conference Paper %B Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th %D 2004 %T Achieving packet-level quality of service through scheduling in multirate WLANs %A Yuan Yuan %A Daqing Gu %A Arbaugh, William A. %A Jinyun Zhang %K Analytical models %K channel conditions %K channel errors %K channel temporal fair share %K compensation %K Computer science %K Delay %K error-prone flow compensation %K IEEE 802.11a/b/g physical layer %K multirate wireless fair scheduling %K multirate WLAN %K packet radio networks %K packet-level quality of service %K Physical layer %K Processor scheduling %K QoS %K quality of service %K radio access networks %K Scheduling algorithm %K Throughput %K throughput fairness %K USA Councils %K Wireless LAN %K wireless packet scheduling %K WMFS %X Wireless packet scheduling has been a popular paradigm to achieve packet-level QoS in terms of fairness and throughput in the presence of channel errors. However, the current design does not anticipate the multi-rate capability offered by the IEEE 802.11a/b/g physical layer, thus suffering significant performance degradation in 802.11 WLANs. In this paper, we propose multirate wireless fair scheduling (WMFS). In MWFS, each flow is granted a temporal fair share of the channel, in contrast to the throughput fair share adopted by existing algorithms. Therefore, each flow receives services in proportion to its perceived transmission rate, and high-rate flows are able to opportunistically exploit their good channel conditions and receive more services. MWFS also renovates the compensation model in order to allow for error-prone flows to catch up, thus ensuring fairness for all flows over error-prone channels. We demonstrate the effectiveness of MWFS through both simulations and analysis. Especially, WMFS achieves system throughput 159% of state-of-the-art scheduling algorithms in simulated scenarios. %B Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th %I IEEE %V 4 %P 2730- 2734 Vol. 4 - 2730- 2734 Vol. 4 %8 2004/09/26/29 %@ 0-7803-8521-7 %G eng %R 10.1109/VETECF.2004.1400554 %0 Journal Article %J Proceedings of the AAAI 2004 Fall Symposium on Artificial Multi-agent Learning %D 2004 %T Adapting network structure for efficient team formation %A Gaston,M. %A Simmons,J. %A desJardins, Marie %B Proceedings of the AAAI 2004 Fall Symposium on Artificial Multi-agent Learning %8 2004/// %G eng %0 Conference Paper %B Distributed Computing Systems, 2004. Proceedings. 24th International Conference on %D 2004 %T Adaptive replication in peer-to-peer systems %A Gopalakrishnan,V. %A Silaghi,B. %A Bhattacharjee, Bobby %A Keleher,P. %K adaptive %K allocation; %K data %K databases; %K decentralized %K delivery %K distributed %K LAR %K low-latency %K peer-to-peer %K processing; %K protocol; %K replicated %K replication %K resource %K strategies; %K structured %K system-neutral %K system; %K systems; %X Peer-to-peer systems can be used to form a low-latency decentralized data delivery system. Structured peer-to-peer systems provide both low latency and excellent load balance with uniform query and data distributions. Under the more common skewed access distributions, however, individual nodes are easily overloaded, resulting in poor global performance and lost messages. This paper describes a lightweight, adaptive, and system-neutral replication protocol, called LAR, that maintains low access latencies and good load balance even under highly skewed demand. We apply LAR to Chord and show that it has lower overhead and better performance than existing replication strategies. %B Distributed Computing Systems, 2004. Proceedings. 24th International Conference on %P 360 - 369 %8 2004/// %G eng %R 10.1109/ICDCS.2004.1281601 %0 Conference Paper %D 2004 %T Algorithmic Foundations for Consistency-Checking of Interaction-States of Mechatronic Systems %A Xu,C. %A Gupta,S.K. %X In order to reduce product development time, we needsoftware tools that can perform automated validation of the proposed design concepts. These tools will ensure that only valid design concepts are transferred to the detailed design stage for further development. This paper provides a step towards the automated validation of proposed design concepts. We define the problem of consistency-checking of interaction- states as a key step in the design concept validation. We present a polynomial time algorithm for solving the interaction consistency-checking problem. We also present an algorithm for analyzing inconsistent interaction-states and identifying the inconsistent interactions. We believe that the framework described in this paper will provide the underlying foundations for constructing the next generation software tools for conceptual design of complex mechatronic systems. %C Salt Lake City, Utah, USA %8 2004/// %G eng %U ftp://ftp.eng.umd.edu/:/home/glue/s/k/skgupta/pub/Publication/DETC04_Xu.pdf %0 Journal Article %J IEEE Software %D 2004 %T Applying Model-based Distributed Continuous Quality Assurance Processes to Enhance Persistent Software Attributes %A Krishna,A. S %A Yilmaz,C. %A Memon, Atif M. %A Porter, Adam %A Schmidt,D. C %A Gokhale,A. %A Natarajan,B. %X Time and resource constraints often force developers of highlyconfigurable quality of service (QoS)-intensive software sys- tems to guarantee their system’s persistent software attributes (PSAs) (e.g., functional correctness, portability, efficiency, and QoS) on very few platform configurations and to extrapolate from these configurations to the entire configuration space, which allows many sources of degradation to escape detec- tion until systems are fielded. This article illustrates how distributed continuous quality assurance (DCQA) processes help improve the assessment of these PSAs across large QoS- intensive software system configuration spaces. We also il- lustrate how model-based DCQA processes enable developers to run formally-designed screening experiments that isolate the most significant configuration options, such as different workload parameters, operating system, compiler flags, fea- ture sets, and/or run-time optimization controls. Our empir- ical results show that DCQA processes can be used monitor, safeguard, and enforce PSAs at an acceptable level of cost and effort. %B IEEE Software %V 21 %P 32 - 40 %8 2004/// %G eng %N 6 %0 Journal Article %J Journal of Algorithms %D 2004 %T Approximation algorithms for partial covering problems %A Gandhi,Rajiv %A Khuller, Samir %A Srinivasan, Aravind %K Approximation algorithms %K Partial covering %K Primal-dual methods %K Randomized rounding %K Set cover %K Vertex cover %X We study a generalization of covering problems called partial covering. Here we wish to cover only a desired number of elements, rather than covering all elements as in standard covering problems. For example, in k-partial set cover, we wish to choose a minimum number of sets to cover at least k elements. For k-partial set cover, if each element occurs in at most f sets, then we derive a primal-dual f-approximation algorithm (thus implying a 2-approximation for k-partial vertex cover) in polynomial time. Without making any assumption about the number of sets an element is in, for instances where each set has cardinality at most three, we obtain an approximation of 4/3. We also present better-than-2-approximation algorithms for k-partial vertex cover on bounded degree graphs, and for vertex cover on expanders of bounded average degree. We obtain a polynomial-time approximation scheme for k-partial vertex cover on planar graphs, and for covering k points in Rd by disks. %B Journal of Algorithms %V 53 %P 55 - 84 %8 2004/10// %@ 0196-6774 %G eng %U http://www.sciencedirect.com/science/article/pii/S0196677404000689 %N 1 %R 10.1016/j.jalgor.2004.04.002 %0 Book %D 2004 %T Automated Planning: Theory and Practice %A Ghallab,Malik %A Nau, Dana S. %A Traverso,Paolo %K Business & Economics / Management %K Computers / Intelligence (AI) & Semantics %K Production planning %K Production planning/ Data processing %K Technology & Engineering / Robotics %X Automated planning technology now plays a significant role in a variety of demanding applications, ranging from controlling space vehicles and robots to playing the game of bridge. These real-world applications create new opportunities for synergy between theory and practice: observing what works well in practice leads to better theories of planning, and better theories lead to better performance of practical applications. Automated Planning mirrors this dialogue by offering a comprehensive, up-to-date resource on both the theory and practice of automated planning. The book goes well beyond classical planning, to include temporal planning, resource scheduling, planning under uncertainty, and modern techniques for plan generation, such as task decomposition, propositional satisfiability, constraint satisfaction, and model checking. The authors combine over 30 years experience in planning research and development to offer an invaluable text to researchers, professionals, and graduate students. *Comprehensively explains paradigms for automated planning. *Provides a thorough understanding of theory and planning practice, and how they relate to each other. *Presents case studies of applications in space, robotics, CAD/CAM, process control, emergency operations, and games.*Provides a thorough understanding of AI planning theory and practice, and how they relate to each other. *Covers all the contemporary topics of planning, as well as important practical applications of planning, such as model checking and game playing. *Presents case studies and applications in planning engineering, space, robotics, CAD/CAM, process control, emergency operations, and games.*Provides lecture notes, examples of programming assignments, pointers to downloadable planning systems and related information online. %I Elsevier %8 2004/05/03/ %@ 9781558608566 %G eng %0 Journal Article %J IEEE Transactions on Speech and Audio Processing, Special Issue on Spontaneous Speech Processing %D 2004 %T Automatic recognition of spontaneous speech for access to multilingual oral history archives %A Byrne,W. %A David Doermann %A Franz,M. %A Gustman,S. %A Hajic,J. %A Oard, Douglas %A Picheny,M. %A Psutka,J. %A Ramabhadran,B. %X The MALACH project has the goal of developing the technologies needed to facilitate access to large collections of spontaneous speech. Its aim is to dramatically improve the state of the art in key Automatic Speech Recognition (ASR), Natural Language Processing (NLP) technologies for use in large-scale retrieval systems. The project leverages a unique collection of oral history interviews with survivors of the Holocaust that has been assembled and extensively annotated by the Survivors of the Shoah Visual History Foundation. This paper describes the collection, 116,000 hours of interviews in 32 languages, and the way in which system requirements have been discerned through user studies. It discusses ASR methods for very difficult speech (heavily accented, emotional, and elderly spontaneous speech), including transcription to create training data and methods for language modeling and speaker adaptation. Results are presented for for English and Czech. NLP results are presented for named entity tagging, topic segmentation, and supervised topic classification, and the architecture of an integrated search system that uses these results is described. %B IEEE Transactions on Speech and Audio Processing, Special Issue on Spontaneous Speech Processing %V 12 %P 420 - 435 %8 2004/07// %G eng %N 4 %0 Conference Paper %B Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval %D 2004 %T Building an information retrieval test collection for spontaneous conversational speech %A Oard, Douglas %A Soergel,Dagobert %A David Doermann %A Huang,Xiaoli %A Murray,G. Craig %A Wang,Jianqiang %A Ramabhadran,Bhuvana %A Franz,Martin %A Gustman,Samuel %A Mayfield,James %A Kharevych,Liliya %A Strassel,Stephanie %K assessment %K Automatic speech recognition %K oral history %K search-guided relevance %X Test collections model use cases in ways that facilitate evaluation of information retrieval systems. This paper describes the use of search-guided relevance assessment to create a test collection for retrieval of spontaneous conversational speech. Approximately 10,000 thematically coherent segments were manually identified in 625 hours of oral history interviews with 246 individuals. Automatic speech recognition results, manually prepared summaries, controlled vocabulary indexing, and name authority control are available for every segment. Those features were leveraged by a team of four relevance assessors to identify topically relevant segments for 28 topics developed from actual user requests. Search-guided assessment yielded sufficient inter-annotator agreement to support formative evaluation during system development. Baseline results for ranked retrieval are presented to illustrate use of the collection. %B Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval %S SIGIR '04 %I ACM %C New York, NY, USA %P 41 - 48 %8 2004/// %@ 1-58113-881-4 %G eng %U http://doi.acm.org/10.1145/1008992.1009002 %R 10.1145/1008992.1009002 %0 Journal Article %J International Conference on Audio Display %D 2004 %T Capture and recreation of higher order 3d sound fields via reciprocity %A Li,Z. %A Duraiswami, Ramani %A Gumerov, Nail A. %X We propose a unified and simple approach for capturing andrecreating 3D sound fields by exploring the reciprocity prin- ciple that is satisfied between the two processes. Our ap- proach makes the system easy to build, and practical. Us- ing this approach, we can capture the 3D sound field by a spherical microphone array and recreate it using a spheri- cal loudspeaker array, and ensure that the recreated sound field matches the recorded field up to a high order of spheri- cal harmonics. A design example and simulation results are presented. For some regular or semi-regular microphone layouts, we design an efficient parallel implementation of the multi-directional spherical beamformer by using the ro- tational symmetries of the beampattern and of the spherical microphone array. This can be implemented in either soft- ware or hardware. A simple design example is presented to demonstrate the idea. It can be easily adapted for other regular or semi-regular layouts of microphones. %B International Conference on Audio Display %8 2004/// %G eng %0 Conference Paper %B Proceedings of the British Machine Vision Conference %D 2004 %T Contour-based 3D Face Modeling from a Monocular Video %A Gupta, H. %A Roy Chowdhury, A.K. %A Chellapa, Rama %X In this paper, we present a novel 3D face modeling approach from a monoc-ular video captured using a conventional camera. The proposed algorithm relies on matching a generic 3D face model to the outer contours of the face to be modeled and a few of its internal features. At the first stage of the method, we estimate the head pose by comparing the edges extracted from video frames, with the contours extracted from a generic face model. Next, the generic face model is adapted to the actual 3D face by global and local deformations. An affine model is used for global deformation. The 3D model is locally deformed by computing the optimal perturbations of a sparse set of control points using a stochastic search optimization method. The deforma- tions are integrated over a set of poses in the video sequence, leading to an accurate 3D model. %B Proceedings of the British Machine Vision Conference %I British Machine Vision Association %P 39.1-39.10 - 39.1-39.10 %8 2004/// %@ 1-901725-25-1 %G eng %U http://www.bmva.org/bmvc/2004/papers/paper_136.html %R 10.5244/C.18.39 %0 Journal Article %J International Journal of Production Research %D 2004 %T Cutter path generation for 2.5D milling by combining multiple different cutter path patterns %A Yao,Zhiyang %A Gupta, Satyandra K. %X Different cutter path patterns have been shown to be efficient for different types of pocket geometries. However, for certain types of complex pockets, no single type of pattern produces efficient cutter paths throughout the pocket. In this paper, different cutter path patterns are systematically analysed, and several existing heuristics for selecting cutter path patterns are discussed. Based on observations, a new cutter path generation algorithm is described in this paper. This algorithm generates a cutter path by using different patterns in different regions of the geometry and seamlessly morphing them together. In case of complex pockets, it produces solutions superior to those generated by any single pattern. %B International Journal of Production Research %V 42 %P 2141 - 2161 %8 2004/// %@ 0020-7543 %G eng %U http://www.tandfonline.com/doi/abs/10.1080/00207540310001652879 %N 11 %R 10.1080/00207540310001652879 %0 Conference Paper %B Image Processing, 2004. ICIP '04. 2004 International Conference on %D 2004 %T Data hiding in curves for collusion-resistant digital fingerprinting %A Gou,Hongmei %A M. Wu %K (mathematics); %K B-spline %K coding; %K collusion-resistant %K CONTROL %K data %K devices; %K digital %K document %K encapsulation; %K extraction; %K feature %K fingerprinting; %K hiding; %K image %K INPUT %K maps; %K model; %K pen-based %K points; %K printing-and-scanning %K processing; %K robustness; %K sequence; %K spectrum %K splines %K spread %K topographic %K watermarking; %X This paper presents a new data hiding method for curves. The proposed algorithm parameterizes a curve using the B-spline model and adds a spread spectrum sequence in the coordinates of the B-spline control points. We demonstrate through experiments the robustness of the proposed data hiding algorithm against printing-and-scanning and collusions, and show its feasibility for collusion-resistant fingerprinting of topographic maps as well as writings/drawings from pen-based input devices. %B Image Processing, 2004. ICIP '04. 2004 International Conference on %V 1 %P 51 - 54 Vol. 1 - 51 - 54 Vol. 1 %8 2004/10// %G eng %R 10.1109/ICIP.2004.1418687 %0 Journal Article %J Algorithms–ESA 2004 %D 2004 %T Data migration on parallel disks %A Golubchik,L. %A Khuller, Samir %A Kim,Y. A %A Shargorodskaya,S. %A Wan,Y. C %X Our work is motivated by the problem of managing data on storage devices, typically a set of disks. Such storage servers are used as web servers or multimedia servers, for handling high demand for data. As the system is running, it needs to dynamically respond to changes in demand for different data items. There are known algorithms for mapping demand to a layout. When the demand changes, a new layout is computed. In this work we study the data migration problem, which arises when we need to quickly change one layout to another. This problem has been studied earlier when for each disk the new layout has been prescribed. However, to apply these algorithms effectively, we identify another problem that we refer to as the correspondence problem, whose solution has a significant impact on the solution for the data migration problem. We study algorithms for the data migration problem in more detail and identify variations of the basic algorithm that seem to improve performance in practice, even though some of the variations have poor worst case behavior. %B Algorithms–ESA 2004 %P 689 - 701 %8 2004/// %G eng %R 10.1007/978-3-540-30140-0_61 %0 Journal Article %J Report of the DHS Workshop Data Sciences, Jointly Released by Sandia National Laboratories and Lawrence Livermore National Laboratory, Alexandria, Va %D 2004 %T Data sciences technology for homeland security information management and knowledge discovery %A Kolda,T. %A Brown,D %A Corones,J. %A Critchlow,T. %A Eliassi-Rad,T. %A Getoor, Lise %A Hendrickson,B. %A Kumar, V. %A Lambert,D. %A Matarazzo,C. %B Report of the DHS Workshop Data Sciences, Jointly Released by Sandia National Laboratories and Lawrence Livermore National Laboratory, Alexandria, Va %8 2004/// %G eng %0 Conference Paper %B Proceedings of the 2004 Eurographics/ACM SIGGRAPH symposium on Geometry processing %D 2004 %T A data structure for non-manifold simplicial d-complexes %A De Floriani, Leila %A Greenfieldboyce,David %A Hui,Annie %X We propose a data structure for d-dimensional simplicial complexes, that we call the Simplified Incidence Graph (SIG). The simplified incidence graph encodes all simplices of a simplicial complex together with a set of boundary and partial co-boundary topological relations. It is a dimension-independent data structure in the sense that it can represent objects of arbitrary dimensions. It scales well to the manifold case, i.e. it exhibits a small overhead when applied to simplicial complexes with a manifold domain, Here, we present efficient navigation algorithms for retrieving all topological relations from a SIG, and an algorithm for generating a SIG from a representation of the complex as an incidence graph. Finally, we compare the simplified incidence graph with the incidence graph, with a widely-used data structure for d-dimensional pseudo-manifold simplicial complexes, and with two data structures specific for two-and three-dimensional simplicial complexes. %B Proceedings of the 2004 Eurographics/ACM SIGGRAPH symposium on Geometry processing %S SGP '04 %I ACM %C New York, NY, USA %P 83 - 92 %8 2004/// %@ 3-905673-13-4 %G eng %U http://doi.acm.org/10.1145/1057432.1057444 %R 10.1145/1057432.1057444 %0 Book %D 2004 %T Data Structures and Algorithms in C++ %A Goodrich,M. T %A Tamassia,R. %A Mount, Dave %I John Wiley & Sons Inc %8 2004/// %G eng %0 Journal Article %J KDD workshop on link analysis and group detection %D 2004 %T Deduplication and group detection using links %A Bhattacharya,I. %A Getoor, Lise %X Clustering is a fundamental problem in data mining. Tradi-tionally, clustering is done based on the similarity of the at- tribute values of the entities to be clustered. More recently, there has been greater interest in clustering relational and structured data. Often times this data is best described as a graph, in which there are both entities, described by a collec- tion of attributes, and links between entities, representing the relations between them. Clustering in these scenarios becomes more complex, as we should also take into account the similarity of the entity links when we are clustering. We propose novel distance measures for clustering linked data, and show how they can be used to solve two important data mining tasks, entity deduplication and group discovery. %B KDD workshop on link analysis and group detection %8 2004/// %G eng %0 Book %D 2004 %T Detecting and correcting a failure sequence in a computer system before a failure occurs %A Gross,K. C %A Votta,L. G. %A Porter, Adam %I Google Patents %8 2004/02// %G eng %0 Conference Paper %B 19th ACM OOPSLA Workshop on Component and Middleware Performance %D 2004 %T A distributed continuous quality assurance process to manage variability in performance-intensive software %A Krishna,A. %A Yilmaz,C. %A Memon, Atif M. %A Porter, Adam %A Schmidt,D. C %A Gokhale,A. %A Natarajan,B. %B 19th ACM OOPSLA Workshop on Component and Middleware Performance %8 2004/// %G eng %0 Journal Article %J The Journal of the Acoustical Society of America %D 2004 %T Efficient computation of acoustical scattering from N spheres via the fast multipole method accelerated flexible generalized minimal residual method %A Gumerov, Nail A. %A Duraiswami, Ramani %X Many problems require computation of acoustic fields in systems consisting of a large number of scatterers, which can be modeled as spheres (or enclosed by them). These spheres can have different sizes, can be arbitrarily distributed in three dimensional space, and can have different surface impedance. Solution of this problem via direct T‐matrix approach [Gumerov and Duraiswami, J. Acoust. Soc. Am., 112, 2688–2701 (2002)] is practical only for relatively low number of scatterers, N, since its computational complexity grows as O(N3). We developed and implemented an efficient computational technique, based on an iterative solver employing a flexible generalized minimal residual method with a right preconditioner. Matrix‐vector multiplications involving a large system matrix and the preconditioner are sped up with the aid of the multilevel fast multipole method. We tested the accuracy, convergence and complexity of the method on example problems with N∼104 (millions of unknowns). These tests showed that the method is accurate for a range of frequencies, and experimentally scales as O(N1.25). The method has substantial advantages in speed and convergence compared to the reflection method reported earlier [Gumerov and Duraiswami, J. Acoust. Soc. Am., 113, 2334 (2002)]. [Work supported NSF Awards 0086075 and 0219681, which are gratefully acknowledged.] %B The Journal of the Acoustical Society of America %V 116 %P 2528 - 2528 %8 2004/// %G eng %U http://link.aip.org/link/?JAS/116/2528/4 %N 4 %0 Journal Article %J University of Maryland, College Park, MD, Tech. Rep. CSTR-4568 %D 2004 %T Efficient peer-to-peer namespace searches %A Gopalakrishnan,V. %A Bhattacharjee, Bobby %A Chawathe,S. %A Keleher,P. %X In this paper we describe new methods for efficient and exact search (keyword and full-text) in distributed namespaces. Our methods can be used in conjunction with existing distributed lookup schemes, such as Distributed Hash Tables, and distributed directories. We describe how indexes for implementing distributed searches can be efficiently created, located, and stored. We describe techniques for creating approximate indexes that can be used to bound the space requirement at individual hosts; such techniques are particularly useful for full-text searches that may require a very large number of individual indexes to be created and maintained. Our methods use a new distributed data structure called the view tree. View trees can be used to efficiently cache and locate results from prior queries. We describe how view trees are created, and maintained. We present experimental results, using large namespaces and realistic data, showing that the techniques introduced in this paper can reduce search overheads (both network and processing costs) by more than an order of magnitude. %B University of Maryland, College Park, MD, Tech. Rep. CSTR-4568 %8 2004/// %G eng %0 Conference Paper %D 2004 %T Enhancement of mechanical engineering curriculum to introduce manufacturing techniques and principles for bio-inspired product development %A Bruck,H. A. %A Gershon,A. L. %A Gupta,S.K. %P 1 - 6 %8 2004/// %G eng %U ftp://ftp.eng.umd.edu/:/home/glue/s/k/skgupta/backup/pub/Publication/IMECE04_Bruck.pdf %0 Conference Paper %B Proceedings of the 4th international symposium on Memory management %D 2004 %T Experience with safe manual memory-management in cyclone %A Hicks, Michael W. %A Morrisett,Greg %A Grossman,Dan %A Jim,Trevor %K cyclone %K Memory management %K memory safety %K regions %K unique pointers %X The goal of the Cyclone project is to investigate type safety for low-level languages such as C. Our most difficult challenge has been providing programmers control over memory management while retaining type safety. This paper reports on our experience trying to integrate and effectively use two previously proposed, type-safe memory management mechanisms: statically-scoped regions and unique pointers. We found that these typing mechanisms can be combined to build alternative memory-management abstractions, such as reference counted objects and arenas with dynamic lifetimes, and thus provide a flexible basis. Our experience---porting C programs and building new applications for resource-constrained systems---confirms that experts can use these features to improve memory footprint and sometimes to improve throughput when used instead of, or in combination with, conservative garbage collection. %B Proceedings of the 4th international symposium on Memory management %S ISMM '04 %I ACM %C New York, NY, USA %P 73 - 84 %8 2004/// %@ 1-58113-945-4 %G eng %U http://doi.acm.org/10.1145/1029873.1029883 %R 10.1145/1029873.1029883 %0 Journal Article %J Technical Reports from UMIACS UMIACS-TR-2004-08 %D 2004 %T FAST ALGORITHMS TO COMPUTE MATRIX-VECTOR PRODUCTS FOR PASCAL MATRICES %A Tang,Zhihui %A Duraiswami, Ramani %A Gumerov, Nail A. %K Technical Report %X The Pascal matrix arises in a number of applications. We present a few waysto decompose the Pascal matrices of size $n \times n$ into products of matrices with structure. Based on these decompositions, we propose fast algorithms to compute the product of a Pascal matrix and a vector with omplexity $O(n\log n)$. We also present a strategy to stabilize the proposed algorithms. Finally, we also present some interesting properties of the Pascal matrices that help us to compute fast the product of the inverse of a Pascal matrix and a vector, and fast algorithms for generalized Pascal Matrices. UMIACS-TR-2004-08 %B Technical Reports from UMIACS UMIACS-TR-2004-08 %8 2004/03/25/ %G eng %U http://drum.lib.umd.edu/handle/1903/1338 %0 Book %D 2004 %T Fast Multipole Methods For The Helmholtz Equation In Three Dimensions %A Gumerov, Nail A. %A Duraiswami, Ramani %K Electronic books %K Helmholtz equation %K Mathematics / Mathematical Analysis %K Science / Physics / Electromagnetism %K Science / Physics / Magnetism %K Technology & Engineering / Acoustics & Sound %K Technology & Engineering / Electrical %X This volume in the Elsevier Series in Electromagnetism presents a detailed, in-depth and self-contained treatment of the Fast Multipole Method and its applications to the solution of the Helmholtz equation in three dimensions. The Fast Multipole Method was pioneered by Rokhlin and Greengard in 1987 and has enjoyed a dramatic development and recognition during the past two decades. This method has been described as one of the best 10 algorithms of the 20th century. Thus, it is becoming increasingly important to give a detailed exposition of the Fast Multipole Method that will be accessible to a broad audience of researchers. This is exactly what the authors of this book have accomplished. For this reason, it will be a valuable reference for a broad audience of engineers, physicists and applied mathematicians.The Only book that provides comprehensive coverage of this topic in one location.Presents a review of the basic theory of expansions of the Helmholtz equation solutionsComprehensive description of both mathematical and practical aspects of the fast multipole method and it's applications to issues described by the Helmholtz equation %I Elsevier %8 2004/// %@ 9780080443713 %G eng %0 Conference Paper %B Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on %D 2004 %T Flexible layout and optimal cancellation of the orthonormality error for spherical microphone arrays %A Zhiyun Li %A Duraiswami, Ramani %A Grassi,E. %A Davis, Larry S. %K array %K audio %K base; %K beamforming; %K cable %K cancellation %K correction; %K error %K flexible %K harmonics; %K higher %K layout; %K microphone %K microphones; %K mounting %K optimization; %K order %K orthonormality %K outlets; %K processing; %K signal %K spherical %K surface; %X This paper describes an approach to achieving a flexible layout of microphones on the surface of a spherical microphone array for beamforming. Our approach achieves orthonormality of spherical harmonics to higher order for relatively distributed layouts. This gives great flexibility in microphone layout on the spherical surface. One direct advantage is that it makes it much easier to build a real world system, such as those with cable outlets and a mounting base, with minimal effects on the performance. Simulation results are presented. %B Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on %V 4 %P iv-41 - iv-44 vol.4 - iv-41 - iv-44 vol.4 %8 2004/05// %G eng %R 10.1109/ICASSP.2004.1326758 %0 Conference Paper %D 2004 %T A Framework for Conceptual Design of Multiple Interaction-State Mechatronic Systems %A Gupta,S.K. %A Xu,C. %A Yao,Z. %X Increasingly, complex mechatronic systems are beingdesigned to have higher levels of autonomy and intelligence. This requires them to operate in multiple interaction-states. To facilitate computer- aided conceptual design of complex mechatronic systems, this paper provides a framework for modeling design concepts behind mechatronic systems with multiple interaction-states. We introduce the primitives and operators used in the modeling framework, and illustrate the modeling process by an example. %C Lausanne, Switzerland %8 2004/// %G eng %U http://www.glue.umd.edu/~skgupta/Publication/TMCE04_Xu.pdf %0 Journal Article %J Computer-Aided Design %D 2004 %T Geometric algorithms for automated design of multi-piece permanent molds %A Priyadarshi,Alok K. %A Gupta, Satyandra K. %K mold design %K Multi-piece molds %K spatial partitioning %X Multi-piece molds, which consist of more than two mold pieces, are capable of producing very complex parts—parts that cannot be produced by the traditional molds. The tooling cost is also low for multi-piece molds, which makes it a candidate for pre-production prototyping and bridge tooling. However, designing multi-piece molds is a time-consuming task. This article describes geometric algorithms for automated design of multi-piece molds. A multi-piece mold design algorithm has been developed to automate several important mold-design steps: finding parting directions, locating parting lines, creating parting surfaces, and constructing mold pieces. This algorithm constructs mold pieces based on global accessibility analysis results of the part and therefore guarantees the disassembly of the mold pieces. A software system has been developed, which has been successfully tested on several complex industrial parts. %B Computer-Aided Design %V 36 %P 241 - 260 %8 2004/03// %@ 0010-4485 %G eng %U http://www.sciencedirect.com/science/article/pii/S0010448503001076 %N 3 %R 10.1016/S0010-4485(03)00107-6 %0 Journal Article %J Computer-Aided Design %D 2004 %T Geometric algorithms for automated design of rotary-platen multi-shot molds %A Li,Xuejun %A Gupta, Satyandra K. %K geometric reasoning %K mold design %K Multi-shot molds %X This paper describes algorithms for automated design of rotary-platen type of multi-shot molds for manufacturing multi-material objects. The approach behind our algorithms works in the following manner. First, we classify the given multi-material object into several basic types based