%0 Journal Article %J terpconnect.umd.edu %D Submitted %T Surveying the Accessibility of Mobile Touchscreen Games for Persons with Motor Impairments: A Preliminary Analysis %A Kim, Y %A Sutreja, N %A Jon Froehlich %A Findlater, L %X ABSTRACT Touchscreen devices have rapidly become one of the most pervasive video game platforms in the world and, in turn, an integral part of popular culture; however, little work exists on comprehensively examining their accessibility. In this poster paper, we ... %B terpconnect.umd.edu %G eng %U http://terpconnect.umd.edu/~leahkf/pubs/ASSETS2013-TouchscreenGames.pdf %0 Patent %D Submitted %T System and Method for Optimal Verification of Operations on Dynamic Sets %A Charalampos Papamanthou %A Tamassia, Roberto %A Triandopoulos, Nikolaos %X A system and method for cryptographically checking the correctness of outsourced set operations performed by an untrusted server over a dynamic collection of sets that are owned (and updated) by a trusted source is disclosed. The system and method provides new authentication mechanisms that allow any entity to publicly verify a proof attesting the correctness of primitive set operations such as intersection, union, subset and set difference. Based on a novel extension of the security properties of bilinear-map accumulators as well as on a primitive called accumulation tree, the system and method achieves optimal verification and proof complexity, as well as optimal update complexity, while incurring no extra asymptotic space overhead. The method provides an efficient proof construction, adding a logarithmic overhead to the computation of the answer of a set-operation query. Applications of interest include efficient verification of keyword search and database queries. %G eng %U http://www.google.com/patents?id=mrcCAgAAEBAJ %0 Journal Article %J Eos %D 2018 %T Satellites and Cell Phones Form a Cholera Early-Warning System %A Akanda, Ali %A Aziz, Sonia %A Jutla, Antarpreet %A Huq, Anwar %A Alam, Munirul %A Ahsan, Gias %A Rita R Colwell %B Eos %V 99 %8 Mar-03-2020 %G eng %U https://eos.org/project-updates/satellites-and-cell-phones-form-a-cholera-early-warning-system %! Eos %R 10.1029/2018EO094839 %0 Journal Article %J Biological Reviews %D 2018 %T Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis) %A Carlson, Colin J. %A Getz, Wayne M. %A Kausrud, Kyrre L. %A Cizauskas, Carrie A. %A Blackburn, Jason K. %A Bustos Carrillo, Fausto A. %A Rita R Colwell %A Easterday, W. Ryan %A Ganz, Holly H. %A Kamath, Pauline L. %A Økstad, Ole A. %A Turner, Wendy C. %A Kolsto, Anne-Brit %A Stenseth, Nils C. %X Environmentally transmitted diseases are comparatively poorly understood and managed, and their ecology is particularly understudied. Here we identify challenges of studying environmental transmission and persistence with a six‐sided interdisciplinary review of the biology of anthrax (Bacillus anthracis). Anthrax is a zoonotic disease capable of maintaining infectious spore banks in soil for decades (or even potentially centuries), and the mechanisms of its environmental persistence have been the topic of significant research and controversy. Where anthrax is endemic, it plays an important ecological role, shaping the dynamics of entire herbivore communities. The complex eco‐epidemiology of anthrax, and the mysterious biology of Bacillus anthracis during its environmental stage, have necessitated an interdisciplinary approach to pathogen research. Here, we illustrate different disciplinary perspectives through key advances made by researchers working in Etosha National Park, a long‐term ecological research site in Namibia that has exemplified the complexities of the enzootic process of anthrax over decades of surveillance. In Etosha, the role of scavengers and alternative routes (waterborne transmission and flies) has proved unimportant relative to the long‐term persistence of anthrax spores in soil and their infection of herbivore hosts. Carcass deposition facilitates green‐ups of vegetation to attract herbivores, potentially facilitated by the role of anthrax spores in the rhizosphere. The underlying seasonal pattern of vegetation, and herbivores' immune and behavioural responses to anthrax risk, interact to produce regular ‘anthrax seasons’ that appear to be a stable feature of the Etosha ecosystem. Through the lens of microbiologists, geneticists, immunologists, ecologists, epidemiologists, and clinicians, we discuss how anthrax dynamics are shaped at the smallest scale by population genetics and interactions within the bacterial communities up to the broadest scales of ecosystem structure. We illustrate the benefits and challenges of this interdisciplinary approach to disease ecology, and suggest ways anthrax might offer insights into the biology of other important pathogens. Bacillus anthracis, and the more recently emerged Bacillus cereus biovar anthracis, share key features with other environmentally transmitted pathogens, including several zoonoses and panzootics of special interest for global health and conservation efforts. Understanding the dynamics of anthrax, and developing interdisciplinary research programs that explore environmental persistence, is a critical