on the relationships among different components in the object. For every basic type, we find a molding sequence based on the precedence constraints resulting due to accessibility and disassembly requirements. Then, starting from the last mold stage, we generate the mold pieces for every mold stage. We expect that algorithms described in this paper will provide the necessary foundations for automating the design of rotary-platen molds. %B Computer-Aided Design %V 36 %P 1171 - 1187 %8 2004/10// %@ 0010-4485 %G eng %U http://www.sciencedirect.com/science/article/pii/S0010448503002331 %N 12 %R 10.1016/j.cad.2003.11.003 %0 Conference Paper %D 2004 %T Geometric Containment Analysis for Rotational Parts %A Karnik,M. %A Gupta,S.K. %A Magrab,E. B. %X This paper describes a system and underlying algorithms toperform geometric containment analysis to determine if a newly designed rotational part can be manufactured from a part in an existing database of rotational parts. Only material removal of the database part is considered in order to obtain the newly designed part from the database part. The system uses a three-step algorithm to test for containment. The first step analyzes feasibility of containment using bounding cylinders. If the bounding cylinder of the query part is bigger than the part in the database, then the database part cannot contain the query part and it is eliminated from consideration. The second step analyzes feasibility of containment by ignoring off-axis features. Any part that fails to satisfy containment at this stage is eliminated from consideration. The third step analyzes the remaining parts from the database for feasibility of containment by including the off-axis features. Finally, the system rank- orders all the database parts that can contain the query part based on their volume differences with the query part. The system described in this paper can be used to find an existing part from which to manufacture a newly designed part. This capability is expected to significantly reduce proliferation of parts, to improve manufacturing responsiveness, and to reduce the cost of new products. %8 2004/// %G eng %U ftp://ftp.eng.umd.edu/:/home/glue/s/k/skgupta/pub/Publication/DETC04_Karnik.pdf %0 Conference Paper %B Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International %D 2004 %T Hierarchical routing with soft-state replicas in TerraDir %A Silaghi,B. %A Gopalakrishnan,Vijay %A Bhattacharjee, Bobby %A Kelcher,P. %K ad-hoc %K adaptive %K allocation; %K asymmetrical %K balancing; %K bottlenecks; %K consistency %K constraints; %K delivering; %K demand %K distribution; %K guarantees; %K hierarchical %K latency %K load %K low %K namespaces; %K peer-to-peer %K protocol; %K protocols; %K replica %K replicas; %K replication %K resource %K routing; %K soft-state %K systems; %K TerraDir; %K topological %X Summary form only given. Recent work on peer-to-peer systems has demonstrated the ability to deliver low latencies and good load balance when demand for data is relatively uniform. We describe an adaptive replication protocol that delivers low latencies, good load balance even when demand is heavily skewed. The protocol can withstand arbitrary and instantaneous changes in demand distribution. Our approach also addresses classical concerns related to topological constraints of asymmetrical namespaces, such as hierarchical bottlenecks in the context of hierarchical namespaces. The protocol replicates routing state in an ad-hoc manner based on profiled information, is lightweight, scalable, and requires no replica consistency guarantees. %B Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International %P 48 - 48 %8 2004/04// %G eng %R 10.1109/IPDPS.2004.1302967 %0 Conference Paper %B 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings %D 2004 %T High-performance MAC for high-capacity wireless LANs %A Yuan Yuan %A Daqing Gu %A Arbaugh, William A. %A Jinyun Zhang %K 35 Mbit/s %K access protocols %K Aggregates %K Bandwidth %K batch transmission %K Computer science %K Educational institutions %K high-capacity wireless LAN %K high-performance MAC %K Laboratories %K Local area networks %K Media Access Protocol %K opportunistic selection %K Physical layer %K probability %K Throughput %K Wireless LAN %X The next-generation wireless technologies, e.g., 802.11n and 802.15.3a, offer a physical-layer speed at least an-order-of-magnitude higher than the current standards. However, direct application of current MACs leads to high protocol overhead and significant throughput degradation. In this paper, we propose ADCA, a high-performance MAC that works with high-capacity physical layer. ADCA exploits two ideas of adaptive batch transmission and opportunistic selection of high-rate hosts to simultaneously reduce the overhead and improve the aggregate throughput. It opportunistically favors high-rate hosts by providing higher access probability and more access time, while ensuring each low-rate host certain minimum amount of channel access time. Simulations show that the ADCA design increases the throughput by 112% and reduces the average delay by 55% compared with the legacy DCF. It delivers more than 100 Mbps MAC-layer throughput as compared with 35 Mbps offered by the legacy MAC %B 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings %I IEEE %P 167 - 172 %8 2004/10/11/13 %@ 0-7803-8814-3 %G eng %R 10.1109/ICCCN.2004.1401615 %0 Book Section %B Comparative Evaluation of Multilingual Information Access SystemsComparative Evaluation of Multilingual Information Access Systems %D 2004 %T iCLEF 2003 at Maryland: Translation Selection and Document Selection %A Dorr, Bonnie J %A He,Daqing %A Luo,Jun %A Oard, Douglas %A Schwartz,Richard %A Wang,Jianqiang %A Zajic, David %E Peters,Carol %E Gonzalo,Julio %E Braschler,Martin %E Kluck,Michael %X Maryland performed two sets of experiments for the 2003 Cross-Language Evaluation Forum’s interactive track, one focused on interactive selection of appropriate translations for query terms, the second focused on interactive selection of relevant documents. Translation selection was supported using possible synonyms discovered through back translation and two techniques for generating KeyWord In Context (KWIC) examples of usage. The results indicate that searchers typically achieved a similar search effectiveness using fewer query iterations when interactive translation selection was available. For document selection, a complete extract of the first 40 words of each news story was compared to a compressed extract generated using an automated parse-and-trim approach that approximates one way in which people can produce headlines. The results indicate that compressed “headlines” result in faster assessment, but with a 20% relative reduction in the F α = 0.8 search effectiveness measure. %B Comparative Evaluation of Multilingual Information Access SystemsComparative Evaluation of Multilingual Information Access Systems %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 3237 %P 231 - 265 %8 2004/// %@ 978-3-540-24017-4 %G eng %U http://dx.doi.org/10.1007/978-3-540-30222-3_42 %0 Conference Paper %B ASME Design for Manufacturing Conference, Salt Lake City, Utah %D 2004 %T Identifying similar parts for assisting cost estimation of prismatic machined parts %A Cardone, Antonio %A Gupta,S.K. %A Karnik,M. %B ASME Design for Manufacturing Conference, Salt Lake City, Utah %8 2004/// %G eng %0 Journal Article %J Signal %D 2004 %T Improved Multiuser Detectors Employing Genetic Algorithms in a Space-Time Block Coded System, Yinggang Du and Kam Tai Chan %A Self-Similarity,G.R.U.I. %A BenAbdelkader,C. %A Cutler,R.G. %A Davis, Larry S. %A Local,F.R.U. %A Global Features,J.H. %A Yuen, P.C. %A Lai,JH %A Li,C. %B Signal %V 2004 %P 640 - 648 %8 2004/// %G eng %N 5 %0 Conference Paper %B Proceedings of the 2nd Workshop on Text Meaning and Interpretation %D 2004 %T Inducing a semantic frame lexicon from WordNet data %A Green,Rebecca %A Dorr, Bonnie J %X This paper presents SemFrame, a system that automatically induces the names and internal structures of semantic frames. After SemFrame identifies sets of frame-evoking verb synsets, the conceptual density of nodes in the WordNet network for corresponding nouns and noun synsets is computed and analyzed. Conceptually dense nodes are candidates for frame names and frame slots. Ca. 76% of the frame names and 87% of the frame slots generated by SemFrame are rated adequate by human judges. %B Proceedings of the 2nd Workshop on Text Meaning and Interpretation %S TextMean '04 %I Association for Computational Linguistics %C Stroudsburg, PA, USA %P 65 - 72 %8 2004/// %G eng %U http://dl.acm.org/citation.cfm?id=1628275.1628284 %0 Conference Paper %B Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics %D 2004 %T Inducing frame semantic verb classes from WordNet and LDOCE %A Green,R. %A Dorr, Bonnie J %A Resnik, Philip %X This paper presents SemFrame, a systemthat induces frame semantic verb classes from WordNet and LDOCE. Semantic frames are thought to have significant potential in resolving the paraphrase problem challenging many language- based applications. When compared to the handcrafted FrameNet, SemFrame achieves its best recall-precision balance with 83.2% recall (based on SemFrame's coverage of FrameNet frames) and 73.8% precision (based on SemFrame verbs’ semantic relatedness to frame-evoking verbs). The next best performing semantic verb classes achieve 56.9% recall and 55.0% precision. %B Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics %P 375 - 375 %8 2004/// %G eng %0 Journal Article %J Molecular biology and evolution %D 2004 %T The ingi and RIME non-LTR retrotransposons are not randomly distributed in the genome of Trypanosoma brucei %A Bringaud,F. %A Biteau,N. %A Zuiderwijk,E. %A Berriman,M. %A El‐Sayed, Najib M. %A Ghedin,E. %A Melville,S. E. %A Hall,N. %A Baltz,T. %B Molecular biology and evolution %V 21 %P 520 - 520 %8 2004/// %G eng %N 3 %0 Journal Article %J information retrieval %D 2004 %T Interactive cross-language document selection %A Oard, Douglas %A Gonzalo,J. %A Sanderson,M. %A López-Ostenero,F. %A Wang,J. %B information retrieval %V 7 %P 205 - 228 %8 2004/// %G eng %N 1 %0 Journal Article %J IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS SPEECH AND SIGNAL PROCESSING %D 2004 %T INTERPOLATION AND RANGE EXTRAPOLATION OF HEAD RELATED TRANSFER FUNCTIONS %A Duraiswami, Ramani %A Zotkin,Dmitry N %A Gumerov, Nail A. %B IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS SPEECH AND SIGNAL PROCESSING %V 4 %8 2004/// %G eng %0 Conference Paper %B Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery %D 2004 %T Iterative record linkage for cleaning and integration %A Bhattacharya,Indrajit %A Getoor, Lise %K clustering %K deduplication %K distance measure %K record linkage %X Record linkage, the problem of determining when two records refer to the same entity, has applications for both data cleaning (deduplication) and for integrating data from multiple sources. Traditional approaches use a similarity measure that compares tuples' attribute values; tuples with similarity scores above a certain threshold are declared to be matches. While this method can perform quite well in many domains, particularly domains where there is not a large amount of noise in the data, in some domains looking only at tuple values is not enough. By also examining the context of the tuple, i.e. the other tuples to which it is linked, we can come up with a more accurate linkage decision. But this additional accuracy comes at a price. In order to correctly find all duplicates, we may need to make multiple passes over the data; as linkages are discovered, they may in turn allow us to discover additional linkages. We present results that illustrate the power and feasibility of making use of join information when comparing records. %B Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery %S DMKD '04 %I ACM %C New York, NY, USA %P 11 - 18 %8 2004/// %@ 1-58113-908-X %G eng %U http://doi.acm.org/10.1145/1008694.1008697 %R 10.1145/1008694.1008697 %0 Book Section %B DUC 04 Conference ProceedingsDUC 04 Conference Proceedings %D 2004 %T Left-Brain/Right-Brain Multi-Document Summarization %A Conroy,John M. %A Schlesinger,Judith D. %A Goldstein,Jade %A O'Leary, Dianne P. %B DUC 04 Conference ProceedingsDUC 04 Conference Proceedings %I U.S. National Inst. of Standards and Technology %8 2004/// %G eng %U \tt http://duc.nist.gov/ %0 Conference Paper %B INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies %D 2004 %T Measurement based optimal multi-path routing %A Guven,T. %A Kommareddy,C. %A La,R.J. %A Shayman,M.A. %A Bhattacharjee, Bobby %K algorithm;network %K approximation;routing %K IP %K measurement;network %K monitoring;optimization;perturbation %K multipath %K network;measurement-based %K networks;Internet;optimisation;routing %K processes; %K protocol;IP %K protocols;stochastic %K Routing %K Stochastic %X We propose a new architecture for efficient network monitoring and measurements in a traditional IP network. This new architecture enables establishment of multiple paths (tunnels) between source-destination pairs without having to modify the underlying routing protocol(s). Based on the proposed architecture we propose a measurement-based multipath routing algorithm derived from simultaneous perturbation stochastic approximation. The proposed algorithm does not assume that the gradient of analytical cost function is known to the algorithm, but rather relies on noisy estimates from measurements. Using the analytical model presented in the paper we prove the convergence of the algorithm to the optimal solution. Simulation results are presented to demonstrate the advantages of the proposed algorithm under a variety of network scenarios. A comparative study with an existing optimal routing algorithm, MATE, is also provided %B INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies %V 1 %P 187 - 196 %8 2004/03// %G eng %R 10.1109/INFCOM.2004.1354493 %0 Journal Article %J International Journal of High Performance Computing Applications %D 2004 %T Measuring HPC productivity %A Faulk,S. %A Gustafson,J. %A Johnson,P. %A Porter, Adam %A Tichy,W. %A Votta,L. %B International Journal of High Performance Computing Applications %V 18 %P 459 - 473 %8 2004/// %G eng %N 4 %0 Journal Article %J SPIE 16th International Symposium on Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia %D 2004 %T Mining tool for surveillance video %A Ghanem,N.M. %A David Doermann %A Davis, Larry S. %A DeMenthon,D. %X This paper describes a system for the mining of surveillance video. Our main contributions are: providing ahigh level query language for submitting queries about spatial and temporal relations of background regions and moving entities, and about human activities; providing a compiler to map high level queries into a set of novel Petri net filters that utilize computer vision algorithms to answer components of the queries; and providing a powerful graphical interface where users have the ability to formulate the query visually. %B SPIE 16th International Symposium on Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia %V 5307 %P 259 - 270 %8 2004/// %G eng %0 Conference Paper %B Proceedings in SPIE 16th International Symposium on Electronic Imaging %D 2004 %T Mining Tools for Surveillance Video %A Ghanem,N. %A David Doermann %A Davis, Larry S. %A DeMenthon,D. %B Proceedings in SPIE 16th International Symposium on Electronic Imaging %P 5307 259-270 - 5307 259-270 %8 2004/01// %G eng %0 Conference Paper %B Proceedings of the 2004 conference on Interaction design and children: building a community %D 2004 %T Mixing ideas: a new technique for working with young children as design partners %A Guha,M.L. %A Druin, Allison %A Chipman,G. %A Fails,J. A %A Simms,S. %A Farber,A. %B Proceedings of the 2004 conference on Interaction design and children: building a community %P 35 - 42 %8 2004/// %G eng %0 Journal Article %J Proceedings of the 2nd ICSE Workshop on Remote Analysis and Measurement of Software Systems (RAMSS), Edinburgh, Scotland, UK %D 2004 %T A Model-based Distributed Continuous Quality Assurance Process to Enhance the Quality of Service of Evolving Performance-intensive Software Systems %A Yilmaz,C. %A Krishna,A. S %A Memon, Atif M. %A Porter, Adam %A Schmidt,D. C %A Gokhale,A. %A Natarajan,B. %X Performance-intensive software, such as that found in high-perfo-rmance computing systems and distributed real-time and embedded systems, increasingly executes on a multitude of platforms and user contexts. To ensure that performance-intensive software meets its quality of service (QoS) requirements, it must often be fine-tuned to specific platforms/contexts by adjusting many (in some cases hun- dreds of) configuration options. Developers who write these types of systems must therefore try to ensure that their additions and mod- ifications work across this large configuration space. In practice, however, time and resource constraints often force developers to assess performance on very few configurations and to extrapolate from these to the entire configuration space, which allows many performance bottlenecks and sources of QoS degradation to escape detection until systems are fielded. To improve the assessment of performance across large config- uration spaces, we present a model-based approach to develop- ing and deploying a new distributed continuous quality assurance (DCQA) process. Our approach builds upon and extends the Skoll environment, which is developing and validating novel software QA processes and tools that leverage the extensive computing resources of worldwide user communities in a distributed, continuous man- ner to significantly and rapidly improve software quality. This pa- per describes how our new DCQA performance assessment process enables developers to run formally-designed screening experiments that isolate the most significant options. After that, exhaustive ex- periments (on the now much smaller configuration space) are con- ducted. We implemented this process using model-based software tools and executed it in the Skoll environment to demonstrate its ef- fectiveness via two experiments on widely used QoS-enabled mid- dleware. Our results show that model-based DCQA processes im- proves developer insight into the effect of system changes on per- formance at an acceptable cost. %B Proceedings of the 2nd ICSE Workshop on Remote Analysis and Measurement of Software Systems (RAMSS), Edinburgh, Scotland, UK %8 2004/// %G eng %0 Conference Paper %B Proceedings of the Thirtieth international conference on Very large data bases - Volume 30 %D 2004 %T Model-driven data acquisition in sensor networks %A Deshpande, Amol %A Guestrin,Carlos %A Madden,Samuel R. %A Hellerstein,Joseph M. %A Wei Hong %X Declarative queries are proving to be an attractive paradigm for ineracting with networks of wireless sensors. The metaphor that "the sensornet is a database" is problematic, however, because sensors do not exhaustively represent the data in the real world. In order to map the raw sensor readings onto physical reality, a model of that reality is required to complement the readings. In this paper, we enrich interactive sensor querying with statistical modeling techniques. We demonstrate that such models can help provide answers that are both more meaningful, and, by introducing approximations with probabilistic confidences, significantly more efficient to compute in both time and energy. Utilizing the combination of a model and live data acquisition raises the challenging optimization problem of selecting the best sensor readings to acquire, balancing the increase in the confidence of our answer against the communication and data acquisition costs in the network. We describe an exponential time algorithm for finding the optimal solution to this optimization problem, and a polynomial-time heuristic for identifying solutions that perform well in practice. We evaluate our approach on several real-world sensor-network data sets, taking into account the real measured data and communication quality, demonstrating that our model-based approach provides a high-fidelity representation of the real phenomena and leads to significant performance gains versus traditional data acquisition techniques. %B Proceedings of the Thirtieth international conference on Very large data bases - Volume 30 %S VLDB '04 %I VLDB Endowment %P 588 - 599 %8 2004/// %@ 0-12-088469-0 %G eng %U http://dl.acm.org/citation.cfm?id=1316689.1316741 %0 Journal Article %J Nature %D 2004 %T Modelling disease outbreaks in realistic urban social networks %A Eubank,Stephen %A Guclu,Hasan %A Kumar,V. S. Anil %A Marathe,Madhav V. %A Srinivasan, Aravind %A Toroczkai,Zolt|[aacute]|n %A Wang,Nan %X Most mathematical models for the spread of disease use differential equations based on uniform mixing assumptions1 or ad hoc models for the contact process2, 3, 4. Here we explore the use of dynamic bipartite graphs to model the physical contact patterns that result from movements of individuals between specific locations. The graphs are generated by large-scale individual-based urban traffic simulations built on actual census, land-use and population-mobility data. We find that the contact network among people is a strongly connected small-world-like5 graph with a well-defined scale for the degree distribution. However, the locations graph is scale-free6, which allows highly efficient outbreak detection by placing sensors in the hubs of the locations network. Within this large-scale simulation framework, we then analyse the relative merits of several proposed mitigation strategies for smallpox spread. Our results suggest that outbreaks can be contained by a strategy of targeted vaccination combined with early detection without resorting to mass vaccination of a population. %B Nature %V 429 %P 180 - 184 %8 2004/05/13/ %@ 0028-0836 %G eng %U http://www.nature.com/nature/journal/v429/n6988/full/nature02541.html %N 6988 %R 10.1038/nature02541 %0 Conference Paper %B Image Processing, 2004. ICIP '04. 2004 International Conference on %D 2004 %T Multi-level fast multipole method for thin plate spline evaluation %A Zandifar,A. %A Lim,S. %A Duraiswami, Ramani %A Gumerov, Nail A. %A Davis, Larry S. %K (mathematics); %K Computer %K deformation; %K evaluation; %K fast %K image %K MATCHING %K matching; %K metal %K method; %K multilevel %K multipole %K nonrigid %K pixel; %K plate %K plate; %K processing; %K registration; %K resolution; %K spline %K splines %K thin %K vision; %X Image registration is an important problem in image processing and computer vision. Much recent work in image registration is on matching non-rigid deformations. Thin plate splines are an effective image registration method when the deformation between two images can be modeled as the bending of a thin metal plate on point constraints such that the topology is preserved (non-rigid deformation). However, because evaluating the computed TPS model at all the image pixels is computationally expensive, we need to speed it up. We introduce the use of multi-level fast muitipole method (MLFMM) for this purpose. Our contribution lies in the presentation of a clear and concise MLFMM framework for TPS, which will be useful for future application developments. The achieved speedup using MLFMM is an improvement from O(N2) to O(N log N). We show that the fast evaluation outperforms the brute force method while maintaining acceptable error bound. %B Image Processing, 2004. ICIP '04. 2004 International Conference on %V 3 %P 1683 - 1686 Vol. 3 - 1683 - 1686 Vol. 3 %8 2004/10// %G eng %R 10.1109/ICIP.2004.1421395 %0 Conference Paper %D 2004 %T New directions in design for manufacturing %A Herrmann,J.W. %A Cooper,J. %A Gupta,S.K. %A Hayes,C. C. %A Ishii,K. %A Kazmer,D. %A Sandborn,P. A. %A Wood,W. H. %X This paper gives an overview of research that is expandingthe domain of design for manufacturing (DFM) into new and important areas. This paper covers DFM and concurrent engineering, DFM for conceptual design, DFM for embodiment design, DFM for detailed design, design for production, platform design for reducing time-to-market, design for system quality, design for life cycle costs, and design for environment. The paper concludes with some general guidelines that suggest how manufacturing firms can develop useful, effective DFM tools. %P 1 - 9 %8 2004/// %G eng %U http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.198.8706&rep=rep1&type=pdf %0 Journal Article %J Journal of Computational Biology %D 2004 %T A Note on Efficient Computation of Haplotypes via Perfect Phylogeny %A Bafna,Vineet %A Gusfield,Dan %A Hannenhalli, Sridhar %A Yooseph,Shibu %X The problem of inferring haplotype phase from a population of genotypes has received a lot of attention recently. This is partly due to the observation that there are many regions on human genomic DNA where genetic recombination is rare (Helmuth, 2001; Daly et al., 2001; Stephens et al., 2001; Friss et al., 2001). A Haplotype Map project has been announced by NIH to identify and characterize populations in terms of these haplotypes. Recently, Gusfield introduced the perfect phylogeny haplotyping problem, as an algorithmic implication of the no-recombination in long blocks observation, together with the standard population-genetic assumption of infinite sites. Gusfield's solution based on matroid theory was followed by direct θ(nm2 ) solutions that use simpler techniques (Bafna et al., 2003; Eskin et al., 2003), and also bound the number of solutions to the PPH problem. In this short note, we address two questions that were left open. First, can the algorithms of Bafna et al. (2003) and Eskin et al. (2003) be sped-up to O(nm + m2 ) time, which would imply an O(nm) time-bound for the PPH problem? Second, if there are multiple solutions, can we find one that is most parsimonious in terms of the number of distinct haplotypes.We give reductions that suggests that the answer to both questions is "no." For the first problem, we show that computing the output of the first step (in either method) is equivalent to Boolean matrix multiplication. Therefore, the best bound we can presently achieve is O(nmω–1), where ω ≤ 2.52 is the exponent of matrix multiplication. Thus, any linear time solution to the PPH problem likely requires a different approach. For the second problem of computing a PPH solution that minimizes the number of distinct haplotypes, we show that the problem is NP-hard using a reduction from Vertex Cover (Garey and Johnson, 1979). %B Journal of Computational Biology %V 11 %P 858 - 866 %8 2004/10// %@ 1066-5277, 1557-8666 %G eng %U http://www.liebertonline.com/doi/abs/10.1089/cmb.2004.11.858 %N 5 %R 10.1089/cmb.2004.11.858 %0 Journal Article %J Environmental Microbiology %D 2004 %T Occurrence and distribution of Vibrio cholerae in the coastal environment of Peru %A Gil,Ana I. %A Louis,Valérie R. %A Rivera,Irma N. G. %A Lipp,Erin %A Huq,Anwar %A Lanata,Claudio F. %A Taylor,David N. %A Russek‐Cohen,Estelle %A Choopun,Nipa %A Sack,R. Bradley %A Rita R Colwell %X The occurrence and distribution of Vibrio cholerae in sea water and plankton along the coast of Peru were studied from October 1997 to June 2000, and included the 1997–98 El Niño event. Samples were collected at four sites in coastal waters off Peru at monthly intervals. Of 178 samples collected and tested, V. cholerae O1 was cultured from 10 (5.6%) samples, and V. cholerae O1 was detected by direct fluorescent antibody assay in 26 out of 159 samples tested (16.4%). Based on the number of cholera cases reported in Peru from 1997 to 2000, a significant correlation was observed between cholera incidence and elevated sea surface temperature (SST) along the coast of Peru (P < 0.001). From the results of this study, coastal sea water and zooplankton are concluded to be a reservoir for V. cholerae in Peru. The climate–cholera relationship observed for the 1997–98 El Niño year suggests that an early warning system for cholera risk can be established for Peru and neighbouring Latin American countries. %B Environmental Microbiology %V 6 %P 699 - 706 %8 2004/07/01/ %@ 1462-2920 %G eng %U http://onlinelibrary.wiley.com/doi/10.1111/j.1462-2920.2004.00601.x/abstract?userIsAuthenticated=false&deniedAccessCustomisedMessage= %N 7 %R 10.1111/j.1462-2920.2004.00601.x %0 Journal Article %J Software, IEEE %D 2004 %T Preserving distributed systems critical properties: a model-driven approach %A Yilmaz,C. %A Memon, Atif M. %A Porter, Adam %A Krishna,A. S %A Schmidt,D. C %A Gokhale,A. %A Natarajan,B. %K configuration management %K formal verification %K Middleware %K middleware suite %K model-driven approach %K persistent software attributes %K QoS requirements %K Quality assurance %K quality of service %K quality-of-service %K Skoll distributed computing resources %K software configuration %K Software maintenance %K Software quality %K software quality assurance process %K system dependability %X The need for creating predictability in distributed systems is most often specified in terms of quality-of-service (QoS) requirements, which help define the acceptable levels of dependability with which capabilities such as processing capacity, data throughput, or service availability reach users. For longer-term properties such as scalability, maintainability, adaptability, and system security, we can similarly use persistent software attributes (PSAs) to specify how and to what degree such properties must remain intact as a network expands and evolves over time. The Skoll distributed continuous software quality assurance process helps to identify viable system and software configurations for meeting stringent QOS and PSA requirements by coordinating the use of distributed computing resources. The authors tested their process using the large, rapidly evolving ACE+TAO middleware suite. %B Software, IEEE %V 21 %P 32 - 40 %8 2004/// %@ 0740-7459 %G eng %N 6 %R 10.1109/MS.2004.50 %0 Journal Article %J Automation in Construction (Elsevier) %D 2004 %T Reconstructing Images of Bar Codes for Construction Site Object Recognition %A Gilsinn,David E. %A Cheok,Geraldine S. %A O'Leary, Dianne P. %B Automation in Construction (Elsevier) %V 13 %P 21 - 35 %8 2004/// %G eng %0 Journal Article %J SIAM Journal on Scientific Computing %D 2004 %T Recursions for the computation of multipole translation and rotation coefficients for the 3-D Helmholtz equation %A Gumerov, Nail A. %A Duraiswami, Ramani %X We develop exact expressions for the coefficients of series representations of trans-lations and rotations of local and multipole fundamental solutions of the Helmholtz equation in spherical coordinates. These expressions are based on the derivation of recurrence relations, some of which, to our knowledge, are presented here for the first time. The symmetry and other properties of the coefficients are also examined and, based on these, efficient procedures for calculating them are presented. Our expressions are direct and do not use the Clebsch–Gordan coefficients or the Wigner 3-j symbols, although we compare our results with methods that use these to prove their accuracy. For evaluating an Nt term truncation of the translated series (involving O(N2t) multipoles), our expressions require O(N3t) evaluations, compared to previous exact expressions that require O(N5t) operations. %B SIAM Journal on Scientific Computing %V 25 %P 1344 - 1381 %8 2004/// %G eng %N 4 %0 Conference Paper %B Second IEEEWorkshop on Event Mining 2004, CVPR2004 %D 2004 %T Representation and Recognition of Events in Surveillance Video Using Petri Nets %A Ghanem,N. %A DeMenthon,D. %A David Doermann %A Davis, Larry S. %X Detection of events is an essential task in surveillance applications. This task requires finding a general event representation method and developing efficient recognition algorithms dealing with this representation. In this paper, we describe an interactive system for querying surveillance video about events. The queries may not be known in advance and have to be composed from primitive events and previously defined queries. We propose using Petri nets as both representation and recognition methods. The Petri net representation for users' queries is derived automatically from simpler event nets. Recognition is then performed by tokens moving through the Petri nets. %B Second IEEEWorkshop on Event Mining 2004, CVPR2004 %P 112 - 112 %8 2004/// %G eng %0 Journal Article %J Proceedings of the 4th International Conference on Language Resources and Evaluation (LREC) Workshop on Building Lexical Resources from Semantically Annotated Corpora %D 2004 %T Semantic annotation and lexico-syntactic paraphrase %A Dorr, Bonnie J %A Green,R. %A Levin,L. %A Rambow,O. %A Farwell,D. %A Habash,N. %A Helmreich,S. %A Hovy,E. %A Miller,K.J. %A Mitamura,T. %A others %X The IAMTC project (Interlingual Annotation of Multilingual Translation Corpora) is developing an interlingual representation frameworkfor annotation of parallel corpora (English paired with Arabic, French, Hindi, Japanese, Korean, and Spanish) with deep-semantic representations. In particular, we are investigating meaning equivalent paraphrases involving conversives and non-literal language use, as well as extended paraphrases involving syntax, lexicon, and grammatical features. The interlingua representation has three levels of depth. Each level is characterized by the types of meaning equivalent paraphrases that receive identical representations at that level. %B Proceedings of the 4th International Conference on Language Resources and Evaluation (LREC) Workshop on Building Lexical Resources from Semantically Annotated Corpora %P 47 - 52 %8 2004/// %G eng %0 Journal Article %J Behaviour & Information Technology %D 2004 %T SlideBar: Analysis of a linear input device %A Chipman,L.E. %A Bederson, Benjamin B. %A Golbeck,J. %B Behaviour & Information Technology %V 23 %P 1 - 9 %8 2004/// %G eng %N 1 %0 Conference Paper %B Intelligent Transportation Systems, 2004. Proceedings. The 7th International IEEE Conference on %D 2004 %T A spherical microphone array system for traffic scene analysis %A Zhiyun Li %A Duraiswami, Ramani %A Grassi,E. %A Davis, Larry S. %K -6 %K 3D %K analysis; %K array %K arrays; %K audio; %K auditory %K beamformer; %K capture; %K dB; %K environment; %K gain; %K microphone %K NOISE %K noise; %K processing; %K real %K robust %K scene %K signal %K spherical %K system; %K traffic %K traffic; %K virtual %K white %K World %X This paper describes a practical spherical microphone array system for traffic auditory scene capture and analysis. Our system uses 60 microphones positioned on the rigid surface of a sphere. We then propose an optimal design of a robust spherical beamformer with minimum white noise gain (WNG) of -6 dB. We test this system in a real-world traffic environment. Some preliminary simulation and experimental results are presented to demonstrate its performance. This system may also find applications in broader areas such as 3D audio, virtual environment, etc. %B Intelligent Transportation Systems, 2004. Proceedings. The 7th International IEEE Conference on %P 338 - 342 %8 2004/10// %G eng %R 10.1109/ITSC.2004.1398921 %0 Conference Paper %D 2004 %T A STEP TOWARDS AUTOMATED DESIGN OF INDEX-PLATE MULTI-SHOT MOLDS %A Li,X. %A Gupta,S.K. %X This paper describes an algorithm for automateddesign of index-plate type of multi-shot molds for manufacturing multi-material objects. This new algorithm is a significant improvement over previous mold design algorithms and it accounts for constraints associated with the index-plate molding process. Our algorithm works in the following manner. First, based on the index-plate process constraints, we determine whether the given multi-material object is moldable by index- plate process by analyzing the geometry of the object. If the object can be molded, then the molding sequence is determined. Finally, the mold pieces. We expect that the algorithm described in this paper will provide the necessary foundations for automating the design of index-plate molds and therefore will help in significantly reducing the mold manufacturing lead-time associated with this type of molds. %C Lausanne, Switzerland %8 2004/04// %G eng %U http://www.glue.umd.edu/~skgupta/Publication/TMCE04_Li.pdf %0 Journal Article %J Tools And Methods Of Competitive Engineering %D 2004 %T A STEP TOWARDS INTEGRATED PRODUCT/PROCESS DEVELOPMENT OF MOLDED MULTI-MATERIAL STRUCTURES %A Gupta,S.K. %A Fowler,G. %X Multi-material molding is emerging as a popularmethod for making multi-material structures. In multi-material molding processes, fabrication and assembly steps are performed concurrently inside the mold. Therefore using existing knowledge on how to design molded products often results in the selection of wrong design alternatives and correcting these mistakes unnecessarily delays the product development process. To overcome this difficulty we need to develop an integrated product/process development methodology for designing molded multi-material structures. This paper presents an overview of different multi-material molding technologies and the role of manufacturing considerations in shape synthesis of molded multi- material structures. %B Tools And Methods Of Competitive Engineering %8 2004/// %G eng %U http://terpconnect.umd.edu/~skgupta/Publication/TMCE04_Gupta.pdf %0 Journal Article %J Computer Vision-ECCV 2004 %D 2004 %T Structure of applicable surfaces from single views %A Gumerov, Nail A. %A Zandifar,A. %A Duraiswami, Ramani %A Davis, Larry S. %X The deformation of applicable surfaces such as sheets of paper satisfies the differential geometric constraints of isometry (lengths and areas are conserved) and vanishing Gaussian curvature. We show that these constraints lead to a closed set of equations that allow recovery of the full geometric structure from a single image of the surface and knowledge of its undeformed shape. We show that these partial differential equations can be reduced to the Hopf equation that arises in non-linear wave propagation, and deformations of the paper can be interpreted in terms of the characteristics of this equation. A new exact integration of these equations is developed that relates the 3-D structure of the applicable surface to an image. The solution is tested by comparison with particular exact solutions. We present results for both the forward and the inverse 3D structure recovery problem. %B Computer Vision-ECCV 2004 %P 482 - 496 %8 2004/// %G eng %0 Journal Article %J Applied Computational Electromagnetics Society journal %D 2004 %T TM Electromagnetic Scattering from 2D Multilayered Dielectric Bodies-Numerical Solution %A Duraiswami, Ramani %A Seydou,F. %A Gumerov, Nail A. %X An integral equation approach is derived for an electromagnetic scattering from an M arbitrary multilayereddielectric domain. The integral equation is valid for the 2D and 3D Helmholtz equation. Here we show the numerical solution for the 2D case by using the Nyström method. For validating the method we develop a mode matching method for the case when the domains are multilayered circular cylinders and give numerical results for illustrating the algorithm. %B Applied Computational Electromagnetics Society journal %P 100 - 107 %8 2004/// %G eng %N 2 %0 Journal Article %J Software Engineering, IEEE Transactions on %D 2004 %T Toolkit design for interactive structured graphics %A Bederson, Benjamin B. %A Grosjean,J. %A Meyer,J. %B Software Engineering, IEEE Transactions on %V 30 %P 535 - 546 %8 2004/// %G eng %N 8 %0 Journal Article %J Computers in Entertainment (CIE) %D 2004 %T Tools for children to create physical interactive storyrooms %A Montemayor,J. %A Druin, Allison %A Chipman,G. %A Farber,A. %A Guha,M.L. %B Computers in Entertainment (CIE) %V 2 %P 12 - 12 %8 2004/// %G eng %N 1 %0 Journal Article %J Artificial Intelligence in Medicine %D 2004 %T Understanding tuberculosis epidemiology using structured statistical models %A Getoor, Lise %A Rhee,Jeanne T %A Koller,Daphne %A Small,Peter %K Bayesian networks %K epidemiology %K Probabilistic and statistical relational models %K Tuberculosis %X Molecular epidemiological studies can provide novel insights into the transmission of infectious diseases such as tuberculosis. Typically, risk factors for transmission are identified using traditional hypothesis-driven statistical methods such as logistic regression. However, limitations become apparent in these approaches as the scope of these studies expand to include additional epidemiological and bacterial genomic data. Here we examine the use of Bayesian models to analyze tuberculosis epidemiology. We begin by exploring the use of Bayesian networks (BNs) to identify the distribution of tuberculosis patient attributes (including demographic and clinical attributes). Using existing algorithms for constructing BNs from observational data, we learned a BN from data about tuberculosis patients collected in San Francisco from 1991 to 1999. We verified that the resulting probabilistic models did in fact capture known statistical relationships. Next, we examine the use of newly introduced methods for representing and automatically constructing probabilistic models in structured domains. We use statistical relational models (SRMs) to model distributions over relational domains. SRMs are ideally suited to richly structured epidemiological data. We use a data-driven method to construct a statistical relational model directly from data stored in a relational database. The resulting model reveals the relationships between variables in the data and describes their distribution. We applied this procedure to the data on tuberculosis patients in San Francisco from 1991 to 1999, their Mycobacterium tuberculosis strains, and data on contact investigations. The resulting statistical relational model corroborated previously reported findings and revealed several novel associations. These models illustrate the potential for this approach to reveal relationships within richly structured data that may not be apparent using conventional statistical approaches. We show that Bayesian methods, in particular statistical relational models, are an important tool for understanding infectious disease epidemiology. %B Artificial Intelligence in Medicine %V 30 %P 233 - 256 %8 2004/03// %@ 0933-3657 %G eng %U http://www.sciencedirect.com/science/article/pii/S0933365703001337 %N 3 %R 10.1016/j.artmed.2003.11.003 %0 Conference Paper %B Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics %D 2004 %T Unsupervised sense disambiguation using bilingual probabilistic models %A Bhattacharya,Indrajit %A Getoor, Lise %A Bengio,Yoshua %X We describe two probabilistic models for unsupervised word-sense disambiguation using parallel corpora. The first model, which we call the Sense model, builds on the work of Diab and Resnik (2002) that uses both parallel text and a sense inventory for the target language, and recasts their approach in a probabilistic framework. The second model, which we call the Concept model, is a hierarchical model that uses a concept latent variable to relate different language specific sense labels. We show that both models improve performance on the word sense disambiguation task over previous unsupervised approaches, with the Concept model showing the largest improvement. Furthermore, in learning the Concept model, as a by-product, we learn a sense inventory for the parallel language. %B Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics %S ACL '04 %I Association for Computational Linguistics %C Stroudsburg, PA, USA %8 2004/// %G eng %U http://dx.doi.org/10.3115/1218955.1218992 %R 10.3115/1218955.1218992 %0 Conference Paper %B Proceedings of the 2004 ACM SIGMOD international conference on Management of data %D 2004 %T Using the structure of Web sites for automatic segmentation of tables %A Lerman,Kristina %A Getoor, Lise %A Minton,Steven %A Knoblock,Craig %X Many Web sites, especially those that dynamically generate HTML pages to display the results of a user's query, present information in the form of list or tables. Current tools that allow applications to programmatically extract this information rely heavily on user input, often in the form of labeled extracted records. The sheer size and rate of growth of the Web make any solution that relies primarily on user input is infeasible in the long term. Fortunately, many Web sites contain much explicit and implicit structure, both in layout and content, that we can exploit for the purpose of information extraction. This paper describes an approach to automatic extraction and segmentation of records from Web tables. Automatic methods do not require any user input, but rely solely on the layout and content of the Web source. Our approach relies on the common structure of many Web sites, which present information as a list or a table, with a link in each entry leading to a detail page containing additional information about that item. We describe two algorithms that use redundancies in the content of table and detail pages to aid in information extraction. The first algorithm encodes additional information provided by detail pages as constraints and finds the segmentation by solving a constraint satisfaction problem. The second algorithm uses probabilistic inference to find the record segmentation. We show how each approach can exploit the web site structure in a general, domain-independent manner, and we demonstrate the effectiveness of each algorithm on a set of twelve Web sites. %B Proceedings of the 2004 ACM SIGMOD international conference on Management of data %S SIGMOD '04 %I ACM %C New York, NY, USA %P 119 - 130 %8 2004/// %@ 1-58113-859-8 %G eng %U http://doi.acm.org/10.1145/1007568.1007584 %R 10.1145/1007568.1007584 %0 Conference Paper %B Proceedings of the 2004 OOPSLA workshop on eclipse technology eXchange %D 2004 %T Visualizing type qualifier inference with Eclipse %A Greenfieldboyce,D. %A Foster, Jeffrey S. %B Proceedings of the 2004 OOPSLA workshop on eclipse technology eXchange %P 57 - 61 %8 2004/// %G eng %0 Journal Article %J Web Engineering %D 2004 %T Wide area performance monitoring using aggregate latency profiles %A Zadorozhny,V. %A Gal,A. %A Raschid, Louiqa %A Ye,Q. %B Web Engineering %P 771 - 775 %8 2004/// %G eng %0 Journal Article %J SIGKDD Explor. Newsl. %D 2004 %T A workshop report: mining for and from the Semantic Web at KDD 2004 %A Hotho,Andreas %A Sure,York %A Getoor, Lise %X The international workshop on Mining for and from the Semantic Web (MSW) at the KDD 2004 successfully brought together people from the communities Semantic Web and Knowledge Discovery. The goal of the workshop was to strengthen the communication and interaction between these communities as there is currently an agreement that both can benefit largely from each other. Overall the contributions and discussions showed that today mining for the semantic web is the primarily targeted research area. However, with a growing amount of available semantic web data also mining from the semantic web will be more prominent. %B SIGKDD Explor. Newsl. %V 6 %P 142 - 143 %8 2004/12// %@ 1931-0145 %G eng %U http://doi.acm.org/10.1145/1046456.1046482 %N 2 %R 10.1145/1046456.1046482 %0 Book %D 2003 %T 19th Biennial Conference on Mechanical Vibration and Noise %A Gupta,A. K. %A Fadel,G. M. %A Lewicki,D. G. %A Shabana,A. A. %A Royston,T. J. %A Gupta,S.K. %A Hayes,C. %A Herrmann,J.W. %A Dym,C. L. %A Schmidt,L. C. %I American Society of Mechanical Engineers %8 2003/// %G eng %0 Journal Article %J University of Maryland Technical Report, HCIL-2003 %D 2003 %T Accuracy, Target Reentry and Fitts’ Law Performance of Preschool Children Using Mice %A Hourcade,J. P %A Bederson, Benjamin B. %A Druin, Allison %A Guimbretiere,F. %B University of Maryland Technical Report, HCIL-2003 %V 16 %8 2003/// %G eng %0 Journal Article %J The Journal of the Acoustical Society of America %D 2003 %T Acoustical scattering from N spheres using a multilevel fast multipole method %A Gumerov, Nail A. %A Duraiswami, Ramani %X We develop an efficient computational method for wave scattering from a large number of spherical objects that are characterized by their radii, locations, and complex acoustical impedances of the surfaces. The direct T‐matrix method for solution of the problem that was developed and tested in [Gumerov and Duraiswami, J. Acoust. Soc. Am. 112, 2688–2701 (2002)] is inefficient for computations involving a large number of scatterers. Here, we implement and test a multilevel fast multipole method for speeding up the solution and achieving better memory complexity. The method is based on hierarchical space subdivision with oct‐trees using optimal space‐partitioning, on a theory for fast translation and re‐expansion of multipole solutions of the Helmholtz equation, and employs an iterative technique for the solution of large dense systems of linear equations with reflection‐based iterations. For N scatterers the method provides O(N
1. We give a general definition of the problem as the task of covering a target region without interfering with anobstruction region. This definition encompasses the task of milling a general 2-D profile that includes bothopen and closed edges.
2. We discuss three alternative definitions of what it means for a cutter to be feasible, and explain which of thesedefinitions is most appropriate for the above problem.
3. We present a geometric algorithm for finding the maximal cutter for 2-D milling operations, and we show thatour algorithm is correct. %I Institute for Systems Research, University of Maryland, College Park %V ISR; TR 2000-40 %8 2000/// %G eng %U http://drum.lib.umd.edu//handle/1903/6137 %0 Conference Paper %D 2000 %T A geometric algorithm for finding the maximal cutter for 2-D milling operations %A Yao,Z. %A Gupta,S.K. %A Nau, Dana S. %X In this paper, we present a geometric algorithm of finding the maximal cutter for 2-Dmilling operations. Our algorithm works not only for the common closed pocket problem, but also for the general 2-D milling problems with open edges. We define the general 2-D milling process in terms of a “target region” to be machined and an “obstruction region” that should not intersect with the cutter during machining. Our algorithm finds the largest cutter that can cover the target region without interfering with the obstruction region. Finding the biggest cutter is expected to help in the selection of the right sets of tools and the right type of cutter trajectories, and thereby ensure high production rate and meet the required quality level. %P 26 - 28 %8 2000/// %G eng %U http://www.cs.umd.edu/~nau/papers/yao2000geometric.pdf %0 Report %D 2000 %T A Geometric Algorithm for Multi-Part Milling Cutter Selection %A Yao,Zhiyang %A Gupta, Satyandra K. %A Nau, Dana S. %K algorithms %K computer aided manufacturing CAM %K cutter selection %K Manufacturing %K multi-part process planning %K Next-Generation Product Realization Systems %K OPTIMIZATION %X Mass customization results in smaller batch sizes in manufacturing that require large numbers of setup and tool changes. The traditional process planning that generates plans for one part at a time is no longer applicable.
In this paper, we propose the idea of process planning for small batch manufacturing, i.e., we simultaneously consider multiple parts and exploit opportunities for sharing manufacturing resources such that the process plan will be optimized over the entire set of parts. In particular, we discuss a geometric algorithm for multiple part cutter selection in 2-1/2D milling operations.
We define the 2-1/2D milling operations as covering the target region without intersecting with the obstruction region. This definition allows us to handle the open edge problem. Based on this definition, we first discuss the lower and upper bond of cutter sizes that are feasible for given parts. Then we introduce the geometric algorithm to find the coverable area for a given cutter. Following that, we discuss the approach of considering cutter loading time and changing time in multiple cutter selection for multiple parts. We represent the cutter selection problem as shortest path problem and use Dijkstra's algorithm to solve it. By using this algorithm, a set of cutters is selected to achieve the optimum machining cost for multiple parts.
Our research illustrates the multiple parts process planning approach that is suitable for small batch manufacturing. At the same time, the algorithm given in this paper clarifies the 2-1/2D milling problem and can also help in cutter path planning problem. %I Institute for Systems Research, University of Maryland, College Park %V ISR; TR 2000-42 %8 2000/// %G eng %U http://drum.lib.umd.edu//handle/1903/6139 %0 Conference Paper %B Geoscience and Remote Sensing Symposium, 2000. Proceedings. IGARSS 2000. IEEE 2000 International %D 2000 %T Geo-registration of Landsat data by robust matching of wavelet features %A Le Moigne,J. %A Netanyahu,N. S %A Masek,J. G %A Mount, Dave %A Goward,S. %A Honzak,M. %K atmospheric techniques %K automated mass processing/analysis system %K chip-window pair %K cloud shadows %K Clouds %K Feature extraction %K feature matching %K geo-registration %K geometrically corrected scene %K geophysical signal processing %K Image matching %K image registration %K landmark chips %K Landsat chips %K Landsat data %K Landsat-5 data %K Landsat-7 data %K overcomplete wavelet representation %K pre-processed scenes %K radiometrically corrected scene %K REALM %K Remote sensing %K robust matching %K robust wavelet feature matching %K scenes %K statistically robust techniques %K sub-pixel accuracy registration %K wavelet features %K Wavelet transforms %K window %X The goal of our project is to build an operational system, which will provide a sub-pixel accuracy registration of Landsat-5 and Landsat-7 data. Integrated within an automated mass processing/analysis system for Landsat data (REALM), the input to our registration method consists of scenes that have been geometrically and radiometrically corrected, as well as pre-processed for the detection of clouds and cloud shadows. Such pre-processed scenes are then geo-registered relative to a database of Landsat chips. This paper describes our registration process, including the use of a database of landmark chips, a feature extraction performed by an overcomplete wavelet representation, and feature matching using statistically robust techniques. Knowing the approximate longitudes and latitudes of the four corners of the scene, a subset of chips which represent landmarks included in the scene are extracted from the database. For each of these selected landmark chips, a corresponding window is extracted from the scene, and each chip-window pair is registered using our robust wavelet feature matching. First results and future directions are presented in the paper %B Geoscience and Remote Sensing Symposium, 2000. Proceedings. IGARSS 2000. IEEE 2000 International %V 4 %P 1610 -1612 vol.4 - 1610 -1612 vol.4 %8 2000/// %G eng %R 10.1109/IGARSS.2000.857287 %0 Journal Article %J Inverse Problems %D 2000 %T An inverse method for the acoustic detection, localization and determination of the shape evolution of a bubble %A Gumerov, Nail A. %A Chahine,G. L %B Inverse Problems %V 16 %P 1741 - 1741 %8 2000/// %G eng %0 Conference Paper %B Proceedings of the 13th annual ACM symposium on User interface software and technology %D 2000 %T Jazz: an extensible zoomable user interface graphics toolkit in Java %A Bederson, Benjamin B. %A Meyer,J. %A Good,L. %B Proceedings of the 13th annual ACM symposium on User interface software and technology %P 171 - 180 %8 2000/// %G eng %0 Journal Article %J Abstraction, Reformulation, and Approximation %D 2000 %T Learning probabilistic relational models %A Getoor, Lise %X My work is on learning Probabilistic Relational Models (PRMs) from structured data (e.g., data in a relational database, an object-oriented database or a frame-based system). This work has as a starting point the framework of Probabilistic Relational Models, introduced in [5, 7]. We adapt and extend the machinery that has been developed over the years for learning Bayesian networks from data [1, 4, 6] to the task of learning PRMs from structured data. At the heart of this work is a search algorithm that explores the space of legal models using search operators that abstract or refine the model. %B Abstraction, Reformulation, and Approximation %P 322 - 323 %8 2000/// %G eng %R 10.1007/3-540-44914-0_25 %0 Journal Article %J The VLDB Journal—The International Journal on Very Large Data Bases %D 2000 %T Learning response time for websources using query feedback and application in query optimization %A Gruser,J. R %A Raschid, Louiqa %A Zadorozhny,V. %A Zhan,T. %B The VLDB Journal—The International Journal on Very Large Data Bases %V 9 %P 18 - 37 %8 2000/// %G eng %N 1 %0 Journal Article %J Autonomous Agents and Multi-Agent Systems %D 2000 %T A logic for characterizing multiple bounded agents %A Grant,J. %A Kraus,S. %A Perlis, Don %B Autonomous Agents and Multi-Agent Systems %V 3 %P 351 - 387 %8 2000/// %G eng %N 4 %0 Journal Article %J IEEE Transactions on Knowledge and Data Engineering %D 2000 %T Logic-based query optimization for object databases %A Grant,J. %A Gryz,J. %A Minker, Jack %A Raschid, Louiqa %K access scope %K application domain %K class hierarchy information %K Constraint optimization %K data integrity %K Data models %K Datalog %K Datalog representation %K deductive databases %K equivalent logic query %K integrity constraints %K Lifting equipment %K Logic %K logic based query optimization %K logic programming %K logic queries %K logic query %K logical representation %K object data model %K object databases %K object queries %K object schema %K object-oriented databases %K ODL %K ODMG database schemas %K optimization technique %K optimized OQL queries %K OQL object query %K query languages %K Query optimization %K query optimization techniques %K Query processing %K Relational databases %K residue technique %K semantic knowledge %K semantic query optimization %X We present a technique for transferring query optimization techniques, developed for relational databases, into object databases. We demonstrate this technique for ODMG database schemas defined in ODL and object queries expressed in OQL. The object schema is represented using a logical representation (Datalog). Semantic knowledge about the object data model, e.g., class hierarchy information, relationship between objects, etc., as well as semantic knowledge about a particular schema and application domain are expressed as integrity constraints. An OQL object query is represented as a logic query and query optimization is performed in the Datalog representation. We obtain equivalent (optimized) logic queries, and subsequently obtain equivalent (optimized) OQL queries for each equivalent logic query. We present one optimization technique for semantic query optimization (SQO) based on the residue technique of U. Charavarthy et al. (1990; 1986; 1988). We show that our technique generalizes previous research on SQO for object databases. We handle a large class of OQL queries, including queries with constructors and methods. We demonstrate how SQO can be used to eliminate queries which contain contradictions and simplify queries, e.g., by eliminating joins, or by reducing the access scope for evaluating a query to some specific subclass(es). We also demonstrate how the definition of a method or integrity constraints describing the method, can be used in optimizing a query with a method %B IEEE Transactions on Knowledge and Data Engineering %V 12 %P 529 - 547 %8 2000/08//Jul %@ 1041-4347 %G eng %N 4 %R 10.1109/69.868906 %0 Journal Article %J Proc. IEEE Pacific RIM Conference on Multimedia, Sydney, Australia %D 2000 %T A Neural Network Approach for Predicting Network Resource Requirements in Video Transmission Systems %A Wong,H.S. %A Wu,M. %A Joyce,R.A. %A Guan,L. %A Kung, S.Y. %X Dynamic resource allocation is important for ensuring ef-ficient network utilization in Internet-based multimedia content delivery system. To allow accurate network traf- fic prediction in the case of video delivery, relevant infor- mation based on video contents and the short term traffic pattern has to be taken into account, while the inclusion of non-relevant features will deterioriate the prediction per- formance due to the "curse of dimensionality" problem. In this work, we propose a neural network-based predic- tion system and specifically address the determination of relevant input features for the system. Experiments have shown that the current system is capable of identifying a highly relevant subset of features for traffic prediction given a large number of video content and short-term net- work traffic descriptors. %B Proc. IEEE Pacific RIM Conference on Multimedia, Sydney, Australia %8 2000/// %G eng %0 Journal Article %J Solid-State Electronics %D 2000 %T Numerical simulation of small-signal microwave performance of 4H–SiC MESFET %A Huang,Mingwei %A Mayergoyz, Issak D %A Goldsman,Neil %X Small-signal high frequency characteristics of 4H–SiC MESFET has been studied by using two-dimensional numerical drift-diffusion model in frequency domain. Non-ideal Schottky boundary conditions have been introduced that take into account a thin interfacial layer and interface energy states. It has been demonstrated that the 10 dB/dec small-signal current gain roll-off can be attributed to the existence of high density interface states at the metal–semiconductor interface. It has been found that as the gate length is reduced to 0.1 μm, fT and fmax may reach as high as 30 and 62 GHz, respectively. %B Solid-State Electronics %V 44 %P 1281 - 1287 %8 2000/07/01/ %@ 0038-1101 %G eng %U http://www.sciencedirect.com/science/article/pii/S0038110100000253 %N 7 %R 10.1016/S0038-1101(00)00025-3 %0 Conference Paper %B ICPR %D 2000 %T Off-line Skilled Forgery Detection using Stroke and Substroke Features %A Guo,K. %A David Doermann %A Rosenfeld, A. %B ICPR %V 2 %P 355 - 359 %8 2000/// %G eng %0 Journal Article %J J Mol Evol %D 2000 %T Phylogenetic relationships of Acanthocephala based on analysis of 18S ribosomal RNA gene sequences %A García-Varela,M %A Pérez-Ponce de León,G. %A de la Torre,P %A Cummings, Michael P. %A Sarma,SS %A Laclette,J. P %X Acanthocephala (thorny-headed worms) is a phylum of endoparasites of vertebrates and arthropods, included among the most phylogenetically basal tripoblastic pseudocoelomates. The phylum is divided into three classes: Archiacanthocephala, Palaeacanthocephala, and Eoacanthocephala. These classes are distinguished by morphological characters such as location of lacunar canals, persistence of ligament sacs in females, number and type of cement glands in males, number and size of proboscis hooks, host taxonomy, and ecology. To understand better the phylogenetic relationships within Acanthocephala, and between Acanthocephala and Rotifera, we sequenced the nearly complete 18S rRNA genes of nine species from the three classes of Acanthocephala and four species of Rotifera from the classes Bdelloidea and Monogononta. Phylogenetic relationships were inferred by maximum-likelihood analyses of these new sequences and others previously determined. The analyses showed that Acanthocephala is the sister group to a clade including Eoacanthocephala and Palaeacanthocephala. Archiacanthocephala exhibited a slower rate of evolution at the nucleotide level, as evidenced by shorter branch lengths for the group. We found statistically significant support for the monophyly of Rotifera, represented in our analysis by species from the clade Eurotatoria, which includes the classes Bdelloidea and Monogononta. Eurotatoria also appears as the sister group to Acanthocephala. %B J Mol Evol %V 50 %P 532 - 540 %8 2000/06// %G eng %N 6 %0 Conference Paper %B Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms %D 2000 %T A point-placement strategy for conforming Delaunay tetrahedralization %A Murphy,Michael %A Mount, Dave %A Gable,Carl W. %B Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms %S SODA '00 %I Society for Industrial and Applied Mathematics %C Philadelphia, PA, USA %P 67 - 74 %8 2000/// %@ 0-89871-453-2 %G eng %U http://dl.acm.org/citation.cfm?id=338219.338236 %0 Journal Article %J Journal of the American Society for Information Science %D 2000 %T Previews and overviews in digital libraries: Designing surrogates to support visual information seeking %A Greene,Stephan %A Marchionini,Gary %A Plaisant, Catherine %A Shneiderman, Ben %X To aid designers of digital library interfaces, we present a framework for the design of information representations in terms of previews and overviews. Previews and overviews are graphic or textual representations of information abstracted from primary information objects. Previews act as surrogates for one or a few objects and overviews represent collections of objects. A design framework is elaborated in terms of the following three dimensions: (1) what information objects are available to users, (2) how information objects are related and displayed, and (3) how users can manipulate information objects. When utilized properly, previews and overviews allow users to rapidly discriminate objects of interest from those not of interest, and to more fully understand the scope and nature of digital libraries. This article presents a definition of previews and overviews in context, provides design guidelines, and describes four example applications. %B Journal of the American Society for Information Science %V 51 %P 380 - 393 %8 2000/01/01/ %@ 1097-4571 %G eng %U http://onlinelibrary.wiley.com/doi/10.1002/(SICI)1097-4571(2000)51:4%3C380::AID-ASI7%3E3.0.CO;2-5/abstract;jsessionid=E15C609DE95671E0E91A862B8AFD1CC6.d03t01 %N 4 %R 10.1002/(SICI)1097-4571(2000)51:4<380::AID-ASI7>3.0.CO;2-5 %0 Conference Paper %B Microgravity fluid physics and heat transfer: proceedings of the International Conference on Microgravity Fluid Physics and Heat Transfer held at the Tutle Bay Hilton, Oahu, Hawaii, September 19-24, 1999 %D 2000 %T Rectified Heat Transfer to Vapor Bubbles in Standing Acoustic Waves %A Gumerov, Nail A. %B Microgravity fluid physics and heat transfer: proceedings of the International Conference on Microgravity Fluid Physics and Heat Transfer held at the Tutle Bay Hilton, Oahu, Hawaii, September 19-24, 1999 %P 96 - 96 %8 2000/// %G eng %0 Journal Article %J Magnetics, IEEE Transactions on %D 2000 %T Resolution enhancement by applying MFM under UHV conditions %A Dreyer,M. %A Gomez,R.D. %A Mayergoyz, Issak D %K conditions;cantilevers;domain %K contrast;magnetic %K domain %K enhancement;Permalloy;magnetic %K enhancement;signal-to-noise %K film;perpendicular %K films;magnetisation; %K force %K magnetization;resolution %K MFM;NiFe;UHV %K microscopy;magnetic %K ratio %K resolution;magnetic %K thin %K volume;permalloy %K walls;lateral %K walls;magnetic %X The enhancement in signal-to-noise ratio and lateral resolution in MFM in going from ambient pressure to UHV is demonstrated. The performance of several cantilevers is evaluated using a patterned 50 nm thick permalloy film, with cross-tie as well as 90 deg; domain walls, and a 200 nm thick permalloy film with perpendicular magnetization. The increase in the quality factor of the cantilever oscillation in UHV improves the sensitivity, consequently allowing less magnetic material on the tip to achieve the same signal-to-noise ratio. This reduction in magnetic volume sharpens the lateral resolution. We also demonstrate that the magnetic interaction can be so weak that a magnetic contrast is visible only under UHV conditions %B Magnetics, IEEE Transactions on %V 36 %P 2975 - 2977 %8 2000/09// %@ 0018-9464 %G eng %N 5 %R 10.1109/20.908645 %0 Journal Article %J IEEE Personal Communications %D 2000 %T A Review of Current Routing Protocols for Ad Hoc %A Royer,E.M. %A Toh,C.K. %A Hicks, Michael W. %A Kakkar,P. %A Moore,J. T %A Hicks, Michael W. %A Moore,J. T %A Alexander,D. S %A Gunter,C. A %A Nettles,S. %A others %B IEEE Personal Communications %V 29 %P 156 - 71 %8 2000/// %G eng %0 Report %D 2000 %T Selecting Flat End Mills for 2-1/2D Milling Operations %A Yao,Zhiyang %A Gupta, Satyandra K. %A Nau, Dana S. %K algorithms %K computer aided manufacturing CAM %K cutter selection %K Manufacturing %K Next-Generation Product Realization Systems %X The size of milling cutter significantly affects the machining time. Therefore, in order to perform milling operations efficiently, we need to select a set of milling cutters with optimal sizes. It is difficult for human process planners to select the optimal or near optimal set of milling cutters due to complex geometric interactions among tools size, part shapes, and tool trajectories.
In this paper, we give a geometric algorithm to find the optimal cutters for 2-1/2D milling operations. We define the 2-1/2D milling operations as covering the target region without intersecting with the obstruction region. This definition allows us to handle the open edge problem. Based on this definition, we introduced the offsetting and inverse-offsetting algorithm to find the coverable area for a given cutter. Following that, we represent the cutter selection problem as shortest path problem and discuss the lower and upper bond of cutter sizes that are feasible for given parts. The Dijkstra's algorithm is used to solve the problem and thus a set of cutters is selected in order to achieve the optimum machining cost.
We believe the selection of optimum cutter combination can not only save manufacturing time but also help automatic process planning. %I Institute for Systems Research, University of Maryland, College Park %V ISR; TR 2000-41 %8 2000/// %G eng %U http://drum.lib.umd.edu//handle/1903/6138 %0 Book Section %B Abstraction, Reformulation, and Approximation %D 2000 %T Using Feature Hierarchies in Bayesian Network Learning %A desJardins, Marie %A Getoor,Lise %A Koller,Daphne %E Choueiry,Berthe %E Walsh,Toby %X In recent years, researchers in statistics and the UAI community have developed an impressive body of theory and algorithmic machinery for learning Bayesian networks from data. Learned Bayesian networks can be used for pattern discovery, prediction, diagnosis, and density estimation tasks. Early pioneering work in this area includes [ 5 , 9 , 10 , 13 ]. The algorithm that has emerged as the current most popular approach is a simple greedy hill-climbing algorithm that searches the space of candidate structures, guided by a network scoring function (either Bayesian or Minimum Description Length (MDL)-based). The search begins with an initial candidate network (typically the empty network, which has no edges), and then considers making small local changes such as adding, deleting, or reversing an edge in the network. %B Abstraction, Reformulation, and Approximation %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 1864 %P 260 - 270 %8 2000/// %@ 978-3-540-67839-7 %G eng %U http://dx.doi.org/10.1007/3-540-44914-0_16 %0 Conference Paper %B Proceedings of the fifth ACM conference on Digital libraries %D 2000 %T Visualizing digital library search results with categorical and hierarchical axes %A Shneiderman, Ben %A Feldman,David %A Rose,Anne %A Grau,Xavier Ferré %K categorical axes %K digital libraries %K Graphical user interfaces %K hierarchy %K hieraxes %K Information Visualization %X Digital library search results are usually shown as a textual list, with 10-20 items per page. Viewing several thousand search results at once on a two-dimensional display with continuous variables is a promising alternative. Since these displays can overwhelm some users, we created a simplified two-dimensional display that uses categorical and hierarchical axes, called hieraxes. Users appreciate the meaningful and limited number of terms on each hieraxis. At each grid point of the display we show a cluster of color-coded dots or a bar chart. Users see the entire result set and can then click on labels to move down a level in the hierarchy. Handling broad hierarchies and arranging for imposed hierarchies led to additional design innovations. We applied hieraxes to a digital video library of science topics used by middle school teachers, a legal information system, and a technical library using the ACM Computing Classification System. Feedback from usability testing with 32 subjects revealed strengths and weaknesses. %B Proceedings of the fifth ACM conference on Digital libraries %S DL '00 %I ACM %C New York, NY, USA %P 57 - 66 %8 2000/// %@ 1-58113-231-X %G eng %U http://doi.acm.org/10.1145/336597.336637 %R 10.1145/336597.336637 %0 Conference Paper %D 2000 %T A web-based process/material advisory system %A Chen,Y. S. %A Gupta,S.K. %A Feng,S. %X This paper describes a web-based process/material advisorysystem that can be used during conceptual design. Given a set of design requirements for a part during conceptual design stage, our system produces process sequences that can meet the design requirements. Quite often during conceptual design stage, design requirements are not precisely defined. Therefore, we allow users to describe design requirements in terms of parameter ranges. Parameter ranges are used to capture uncertainties in design requirements. Our system accounts for uncertainties in design requirements in generating and evaluating process/material combinations. Our system uses a two step algorithm. During the first step, we generate a material/process option tree. This tree represents various process/material options that can be used to meet the given set of design requirements. During the second step, we evaluate various alternative process/material options using a depth first branch and bound algorithm to identify and recommend the least expensive process/material combination to the designer. Our system can be accessed on the World Wide Web using a standard browser. Our system allows designs to consider a wide variety of process/material options during the conceptual design stage and allows them to find the most cost-effective combination. By selecting the process/material combination during the early design stages, designers can ensure that the detailed design is compatible with all of the process constraints for the selected process. %8 2000/// %G eng %U http://www.mel.nist.gov/msidlibrary/doc/imece_feng.pdf %0 Conference Paper %B Simulation of Semiconductor Processes and Devices, 1999. SISPAD '99. 1999 International Conference on %D 1999 %T Advances in spherical harmonic device modeling: calibration and nanoscale electron dynamics %A Lin,Chung-Kai %A Goldsman,N. %A Mayergoyz, Issak D %A Aronowitz,S. %A Belova,N. %K Boltzmann %K characteristics;SHBTE %K current;surface %K device %K dynamics;spherical %K electron %K equation;calibration;semiconductor %K equation;I-V %K harmonic %K model;substrate %K models;surface %K scattering; %K scattering;Boltzmann %K simulation;calibration;nanoscale %K transport %X Improvements in the Spherical Harmonic (SH) method for solving Boltzmann Transport Equation (BTE) are presented. The simulation results provide the same physical detail as analytical band Monte Carlo (MC) calculations, and are obtained approximately a thousand times faster. A new physical model for surface scattering has also been developed. As a result, the SHBTE model achieves calibration for a complete process of I-V characteristics and substrate current consistently for the first time %B Simulation of Semiconductor Processes and Devices, 1999. SISPAD '99. 1999 International Conference on %P 167 - 170 %8 1999/// %G eng %R 10.1109/SISPAD.1999.799287 %0 Thesis %D 1999 %T An architecture and implementation for a cooperative database system %A Godfrey,P. %A Minker, Jack %I University of Maryland at College Park %8 1999/// %G eng %0 Conference Paper %B ICDAR %D 1999 %T ARobust Method for Unknown Forms Analysis %A Xingyuan,L. %A David Doermann %A Oh,W. %A Gao,W. %B ICDAR %P 531 - 534 %8 1999/// %G eng %0 Conference Paper %D 1999 %T Automated punch shape synthesis for sheet metal bending operations %A Alva,U. %A Gupta,S.K. %8 1999/// %G eng %0 Conference Paper %B Proceedings of the 1998 conference on Advances in neural information processing systems II %D 1999 %T Classification in non-metric spaces %A Weinshall,Daphna %A Jacobs, David W. %A Gdalyahu,Yoram %B Proceedings of the 1998 conference on Advances in neural information processing systems II %I MIT Press %C Cambridge, MA, USA %P 838 - 844 %8 1999/// %@ 0-262-11245-0 %G eng %U http://dl.acm.org/citation.cfm?id=340534.340816 %0 Journal Article %J Proceedings of the 7th International Workshop on Artificial Intelligence and Statistics (AISTATS-99) %D 1999 %T Efficient learning using constrained sufficient statistics %A Friedman,N. %A Getoor, Lise %X Learning Bayesian networks is a central prob-lem for pattern recognition, density estima- tion and classification. In this paper, we propose a new method for speeding up the computational process of learning Bayesian network structure. This approach uses con- straints imposed by the statistics already col- lected from the data to guide the learning al- gorithm. This allows us to reduce the num- ber of statistics collected during learning and thus speed up the learning time. We show that our method is capable of learning struc- ture from data more efficiently than tradi- tional approaches. Our technique is of partic- ular importance when the size of the datasets is large or when learning from incomplete data. The basic technique that we introduce is general and can be used to improve learn- ing performance in many settings where suf- ficient statistics must be computed. In ad- dition, our technique may be useful for al- ternate search strategies such as branch and bound algorithms. %B Proceedings of the 7th International Workshop on Artificial Intelligence and Statistics (AISTATS-99) %8 1999/// %G eng %0 Conference Paper %B Proceedings of the fifteenth annual symposium on Computational geometry %D 1999 %T Efficient perspective-accurate silhouette computation %A Barequet,G. %A Duncan,C. A %A Goodrich,M. T %A Kumar,S. %A Pop, Mihai %B Proceedings of the fifteenth annual symposium on Computational geometry %S SCG '99 %I ACM %C New York, NY, USA %P 417 - 418 %8 1999/// %@ 1-58113-068-6 %G eng %U http://doi.acm.org/10.1145/304893.304999 %R 10.1145/304893.304999 %0 Journal Article %J International Journal on Digital Libraries %D 1999 %T The end of zero-hit queries: query previews for NASA’s Global Change Master Directory %A Greene,Stephan %A Tanin,Egemen %A Plaisant, Catherine %A Shneiderman, Ben %A Olsen,Lola %A Major,Gene %A Johns,Steve %X The Human-Computer Interaction Laboratory (HCIL) of the University of Maryland and NASA have collaborated over three years to refine and apply user interface research concepts developed at HCIL in order to improve the usability of NASA data services. The research focused on dynamic query user interfaces, visualization, and overview + preview designs. An operational prototype, using query previews, was implemented with NASA’s Global Change Master Directory (GCMD), a directory service for earth science datasets. Users can see the histogram of the data distribution over several attributes and choose among attribute values. A result bar shows the cardinality of the result set, thereby preventing users from submitting queries that would have zero hits. Our experience confirmed the importance of metadata accuracy and completeness. The query preview interfaces make visible the problems or gaps in the metadata that are undetectable with classic form fill-in interfaces. This could be seen as a problem, but we think that it will have a long-term beneficial effect on the quality of the metadata as data providers will be compelled to produce more complete and accurate metadata. The adaptation of the research prototype to the NASA data required revised data structures and algorithms. %B International Journal on Digital Libraries %V 2 %P 79 - 90 %8 1999/// %@ 1432-5012 %G eng %U http://dx.doi.org/10.1007/s007990050039 %N 2 %0 Conference Paper %B Simulation of Semiconductor Processes and Devices, 1999. SISPAD '99. 1999 International Conference on %D 1999 %T Gate leakage current simulation by Boltzmann transport equation and its dependence on the gate oxide thickness %A Han,Zhiyi %A Lin,Chung-Kai %A Goldsman,N. %A Mayergoyz, Issak D %A Yu,S. %A Stettler,M. %K 30 %K angstrom;60 %K angstrom;Boltzmann %K Bias %K calculations;leakage %K charges;spherical %K component;tunneling %K current %K currents;semiconductor %K dependence;method %K dependence;MOSFET;barrier %K device %K effect;distribution %K equation;DC %K equation;MOSFET;WKB %K function;first %K harmonic %K image %K leakage %K lowering %K method %K method;gate %K model;thermionic %K models;tunnelling; %K of %K oxide %K principle %K probability;Boltzmann %K simulation;gate %K thickness %K transport %K WKB %X As device dimensions shrink toward 0.1 mu;m, gate oxides are becoming so thin that MOSFET gate leakage current and oxide degradation are becoming limiting issues. We provide a more rigorous way to calculate gate leakage current. To achieve this we build upon the Spherical Harmonic Method of modeling, which deterministically solves the Boltzmann equation for an entire device. The method gives the distribution function and is 1000 times faster than MC. Once the distribution function is calculated, the tunneling probability is derived from the first principle WKB method. The barrier lowering effect is accounted for by the method of image charges. We calculate gate leakage current as a function of DC bias. The thermionic and tunneling components are compared at different DC bias points. The dependence of gate leakage current on gate oxide thickness is simulated %B Simulation of Semiconductor Processes and Devices, 1999. SISPAD '99. 1999 International Conference on %P 247 - 250 %8 1999/// %G eng %R 10.1109/SISPAD.1999.799307 %0 Journal Article %J IEEE Computer Graphics and Applications %D 1999 %T Human-centered computing, online communities, and virtual environments %A Brown,J. R %A van Dam,A. %A Earnshaw,R. %A Encarnacao,J. %A Guedj,R. %A Preece,J. %A Shneiderman, Ben %A Vince,J. %K Books %K Collaboration %K Collaborative work %K Conferences %K EC/NSF joint Advanced Research Workshop %K Feeds %K Human computer interaction %K human-centered computing %K Internet %K Joining materials %K Laboratories %K Online communities %K Research initiatives %K USA Councils %K User interfaces %K Virtual environment %K virtual environments %K Virtual reality %X This report summarizes results of the first EC/NSF joint Advanced Research Workshop, which identified key research challenges and opportunities in information technology. The group agreed that the first joint research workshop should concentrate on the themes of human-centered computing and VEs. Human-centered computing is perceived as an area of strategic importance because of the move towards greater decentralization and decomposition in the location and provision of computation. The area of VEs is one where increased collaboration should speed progress in solving some of the more intractable problems in building effective applications %B IEEE Computer Graphics and Applications %V 19 %P 70 - 74 %8 1999/12//Nov %@ 0272-1716 %G eng %N 6 %R 10.1109/38.799742 %0 Journal Article %J Information and Computation %D 1999 %T Improved Methods for Approximating Node Weighted Steiner Trees and Connected Dominating Sets %A Guha,Sudipto %A Khuller, Samir %X In this paper we study the Steiner tree problem in graphs for the case when vertices as well as edges have weights associated with them. A greedy approximation algorithm based on “spider decompositions” was developed by Klein and Ravi for this problem. This algorithm provides a worst case approximation ratio of 2 ln k, wherekis the number of terminals. However, the best known lower bound on the approximation ratio is (1−o(1)) ln k, assuming thatNP⊈DTIME[nO(log log n)], by a reduction from set cover. We show that for the unweighted case we can obtain an approximation factor of ln k. For the weighted case we develop a new decomposition theorem and generalize the notion of “spiders” to “branch-spiders” that are used to design a new algorithm with a worst case approximation factor of 1.5 ln k. We then generalize the method to yield an approximation factor of (1.35+ε) ln k, for any constantε>0. These algorithms, although polynomial, are not very practical due to their high running time, since we need to repeatedly find many minimum weight matchings in each iteration. We also develop a simple greedy algorithm that is practical and has a worst case approximation factor of 1.6103 ln k. The techniques developed for this algorithm imply a method of approximating node weighted network design problems defined by 0–1 proper functions as well. These new ideas also lead to improved approximation guarantees for the problem of finding a minimum node weighted connected dominating set. The previous best approximation guarantee for this problem was 3 ln nby Guha and Khuller. By a direct application of the methods developed in this paper we are able to develop an algorithm with an approximation factor of (1.35+ε) ln nfor any fixedε>0. %B Information and Computation %V 150 %P 57 - 74 %8 1999/04/10/ %@ 0890-5401 %G eng %U http://www.sciencedirect.com/science/article/pii/S0890540198927547 %N 1 %R 10.1006/inco.1998.2754 %0 Journal Article %J International Joint Conference on Artificial Intelligence %D 1999 %T Learning probabilistic relational models %A Friedman,N. %A Getoor, Lise %A Koller,D. %A Pfeffer,A. %X A large portion of real-world data is stored in com-mercial relational database systems. In contrast, most statistical learning methods work only with “flat” data representations. Thus, to apply these methods, we are forced to convert our data into a flat form, thereby losing much of the relational structure present in our database. This paper builds on the recent work on probabilistic relational mod- els (PRMs), and describes how to learn them from databases. PRMs allow the properties of an object to depend probabilistically both on other proper- ties of that object and on properties of related ob- jects. Although PRMs are significantly more ex- pressive than standard models, such as Bayesian networks, we show how to extend well-known sta- tistical methods for learning Bayesian networks to learn these models. We describe both parameter estimation and structure learning — the automatic induction of the dependency structure in a model. Moreover, we show how the learning procedure can exploit standard database retrieval techniques for efficient learning from large datasets. We present experimental results on both real and synthetic re- lational databases. %B International Joint Conference on Artificial Intelligence %V 16 %P 1300 - 1309 %8 1999/// %G eng %0 Journal Article %J ACM Transactions on Programming Languages and SystemsACM Trans. Program. Lang. Syst. %D 1999 %T Model-checking concurrent systems with unbounded integer variables: symbolic representations, approximations, and experimental results %A Bultan,Tevfik %A Gerber,Richard %A Pugh, William %B ACM Transactions on Programming Languages and SystemsACM Trans. Program. Lang. Syst. %V 21 %P 747 - 789 %8 1999/07// %@ 01640925 %G eng %U http://dl.acm.org/citation.cfm?id=325480 %N 4 %R 10.1145/325478.325480 %0 Journal Article %J Proceedings of the National Academy of Sciences of the United States of America %D 1999 %T More surprises from Kinetoplastida %A Donelson,J. E %A Gardner,M. J %A El‐Sayed, Najib M. %B Proceedings of the National Academy of Sciences of the United States of America %V 96 %P 2579 - 2579 %8 1999/// %G eng %N 6 %0 Journal Article %J SPIE Photonics East’99 %D 1999 %T Multi-level data hiding for digital image and video %A Wu,M. %A Yu,H. %A Gelman,A. %X Previous works on data hiding generally targeted on a specific tradeoff between capacity and robustness. This results inoverestimation of the processing noise under some situations and/or underestimation under some other situations, hence limits the overall performance. In this paper, we propose a multi-level data hiding scheme which is able to convey secondary data in high rate when noise is not severe and can also convey some data reliably under heavy distortion. The proposed scheme is motivated by a two-category classification of embedding schemes and by a study on detection performance of spread spectrum watermarking. The multi-level data hiding has been successfully applied to both digital image and video, and can be used for applications such as copy control. %B SPIE Photonics East’99 %8 1999/// %G eng %0 Journal Article %J Components and Packaging Technologies, IEEE Transactions on %D 1999 %T Nano-to-millimeter scale integrated systems %A Last,H.R. %A Deeds,M. %A Garvick,D. %A Kavetsky,R. %A Sandborn,P. A. %A Magrab,E. B. %A Gupta,S.K. %K fabrication technology %K In2m %K integrated nano to millimeter system %K micromechanical devices %K nanotechnology %X Over the last several years various industries have been developing nano, micro, and millimeter scale technologies, which have resulted in components ranging from quantum transistors, to widely commercialized integrated circuits, to microelectromechanical sensors. A common emphasis of these fabrication industries has been on the integration of different functions in miniaturized systems; however, the technology currently used to realize these systems is monolithic. A unique class of hybrid technology systems is Integrated nano to millimeter (In2m) systems. An In2m system typically has components spanning multiple sizes, diverse technology domains, and mixtures of electrical, mechanical, thermal, chemical, fluidic, and biological functions %B Components and Packaging Technologies, IEEE Transactions on %V 22 %P 338 - 343 %8 1999/06// %@ 1521-3331 %G eng %N 2 %R 10.1109/6144.774758 %0 Book Section %B Internet Programming LanguagesInternet Programming Languages %D 1999 %T Network Programming Using PLAN %A Hicks, Michael W. %A Kakkar,Pankaj %A Moore,Jonathan %A Gunter,Carl %A Nettles,Scott %E Bal,Henri %E Belkhouche,Boumediene %E Cardelli,Luca %X We present here a methodology for programming active networks in the environment defined by our new language PLAN (Packet Language for Active Networks). This environment presumes a two-level architecture consisting of: 1. active packets carrying PLAN code; and 2. downloadable, node-resident services written in more general-purpose languages. We present several examples which illustrate how these two features can be combined to implement various network functions. %B Internet Programming LanguagesInternet Programming Languages %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 1686 %P 127 - 143 %8 1999/// %@ 978-3-540-66673-8 %G eng %U http://dx.doi.org/10.1007/3-540-47959-7_7 %0 Journal Article %J Progress in brain research %D 1999 %T Penumbral tissue damage following acute stroke: a computational investigation %A Ruppin,E. %A Revett,K. %A Ofer,E. %A Goodall,S. %A Reggia, James A. %B Progress in brain research %V 121 %P 243 - 260 %8 1999/// %G eng %0 Book %D 1999 %T Perceptual Organization in Computer Vision %A Boyer,K.L. %A Sarkar,S. %A Feldman,J. %A Granlund,G. %A Horaud,R. %A Hutchinson,S. %A Jacobs, David W. %A Kak,A. %A Lowe,D. %A Malik,J. %I Academic Press %8 1999/// %G eng %0 Journal Article %J ACM SIGPLAN NOTICES %D 1999 %T PLAN: A programming language for active networks %A Hicks, Michael W. %A Kakkar,P. %A Moore,J. T %A Gunter,C. A %A Nettles,S. %X PLAN (Programming Language for Active Networks) is anew language for programs that are carried in the packets of a programmable network. PLAN programs replace the packet headers (which can be viewed as `dumb' programs) used in current networks. As a header replacement, PLAN programs must be lightweight and of limited functionality. These limitations are mitigated by allowing PLAN code to call service routines written in other, more powerful lan- guages. These service routines may also be loaded into the routers dynamically. This two-level architecture, in which PLAN serves as a scripting or `glue' language for more gen- eral services, is the primary contribution of the paper. PLAN is a strict functional language providing a limited set of primitives and datatypes. PLAN de nes primitives for remotely executing PLAN programs on other nodes, and these primitives are used to provide basic data transport in the network. Because remote execution makes debugging di cult, PLAN provides strong static guarantees to the pro- grammer, such as type safety. A more novel property aimed at protecting network availability is a guarantee that PLAN programs use a bounded amount of space and time on active routers and bandwidth in the network. %B ACM SIGPLAN NOTICES %V 34 %P 86 - 93 %8 1999/// %G eng %0 Conference Paper %B IEEE INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings %D 1999 %T PLANet: an active internetwork %A Hicks, Michael W. %A Moore,J. T %A Alexander,D. S %A Gunter,C. A %A Nettles,S. M %K 100 Mbit/s %K 300 MHz %K 48 Mbit/s %K active internetwork %K active network architecture %K active network implementation %K byte-code-interpreted applications %K Computer architecture %K Computer languages %K Computer networks %K congested conditions %K dynamic programming %K dynamic router extensions %K Ethernet %K Ethernet networks %K INFORMATION SCIENCE %K Internet %K Internet-like services %K internetworking %K IP %K IP networks %K link layers %K Linux user-space applications %K Local area networks %K ML dialect %K Network performance %K networking operations %K OCaml %K Packet Language for Active Networks %K packet programs %K packet switching %K Pentium-II %K performance %K performance evaluation %K PLAN %K PLANet %K Planets %K programmability features %K programming languages %K router functionality %K special purpose programming language %K Switches %K telecommunication network routing %K Transport protocols %K Web and internet services %X We present PLANet: an active network architecture and implementation. In addition to a standard suite of Internet-like services, PLANet has two key programmability features: (1) all packets contain programs; and (2) router functionality may be extended dynamically. Packet programs are written in our special purpose programming language PLAN, the Packet Language for Active Networks, while dynamic router extensions are written in OCaml, a dialect of ML. Currently, PLANet routers run as byte-code-interpreted Linux user-space applications, and support Ethernet and IP as link layers. PLANet achieves respectable performance on standard networking operations: on 300 MHz Pentium-II's attached to 100 Mbps Ethernet, PLANet can route 48 Mbps and switch over 5000 packets per second. We demonstrate the utility of PLANet's activeness by showing experimentally how it can nontrivially improve application and aggregate network performance in congested conditions %B IEEE INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings %I IEEE %V 3 %P 1124-1133 vol.3 - 1124-1133 vol.3 %8 1999/03/21/25 %@ 0-7803-5417-6 %G eng %R 10.1109/INFCOM.1999.751668 %0 Book %D 1999 %T The RNA World %A Woodson,Sarah A. %A Mount, Stephen M. %E Gesteland,Raymond F. %E Cech,Thomas R. %E Atkins,John F. %I Cold Spring Harbor Laboratory Press %C Cold Spring Harbor, New York %8 1999/// %G eng %0 Journal Article %J TRANSACTIONS-AMERICAN SOCIETY OF MECHANICAL ENGINEERS JOURNAL OF MANUFACTURING SCIENCE AND ENGINEERING %D 1999 %T Sheet metal bending: generating shared setups %A Gupta,S.K. %A Bourne,D. A. %X Contemporary process planners for sheet metal bending solve the process planning problemfor individual parts. Quite often, many different parts can be produced on shared setups. However, plans generated by current process planning systems fail to exploit this commonality between setups and try to generate optimal setups for individual parts. In this paper, we present an algorithm for multi-part setup planning for sheet metal bending. This algorithm takes a set of parts and operation sequences for these parts, and tries to find a shared setup plan that can work for every part in the set. Setup changes constitute a major portion of the production time in batch production environments. Therefore, multi-part setup planning techniques can be used to significantly cut down the total number of setups and increase the overall through-put. %B TRANSACTIONS-AMERICAN SOCIETY OF MECHANICAL ENGINEERS JOURNAL OF MANUFACTURING SCIENCE AND ENGINEERING %V 121 %P 689 - 694 %8 1999/// %G eng %U http://terpconnect.umd.edu/~skgupta/Publication/JMSE99_Gupta_draft.pdf %0 Journal Article %J Journal of manufacturing systems %D 1999 %T Sheet metal bending operation planning: using virtual node generation to improve search efficiency %A Gupta,S.K. %X A large number of manufacturing operation planning problems can be formulatedas state-space search problems. In case of sheet-metal bending operation planning, processing a search node involves extensive geometric reasoning. Such computation- intensive node-processing limits the number of search nodes that can be expanded in a reasonable amount of time, making it difficult to solve real-life operation planning problems. In this paper, we describe a scheme to speed up operation planning by virtual gen- eration of state-space nodes. In this scheme, we eliminate unnecessary computation at the time of node generation by extracting the required information from already generated nodes. Although generation of two different search nodes rarely involves identical computation steps, there is considerable overlap in node generation steps. We have divided the node generation step into a number of computation subproblems. When we need to generate a new node, we first try to see if any of the node gener- ation subproblems have been solved for any of the already generated nodes. If any subproblem has already been solved for some other node, then we use the solution of that subproblem to save computation time. In such cases, we do not perform node generation computation steps, and therefore we call such node generation virtual. The scheme presented in this paper increases the node generation capability and allows us to consider many more search nodes. The ability to consider more search nodes helps us in solving more complex problems and finding better operation plans. %B Journal of manufacturing systems %V 18 %P 127 - 139 %8 1999/// %G eng %U ftp://ftp.eng.umd.edu/:/home/glue/s/k/skgupta/pub/Publication/JMS99_Gupta_draft.pdf %N 2 %0 Journal Article %J Electronic Notes in Theoretical Computer Science %D 1999 %T Specifying the PLAN Network Programming Langauge %A Kakkar,Pankaj %A Hicks, Michael W. %A Moore,Jon %A Gunter,Carl A. %X We discuss how the specification of the PLAN programming language supports the design objectives of the language. The specification aims to provide a mathematically precise operational semantics that can serve as a standard for implementing interpreters and portable programs. The semantics should also support proofs of key properties of PLAN that would hold of all conformant implementations. This paper discusses two such properties. (1) Type checking is required, but interpreters are given significant flexibility about when types are checked; the specification must support a clear description of the possible behaviors of a network of conformant implementations. (2) It is essential to have guarantees about how PLAN programs use global resources, but the specification must be flexible about extensions in the network service layer. We illustrate on of kind of issue that will arise in using to specification to prove properties of the network based on the choice of services. %B Electronic Notes in Theoretical Computer Science %V 26 %P 87 - 104 %8 1999/// %@ 1571-0661 %G eng %U http://www.sciencedirect.com/science/article/pii/S1571066105802853 %R 10.1016/S1571-0661(05)80285-3 %0 Journal Article %J SIAM Journal on Matrix Analysis and Applications %D 1999 %T Tikhonov Regularization and Total Least Squares %A Golub, Gene H. %A Hansen,Per Christian %A O'Leary, Dianne P. %K bidiagonalization %K discrete ill-posed problems %K regularization %K total least squares %X Discretizations of inverse problems lead to systems of linear equations with a highly ill-conditioned coefficient matrix, and in order to computestable solutions to these systems it is necessary to apply regularization methods. We show how Tikhonov's regularization method, which in its original formulation involves a least squares problem, can be recast in a total least squares formulation suited for problems in which both the coefficient matrix and the right-hand side are known only approximately. We analyze the regularizing properties of this method and demonstrate by a numerical example that, in certain cases with large perturbations, the new method is superior to standard regularization methods. %B SIAM Journal on Matrix Analysis and Applications %V 21 %P 185 - 194 %8 1999/// %G eng %U http://link.aip.org/link/?SML/21/185/1 %N 1 %R 10.1137/S0895479897326432 %0 Conference Paper %B CHI '99 extended abstracts on Human factors in computing systems %D 1999 %T Trust me, I'm accountable: trust and accountability online %A Friedman,Batya %A Thomas,John C. %A Grudin,Jonathan %A Nass,Clifford %A Nissenbaum,Helen %A Schlager,Mark %A Shneiderman, Ben %K accountability %K anonymity %K Communication %K computers and society %K ethics %K Internet %K media effects %K privacy %K Reciprocity %K repute %K social actors %K social capital %K social impacts %K trust %K value-sensitive design %K wired world %K WWW %X We live in an increasingly wired world. According to Robert Putnam, people are spending less time in persistent personal face to face interactions and more time in pursuits such as watching TV and using the Internet. At the same time, independently measured "social capital" -- the extent to which we trust and work for a common good -- is declining. In this panel, we explore: the impacts of electronic media on trust and accountability; whether and how electronic media can be designed and used to increase deserved trust and accountability; the relationship between protecting privacy and increasing the efficacy of communication; and how people's tendency to treat computers as social actors impacts these issues. In brief, how can modern technology enhance humanity's humanity? %B CHI '99 extended abstracts on Human factors in computing systems %S CHI EA '99 %I ACM %C New York, NY, USA %P 79 - 80 %8 1999/// %@ 1-58113-158-5 %G eng %U http://doi.acm.org/10.1145/632716.632766 %R 10.1145/632716.632766 %0 Journal Article %J Proc. Workshop Web Usage Analysis and User Profiling (WEBKDD’99) %D 1999 %T Using probabilistic relational models for collaborative filtering %A Getoor, Lise %A Sahami,M. %X Recent projects in collaborative filtering and information filtering address the task of inferring user prefer-ence relationships for products or information. The data on which these inferences are based typically con- sists of pairs of people and items. The items may be information sources (such as web pages or newspaper articles) or products (such as books, software, movies or CDs). We are interested in making recommen- dations or predictions. Traditional approaches to the problem derive from classical algorithms in statistical pattern recognition and machine learning. The majority of these approaches assume a ”flat” data repre- sentation for each object, and focus on a single dyadic relationship between the objects. In this paper, we examine a richer model that allows us to reason about many different relations at the same time. We build on the recent work on probabilistic relational models (PRMs), and describe how PRMs can be applied to the task of collaborative filtering. PRMs allow us to represent uncertainty about the existence of relationships in the model and allow the properties of an object to depend probabilistically both on other properties of that object and on properties of related objects. %B Proc. Workshop Web Usage Analysis and User Profiling (WEBKDD’99) %8 1999/// %G eng %0 Journal Article %J University of Maryland Technical Report, CS-TR %D 1999 %T Zoom-Only Vs Overview-Detail Pair: A Study in Browsing Techniques as Applied to Patient Histories %A Ghosh,P. %A Shneiderman, Ben %B University of Maryland Technical Report, CS-TR %V 4028 %P 12 - 12 %8 1999/// %G eng %N 99 %0 Conference Paper %D 1998 %T 3D spatial layouts using a-teams %A Sachdev,S. %A Paredis,C. J. J. %A Gupta,S.K. %A Talukdar,S. N. %X Spatial layout is the problem of arranging a set of componentsin an enclosure such that a set of objectives and constraints is sat- isfied. The constraints may include non-interference of objects, accessibility requirements and connection cost limits. Spatial lay- out problems are found primarily in the domains of electrical en- gineering and mechanical engineering in the design of integrated circuits and mechanical or electromechanical artifacts. Traditional approaches include ad-hoc (or specialized) heuristics, Genetic Al- gorithms and Simulated Annealing. The A-Teams approach pro- vides a way of synergistically combining these approaches in a modular agent based fashion. A-Teams are also open to the addi- tion of new agents. Modifications in the task requirements trans- late to modifications in the agent mix. In this paper we describe how modular A-Team based optimization can be used to solve 3 dimensional spatial layout problems. %8 1998/// %G eng %U http://www-2.cs.cmu.edu/afs/cs.cmu.edu/user/cjp/www/pubs/DETC98.pdf %0 Journal Article %J Algorithmica %D 1998 %T Approximation algorithms for connected dominating sets %A Guha,S. %A Khuller, Samir %X The dominating set problem in graphs asks for a minimum size subset of vertices with the following property: each vertex is required to be either in the dominating set, or adjacent to some vertex in the dominating set. We focus on the related question of finding a connected dominating set of minimum size, where the graph induced by vertices in the dominating set is required to be connected as well. This problem arises in network testing, as well as in wireless communication.Two polynomial time algorithms that achieve approximation factors of 2H(Δ)+2 and H(Δ)+2 are presented, where Δ is the maximum degree and H is the harmonic function. This question also arises in relation to the traveling tourist problem, where one is looking for the shortest tour such that each vertex is either visited or has at least one of its neighbors visited. We also consider a generalization of the problem to the weighted case, and give an algorithm with an approximation factor of (c n +1) \ln n where c n ln k is the approximation factor for the node weighted Steiner tree problem (currently c n = 1.6103 ). We also consider the more general problem of finding a connected dominating set of a specified subset of vertices and provide a polynomial time algorithm with a (c+1) H(Δ) +c-1 approximation factor, where c is the Steiner approximation ratio for graphs (currently c = 1.644 ). %B Algorithmica %V 20 %P 374 - 387 %8 1998/// %G eng %N 4 %R 10.1007/PL00009201 %0 Conference Paper %B Performance, Computing and Communications, 1998. IPCCC '98., IEEE International %D 1998 %T Benchmarking a network of PCs running parallel applications %A Hollingsworth, Jeffrey K %A Guven, E. %A Akinlar, C. %K 100 Mbit/s %K 125 mus %K Aerodynamics %K Application software %K communication micro-benchmarks %K default mathematical libraries %K Delay %K Ethernet %K Ethernet networks %K gcc %K latency %K lightweight message-passing protocol %K Linux %K Local area networks %K mathematics computing %K Message passing %K microcomputer applications %K Microsoft Windows NT %K NAS parallel benchmarks %K network operating systems %K Numerical simulation %K parallel applications %K PARALLEL PROCESSING %K PC network benchmarking %K performance comparison %K performance evaluation %K Personal communication networks %K Protocols %K PVM %K running time %K software libraries %K System software %K system software configurations %K TCP/IP %K TCPIP %K Transport protocols %K U-Net active messages %K Visual C++ %X Presents a benchmarking study that compares the performance of a network of four PCs connected by a 100 Mbit/s fast Ethernet running three different system software configurations: TCP/IP on Windows NT, TCP/IP on Linux and a lightweight message-passing protocol (U-Net active messages) on Linux. For each configuration, we report results for communication micro-benchmarks and the NAS (Numerical Aerodynamics Simulation) parallel benchmarks. For the NAS benchmarks, the overall running time using Linux TCP/IP was 12-500% less than the Windows NT TCP/IP configuration. Likewise, the Linux U-Net based message-passing protocol outperformed the Linux TCP/IP version by 5-200%+. We also show that, by using Linux U-Net, we are able to achieve 125 μs latency between two processes using PVM. Finally, we report that the default mathematical libraries supplied with NT (for both gcc and Visual C++) are substantially slower than the one supplied with Linux %B Performance, Computing and Communications, 1998. IPCCC '98., IEEE International %I IEEE %P 1 - 7 %8 1998/02/16/18 %@ 0-7803-4468-5 %G eng %R 10.1109/PCCC.1998.659876 %0 Conference Paper %D 1998 %T Capturing articulation in assemblies from component geometry %A Sinha,R. %A Paredis,C. J. J. %A Gupta,S.K. %A Khosla,P. K. %X This paper presents a method to extract instantaneous artic-ulation from part geometry, based on surface mating constraints as well as constraints imposed by other incidental contacts. Many assemblies contain joints, each of which have degrees of freedom associated with them. These joints allow the relative positions of parts in the mechanism to change as the joints are articulated. Being able to represent these joints and their behav- ior is important from the designers perspective because it enables him or her to verify whether kinematic requirements have been met.Therefore, it is useful to be able to obtain such joint informa- tion directly from part geometry and contact physics. The method presented here handles all lower pairs of kine- matic joints. Surface mating contacts are classified into one of three types: planar, spherical and cylindrical. The contacts are represented by algebraic inequalities describing the translational and angular velocities at the contact. Non-penetration conditions are written for a finite set of points on the boundary of each contact face, and it is shown that the finite set of conditions is representative of the entire boundary and the region enclosed by the boundary. Simultaneous satisfaction of the non-penetration conditions at all the contact surfaces between a pair of bodies is represented by a 6-dimensional simplex, which can be solved using linear programming. %8 1998/// %G eng %U http://www-cgi.cs.cmu.edu/afs/cs.cmu.edu/user/cjp/www/pubs/DAC98.pdf %0 Journal Article %J Neural Computation %D 1998 %T Computational studies of lateralization of phoneme sequence generation %A Reggia, James A. %A Goodall,S. %A Shkuro,Y. %B Neural Computation %V 10 %P 1277 - 1297 %8 1998/// %G eng %N 5 %0 Conference Paper %B Computer Vision, 1998. Sixth International Conference on %D 1998 %T Condensing image databases when retrieval is based on non-metric distances %A Jacobs, David W. %A Weinshall,D. %A Gdalyahu,Y. %K appearance-based %K databases; %K databases;image %K dataspaces;pattern %K MATCHING %K methods;non-metric %K processing;visual %K recognition;query %K systems;image %K vision;classification %X One of the key problems in appearance-based vision is understanding how to use a set of labeled images to classify new images. Classification systems that can model human performance, or that use robust image matching methods, often make use of similarity judgments that are non-metric but when the triangle inequality is not obeyed, most existing pattern recognition techniques are not applicable. We note that exemplar-based (or nearest-neighbor) methods can be applied naturally when using a wide class of non-metric similarity functions. The key issue, however, is to find methods for choosing good representatives of a class that accurately characterize it. We note that existing condensing techniques for finding class representatives are ill-suited to deal with non-metric dataspaces. We then focus on developing techniques for solving this problem, emphasizing two points: First, we show that the distance between two images is not a good measure of how well one image can represent another in non-metric spaces. Instead, we use the vector correlation between the distances from each image to other previously seen images. Second, we show that in non-metric spaces, boundary points are less significant for capturing the structure of a class than they are in Euclidean spaces. We suggest that atypical points may be more important in describing classes. We demonstrate the importance of these ideas to learning that generalizes from experience by improving performance using both synthetic and real images %B Computer Vision, 1998. Sixth International Conference on %P 596 - 601 %8 1998/01// %G eng %R 10.1109/ICCV.1998.710778 %0 Journal Article %J Vision Research %D 1998 %T Determining the similarity of deformable shapes %A Basri,Ronen %A Costa,Luiz %A Geiger,Davi %A Jacobs, David W. %X Determining the similarity of two shapes is a significant task in both machine and human vision systems that must recognize or classify objects. The exact properties of human shape similarity judgements are not well understood yet, and this task is particularly difficult in domains where the shapes are not related by rigid transformations. In this paper we identify a number of possibly desirable properties of a shape similarity method, and determine the extent to which these properties can be captured by approaches that compare local properties of the contours of the shapes, through elastic matching. Special attention is devoted to objects that possess articulations, i.e. articulated parts. Elastic matching evaluates the similarity of two shapes as the sum of local deformations needed to change one shape into another. We show that similarities of part structure can be captured by such an approach, without the explicit computation of part structure. This may be of importance, since although parts appear to play a significant role in visual recognition, it is difficult to stably determine part structure. We also show novel results about how one can evaluate smooth and polyhedral shapes with the same method. Finally, we describe shape similarity effects that cannot be handled by current approaches. %B Vision Research %V 38 %P 2365 - 2385 %8 1998/08// %@ 0042-6989 %G eng %U http://www.sciencedirect.com/science/article/pii/S0042698998000431 %N 15–16 %R 10.1016/S0042-6989(98)00043-1 %0 Report %D 1998 %T Direction of Arrival and the Rank-Revealing URV Decomposition %A Boman,E. C %A Griffen,M. F %A Stewart, G.W. %K Technical Report %X In many practical direction-of-arrival (DOA) problems the numberof sources and their directions from an antenna array do not remain stationary. Hence a practical DOA algorithm must be able to track changes with a minimal number of snapshots. In this paper we describe DOA algorithms, based on a new decomposition, that are not expensive to compute or difficult to update. The algorithms are compared with algorithms based on the singular value decomposition (SVD). (Also cross-referenced as UMIACS-TR-91-166) %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %V UMIACS-TR-91-166 %8 1998/10/15/ %G eng %U http://drum.lib.umd.edu/handle/1903/561 %0 Journal Article %J Proceedings of the ASME Design Engineering Technical Conference %D 1998 %T Double quaternions for motion interpolation %A Ge,Q. J %A Varshney, Amitabh %A Menon,J. P %A Chang,C. F %X This paper describes the concept of double quaternions, anextension of quaternions, and shows how they can be used for ef- fective three-dimensional motion interpolation. Motion interpo- lation using double quaternions has several advantages over the method of interpolating rotation and translation independently and then combining the results. First, double quaternions pro- vide a conceptual framework that allows one to handle rotational and translational components in a unified manner. Second, re- sults obtained by using double quaternions are coordinate frame invariant. Third, double quaternions allow a natural way to trade- off robustness against accuracy. Fourth, double quaternions, be- ing a straightforward extension of quaternions, can be integrated into several existing systems that currently use quaternions with translational components, with a only small coding effort. %B Proceedings of the ASME Design Engineering Technical Conference %8 1998/// %G eng %0 Conference Paper %B 8th International Offshore and Polar Engineering Conference, Montreal, Canada %D 1998 %T Dynamics of bubbles in conditions of gas hydrate formation %A Gumerov, Nail A. %A Chahine,G. L %B 8th International Offshore and Polar Engineering Conference, Montreal, Canada %8 1998/// %G eng %0 Journal Article %J Physics of Fluids %D 1998 %T Effect of acoustic radiation on the stability of spherical bubble oscillations %A Gumerov, Nail A. %B Physics of Fluids %V 10 %P 1767 - 1767 %8 1998/// %G eng %0 Journal Article %J Pattern Recognition %D 1998 %T EFFICIENT DETERMINATION OF SHAPE FROM MULTIPLE IMAGES CONTAINING PARTIAL INFORMATION %A Basri,Ronen %A GROVE,ADAM J. %A Jacobs, David W. %K 2-D shape recovery from multiple images %K NP-complete %K Shape recovery with occlusion %X We consider the problem of reconstructing the shape of a 2-D object from multiple partial images related by scaled translations, in the presence of occlusion. Lindenbaum and Bruckstein have considered this problem in the specific case of a translating object seen by small sensors, for application to the understanding of insect vision. Their solution is limited by the fact that its run time is exponential in the number of images and sensors. We generalize the problem to allow for arbitrary types of occlusion of objects that translate and change scale. We show that this more general version of the problem can be solved in time that is polynomial in the number of sensors, but that even the original problem posed by Lindenbaum and Bruckstein is, in fact, NP-hard when the number of images is unbounded. Finally, we consider the case where the object is known to be convex. We show that Lindenbaum and Bruckstein’s version of the problem is then efficiently solvable even when many images are used, as is the general problem in certain more restricted cases. %B Pattern Recognition %V 31 %P 1691 - 1703 %8 1998/11// %@ 0031-3203 %G eng %U http://www.sciencedirect.com/science/article/pii/S0031320398000508 %N 11 %R 10.1016/S0031-3203(98)00050-8 %0 Book Section %B Machine Translation and the Information SoupMachine Translation and the Information Soup %D 1998 %T Enhancing Automatic Acquisition of Thematic Structure in a Large-Scale Lexicon for Mandarin Chinese %A Olsen,Mari %A Dorr, Bonnie J %A Thomas,Scott %E Farwell,David %E Gerber,Laurie %E Hovy,Eduard %X This paper describes a refinement to our procedure for porting lexical conceptual structure (LCS) into new languages. Specifically we describe a two-step process for creating candidate thematic grids for Mandarin Chinese verbs, using the English verb heading the VP in the subde_nitions to separate senses, and roughly parsing the verb complement structure to match thematic structure templates. We accomplished a substantial reduction in manual effort, without substantive loss. The procedure is part of a larger process of creating a usable lexicon for interlingual machine translation from a large on-line resource with both too much and too little information. %B Machine Translation and the Information SoupMachine Translation and the Information Soup %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 1529 %P 41 - 50 %8 1998/// %@ 978-3-540-65259-5 %G eng %U http://dx.doi.org/10.1007/3-540-49478-2_4 %0 Journal Article %J Simulation of semiconductor processes and devices 1998: SISPAD 98 %D 1998 %T Extension of Spherical Harmonic Method to RF Transient Regime %A Lin,C. K. %A Goldsman,N. %A Chang,C. H. %A Mayergoyz, Issak D %A Aronowitz,S. %A Dong,J. %A Belova,N. %X The space and time dependent electron Boltzmann transport equation (BTE)is solved sclf-consistently with the Poisson and transient hole current-continuity equation. A transient Spherical Harmonic expansion method is used to solve the BTE. By this method we can efficiently solve the BTE in the RF regime to observe how the complete distribution function responds to a rapid transient. Calculations on a BJT, which give the time dependent distribution function over a large energy range 0-3eV, throughout the device, as well as average quantities, require only 40 minutes CPU time on an Alpha workstation. %B Simulation of semiconductor processes and devices 1998: SISPAD 98 %P 42 - 42 %8 1998/// %G eng %0 Journal Article %J Journal of Combinatorial Optimization %D 1998 %T Facility Location with Dynamic Distance Functions %A Khuller, Samir %A Sussmann,Y. J %A Bhatia,Randeep %A Guha,Sudipto %X Facility location problems have always been studied with theassumption that the edge lengths in the network are static anddo not change over time. The underlying network could be used to model a city street networkfor emergency facility location/hospitals, or an electronic network for locating information centers. In any case, it is clear that due to trafficcongestion the traversal time on links changes with time. Very often, we have estimates as to how the edge lengths change over time, and our objective is to choose a set of locations (vertices) ascenters, such that at every time instant each vertex has a center close to it (clearly, the center close to a vertex may change over time). We also provide approximation algorithms as well as hardness results forthe K-center problem under this model. This is the first comprehensive study regarding approximation algorithmsfor facility location for good time-invariant solutions. %B Journal of Combinatorial Optimization %V 2 %P 199 - 217 %8 1998/// %G eng %N 3 %R 10.1023/A:1009796525600 %0 Report %D 1998 %T Feature Recognition for Interactive Applications: Exploiting Distributed Resources %A Regli,William C. %A Gupta, Satyandra K. %A Nau, Dana S. %K Technical Report %X The availability of low-cost computational power is a drivingforce behind the growing sophistication of CAD software. Tools designed to reduce time-consuming build-test-redesign iterations are essential for increasing engineering quality and productivity. However, automation of the design process poses many difficult computational problems. As more downstream engineering activities are being considered during the design phase, guaranteeing reasonable response times within design systems becomes problematic. Design is an interactive process and speed is a critical factor in systems that enable designers to explore and experiment with alternative ideas during the design phase. Achieving interactivity requires an increasingly sophisticated allocation of computational resources in order to perform realistic design analyses and generate feedback in real time. This paper presents our initial efforts to develop techniques to apply distributed algorithms to the problem of recognizing machining features from solid models. Existing work on recognition of features has focused exclusively on serial computer architectures. Our objective is to show that distributed algorithms can be employed on realistic parts with large numbers of features and many geometric and topological entities to obtain significant improvements in computation time using existing hardware and software tools. Migrating solid modeling applications toward a distributed computing framework enables interconnection of many of the autonomous and geographically diverse software tools used in the modern manufacturing enterprise. (Also cross-referenced as UMIACS-TR-94-126.1) %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %V UMIACS-TR-94-126.1 %8 1998/10/15/ %G eng %U http://drum.lib.umd.edu//handle/1903/675 %0 Conference Paper %D 1998 %T Feature-recognition for MEMS extraction %A Baidya,B. %A Gupta,S.K. %A Mukherjee,T. %P 13 - 16 %8 1998/// %G eng %U http://www.ece.cmu.edu/~mems/pubs/pdfs/asme/detc/0029_baidya-1998.pdf %0 Journal Article %J Mol Biochem Parasitol %D 1998 %T Genetic nomenclature for Trypanosoma and Leishmania. %A Clayton, C %A Adams, M %A Almeida, R %A Baltz, T %A Barrett, M %A Bastien, P %A Belli, S %A Beverley, S %A Biteau, N %A Blackwell, J %A Blaineau, C %A Boshart, M %A Bringaud, F %A Cross, G %A Cruz, A %A Degrave, W %A Donelson, J %A El-Sayed, N %A Fu, G %A Ersfeld, K %A Gibson, W %A Gull, K %A Ivens, A %A Kelly, J %A Vanhamme, L %K Animals %K Leishmania %K Terminology as Topic %K Trypanosoma %B Mol Biochem Parasitol %V 97 %P 221-4 %8 1998 Nov 30 %G eng %N 1-2 %0 Conference Paper %B Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms %D 1998 %T Greedy strikes back: improved facility location algorithms %A Guha,Sudipto %A Khuller, Samir %B Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms %S SODA '98 %I Society for Industrial and Applied Mathematics %C Philadelphia, PA, USA %P 649 - 657 %8 1998/// %@ 0-89871-410-9 %G eng %U http://dl.acm.org/citation.cfm?id=314613.315037 %0 Journal Article %J VLSI DESIGN %D 1998 %T Hydrodynamic Device Simulation with New State Variables Specially Chosen a Block Gummel Iterative Approach %A Liang,W. %A Kerr,D. C. %A Goldsman,N. %A Mayergoyz, Issak D %X A new numerical formulation for solving the hydrodynamic model of semiconductor devicesis presented. Themethod is based on using new variables to transform the conventional hydrodynamic equations into forms which facilitatenumerical evaluation with a block Gum- mel approach. To demonstrate the new method, we apply it to model a 0.35 wn 2-D LDD MOSFET, where robust convergence properties are observed. %B VLSI DESIGN %V 6 %P 191 - 195 %8 1998/// %G eng %N 1-4 %0 Journal Article %J Intelligent Systems and their Applications, IEEE %D 1998 %T IMACS: a case study in real-world planning %A Gupta,S.K. %A Nau, Dana S. %A Regli,W. C. %K automated designer's aid %K CAD/CAM %K case study %K computer aided analysis %K computer aided production planning %K design modifications %K IMACS %K intelligent design assistants %K Interactive Manufacturability Analysis and Critiquing System %K interactive systems %K machined parts evaluation %K machining %K manufacturability %K planning (artificial intelligence) %K planning systems %X This article discusses the complexities of real-world planning and how to create planning systems to address them. IMACS (Interactive Manufacturability Analysis and Critiquing System), an automated designer's aid, evaluates machined parts and suggests design modifications to improve their manufacturability, offering advantages over the planning techniques used in classical planning systems %B Intelligent Systems and their Applications, IEEE %V 13 %P 49 - 60 %8 1998/06//may %@ 1094-7167 %G eng %N 3 %R 10.1109/5254.683210 %0 Conference Paper %D 1998 %T Integrated design and rapid manufacturing over the Internet %A Rajagopalan,S. %A Pinilla,J. M. %A Losleben,P. %A Tian,Q. %A Gupta,S.K. %X An Internet-based infrastructure is being developed inorder to provide designers with access to multiple layered- manufacturing services. The design domain being addressed is that of small mechanisms or electro-mechanical assemblies that would be used in robots or other mechatronic devices. The approach presented relies on the formalization of the data exchange interface between designers and manufacturers. The primary operatives in this system are Design Clients, Manufacturing Services and Process Brokers. The Design Client allows designers to submit completed designs for algorithmic decomposition, or alternately, to compose a design from primitives and library components that have been primed with some process-related information. During this early phase, the Manufacturing Service consists of a highly automated machine that can be used to build ceramic parts, and the associated software components for design decomposition, process planning and machine control. In later phases, multiple service providers will be made accessible. The Process Broker implements a number of supporting services including process selection and optimal part orientation. Future broker services will include manufacturability analysis, directory services and accreditation etc. Currently, this interface is being built and evaluated internally at Stanford and CMU. It will be made available for use by other selected universities in the near future. %8 1998/// %G eng %U http://cdr.stanford.edu/interface/publications/DETC98CIE-5519.pdf %0 Journal Article %J Logics for databases and information systems %D 1998 %T Integrity constraints: Semantics and applications %A Godfrey,P. %A Grant,J. %A Gryz,J. %A Minker, Jack %X Integrity constraints axe introduced in a logical framework. Examples are given to illustrate the expressiveness of integrity constraints. Various definitions for the semantics of integrity constraints are defined and compared. Additional types of constraints are also mentioned. Techniques of reasoning with integrity constraints, including model elimination and the residue method, are explained. Applications of integrity constraints considered in detail, including semantic query optimization, cooperative answering, combining databases, and view updates. Additional applications to order optimization, query folding, object-oriented databases, and database security are sketched. The conclusion lists areas of integrity constraints that need to be investigated. %B Logics for databases and information systems %P 265 - 306 %8 1998/// %G eng %R 10.1007/978-1-4615-5643-5_9 %0 Conference Paper %D 1998 %T An intelligent environment for simulating mechanical assembly operations %A Gupta,S.K. %A Paredis,C. J. J. %A Sinha,R. %A Wang,C. H. %A Brown,P. F. %X Rapid technical advances in many different areas of scientificcomputing provide the enabling technologies for creating a com- prehensive simulation and visualization environment for assembly design and planning. We have built an intelligent environment in which simple simulations can be composed together to create com- plex simulations for detecting potential assembly problems. Our goal in this project is to develop high fidelity assembly simulation and visualization tools that can detect assembly related problems without going through physical mock-ups. In addition, these tools can be used to create easy-to-visualize instructions for performing assembly and service operations. %P 13 - 16 %8 1998/// %G eng %U http://www.cs.cmu.edu/afs/cs.cmu.edu/Web/People/paredis/pubs/DFM98.pdf %0 Book Section %B Machine Translation and the Information SoupMachine Translation and the Information Soup %D 1998 %T Lexical Selection for Cross-Language Applications: Combining LCS with WordNet %A Dorr, Bonnie J %A Katsova,Maria %E Farwell,David %E Gerber,Laurie %E Hovy,Eduard %X This paper describes experiments for testing the power of large-scale resources for lexical selection in machine translation (MT) and cross-language information retrieval (CLIR). We adopt the view that verbs with similar argument structure share certain meaning components, but that those meaning components are more relevant to argument realization than to idiosyncratic verb meaning. We verify this by demonstrating that verbs with similar argument structure as encoded in Lexical Conceptual Structure (LCS) are rarely synonymous in WordNet. We then use the results of this work to guide our implementation of an algorithm for cross-language selection of lexical items, exploiting the strengths of each resource: LCS for semantic structure and WordNet for semantic content. We use the Parka Knowledge-Based System to encode LCS representations and WordNet synonym sets and we implement our lexical-selection algorithm as Parka-based queries into a knowledge base containing both information types. %B Machine Translation and the Information SoupMachine Translation and the Information Soup %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 1529 %P 438 - 447 %8 1998/// %@ 978-3-540-65259-5 %G eng %U http://dx.doi.org/10.1007/3-540-49478-2_39 %0 Journal Article %J Technical Reports of the Computer Science Department %D 1998 %T Life cycle of user interface techniques: The DJJ information system design Process %A Rose,Anne %A Ellis,Jason %A Plaisant, Catherine %A Greene,Stephan %K Technical Report %X To take advantage of todays technology, many organizations are migrating fromtheir legacy systems. With help from the Human-Computer Interaction Laboratory (HCIL) and Cognetics Corporation, the Maryland Department of Juvenile Justice (DJJ) is currently undergoing an effort to redesign their information system to take advantage of graphical user interfaces. As a research lab, HCIL identifies interesting research problems and then prototypes solutions. As a project matures, the exploratory prototypes are adapted to suit the end product requirements. This case study describes the life cycle of three DJJ prototypes: (1) LifeLines, which uses time lines to display an overview of a youth in one screen, (2) the DJJ Navigator, which helps manage individual workloads by displaying different user views, and (3) the ProgramFinder, a tool for selecting the best program for a youth. (Also cross-referenced as CAR-TR-826) %B Technical Reports of the Computer Science Department %8 1998/10/15/ %G eng %U http://drum.lib.umd.edu/handle/1903/458 %0 Conference Paper %B Cooperative Information Systems, IFCIS International Conference on %D 1998 %T A Meta-Wrapper for Scaling up to Multiple Autonomous Distributed Information Sources %A Vidal,Maria Esther %A Raschid, Louiqa %A Gruser,Jean Robert %K information resource discovery %K integration and interoperability %K metadata use and management %K wrappers and mediators %X Abstract Current mediator and wrapper architectures do not have the flexibility to scale to multiple wrapped sources, where some sources may be redundant, and some sources may provide incomplete answers to a query. We propose a meta-wrapper component which is capable of handling multiple wrapped sources, in a particular domain, where the multiple sources provide related information. The meta-wrapper makes these sources transparent to the mediator, and provides a single meta-wrapper interface for all these sources. Source descriptions specify the content and query capability of the sources. These are used to determine the meta-wrapper interface and to decide which queries from a mediator can be accepted. Sources are partitioned into equivalence classes, based on their descriptions. These equivalence classes are partially ordered, and the lattices that correspond to these orderings are used to identify the relevant sources for a query submitted by the mediator. If there is redundancy of the sources, the meta-wrapper identifies alternate sources for the query. A meta-wrapper cost model is then used to select among alternate relevant sources and choose the best plan. %B Cooperative Information Systems, IFCIS International Conference on %I IEEE Computer Society %C Los Alamitos, CA, USA %P 148 - 148 %8 1998/// %@ 0-8186-8380-5 %G eng %R http://doi.ieeecomputersociety.org/10.1109/COOPIS.1998.706193 %0 Conference Paper %B Proc. ASME Fluids Engineering Division Summer Meeting %D 1998 %T Modeling of particle motion in viscous swirl flow between two porous cylinders %A Gumerov, Nail A. %A Duraiswami, Ramani %B Proc. ASME Fluids Engineering Division Summer Meeting %P 21 - 25 %8 1998/// %G eng %0 Journal Article %J SIGPLAN Not. %D 1998 %T PLAN: a packet language for active networks %A Hicks, Michael W. %A Kakkar,Pankaj %A Moore,Jonathan T. %A Gunter,Carl A. %A Nettles,Scott %X PLAN (Packet Language for Active Networks) is a new language for programs that form the packets of a programmable network. These programs replace the packet headers (which can be viewed as very rudimentary programs) used in current networks. As such, PLAN programs are lightweight and of restricted functionality. These limitations are mitigated by allowing PLAN code to call node-resident service routines written in other, more powerful languages. This two-level architecture, in which PLAN serves as a scripting or 'glue' language for more general services, is the primary contribution of this paper. We have successfully applied the PLAN programming environment to implement an IP-free internetwork.PLAN is based on the simply typed lambda calculus and provides a restricted set of primitives and datatypes. PLAN defines a special construct called a chunk used to describe the remote execution of PLAN programs on other nodes. Primitive operations on chunks are used to provide basic data transport in the network and to support layering of protocols. Remote execution can make debugging difficult, so PLAN provides strong static guarantees to the programmer, such as type safety. A more novel property aimed at protecting network availability is a guarantee that PLAN programs use a bounded amount of network resources. %B SIGPLAN Not. %V 34 %P 86 - 93 %8 1998/09// %@ 0362-1340 %G eng %U http://doi.acm.org/10.1145/291251.289431 %N 1 %R 10.1145/291251.289431 %0 Journal Article %J University of Pennsylvania (February 27, 1998) %D 1998 %T The PLAN system for building Active Networks %A Hicks, Michael W. %A Kakkar,P. %A Moore,J. T %A Gunter,C. A %A Alexander,D. S %A Nettles,S. %B University of Pennsylvania (February 27, 1998) %8 1998/// %G eng %0 Journal Article %J Journal of Cerebral Blood Flow & Metabolism %D 1998 %T Spreading depression in focal ischemia: A computational study %A Revett,K. %A Ruppin,E. %A Goodall,S. %A Reggia, James A. %B Journal of Cerebral Blood Flow & Metabolism %V 18 %P 998 - 1007 %8 1998/// %G eng %N 9 %0 Journal Article %J IEEE Network %D 1998 %T The SwitchWare active network architecture %A Alexander,D. S %A Arbaugh, William A. %A Hicks, Michael W. %A Kakkar,P. %A Keromytis,A. D %A Moore,J. T %A Gunter,C. A %A Nettles,S. M %A Smith,J. M %K active extensions %K active packets %K Authentication %K Computer languages %K Computer networks %K cryptography %K cryptography-based authentication %K high-integrity base %K integrity checking %K IP networks %K LAN interconnection %K mobile programs %K network operating systems %K packet switching %K programmable network infrastructure %K programming languages %K Protocols %K Safety %K safety requirements %K scalability %K secure active router infrastructure %K Security %K security requirements %K services %K strong type checking %K Switches %K SwitchWare active network architecture %K telecommunication network routing %K Tin %K usability %K verification techniques %X Active networks must balance the flexibility of a programmable network infrastructure against the safety and security requirements inherent in sharing that infrastructure. Furthermore, this balance must be achieved while maintaining the usability of the network. The SwitchWare active network architecture is a novel approach to achieving this balance using three layers: active packets, which contain mobile programs that replace traditional packets; active extensions, which provide services on the network elements and can be dynamically loaded; and a secure active router infrastructure, which forms a high-integrity base on which the security of the other layers depends. In addition to integrity checking and cryptography-based authentication, security in our architecture depends heavily on verification techniques from programming languages, such as strong type checking %B IEEE Network %V 12 %P 29 - 36 %8 1998/06//May %@ 0890-8044 %G eng %N 3 %R 10.1109/65.690959 %0 Journal Article %J The ML Workshop, International Conference on Functional Programming (ICFP) %D 1998 %T The switchware active network implementation %A Alexander,D. S %A Hicks, Michael W. %A Kakkar,P. %A Keromytis,A. D %A Shaw,M. %A Moore,J. T %A Gunter,C. A %A Jim,T. %A Nettles,S. M %A Smith,J. M %B The ML Workshop, International Conference on Functional Programming (ICFP) %8 1998/// %G eng %0 Book Section %B Machine Translation and the Information SoupMachine Translation and the Information Soup %D 1998 %T A Thematic Hierarchy for Efficient Generation from Lexical-Conceptual Structure %A Dorr, Bonnie J %A Habash,Nizar %A Traum,David %E Farwell,David %E Gerber,Laurie %E Hovy,Eduard %X This paper describes an implemented algorithm for syntactic realization of a target-language sentence from an interlingual representation called Lexical Conceptual Structure (LCS). We provide a mapping between LCS thematic roles and Abstract Meaning Representation (AMR) relations; these relations serve as input to an off-the-shelf generator (Nitrogen). There are two contributions of this work: (1) the development of a thematic hierarchy that provides ordering information for realization of arguments in their surface positions; (2) the provision of a diagnostic tool for detecting inconsistencies in an existing online LCS-based lexicon that allows us to enhance principles for thematic-role assignment. %B Machine Translation and the Information SoupMachine Translation and the Information Soup %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 1529 %P 333 - 343 %8 1998/// %@ 978-3-540-65259-5 %G eng %U http://dx.doi.org/10.1007/3-540-49478-2_30 %0 Journal Article %J VLSI Design %D 1998 %T Three-Dimensional Hydrodynamic Modeling of MOSFET Devices %A Kerr,Daniel C. %A Goldsman,Neil %A Mayergoyz, Issak D %X The hydrodynamic (HD) model of semiconductor devices is solved numerically inthree-dimensions (3-D) for the MOSFET device. The numerical instabilities of the HD model are analyzed to develop a stable discretization. The formulation is stabilized by using a new, higher-order discretization for the relaxation-time approximation (RTA) term of the energy-balance (EB) equation. The developed formulation is used to model the MOSFET. %B VLSI Design %V 6 %P 261 - 265 %8 1998/// %@ 1065-514X, 1563-5171 %G eng %U http://www.hindawi.com/journals/vlsi/1998/060859/abs/ %N 1-4 %R 10.1155/1998/60859 %0 Book %D 1998 %T Trends in the Early Careers of Life Scientists %A Tilghman,S %A Astin,HS %A Brinkley,W %A Chilton,MD %A Cummings, Michael P. %A Ehrenberg,RG %A Fox,MF %A Glenn,K %A Green,PJ %A Hans,S %A Kelman,A %A LaPidus,J %A Levin,B %A McIntosh,JR %A Riecken,H %A Stephen,PE %I National Academy Press %C Washington, DC %8 1998/// %G eng %0 Journal Article %J Mol Biol Cell %D 1998 %T Trends in the early careers of life scientists - Preface and executive summary %A Tilghman,S %A Astin,HS %A Brinkley,W %A Chilton,MD %A Cummings, Michael P. %A Ehrenberg,RG %A Fox,MF %A Glenn,K %A Green,PJ %A Hans,S %A Kelman,A %A LaPidus,J %A Levin,B %A McIntosh,JR %A Riecken,H %A Stephen,PE %B Mol Biol Cell %V 9 %P 3007 - 3015 %8 1998/11// %G eng %N 11 %0 Report %D 1998 %T Updating Discourse Context with Active Logic %A Gurney,John %A Purang,Khemdut %A Perlis, Don %K Technical Report %X In this paper we present our implementation of a system of active logicthat processes natural language discourses. We focus on problems that involve presupposition and the associated well-known problems of the projection of presupposition. We discuss Heim's largely successful theory of presupposition and point out certain limitations. We then use these observations to build our discourse processor based on active logic. Our main contributions are the handling of problems that go beyond the scope of Heim's theory , especially discourses the involve cancellation of presupposition. Ongoing work suggests that conversational implicature and the cancellation of implicature can also be treated by our methods. Key words: presupposition, discourse, con text, accommodation, active logic, implicature. (Also cross-referenced as UMIACS-TR-96-62) %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %V UMIACS-TR-96-62 %8 1998/10/15/ %G eng %U http://drum.lib.umd.edu//handle/1903/842 %0 Conference Paper %B Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence %D 1998 %T Utility elicitation as a classification problem %A Chajewska,Urszula %A Getoor, Lise %A Norman,Joseph %A Shahar,Yuval %X We investigate the application of classification techniques to utility elicitation. In a decision problem, two sets of parameters must generally be elicited: the probabilities and the utilities. While the prior and conditional probabilities in the model do not change from user to user, the utility models do. Thus it is necessary to elicit a utility model separately for each new user. Elicitation is long and tedious, particularly if the outcome space is large and not decomposable. There are two common approaches to utility function elicitation. The first is to base the determination of the user's utility function solely on elicitation of qualitative preferences. The second makes assumptions about the form and decomposability of the utility function. Here we take a different approach: we attempt to identify the new user's utility function based on classification relative to a database of previously collected utility functions. We do this by identifying clusters of utility functions that minimize an appropriate distance measure. Having identified the clusters, we develop a classification scheme that requires many fewer and simpler assessments than full utility elicitation and is more robust than utility elicitation based solely on preferences. We have tested our algorithm on a small database of utility functions in a prenatal diagnosis domain and the results are quite promising. %B Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence %S UAI'98 %I Morgan Kaufmann Publishers Inc. %C San Francisco, CA, USA %P 79 - 88 %8 1998/// %@ 1-55860-555-X %G eng %U http://dl.acm.org/citation.cfm?id=2074094.2074104 %0 Conference Paper %B 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings %D 1998 %T Wrapper generation for Web accessible data sources %A Gruser,J. %A Raschid, Louiqa %A Vidal,M. E %A Bright,L. %K application program interfaces %K data mining %K Databases %K Educational institutions %K Electrical capacitance tomography %K HTML %K HTML documents %K Internet %K Query processing %K Read only memory %K Search engines %K Specification languages %K Uniform resource locators %K World Wide Web %K wrapper generation toolkit %K WWW %X There is an increase in the number of data sources that can be queried across the WWW. Such sources typically support HTML forms-based interfaces and search engines query collections of suitably indexed data. The data is displayed via a browser: One drawback to these sources is that there is no standard programming interface suitable for applications to submit queries. Second, the output (answer to a query) is not well structured. Structured objects have to be extracted from the HTML documents which contain irrelevant data and which may be volatile. Third, domain knowledge about the data source is also embedded in HTML documents and must be extracted. To solve these problems, we present technology to define and (automatically) generate wrappers for Web accessible sources. Our contributions are as follows: (1) Defining a wrapper interface to specify the capability of Web accessible data sources. (2) Developing a wrapper generation toolkit of graphical interfaces and specification languages to specify the capability of sources and the functionality of the wrapper (3) Developing the technology to automatically generate a wrapper appropriate to the Web accessible source, from the specifications. %B 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings %I IEEE %P 14 - 23 %8 1998/08/22/22 %@ 0-8186-8380-5 %G eng %R 10.1109/COOPIS.1998.706180 %0 Journal Article %J Electron Devices, IEEE Transactions on %D 1997 %T 2-D MOSFET modeling including surface effects and impact ionization by self-consistent solution of the Boltzmann, Poisson, and hole-continuity equations %A Liang,Wenchao %A Goldsman,N. %A Mayergoyz, Issak D %A Oldiges,P.J. %K 2D %K characteristics;LDD %K concentration;electron %K concentration;hole-continuity %K density;electron-hole %K density;impact %K device %K distribution %K effects;surface %K equation;collision %K equation;I-V %K equation;MOSFET;electron %K equations;impact %K equations;semiconductor %K function;electron %K generation;electron-hole %K harmonic %K integral;electron %K ionisation;integral %K ionization;self-consistent %K method;Boltzmann %K method;surface %K modeling;Boltzmann %K models;surface %K MOSFET %K MOSFET;Poisson %K pair %K potential;hole %K recombination;electrostatic %K recombination;hole %K scattering; %K scattering;two-dimensional %K simulation %K solution;spherical %K submicron %K temperature;electron-hole %K transport %X We present a new two-dimensional (2-D) MOSFET simulation method achieved by directly solving the Boltzmann transport equation for electrons, the hole-current continuity equation, and the Poisson equation self-consistently. The spherical harmonic method is used for the solution of the Boltzmann equation. The solution directly gives the electron distribution function, electrostatic potential, and the hole concentration for the entire 2-D MOSFET. Average quantities such as electron concentration and electron temperature are obtained directly from the integration of the distribution function. The collision integral is formulated to arbitrarily high spherical harmonic order, and new collision terms are included that incorporate effects of surface scattering and electron-hole pair recombination/generation. I-V characteristics, which agree with experiment, are calculated directly from the distribution function for an LDD submicron MOSFET. Electron-hole pair generation due to impact ionization is also included by direct application of the collision integral. The calculations are efficient enough for day-to-day engineering design on workstation-type computers %B Electron Devices, IEEE Transactions on %V 44 %P 257 - 267 %8 1997/02// %@ 0018-9383 %G eng %N 2 %R 10.1109/16.557713 %0 Journal Article %J Research in Engineering Design %D 1997 %T Automated manufacturability analysis: A survey %A Gupta, Satyandra K. %A Regli,William C. %A Das,Diganta %A Nau, Dana S. %K engineering %X In the market-place of the 21st century, there is no place for traditional ‘over-the-wall’ communications between design and manufacturing. In order to ‘design it right the very first time’, designers must ensure that their products are both functional and easy to manufacture. Software tools have had some successes in reducing the barriers between design and manufacturing. Manufacturability analysis systems are emerging as one such tool — enabling identification of potential manufacturing problems during the design phase and providing suggestions to designers on how to eliminate them. %B Research in Engineering Design %V 9 %P 168 - 190 %8 1997/// %@ 0934-9839 %G eng %U http://www.springerlink.com/content/p8p5516251023777/abstract/ %N 3 %R 10.1007/BF01596601 %0 Conference Paper %B Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms %D 1997 %T Better approximation guarantees for job-shop scheduling %A Goldberg,Leslie Ann %A Paterson,Mike %A Srinivasan, Aravind %A Sweedyk,Elizabeth %B Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms %S SODA '97 %I Society for Industrial and Applied Mathematics %C Philadelphia, PA, USA %P 599 - 608 %8 1997/// %@ 0-89871-390-0 %G eng %U http://dl.acm.org/citation.cfm?id=314161.314395 %0 Journal Article %J Stroke %D 1997 %T A computational model of acute focal cortical lesions %A Goodall,S. %A Reggia, James A. %A Chen,Y. %A Ruppin,E. %A Whitney,C. %B Stroke %V 28 %P 101 - 101 %8 1997/// %G eng %N 1 %0 Journal Article %J PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL IN℡LIGENCE %D 1997 %T Effective redundant constraints for online scheduling %A Getoor, Lise %A Ottosson,G. %A Fromherz,M. %A Carlson,B. %X The use of heuristics as a means to improve constraint solverperformance has been researched widely. However, most work has been on problem-independent heuristics (e.g., vari- able and value ordering), and has focused on offline prob- lems (e.g., one-shot constraint satisfaction). In this paper, we present an online scheduling problem for which we are developing a real-time scheduling algorithm. While we can and do use generic heuristics in the scheduler, here we fo- cus on the use of domain-specific redundant constraints to ef- fectively approximate optimal offline solutions. We present a taxonomy of redundant domain constraints, and examine their impact on the effectiveness of the scheduler. We also describe several techniques for generating redundant con- straints, which can be applied to a large class of job shop scheduling problems. %B PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL IN℡LIGENCE %P 302 - 307 %8 1997/// %G eng %0 Journal Article %J Computational Intelligence %D 1997 %T Interpreting presuppositions using active logic: From contexts to utterances %A Gurney,J. %A Perlis, Don %A Purang,K. %B Computational Intelligence %V 13 %P 391 - 413 %8 1997/// %G eng %N 3 %0 Conference Paper %B Document Analysis and Recognition, 1997., Proceedings of the Fourth International Conference on %D 1997 %T Local correspondence for detecting random forgeries %A Guo,J. K %A David Doermann %A Rosenfeld, A. %K applications;online %K applications;questioned %K correspondence;offline %K detection;reference %K extraction;handwriting %K features;stroke %K forged %K forgeries;random %K forgeries;stroke %K Forgery %K level;stroke %K meaningful %K processing; %K properties;local %K recognition;image %K segmentation;stylistically %K segmentation;word %K segments;feature %K signature;random %K signature;signature %K signatures;invariant %K verification;skilled %X Progress on the problem of signature verification has advanced more rapidly in online applications than offline applications, in part because information which can easily be recorded in online environments, such as pen position and velocity, is lost in static offline data. In offline applications, valuable information which can be used to discriminate between genuine and forged signatures is embedded at the stroke level. We present an approach to segmenting strokes into stylistically meaningful segments and establish a local correspondence between a questioned signature and a reference signature to enable the analysis and comparison of stroke features. Questioned signatures which do not conform to the reference signature are identified as random forgeries. Most simple forgeries can also be identified, as they do not conform to the reference signature's invariant properties such as connections between letters. Since we have access to both local and global information, our approach also shows promise for extension to the identification of skilled forgeries %B Document Analysis and Recognition, 1997., Proceedings of the Fourth International Conference on %V 1 %P 319 -323 vol.1 - 319 -323 vol.1 %8 1997/08// %G eng %R 10.1109/ICDAR.1997.619864 %0 Conference Paper %B , 1997 International Conference on Parallel Architectures and Compilation Techniques., 1997. Proceedings %D 1997 %T MDL: a language and compiler for dynamic program instrumentation %A Hollingsworth, Jeffrey K %A Niam, O. %A Miller, B. P %A Zhichen Xu %A Goncalves,M. J.R %A Ling Zheng %K Alpha architecture %K application program %K application program interfaces %K Application software %K compiler generators %K Computer science %K dynamic code generation %K Dynamic compiler %K dynamic program instrumentation %K Educational institutions %K files %K instrumentation code %K Instruments %K MDL %K measurement %K message channels %K Message passing %K Metric Description Language %K modules %K nodes %K Operating systems %K optimising compilers %K PA-RISC %K Paradyn Parallel Performance Tools %K Parallel architectures %K parallel programming %K performance data %K platform independent descriptions %K Power 2 architecture %K Power generation %K procedures %K program debugging %K Program processors %K running programs %K Runtime %K software metrics %K SPARC %K Specification languages %K x86 architecture %X We use a form of dynamic code generation, called dynamic instrumentation, to collect data about the execution of an application program. Dynamic instrumentation allows us to instrument running programs to collect performance and other types of information. The instrumentation code is generated incrementally and can be inserted and removed at any time. Our instrumentation currently runs on the SPARC, PA-RISC, Power 2, Alpha, and x86 architectures. Specification of what data to collect are written in a specialized language called the Metric Description Language, that is part of the Paradyn Parallel Performance Tools. This language allows platform independent descriptions of how to collect performance data. It also provides a concise way to specify, how to constrain performance data to particular resources such as modules, procedures, nodes, files, or message channels (or combinations of these resources). We also describe the details of how we weave instrumentation into a running program %B , 1997 International Conference on Parallel Architectures and Compilation Techniques., 1997. Proceedings %I IEEE %P 201 - 212 %8 1997/11/10/14 %@ 0-8186-8090-3 %G eng %R 10.1109/PACT.1997.644016 %0 Conference Paper %B Proceedings of the eighteenth international conference on Information systems %D 1997 %T Mechanism design for intellectual property rights protection %A Giridharan,P. S. %A Srinivasan, Aravind %B Proceedings of the eighteenth international conference on Information systems %S ICIS '97 %I Association for Information Systems %C Atlanta, GA, USA %P 448– - 448– %8 1997/// %G eng %U http://dl.acm.org/citation.cfm?id=353071.353206 %0 Journal Article %J SIAM Journal on Scientific Computing %D 1997 %T Regularization by Truncated Total Least Squares %A Fierro,R. D. %A Golub, G. H %A Hansen,P. C. %A O'Leary, Dianne P. %K bidiagonalization %K discrete ill-posed problems %K regularization %K total least squares %X The total least squares (TLS) method is a successful method for noise reduction in linear least squares problems in a number of applications. The TLS method is suited to problems in which both the coefficient matrix and the right-hand side are not precisely known. This paper focuses on the use of TLS for solving problems with very ill-conditioned coefficient matrices whose singular values decay gradually (so-called discrete ill-posed problems), where some regularization is necessary to stabilize the computed solution. We filter the solution by truncating the small singular values of the TLS matrix. We express our results in terms of the singular value decomposition (SVD) of the coefficient matrix rather than the augmented matrix. This leads to insight into the filtering properties of the truncated TLS method as compared to regularized least squares solutions. In addition, we propose and test an iterative algorithm based on Lanczos bidiagonalization for computing truncated TLS solutions. %B SIAM Journal on Scientific Computing %V 18 %P 1223 - 1241 %8 1997/// %G eng %U http://link.aip.org/link/?SCE/18/1223/1 %N 4 %R 10.1137/S1064827594263837 %0 Conference Paper %B Data Engineering, 1997. Proceedings. 13th International Conference on %D 1997 %T Semantic query optimization for object databases %A Grant,J. %A Gryz,J. %A Minker, Jack %A Raschid, Louiqa %K application;object %K constraints;keys;method %K constructors;DATALOG;data %K databases;object-oriented %K databases;query %K Datalog %K Evaluation %K integrity;data %K languages;query %K Logic %K object %K optimization;structure %K plans;residue %K processing;software %K query %K query;access %K query;integrity %K relations;equivalent %K representation;ODL %K schema;ODMG-93 %K standard;OQL %K standards; %K structures;object-oriented %K Support %K technique;semantic %X Presents a technique for semantic query optimization (SQO) for object databases. We use the ODMG-93 (Object Data Management Group) standard ODL (Object Database Language) and OQL (Object Query Language) languages. The ODL object schema and the OQL object query are translated into a DATALOG representation. Semantic knowledge about the object model and the particular application is expressed as integrity constraints. This is an extension of the ODMG-93 standard. SQO is performed in the DATALOG representation, and an equivalent logic query and (subsequently) an equivalent OQL object query are obtained. SQO is based on the residue technique of Chakravarthy et al. (1990). We show that our technique generalizes previous research on SQO for object databases. It can be applied to queries with structure constructors and method application. It utilizes integrity constraints about keys, methods and knowledge of access support relations, to produce equivalent queries, which may have more efficient evaluation plans %B Data Engineering, 1997. Proceedings. 13th International Conference on %P 444 - 453 %8 1997/04// %G eng %R 10.1109/ICDE.1997.581983 %0 Conference Paper %B Data Engineering, 1997. Proceedings. 13th International Conference on %D 1997 %T Semantic query optimization for object databases %A Grant,J. %A Gryz,J. %A Minker, Jack %A Raschid, Louiqa %B Data Engineering, 1997. Proceedings. 13th International Conference on %P 444 - 453 %8 1997/// %G eng %0 Conference Paper %B Computer Aided Verification %D 1997 %T Symbolic model checking of infinite state systems using Presburger arithmetic %A Bultan,T. %A Gerber,R. %A Pugh, William %B Computer Aided Verification %P 400 - 411 %8 1997/// %G eng %0 Journal Article %J Computer-Aided Design %D 1997 %T Towards multiprocessor feature recognition %A Regli,William C. %A Gupta, Satyandra K. %A Nau, Dana S. %K Distributed computing %K feature recognition %K feature-based modelling %K multiprocessor solid modelling %X The availability of low-cost computational power is enabling the development of increasingly sophisticated cad software. Automation of design and manufacturing activities poses many difficult computational problems—significant among them is how to develop interactive systems that enable designers to explore and experiment with alternative ideas. As more downstream manufacturing activities are considered during the design phase, computational costs become problematic. Creating working software-based solutions requires a sophisticated allocation of computational resources in order to perform realistic design analyses and generate feedback. This paper presents our initial efforts to employ multiprocessor algorithms to recognize machining features from solid models of parts with large numbers of features and many geometric and topological entities. Our goal is to outline how improvements in computation time can be obtained by migrating existing software tools to multiprocessor architectures. An implementation of our approach is discussed. %B Computer-Aided Design %V 29 %P 37 - 51 %8 1997/01// %@ 0010-4485 %G eng %U http://www.sciencedirect.com/science/article/pii/S0010448596000474 %N 1 %R 10.1016/S0010-4485(96)00047-4 %0 Journal Article %J Journal of Mechanical Design %D 1997 %T Using manufacturing planning to generate manufacturability feedback %A Gupta,S.K. %B Journal of Mechanical Design %V 119 %P 73 - 73 %8 1997/// %G eng %0 Journal Article %J Human Factors in Web Development %D 1997 %T A zooming web browser %A Bederson, Benjamin B. %A Hollan,J.D. %A Stewart,J. %A Rogers,D. %A Druin, Allison %A Vick,D. %A Ring,L. %A Grose,E. %A Forsythe,C. %B Human Factors in Web Development %8 1997/// %G eng %0 Conference Paper %B Proceedings of the 4th Bar-Ilan Symposium on Foundations of AI %D 1996 %T Disjunctive deductive databases: Semantics, updates and architecture %A Fernandez,J. A. %A Gryz,J. %A Minker, Jack %X The basic assumption in relational and deductive databases is that there are no gaps in our knowledge. That is, the database cannot store data that contain null values or data that is indefinite. In practical situations knowledge is not precise, and there are gaps in our knowledge. These gaps may be due to null values in the data, may arise when we combine several databases that lead to inconsistent theories, or may occur because information is indefinite in nature, such as in military or medical applications. In this paper we describe semantics for disjunctive deductive databases that extend the work in deductive databases, solve the view update problem, and permit indefinite data to be represented efficiently. Hierarchic, stratified, and normal stable models of disjunctive databases are described. An architecture is proposed for a disjunctive deductive database system and a class of theories for which the architecture will be effective is discussed. %B Proceedings of the 4th Bar-Ilan Symposium on Foundations of AI %P 256 - 274 %8 1996/// %G eng %0 Journal Article %J Languages and Compilers for Parallel Computing %D 1996 %T Efficient distribution analysis via graph contraction %A Sheffler,T. %A Schreiber,R. %A Pugh, William %A Gilbert,J. %A Chatterjee,S. %B Languages and Compilers for Parallel Computing %P 377 - 391 %8 1996/// %G eng %0 Journal Article %J Empirical Software Engineering %D 1996 %T The empirical investigation of Perspective-Based Reading %A Basili, Victor R. %A Green,Scott %A Laitenberger,Oliver %A Lanubile,Filippo %A Shull, Forrest %A Sørumgård,Sivert %A Zelkowitz, Marvin V %K Computer %K Science %X We consider reading techniques a fundamental means of achieving high quality software. Due to the lack of research in this area, we are experimenting with the application and comparison of various reading techniques. This paper deals with our experiences with a family of reading techniques known as Perspective-Based Reading (PBR), and its application to requirements documents. The goal of PBR is to provide operational scenarios where members of a review team read a document from a particular perspective, e.g., tester, developer, user. Our assumption is that the combination of different perspectives provides better coverage of the document, i.e., uncovers a wider range of defects, than the same number of readers using their usual technique. %B Empirical Software Engineering %V 1 %P 133 - 164 %8 1996/// %@ 1382-3256 %G eng %U http://dx.doi.org/10.1007/BF00368702 %N 2 %0 Journal Article %J Computer-Aided Design %D 1996 %T Generating redesign suggestions to reduce setup cost: a step towards automated redesign %A Das,Diganta %A Gupta, Satyandra K. %A Nau, Dana S. %X All mechanical designs pass through a series of formal and informal redesign steps, involving the analysis of functionality, manufacturability, cost and other life-cycle factors. The speed and efficacy of these steps has a major influence on the lead time of the product from conceptualization to launching. In this paper we propose a methodology for automatically generating redesign suggestions for reducing setup costs for machined parts.Given an interpretation of the design as a collection of machinable features, our approach is to generate alternate machining features by making geometric changes to the original features, and add them to the feature set of the original part to create an extended feature set. The designer may provide restrictions on the design indicating the type and extent of modifications allowed on certain faces and volumes, in which case all redesign suggestions generated by our approach honour those restrictions. By taking combinations of features from the extended feature set generated above, we can generate modified versions of the original design that still satisfy the designer's intent. By considering precedence constraints, we can estimate the setup time that will be required for each design. Any modified design whose setup time is less than that of the original design can be presented to the designer as a possible way to modify the original design. %B Computer-Aided Design %V 28 %P 763 - 782 %8 1996/10// %@ 0010-4485 %G eng %U http://www.sciencedirect.com/science/article/pii/0010448595000348 %N 10 %R 10.1016/0010-4485(95)00034-8 %0 Conference Paper %B Euro-Par'96 Parallel Processing %D 1996 %T A high performance image database system for remotely sensed imagery %A Shock,C. %A Chang,C. %A Davis, Larry S. %A Goward,S. %A Saltz, J. %A Sussman, Alan %B Euro-Par'96 Parallel Processing %P 109 - 122 %8 1996/// %G eng %0 Conference Paper %B Neural Networks, 1996., IEEE International Conference on %D 1996 %T Learning activation rules for associative networks %A Reggia, James A. %A Grundstrom,E. %A Berndt,R. S %B Neural Networks, 1996., IEEE International Conference on %V 1 %P 365 - 370 %8 1996/// %G eng %0 Journal Article %J International journal of neural systems %D 1996 %T Learning Activation Rules Rather Than Connection Weights %A Grundstrom,E. L %A Reggia, James A. %B International journal of neural systems %V 7 %P 129 - 148 %8 1996/// %G eng %N 2 %0 Journal Article %J Journal of Automated Reasoning %D 1996 %T Model theoretic approach to view updates in deductive databases %A Fernandez,J. A. %A Grant,J. %A Minker, Jack %X The view update problem for deductive databases has been defined as the problem of accomplishing the update of an intensional predicate by modifying appropriately the extensional database. A previous paper by Grant, Horty, Lobo, and Minker developed algorithms for the insertion and the deletion of an intensional predicate in certain important classes of stratified disjunctive deductive databases. This paper introduces a model theoretic approach which encompasses a wide class of Herbrand semantics, including the perfect model and stable model semantics, for disjunctive databases including negation. This generalizes the earlier results: now the intensional database may contain disjunctive and denial rules, and the database may be required to satisfy integrity constraints. As in the previous paper, the algorithms are proved to be correct and best according to the criterion of causing minimal change to the database, where the first priority is to minimize deletions. %B Journal of Automated Reasoning %V 17 %P 171 - 197 %8 1996/// %G eng %N 2 %R 10.1007/BF00244495 %0 Journal Article %J Foundations of Intelligent Systems %D 1996 %T Semantic query optimization for bottom-up evaluation %A Godfrey,P. %A Gryz,J. %A Minker, Jack %X Semantic query optimization uses semantic knowledge in databases (represented in the form of integrity constraints) to rewrite queries and logic programs to achieve efficient query evaluation. Much work has been done to develop various techniques for optimization. Most of it, however, is applicable to top-down query evaluation strategies. Moreover, little attention has been paid to the cost of the optimization. We address the issue of semantic query optimization for bottom-up query evaluation strategies with an emphasis on overall efficiency. We focus on a single optimization technique, join elimination. We discuss factors that influence the cost of semantic optimization, and present two different abstract algorithms for optimization. The first pre-processes a query statically before it is evaluated; the second combines query evaluation with semantic optimization using heuristics to achieve the largest possible savings. %B Foundations of Intelligent Systems %P 561 - 571 %8 1996/// %G eng %R 10.1007/3-540-61286-6_180 %0 Journal Article %J International Journal of Communication Systems %D 1996 %T SEROS – A SELF-ROUTING OPTICAL ATM SWITCH %A Guizani,Mohsen %A Memon, Atif M. %K 2 × 2 ATM switch %K fault-tolerant %K MINs %K photonic switching network %K reliability %K self-routing %X A fault-tolerant high-performance SElf-Routing 2 × 2 Optical ATM Switch (SEROS) is proposed. The switch is designed using all-optical components which allows the exploitation of spatial parallelism. SEROS can be used with any multistage interconnection network such as Omega, Banyan, Shuffle or Benes. For the purpose of this study, SEROS has been incorporated into a generic self-routing multistage interconnection network that uses 2 × 2 switches and is not fault tolerant. Reliability analysis is carried out and the results are compared with two major fault-tolerant networks. They show that without redundant switches, better network survivability is achieved. All the switches in the network are 2 × 2, making it easier to mass produce. %B International Journal of Communication Systems %V 9 %P 115 - 125 %8 1996/// %@ 1099-1131 %G eng %U http://onlinelibrary.wiley.com/doi/10.1002/(SICI)1099-1131(199603)9:2<115::AID-DAC301>3.0.CO;2-B/abstract %N 2 %R 10.1002/(SICI)1099-1131(199603)9:2<115::AID-DAC301>3.0.CO;2-B %0 Conference Paper %B Pattern Recognition, 1996., Proceedings of the 13th International Conference on %D 1996 %T Space/time trade-offs for associative memory %A GROVE,A. J %A Jacobs, David W. %K access %K matching;set %K memory;associative %K nets;pattern %K processing;content-addressable %K query;memory %K recall;membership %K scheme;associative %K space;set %K storage;neural %K theory; %K theory;storage %K time;associative %X In any storage scheme, there is some trade-off between the space used (size of memory) and access time. However, the nature of this trade-off seems to depend on more than just what is being stored-it also depends the types of queries we consider. We justify this claim by considering a particular memory model and contrast recognition (membership queries) with associative recall. We show that the latter task can require exponentially larger memories even when identical information is stored %B Pattern Recognition, 1996., Proceedings of the 13th International Conference on %V 4 %P 296 -302 vol.4 - 296 -302 vol.4 %8 1996/08// %G eng %R 10.1109/ICPR.1996.547434 %0 Report %D 1995 %T Automated Manufacturability Analysis: A Survey %A Das,Diganta %A Gupta, Satyandra K. %A Regli,W. C. %A Nau, Dana S. %K manufacturability %K Manufacturing %K Solid modeling %K Systems Integration Methodology %X In the marketplace of the 21st century, there is no place for traditional ``over-the-wall'' communications between design and manufacturing. In order to ``design it right the very first time,'' designers must ensure that their products are both functional and easy to manufacture. Software tools have had some successes in reducing the barriers between design and manufacturing. Manufacturability analysis systems are emerging as one such tool---enabling identification of potential manufacturing problems during the design phase and providing suggestions to designers on how to eliminate them.
In this paper, we provide a survey of current state of the art in automated manufacturability analysis. We present the historical context in which this area has emerged and outline characteristics to compare and classify various systems. We describe the two dominant approaches to automated manufacturability analysis and overview representative systems based on their application domain. We describe support tools that enhance the effectiveness of manufacturability analysis systems. Finally, we attempt to expose some of the existing research challenges and future directions.
%I Institute for Systems Research, University of Maryland, College Park %V ISR; TR 1995-14 %8 1995/// %G eng %U http://drum.lib.umd.edu//handle/1903/5609 %0 Thesis %D 1995 %T Automated Manufacturability Analysis of Machined Parts %A Gupta, Satyandra K. %K Automation %K computer aided manufacturing %K computer integrated manufacturing %K Feature extraction %K flexible manufacturing %K manufacturability %K Manufacturing %K Solid modeling %X Because of pressing demands to reduce lead time and product cost, increasing research attention is being given to integration of engineering design and manufacturing. In this thesis, a systematic approach has been developed for computer-aided manufacturability analysis of machined parts. This approach can be used during design stages to improve the product quality from the manufacturing point of view.
Evaluating the manufacturability of a proposed design involves determining whether or not it is manufacturable with a given set of manufacturing operations - and if so, then finding the associated manufacturing efficiency. In this research, the design is represented as a solid model. The tolerance and surface finish information is represented as attributes of various faces of the solid model. Machining features are used to model the available machining operations Since there can be several different ways to manufacture a proposed design, this requires considering alternative ways to manufacture it, in order to determine which one best meets the design and manufacturing objectives.
The approach developed in this thesis is based on the systematic exploration of various machining plans. The first step is to identify all machining features which can potentially be used to machine the given design. Using these features, different machining plans are generated. Each time a new plan generated, it is examined to find whether it can produce the desired design tolerances. If a plan is found to be capable of meeting the tolerance specifications, then its rating is computed. If no machining plan can be found that is capable of producing the design, then the design cannot be machined using the given set of machining operations; otherwise, the manufacturability rating of the design is computed. Since various alternative ways of machining the part are considered in this approach, the conclusions about the manufacturability are more realistic compared to the approach where just one alternative is considered.
It is anticipated that this research will help in speeding up the evaluation of new product designs in order to decide how or whether to manufacture them. Such a capability will be useful in responding quickly to changing demands and opportunities in the marketplace. %I UNIVERSITY OF MARYLAND, COLLEGE PARK %8 1995/// %G eng %U http://drum.lib.umd.edu//handle/1903/5693 %0 Journal Article %J Integrated Planning Applications %D 1995 %T The COLLAGE/KHOROS link: Planning for image processing tasks %A Lansky,A. %A Friedman,M. %A Getoor, Lise %A Schmidler,S. %A Short Jr,N. %B Integrated Planning Applications %P 67 - 76 %8 1995/// %G eng %0 Report %D 1995 %T Current Trends and Future Challenges in Automated Manufacturability Analysis %A Gupta, Satyandra K. %A Das,Diganta %A Regli,W. C. %A Nau, Dana S. %K computer integrated manufacturing %K manufacturability %K Manufacturing %K Solid modeling %K Systems Integration Methodology %X In the marketplace of the 21st century, there is no place for traditional communications between design and manufacturing. In order to ``design it right the first time,'' designers must ensure that their products are both functional and easy to manufacture. Software tools have had some successes in reducing the barriers between design and manufacturing. Manufacturability analysis systems are emerging as one such tool---enabling identification of potential manufacturing problems during the design phase and providing suggestions to designers on how to eliminate them.
In this paper, we survey of current state of the art in automated manufacturability analysis. We describe the two dominant approaches to automated manufacturability analysis and overview representative systems based on their application domain. Finally, we attempt to expose some of the existing research challenges and future directions. %I Institute for Systems Research, University of Maryland, College Park %V ISR; TR 1995-16 %8 1995/// %G eng %U http://drum.lib.umd.edu//handle/1903/5611 %0 Conference Paper %B , Tenth Annual IEEE Symposium on Logic in Computer Science, 1995. LICS '95. Proceedings %D 1995 %T Efficient on-the-fly model checking for CTL %A Bhat,G. %A Cleaveland, Rance %A Grumberg,O. %K Algorithm design and analysis %K Automata %K computational complexity %K Computer science %K CTL %K Encoding %K finite automata %K finite-state system %K global algorithm %K Logic %K LTL %K on-the-fly model checking %K Performance analysis %K Safety %K State-space methods %K sublogic %K temporal logic %K time complexity %X This paper gives an on-the-fly algorithm for determining whether a finite-state system satisfies a formula in the temporal logic CTL. The time complexity of our algorithm matches that of the best existing “global algorithm” for model checking in this logic, and it performs as well as the best known global algorithms for the sublogics CTL and LTL. In contrast with these approaches, however, our routine constructs the state space of the system under consideration in a need-driven fashion and will therefore perform better in practice %B , Tenth Annual IEEE Symposium on Logic in Computer Science, 1995. LICS '95. Proceedings %I IEEE %P 388 - 397 %8 1995/06/26/29 %@ 0-8186-7050-9 %G eng %R 10.1109/LICS.1995.523273 %0 Journal Article %J COMPUTERS IN ENGINEERING %D 1995 %T Estimation of setup time for machined parts: accounting for work-holding constraints using a vise %A Das,D. %A Gupta,S.K. %A Nau, Dana S. %X For machined parts, setup time is a major component ofthe total time required to manufacture a machined part from a stock. If the number of setups and hence setup time can be reduced, this will not only decrease the manufacturing time, but will also ensure better machining accuracy, require fewer work-holding devices and increase machine usage time. To achieve any improvement in setup time, rst we need to estimate the setup time accurately. In this paper we pro- pose a methodology to estimate the setup time for machin- ing prismatic parts in a three axis vertical machining center. We concurrently consider three major factors for estimating the number of setups, namely|the precedence constraints among machining operations, the feasibility of work holding using vise clamping, and the availability of datum faces for locating the workpiece on the machine table during machin- ing on a 3 axis vertical machining center. %B COMPUTERS IN ENGINEERING %P 619 - 632 %8 1995/// %G eng %U http://www.cs.umd.edu/~nau/papers/das1995estimation.pdf %0 Journal Article %J Machine Learning %D 1995 %T Evaluation and selection of biases in machine learning %A Gordon,Diana F. %A desJardins, Marie %X In this introduction, we define the term bias as it is used in machine learning systems. We motivate the importance of automated methods for evaluating and selecting biases using a framework of bias selection as search in bias and meta-bias spaces. Recent research in the field of machine learning bias is summarized. %B Machine Learning %V 20 %P 5 - 22 %8 1995/// %@ 0885-6125 %G eng %U http://dx.doi.org/10.1007/BF00993472 %N 1 %0 Journal Article %J Goal-Driven Learning %D 1995 %T Explicitly Biased Generalization %A Gordon,D. %A Perlis, Don %B Goal-Driven Learning %P 321 - 354 %8 1995/// %G eng %0 Journal Article %J Research in Engineering Design %D 1995 %T Extracting alternative machining features: An algorithmic approach %A Regli,William C. %A Gupta, Satyandra K. %A Nau, Dana S. %K engineering %X Automated recognition of features from CAD models has been attempted for a wide range of application domains. In this article we address the problem of representing and recognizing a complete class of features in alternative interpretation for a given design. %B Research in Engineering Design %V 7 %P 173 - 192 %8 1995/// %@ 0934-9839 %G eng %U http://www.springerlink.com/content/t271m7t670m36484/abstract/ %N 3 %R 10.1007/BF01638098 %0 Conference Paper %D 1995 %T Interactive feature recognition using multi-processor methods %A Regli,W. C. %A Gupta,S.K. %A Nau, Dana S. %8 1995/// %G eng %0 Conference Paper %B Geoscience and Remote Sensing Symposium, 1995. IGARSS '95. 'Quantitative Remote Sensing for Science and Applications', International %D 1995 %T Land cover dynamics investigation using parallel computers %A Liang, S. %A Davis, Larry S. %A Townshend,J. %A Chellapa, Rama %A DeFries, R. %A Dubayah, R. %A Goward,S. %A JaJa, Joseph F. %A Krishnamachar, S. %A Roussopoulos, Nick %A Saltz, J. %A Samet, Hanan %A Shock,T. %A Srinivasan, M. %K ; geographic information system; geophysical measurement technique; geophysics computing; image classification; image map database; image segmentation; land cover dynamics; land surface; mixture modeling; object oriented programming; optical imaging; para %K GIS; IR imaging; Markovian random fields; atmospheric correction %X A comprehensive and highly interdisciplinary research program is being carried out to investigate global land cover dynamics in heterogeneous parallel computing environments. Some of the problems are addressed including atmospheric correction, mixture modeling, image classifications by Markovian random fields and by segmentation, global image/map databases, object oriented parallel programming and parallel/IO. During the initial two years project, significant progress has been made in all of these areas %B Geoscience and Remote Sensing Symposium, 1995. IGARSS '95. 'Quantitative Remote Sensing for Science and Applications', International %V 1 %P 332 -334 vol.1 - 332 -334 vol.1 %8 1995//10/14 %G eng %R 10.1109/IGARSS.1995.520273 %0 Journal Article %J Journal of Molecular Biology %D 1995 %T Localization of Sequences Required for Size-specific Splicing of a SmallDrosophilaIntronin Vitro %A Guo,Ming %A Mount, Stephen M. %K Drosophila; pre-mRNA splicing; intron size; species specificity; in vitrosplicing %X Many introns inDrosophilaand other invertebrates are less than 80 nucleotides in length, too small to be recognized by the vertebrate splicing machinery. Comparison of nuclear splicing extracts from human HeLa andDrosophilaKc cells has revealed species-specificity, consistent with the observed size differences. Here we present additional results with the 68 nucleotide fifth intron of theDrosophilamyosin heavy chain gene. As observed with the 74 nucleotide second intron of theDrosophilawhite gene, the wild-type myosin intron is accurately spliced in a homologous extract, and increasing the size by 16 nucleotides both eliminates splicing in theDrosophilaextract and allows accurate splicing in the human extract. In contrast to previous results, however, an upstream cryptic 5′ splice site is activated when the wild-type myosin intron is tested in a human HeLa cell nuclear extract, resulting in the removal of 98 nucleotide intron.The size dependence of splicing inDrosophilaextracts is also intron-specific; we noted that a naturally larger (150 nucleotide) intron from theftzgene is efficiently spliced in Kc cell extracts that do not splice enlarged introns (of 84, 90, 150 or 350 nucleotides) derived from the 74 nucleotidewhiteintron. Here, we have exploited that observation, using a series of hybrid introns to show that a region of 46 nucleotides at the 3′ end of thewhiteintron is sufficient to confer the species-specific size effect. At least two sequence elements within this region, yet distinct from previously described branchpoint and pyrimidine tract signals, are required for efficient splicing of small splicing of small hybrid intronsin vitro. %B Journal of Molecular Biology %V 253 %P 426 - 437 %8 1995/10/27/ %@ 0022-2836 %G eng %U http://www.sciencedirect.com/science/article/pii/S0022283685705645 %N 3 %R 10.1006/jmbi.1995.0564 %0 Conference Paper %D 1995 %T Manufacturing feature instances: which ones to recognize? %A Gupta, Satyandra K. %A Regli,William C. %A Nau, Dana S. %S SMA '95 %I ACM %C New York, NY, USA %P 141 - 152 %8 1995/// %@ 0-89791-672-7 %G eng %U http://doi.acm.org/10.1145/218013.218052 %R 10.1145/218013.218052 %0 Journal Article %J AIP Conference Proceedings %D 1995 %T Next generation network management technology %A Baras,John S %A Atallah,George C %A Ball,Mike %A Goli,Shravan %A Karne,Ramesh K %A Kelley,Steve %A Kumar,Harsha %A Plaisant, Catherine %A Roussopoulos, Nick %A Schneiderman,Ben %A Srinivasarao,Mulugu %A Stathatos,Kosta %A Teittinen,Marko %A Whitefield,David %X Today’s telecommunications networks are becoming increasingly large, complex, mission critical and heterogeneous in several dimensions. For example, the underlying physical transmission facilities of a given network may be ‘‘mixed media’’ (copper, fiber‐optic, radio, and satellite); the subnetworks may be acquired from different vendors due to economic, performance, or general availability reasons; the information being transmitted over the network may be ‘‘multimedia’’ (video, data, voice, and images) and, finally, varying performance criteria may be imposed e.g., data transfer may require high throughput while the others, whose concern is voice communications, may require low call blocking probability. For these reasons, future telecommunications networks are expected to be highly complex in their services and operations. Due to this growing complexity and the disparity among management systems for individual sub‐networks, efficient network management systems have become critical to the current and future success of telecommunications companies. This paper addresses a research and development effort which focuses on prototyping configuration management, since that is the central process of network management and all other network management functions must be built upon it. Our prototype incorporates ergonomically designed graphical user interfaces tailored to the network configuration management subsystem and to the proposed advanced object‐oriented database structure. The resulting design concept follows open standards such as Open Systems Interconnection (OSI) and incorporates object oriented programming methodology to associate data with functions, permit customization, and provide an open architecture environment. © 1995 American Institute of Physics %B AIP Conference Proceedings %V 325 %P 75 - 82 %8 1995/01/25/ %@ 0094243X %G eng %U http://proceedings.aip.org/resource/2/apcpcs/325/1/75_1?isAuthorized=no %N 1 %R doi:10.1063/1.47255 %0 Journal Article %J IEEE Transactions on ComputersIEEE Trans. Comput. %D 1995 %T Parametric dispatching of hard real-time tasks %A Gerber,R. %A Pugh, William %A Saksena,M. %B IEEE Transactions on ComputersIEEE Trans. Comput. %V 44 %P 471 - 479 %8 1995/03// %@ 00189340 %G eng %U http://dl.acm.org/citation.cfm?id=626999 %N 3 %R 10.1109/12.372041 %0 Book Section %B Combinatorial Pattern MatchingCombinatorial Pattern Matching %D 1995 %T Polynomial-time algorithm for computing translocation distance between genomes %A Hannenhalli, Sridhar %E Galil,Zvi %E Ukkonen,Esko %X With the advent of large-scale DNA physical mapping and sequencing, studies of genome rearrangements are becoming increasingly important in evolutionary molecular biology. From a computational perspective, study of evolution based on rearrangements leads to rearrangement distance problem, i.e., computing the minimum number of rearrangement events required to transform one genome into another. Different types of rearrangement events give rise to a spectrum of interesting combinatorial problems. The complexity of most of these problems is unknown. Multichromosomal genomes frequently evolve by a rearrangement event called translocation which exchanges genetic material between different chromosomes. In this paper we study the translocation distance problem, modeling evolution of genomes evolving by translocations. Translocation distance problem was recently studied for the first time by Kececioglu and Ravi, who gave a 2-approximation algorithm for computing translocation distance. In this paper we prove a duality theorem leading to a polynomial algorithm for computing translocation distance for the case when the orientation of the genes are known. This leads to an algorithm generating a most parsimonious (shortest) scenario, transforming one genome into another by translocations. %B Combinatorial Pattern MatchingCombinatorial Pattern Matching %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 937 %P 162 - 176 %8 1995/// %@ 978-3-540-60044-2 %G eng %U http://dx.doi.org/10.1007/3-540-60044-2_41 %0 Journal Article %J American Association of Artificial Intelligence Spring Symposium on Representing Mental States and Mechanisms %D 1995 %T Representing a student’s learning states and transitions %A Gurer,D. %A desJardins, Marie %A Schlager,M. %X We describe an ongoing project to develop an adaptive training system (ATS) that dynamically models a student’s learning processes and can provide specialized tutoring adapted to a student’s knowledge state and learning style. The student modeling component of the ATS, ML-Modeler, uses machine learning (ML) techniques to emulate the student’s novice-toexpert transition. ML-Modeler infers which learning methods the student has used to reach the current knowledge state by comparing the student’s solution trace to an expert solution and generating plausible hypotheses about what misconceptions and errors the student has made. A case-based approach is used to generate hypotheses through incorrectly applying analogy, overgeneralization, and overspecialization. The student and expert models use a network-based representation that includes abstract concepts and relationships as well as strategies for problem solving. Fuzzy methods are used to represent the uncertainty in the student model. This paper describes the design of the ATS and ML-Modeler, and gives a detailed example of how the system would model and tutor the student in a typical session. The domain we use for this example is high-school level chemistry. %B American Association of Artificial Intelligence Spring Symposium on Representing Mental States and Mechanisms %8 1995/// %G eng %0 Journal Article %J INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE %D 1995 %T Scope and abstraction: Two criteria for localized planning %A Lansky,A. L %A Getoor, Lise %X Localization is a general-purpose representational technique for partitioning a problem intosubproblems. A localized problem-solver searches several smaller search spaces, one for each subproblem. Unlike most methods of partitioning, however, localization allows for subprob- lems that overlap i.e. multiple search spaces may be involved in constructing shared pieces of the overall plan. In this paper we focus on two criteria for forming localizations: scope and abstraction. We describe a method for automatically generating such localizations and provide empirical results that contrast their use in an o ce-building construction domain. %B INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE %V 14 %P 1612 - 1619 %8 1995/// %G eng %0 Conference Paper %B In Proceedings of IJCAI-95 %D 1995 %T Selecting Tense, Aspect, and Connecting Words In Language Generation %A Dorr, Bonnie J %A Gaasterland,Terry %X Generating language that reflects the temporal organization of represented knowledge requires a language generation model that integrates contemporary theories of tense and aspect, temporal representations, and methods to plan text. This paper presents a model that produces complex sentences that reflect temporal relations present in underlying temporal concepts. The main result of this work is the successful application of constrained linguistic theories of tense and aspect to a generator which produces meaningful event combinations and selects appropriate connecting words that relate them. 1 Introduction Reasoning about temporal knowledge and formulating answers to questions that involve time necessitate the presentation of temporal information to users. One approach is to incorporate the temporal information directly into natural language paraphrases of the represented knowledge. This requires a method to plan language that contains not only tense selections, but aspect selections... %B In Proceedings of IJCAI-95 %P 1299 - 1305 %8 1995/// %G eng %0 Journal Article %J Computer-Aided Design %D 1995 %T Systematic approach to analysing the manufacturability of machined parts %A Gupta, Satyandra K. %A Nau, Dana S. %K computer-aided manufacturability analysis %K design for manufacturability %K feature-based models %X The ability to quickly introduce new quality products is a decisive factor in capturing market share. Because of pressing demands to reduce leadtimes, analysing the manufacturability of the proposed design has become an important step in the design stage. The paper presents an approach to analysing the manufacturability of machined parts.Evaluating the manufacturability of a proposed design involves determining whether or not it is manufacturable with a given set of manufacturing operations, and, if it is, finding the associated manufacturing efficiency. Since there can be several different ways to manufacture a proposed design, this requires that different ways to manufacture it be considered, in order to determine which one best meets the design and manufacturing objectives. The first step in the approach is to identify all the machining operations which can potentially be used to create the given design. Using these operations, different operation plans are generated for machining the part. Each time a new operation plan is generated, the user examines whether it can produce the desired shape and tolerances, and calculates its manufacturability rating. If no operation plan can be found that is capable of producing the design, then the given design is considered unmachinable; otherwise, the manufacturability rating for the design is the rating of the best operation plan. The authors expect that, by providing feedback about possible problems with the design, the work described in the paper will help in speeding up the evaluation of new product designs so that it can be decided how or whether to manufacture them. Such a capability will be useful in responding quickly to changing demands and opportunities in the marketplace. %B Computer-Aided Design %V 27 %P 323 - 342 %8 1995/05// %@ 0010-4485 %G eng %U http://www.sciencedirect.com/science/article/pii/001044859596797P %N 5 %R 10.1016/0010-4485(95)96797-P %0 Journal Article %J AI Magazine %D 1994 %T AAAI 1994 Spring Symposium Series Reports %A Woods,William %A Uckun,Sendar %A Kohane,Isaac %A Bates,Joseph %A Hulthage,Ingemar %A Gasser,Les %A Hanks,Steve %A Gini,Maria %A Ram,Ashwin %A desJardins, Marie %A Johnson,Peter %A Etzioni,Oren %A Coombs,David %A Whitehead,Steven %B AI Magazine %V 15 %P 22 - 22 %8 1994/09/15/ %@ 0738-4602 %G eng %U http://www.aaai.org/ojs/index.php/aimagazine/article/viewArticle/1101 %N 3 %R 10.1609/aimag.v15i3.1101 %0 Report %D 1994 %T An Application of Distributed Solid Modeling: Feature Recognition %A Regli,W. C. %A Gupta, Satyandra K. %A Nau, Dana S. %K Distributed computing %K feature recognition %K feature- based modeling %K multiprocessor solid modeling %K Systems Integration Methodology %X The availability of low-cost computational power is a driving force behind the growing sophistication of CAD software. Tools designed to reduce time-consuming build-test-redesign iterations are essential for increasing engineering quality and productivity. However, automation of the design process poses many difficult computational problems. As more downstream engineering activities are being considered during the design phase, guaranteeing reasonable response times within design systems becomes problematic. Design is an interactive process and speed is a critical factor in systems that enable designers to explore and experiment with alternative ideas during the design phase. Achieving interactivity requires an increasingly sophisticated allocation of computational resources in order to perform realistic design analyses and generate feedback in real time.
This paper presents our initial efforts to develop techniques to apply distributed algorithms to the problem of recognizing machining features from solid models. Existing work on recognition of features has focused exclusively on serial computer architectures. Our objective is to show that distributed algorithms can be employed on realistic parts with large numbers of features and many geometric and topological entities to obtain significant improvements in computation time using existing hardware and software tools. Migrating solid modeling applications toward a distributed computing frame-work enables interconnection of many of the autonomous and geographically diverse software tools used in the modern manufacturing enterprise.
This has been implemented on a network of SUN workstations using the ACIS solid modeler and the NIH C++ class library; inter-processor communication is handled with TCP/IP- based network communication tools. %I Institute for Systems Research, University of Maryland, College Park %V ISR; TR 1994-82 %8 1994/// %G eng %U http://drum.lib.umd.edu//handle/1903/5552 %0 Journal Article %J Advances in Engineering Software %D 1994 %T Building MRSEV models for CAM applications %A Gupta, Satyandra K. %A Kramer,Thomas R. %A Nau, Dana S. %A Regli,William C. %A Zhang,Guangming %K CAD/CAM integration %K design critiquing %K feature recognition %X In integrating CAD and CAM applications, one major problem is how to interpret CAD information in a manner that makes sense for CAM. The goal is to develop a general approach that can be used with a variety of CAD and CAM applications for the manufacture of machined parts.In particular, a methodology is presented for taking a CAD model, extracting alternative interpretations of the model as collections of MRSEVs (material removal shape element volumes, a STEP-based library of machining features), and evaluating these interpretations to determine which one is optimal. The evaluation criteria may be defined by the user, in order to select the best interpretation for the particular application at hand. %B Advances in Engineering Software %V 20 %P 121 - 139 %8 1994/// %@ 0965-9978 %G eng %U http://www.sciencedirect.com/science/article/pii/096599789490054X %N 2–3 %R 10.1016/0965-9978(94)90054-X %0 Journal Article %J Magnetics, IEEE Transactions on %D 1994 %T Calculation of head sensitivity function from 3-D magnetic fields %A Burke,E.R. %A Gomez,R.D. %A Madabhushi,R. %A Mayergoyz, Issak D %K 3-D %K fields;finite %K fields;magnetic %K function;magnetization;recorded %K head;very %K heads;magnetisation;sensitivity; %K magnetic %K narrow %K Sensitivity %K series;magnetic %K tracks;Fourier %K tracks;reproduce %K widths;head %X A head sensitivity function is calculated using 3-D magnetic fields. The 3-D magnetic fields are calculated for recorded tracks with finite widths. The magnetization in the medium is expressed in 2-D Fourier series in the plane of the film and is assumed uniform through the thickness of the film. The reproduce head is idealized. These techniques are applied to data found in the literature for very narrow tracks ( 0.5 mu;m). A surprising amount of the experimental data can be explained by the finite width of the tracks. The fine structure of the measurements can then be isolated and attributed to the particular features of the individual heads %B Magnetics, IEEE Transactions on %V 30 %P 4278 - 4280 %8 1994/11// %@ 0018-9464 %G eng %N 6 %R 10.1109/20.334060 %0 Report %D 1994 %T Calibrating, Counting, Grounding, Grouping %A Elgot-drapkin,J. %A Gordon,D. %A Kraus,S. %A Miller,M. %A Nirkhe,M. %A Perlis, Don %I Association for the Advancement of Artificial Intelligence %V FS-94-03 %8 1994/// %G eng %0 Journal Article %J Numerische Mathematik %D 1994 %T On the convergence of line iterative methods for cyclically reduced non-symmetrizable linear systems %A Elman, Howard %A Golub, G. H %A Starke, G. %B Numerische Mathematik %V 67 %P 177 - 190 %8 1994/// %G eng %N 2 %0 Conference Paper %D 1994 %T Design for manufacture in multi-enterprise partnerships: current status and future directions %A Nau, Dana S. %A Ball,M. O %A Gupta,S.K. %A Minis,I. E. %A Zhang, G. %X To pursue market and technology opportunities effectively, US commercial and defense industries will be relying increasingly on multi-enterprise partnerships. Horizontal partnering combines the strengths of multiple firms in product design, manufacture, after sales support and customer service, in order to launch superior products in the global market. To support effective partnering, new approaches will be needed for integrating the activities of design, planning, and production. It is important to address both the fundamental modeling of design, process planning, and production planning in ways that account for the capabilities of potential manufacturing partners, and the development of optimization procedures to address the underlying decision problems. This paper elaborates on these issues and discusses approaches for addressing them. %P 117 - 125 %8 1994/// %G eng %U http://www.csa.com/partners/viewrecord.php?requester=gs&collection=TRD&recid=0160471CI %0 Report %D 1994 %T Feature Recognition for Manufacturability Analysis %A Regli,W. C. %A Gupta, Satyandra K. %A Nau, Dana S. %K algorithms %K Automation %K COMPUTER AIDED DESIGN %K computer aided manufacturing %K computer integrated manufacturing %K Feature extraction %K manufacturability %K Manufacturing %K Solid modeling %K Systems Integration %X While automated recognition of features has been attempted for a wide range of applications, no single existing approach possesses the functionality required to perform manufacturability analysis. In this paper, we present a methodology for taking a CAD model and extracting a set of machinable features suitable for generating all alternative interpretations of the model as collections of MRSEVs (Material Removal Shape Element Volumes, a STEP-based library of machining, features). This set of MRSEVs is to be employed for manufacturability analysis. The algorithm handles a variety of features including those describing holes, pockets, slots, and chamfering and filleting operations. In addition, it considers elementary accessibility constraints for these features and is provably complete over a, significant class of machinable parts the features describe. Further, the approach has low-order polynomial-time worst-case complexity. %I Institute for Systems Research, University of Maryland, College Park %V ISR; TR 1994-10 %8 1994/// %G eng %U http://drum.lib.umd.edu//handle/1903/5490 %0 Journal Article %J Machine Translation %D 1994 %T From syntactic encodings to thematic roles: Building lexical entries for interlingual MT %A Dorr, Bonnie J %A Garman,Joseph %A Weinberg, Amy %K humanities %K Social Sciences and Law %X Our goal is to construct large-scale lexicons for interlingual MT of English, Arabic, Korean, and Spanish. We describe techniques that predict salient linguistic features of a non-English word using the features of its English gloss (i.e., translation) in a bilingual dictionary. While not exact, owing to inexact glosses and language-to-language variations, these techniques can augment an existing dictionary with reasonable accuracy, thus saving significant time. We have conducted two experiments that demonstrate the value of these techniques. The first tested the feasibility of building a database of thematic grids for over 6500 Arabic verbs based on a mapping between English glosses and the syntactic codes in Longman's Dictionary of Contemporary English (LDOCE) (Procter, 1978). We show that it is more efficient and less error-prone to hand-verify the automatically constructed grids than it would be to build the thematic grids by hand from scratch. The second experiment tested the automatic classification of verbs into a richer semantic typology based on (Levin, 1993), from which we can derive a more refined set of thematic grids. In this second experiment, we show that a brute-force, non-robust technique provides 72% accuracy for semantic classification of LDOCE verbs; we then show that it is possible to approach this yield with a more robust technique based on fine-tuned statistical correlations. We further suggest the possibility of raising this yield by taking into account linguistic factors such as polysemy and positive and negative constraints on the syntax-semantics relation. We conclude that, while human intervention will always be necessary for the construction of a semantic classification from LDOCE, such intervention is significantly minimized as more knowledge about the syntax-semantics relation is introduced. %B Machine Translation %V 9 %P 221 - 250 %8 1994/// %@ 0922-6567 %G eng %U http://www.springerlink.com/content/m793l5qj78214881/abstract/ %N 3 %R 10.1007/BF00980579 %0 Journal Article %J SIAM Journal on Numerical Analysis %D 1994 %T Inexact and Preconditioned Uzawa Algorithms for Saddle Point Problems %A Elman, Howard %A Golub, Gene H. %X Variants of the Uzawa algorithm for solving symmetric indefinite linear systems are developed and analyzed. Each step of this algorithm requires the solution of a symmetric positive-definite system of linear equations. It is shown that if this computation is replaced by an approximate solution produced by an arbitrary iterative method, then with relatively modest requirements on the accuracy of the approximate solution, the resulting inexact Uzawa algorithm is convergent, with a convergence rate close to that of the exact algorithm. In addition, it is shown that preconditioning can be used to improve performance. The analysis is illustrated and supplemented using several examples derived from mixed finite element discretization of the Stokes equations. %B SIAM Journal on Numerical Analysis %V 31 %P 1645 - 1661 %8 1994/12/01/ %@ 0036-1429 %G eng %U http://www.jstor.org/stable/2158371 %N 6 %0 Journal Article %J Concurrent EngineeringConcurrent Engineering %D 1994 %T Integrating DFM with CAD through Design Critiquing %A Gupta, Satyandra K. %A Regli,William C. %A Nau, Dana S. %K design critiquing %K design for manufacturability %K feature-based modeling %K manufacturability analysis %K multi-agent coordination. %X The increasing focus on design for manufacturability (DFM) in research in concurrent engineering and engineering design is expanding the scope of traditional design activities in order to identify and eliminate manufacturing problems during the design stage. Manufacturing a product generally involves many different kinds of manufacturing activities, each having different characteristics. A design that is good for one kind of activity may not be good for another; for example, a design that is easy to assemble may not be easy to machine. One obstacle to DFM is the difficulty involved in building a single system that can handle the various manufacturing domains relevant to a design. %B Concurrent EngineeringConcurrent Engineering %V 2 %P 85 - 95 %8 1994/06/01/ %@ 1063-293X, 1531-2003 %G eng %U http://cer.sagepub.com/content/2/2/85 %N 2 %R 10.1177/1063293X9400200202 %0 Conference Paper %B Proceedings of the Annual Symposium on Computer Application in Medical Care %D 1994 %T Modeling brain adaptation to focal damage. %A Goodall,S. %A Reggia, James A. %A Cho,S. %B Proceedings of the Annual Symposium on Computer Application in Medical Care %P 860 - 860 %8 1994/// %G eng %0 Report %D 1994 %T Next Generation Network Management Technology %A Atallah,George C %A Ball,Michael O %A Baras,John S %A Goli,Shravan K %A Karne,Ramesh K %A Kelley,Stephen %A Kumar,Harsha P. %A Plaisant, Catherine %A Roussopoulos, Nick %A Shneiderman, Ben %A Srinivasarao,Mulugu %A Stathatos,Kostas %A Teittinen,Marko %A Whitefield,David %K Constraints for Network Management. %K Network Configuration Management %K network management %K Object Oriented Data Base Model for Network Management %K Rules %K Systems Integration %K Visual Information Management for Network Configuration Management %X Today's telecommunications networks are becoming increasingly large, complex, mission critical and heterogeneous in several dimensions. For example, the underlying physical transmission facilities of a given network may be ﲭixed media (copper, fiber- optic, radio, and satellite); the sub networks may be acquired from different vendors due to economic, performance, or general availability reasons; the information being transmitted over the network may be ﲭultimedia (video, data, voice, and images) and, finally, varying performance criteria may be imposed e.g. data transfer may require high throughput while the others, whose concern is voice communications, may require low call blocking probability. For these reasons, future telecommunications networks are expected to be highly complex in their services and operations. Due to this growing complexity and the disparity among management systems for individual sub networks, efficient network management systems have become critical to the current and future success of telecommunications companies. This paper addresses a research and development effort which focuses on prototyping configuration management, since that is the central process of network management and all other network management functions must be built upon it. Our prototype incorporates ergonomically designed graphical user interfaces tailored to the network configuration management subsystem and to the proposed advanced object-oriented database structure. The resulting design concept follows open standards such as Open Systems Interconnection (OSI) and incorporates object oriented programming methodology to associate data with functions, permit customization, and provide an open architecture environment.
Evaluating manufacturability involves finding a way to manufacture the proposed design, and estimating the associated production cost and quality. However, there often can be several different ways to manufacture a proposed design - so to evaluate the manufacturability of the proposed design, we need to consider different ways to manufacture it, and determine which one best meets the manufacturing objectives.
In this paper we describe a methodology for systematically generating and evaluating alternative operation plans. As a first step, we identify all machining operations which can potentially be used to create the given design. Using these operations, we generate different operation plans for machining the part. Each time we generate a new operation plan, we assign it a manufacturability rating. The manufacturability rating for the design is the rating of the best operation plan.
We anticipate that by providing feedback about possible problems with the design, this work will be useful in providing a way to speed up the evaluation of new product designs in order to decide how or whether to manufacture them. %I Institute for Systems Research, University of Maryland, College Park %V ISR; TR 1993-45 %8 1993/// %G eng %U http://drum.lib.umd.edu//handle/1903/5390 %0 Journal Article %J SIAM Journal on Scientific ComputingSIAM J. Sci. Comput. %D 1993 %T Performance Enhancements and Parallel Algorithms for Two Multilevel Preconditioners %A Elman, Howard %A Guo,Xian-Zhong %B SIAM Journal on Scientific ComputingSIAM J. Sci. Comput. %V 14 %P 890 - 890 %8 1993/// %@ 10648275 %G eng %U http://link.aip.org/link/SJOCE3/v14/i4/p890/s1&Agg=doi %N 4 %R 10.1137/0914055 %0 Journal Article %J Algorithms and Data Structures %D 1993 %T Point probe decision trees for geometric concept classes %A Arkin,E. %A Goodrich,M. %A Mitchell,J. %A Mount, Dave %A Piatko,C. %A Skiena,S. %X A fundamental problem in model-based computer vision is that of identifying to which of a given set of concept classes of geometric models an observed model belongs. Considering a ldquoproberdquo to be an oracle that tells whether or not the observed model is present at a given point in an image, we study the problem of computing efficient strategies (ldquodecision treesrdquo) for probing an image, with the goal to minimize the number of probes necessary (in the worst case) to determine in which class the observed model belongs. We prove a hardness result and give strategies that obtain decision trees whose height is within a log factor of optimal.These results grew out of discussions that began in a series of workshops on Geometric Probing in Computer Vision, sponsored by the Center for Night Vision and Electro-Optics, Fort Belvoir, Virginia, and monitored by the U.S. Army Research Office. The views, opinions, and/or findings contained in this report are those of the authors and should not be construed as an official Department of the Army position, policy, or decision, unless so designated by other documentation. %B Algorithms and Data Structures %P 95 - 106 %8 1993/// %G eng %R 10.1007/3-540-57155-8_239 %0 Journal Article %J Molecular and Cellular BiologyMol. Cell. Biol. %D 1993 %T Species-specific signals for the splicing of a short Drosophila intron in vitro. %A Guo,M. %A Lo,P. C. %A Mount, Stephen M. %X The effects of branchpoint sequence, the pyrimidine stretch, and intron size on the splicing efficiency of the Drosophila white gene second intron were examined in nuclear extracts from Drosophila and human cells. This 74-nucleotide intron is typical of many Drosophila introns in that it lacks a significant pyrimidine stretch and is below the minimum size required for splicing in human nuclear extracts. Alteration of sequences of adjacent to the 3' splice site to create a pyrimidine stretch was necessary for splicing in human, but not Drosophila, extracts. Increasing the size of this intron with insertions between the 5' splice site and the branchpoint greatly reduced the efficiency of splicing of introns longer than 79 nucleotides in Drosophila extracts but had an opposite effect in human extracts, in which introns longer than 78 nucleotides were spliced with much greater efficiency. The white-apricot copia insertion is immediately adjacent to the branchpoint normally used in the splicing of this intron, and a copia long terminal repeat insertion prevents splicing in Drosophila, but not human, extracts. However, a consensus branchpoint does not restore the splicing of introns containing the copia long terminal repeat, and alteration of the wild-type branchpoint sequence alone does not eliminate splicing. These results demonstrate species specificity of splicing signals, particularly pyrimidine stretch and size requirements, and raise the possibility that variant mechanisms not found in mammals may operate in the splicing of small introns in Drosophila and possibly other species. %B Molecular and Cellular BiologyMol. Cell. Biol. %V 13 %P 1104 - 1118 %8 1993/02/01/ %@ 0270-7306, 1098-5549 %G eng %U http://mcb.asm.org/content/13/2/1104 %N 2 %R 10.1128/MCB.13.2.1104 %0 Report %D 1993 %T A Systematic Approach for Analyzing the Manufacturability of Machined Parts %A Gupta, Satyandra K. %A Nau, Dana S. %K Automation %K computer aided manufacturing %K Feature extraction %K manufacturability %K Systems Integration %X The ability to quickly introduce new quality products is a decisive factor in capturing market share. Because of pressing demands to reduce lead time, analyzing the manufacturability of the proposed design has become an important step in the design stage. This paper presents an approach for analyzing the manufacturability of machined parts.
Evaluating the manufacturability of a proposed design involves determining whether or not it is manufacturable with a given set of manufacturing operations - and if so, then finding the associated manufacturing efficiency. Since there can be several different ways to manufacture a proposed design, this requires us to consider different ways to manufacture it, in order to determine which one best meets the design and manufacturing objectives.
The first step in our approach is to identify all machining operations which can potentially be used to create the given design. Using these operations, we generate different operation plans for machining the part. Each time we generate a new operation plan, we examine whether it can produce the desired shape and tolerances, and calculate its manufacturability rating. If no operation plan can be found that is capable of producing the design, then the given design is considered unmachinable; otherwise, the manufacturability rating for the design is the rating of the best operation plan.
We anticipate that by providing feedback about possible problems with the design, this work will help in speeding up the evaluation of new product designs in order to decide how or whether to manufacture them. Such a capability will be useful in responding quickly to changing demands and opportunities in the marketplace.
%I Institute for Systems Research, University of Maryland, College Park
%V ISR; TR 1993-76
%8 1993///
%G eng
%U http://drum.lib.umd.edu//handle/1903/5420
%0 Conference Paper
%D 1993
%T Using MRSEVs to develop machining alternatives
%A Nau, Dana S.
%A Gupta,S.K.
%A Kramer,T. R.
%A Regli,W. C.
%A Zhang, G.
%8 1993///
%G eng
%U http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.47.4870&rep=rep1&type=pdf
%0 Journal Article
%J Information Processing Letters
%D 1992
%T On the difficulty of Manhattan channel routing
%A Greenberg,Ronald
%A JaJa, Joseph F.
%A Krishnamurthy,Sridhar
%K combinatorial problems
%K computational complexity
%K lower bounds
%K VLSI channel routing
%X We show that channel routing in the Manhattan model remains difficult even when all nets are single-sided. Given a set of n single-sided nets, we consider the problem of determining the minimum number of tracks required to obtain a dogleg-free routing. In addition to showing that the decision version of the problem isNP-complete, we show that there are problems requiring at least d+Ω(n) tracks, where d is the density. This existential lower bound does not follow from any of the known lower bounds in the literature.
%B Information Processing Letters
%V 44
%P 281 - 284
%8 1992/12/21/
%@ 0020-0190
%G eng
%U http://www.sciencedirect.com/science/article/pii/002001909290214G
%N 5
%R 10.1016/0020-0190(92)90214-G
%0 Report
%D 1992
%T General of Machining Alternatives for Machinability Evaluation
%A Gupta, Satyandra K.
%A Nau, Dana S.
%A Zhang,G. M.
%K Automation
%K computer aided manufacturing
%K manufacturability
%K Manufacturing Systems
%X This paper presents a new methodology for evaluating the machinability of a machined part during the design stage of the product development cycle, so that problems related to machining can be recognized and corrected while the product is being designed. Our basic approach is to perform a systematic evaluation of machining alternatives throughout each step in the design stage. This involves three basic steps: (1) generate alternative interpretations of the design as different collections of machinable features, (2) generate the various possible sequences of machining operations capable of producing each interpretation, and (3) evaluate each operation sequence, to determine the relevant information on achievable quality and associated costs. The information provided by this analysis can be used not only to give feedback to the designer about problems that might arise with the machining, but also to provide information to the manufacturing engineer about alternative ways in which the part might be machined.
%I Institute for Systems Research, University of Maryland, College Park
%V ISR; TR 1992-106
%8 1992///
%G eng
%U http://hdl.handle.net/1903/5287
%0 Report
%D 1992
%T Generation and Evaluation of Alternative Operation
%A Nau, Dana S.
%A Zhang,G. M.
%A Gupta, Satyandra K.
%K Automation
%K computer aided manufacturing
%K computer integrated manufacturing
%K Feature extraction
%K flexible manufacturing
%K Manufacturing
%K Manufacturing Systems
%K Solid modeling
%X This paper presents a new and systematic approach to assist decision-making in selecting machining operation sequences. The approach is to produce alternative interpretations of design as different collections of machinable features, use these interpretations to generate alternative machining operation sequences, and evaluate the cost and achievable machining accuracy of each operations sequence. Given the operation sequences and their evaluations, it is then possible to calculate the performance measures of interest, and use these performance measures to select, from among the various alternatives, one or more of them that can best balance the need for a quality product against the need for efficient machining.
%I Institute for Systems Research, University of Maryland, College Park
%V ISR; TR 1992-20
%8 1992///
%G eng
%U http://drum.lib.umd.edu//handle/1903/5203
%0 Report
%D 1992
%T Generation of Machining Alternatives for Machinability Evaluation
%A Gupta, Satyandra K.
%A Nau, Dana S.
%A Zhang,G. M.
%K Automation
%K computer aided manufacturing
%K manufacturability
%K Manufacturing Systems
%X This paper presents a new methodology for evaluating the machinability of a machined part during the design stage of the product development cycle, so that problems related to machining can be recognized and corrected while the product is being designed. Our basic approach is to perform a systematic evaluation of machining alternatives throughout each step in the design stage. This involves three basic steps: (1) generate alternative interpretations of the design as different collections of machinable features, (2) generate the various possible sequences of machining operations capable of producing each interpretation, and (3) evaluate each operation sequence, to determine the relevant information on achievable quality and associated costs. The information provided by this analysis can be used not only to give feedback to the designer about problems that might arise with the machining, but also to provide information to the manufacturing engineer about alternative ways in which the part might be machined.
%I Institute for Systems Research, University of Maryland, College Park
%V ISR; TR 1992-106
%8 1992///
%G eng
%U http://drum.lib.umd.edu//handle/1903/5287
%0 Journal Article
%J Computing Systems in Engineering
%D 1992
%T PARTI primitives for unstructured and block structured problems
%A Sussman, Alan
%A Saltz, J.
%A Das,R.
%A Gupta,S.
%A Mavriplis,D.
%A Ponnusamy,R.
%A Crowley,K.
%X This paper describes a set of primitives (PARTI) developed to efficiently execute unstructured and block structured problems on distributed memory parallel machines. We present experimental data from a three-dimensional unstructured Euler solver run on the Intel Touchstone Delta to demonstrate the usefulness of our methods.
%B Computing Systems in Engineering
%V 3
%P 73 - 86
%8 1992///
%@ 0956-0521
%G eng
%U http://www.sciencedirect.com/science/article/pii/0956052192900962
%N 1-4
%R 10.1016/0956-0521(92)90096-2
%0 Report
%D 1992
%T Reflecting time in generated text: tense, aspect and temporal connecting words
%A Dorr, Bonnie J
%A Gaasterland,Terry
%I University of Maryland at College Park
%C College Park, MD, USA
%8 1992///
%G eng
%0 Journal Article
%J Computer Vision—ECCV'92
%D 1992
%T A study of affine matching with bounded sensor error
%A Grimson,W.
%A Huttenlocher,D.
%A Jacobs, David W.
%X Affine transformations of the plane have been used by modelbased recognition systems to approximate the effects of perspective projection. Because the underlying mathematics are based on exact data, in practice various heuristics are used to adapt the methods to real data where there is positional uncertainty. This paper provides a precise analysis of affine point matching under uncertainty. We obtain an expression for the range of affine-invariant values consistent with a given set of four points, where each data point lies in an exist-disc. This range is shown to depend on the actual x- y-positions of the data points. Thus given uncertainty in the data, the representation is no longer invariant with respect to the Cartesian coordinate system. This is problematic for methods, such as geometric hashing, that depend on the invariant properties of the representation. We also analyze the effect that uncertainty has on the probability that recognition methods using affine transformations will find false positive matches. We find that such methods will produce false positives with even moderate levels of sensor error.
%B Computer Vision—ECCV'92
%P 291 - 306
%8 1992///
%G eng
%R 10.1007/3-540-55426-2_34
%0 Conference Paper
%B , First International Workshop on Interoperability in Multidatabase Systems, 1991. IMS '91. Proceedings
%D 1991
%T An algebra and calculus for relational multidatabase systems
%A Grant,J.
%A Litwin,W.
%A Roussopoulos, Nick
%A Sellis,T.
%K Algebra
%K autonomous databases
%K Calculus
%K Computer networks
%K Computer science
%K Data models
%K Data structures
%K Database systems
%K database theory
%K distributed databases
%K Military computing
%K multidatabase manipulation language
%K multidatabase system
%K multirelational algebra
%K query languages
%K relational algebra
%K Relational databases
%K Spatial databases
%K theoretical foundation
%X With the existence of many autonomous databases widely accessible through computer networks, users will require the capability to jointly manipulate data in different databases. A multidatabase system provides such a capability through a multidatabase manipulation language. The authors propose a theoretical foundation for such languages by presenting a multirelational algebra and calculus based on the relational algebra and calculus. The proposal is illustrated by various queries on an example multidatabase
%B , First International Workshop on Interoperability in Multidatabase Systems, 1991. IMS '91. Proceedings
%I IEEE
%P 118 - 124
%8 1991/04//
%@ 0-8186-2205-9
%G eng
%R 10.1109/IMS.1991.153694
%0 Journal Article
%J Journal of Experimental & Theoretical Artificial Intelligence
%D 1991
%T An experimental study of criteria for hypothesis plausibility
%A Tuhrim,S.
%A Reggia, James A.
%A Goodall,S.
%B Journal of Experimental & Theoretical Artificial Intelligence
%V 3
%P 129 - 144
%8 1991///
%G eng
%N 2
%0 Journal Article
%J Math. Comp
%D 1991
%T Iterative methods for cyclically reduced non-self-adjoint linear systems II
%A Elman, Howard
%A Golub, G. H
%B Math. Comp
%V 56
%P 215 - 242
%8 1991///
%G eng
%N 193
%0 Conference Paper
%B Foundations of Computer Science, 1991. Proceedings., 32nd Annual Symposium on
%D 1991
%T Towards a theory of nearly constant time parallel algorithms
%A Gil,J.
%A Matias,Y.
%A Vishkin, Uzi
%K computational complexity
%K Estimation
%K nearly constant time parallel algorithms
%K Parallel algorithms
%K positive numbers
%K randomization
%K running time
%K superfast optimal algorithms
%X It is demonstrated that randomization is an extremely powerful tool for designing very fast and efficient parallel algorithms. Specifically, a running time of