step forward for understanding these emerging threats. %B Biological Reviews %P 1813 - 1831 %8 Jan-11-2018 %G eng %U https://onlinelibrary.wiley.com/doi/full/10.1111/brv.12420 %N 4 %! Biol Rev %R 10.1111/brv.12420 %0 Journal Article %J Journal of Applied Microbiology %D 2017 %T SYN-004 (ribaxamase), an oral beta-lactamase, mitigates antibiotic-mediated dysbiosis in a porcine gut microbiome model %A Connelly, S. %A Bristol, J.A. %A Hubert, S. %A Subramanian, P. %A Hasan, N.A. %A Rita R Colwell %A Kaleko, M. %X Aim To evaluate an antibiotic inactivation strategy to protect the gut microbiome from antibiotic‐mediated damage. Methods and Results SYN‐004 (ribaxamase) is an orally delivered beta‐lactamase intended to degrade penicillins and cephalosporins within the gastrointestinal tract to protect the microbiome. Pigs (20 kg, n = 10) were treated with ceftriaxone (CRO) (IV, 50 mg kg−1, SID) for 7 days and a cohort (n = 5) received ribaxamase (PO, 75 mg, QID) for 9 days beginning the day before antibiotic administration. Ceftriaxone serum levels were not statistically different in the antibiotic‐alone and antibiotic + ribaxamase groups, indicating ribaxamase did not alter systemic antibiotic levels. Whole‐genome metagenomic analyses of pig faecal DNA revealed that CRO caused significant changes to the gut microbiome and an increased frequency of antibiotic resistance genes. With ribaxamase, the gut microbiomes were not significantly different from pretreatment and antibiotic resistance gene frequency was not increased. Conclusion Ribaxamase mitigated CRO‐mediated gut microbiome dysbiosis and attenuated propagation of the antibiotic resistance genes in pigs. Significance and Impact of the Study Damage of the microbiome can lead to overgrowth of pathogenic organisms and antibiotic exposure can promote selection for antibiotic‐resistant micro‐organisms. Ribaxamase has the potential to become the first therapy designed to protect the gut microbiome from antibiotic‐mediated dysbiosis and reduce emergence of antibiotic resistance. %B Journal of Applied Microbiology %P 66 - 79 %8 Jan-07-2017 %G eng %U https://onlinelibrary.wiley.com/doi/10.1111/jam.13432 %N 1Suppl 11 %! J Appl Microbiol %R 10.1111/jam.13432 %0 Journal Article %J The Milbank Quarterly %D 2016 %T Strategic Planning in Population Health and Public Health Practice: A Call to Action for Higher Education %A Phelps, Charles %A Madhavan, Guruprasad %A Rappuoli, Rino %A LEVIN, SCOTT %A Shortlife, Edward %A Rita R Colwell %X POLICY POINTS: Scarce resources, especially in population health and public health practice, underlie the importance of strategic planning. Public health agencies' current planning and priority setting efforts are often narrow, at times opaque, and focused on single metrics such as cost-effectiveness. As demonstrated by SMART Vaccines, a decision support software system developed by the Institute of Medicine and the National Academy of Engineering, new approaches to strategic planning allow the formal incorporation of multiple stakeholder views and multicriteria decision making that surpass even those sophisticated cost-effectiveness analyses widely recommended and used for public health planning. Institutions of higher education can and should respond by building on modern strategic planning tools as they teach their students how to improve population health and public health practice. CONTEXT: Strategic planning in population health and public health practice often uses single indicators of success or, when using multiple indicators, provides no mechanism for coherently combining the assessments. Cost-effectiveness analysis, the most complex strategic planning tool commonly applied in public health, uses only a single metric to evaluate programmatic choices, even though other factors often influence actual decisions. METHODS: Our work employed a multicriteria systems analysis approach--specifically, multiattribute utility theory--to assist in strategic planning and priority setting in a particular area of health care (vaccines), thereby moving beyond the traditional cost-effectiveness analysis approach. FINDINGS: (1) Multicriteria systems analysis provides more flexibility, transparency, and clarity in decision support for public health issues compared with cost-effectiveness analysis. (2) More sophisticated systems-level analyses will become increasingly important to public health as disease burdens increase and the resources to deal with them become scarcer. CONCLUSIONS: The teaching of strategic planning in public health must be expanded in order to fill a void in the profession's planning capabilities. Public health training should actively incorporate model building, promote the interactive use of software tools, and explore planning approaches that transcend restrictive assumptions of cost-effectiveness analysis. The Strategic Multi-Attribute Ranking Tool for Vaccines (SMART Vaccines), which was recently developed by the Institute of Medicine and the National Academy of Engineering to help prioritize new vaccine development, is a working example of systems analysis as a basis for decision support. %B The Milbank Quarterly %V 94906033 %P 109 - 125 %8 Jan-03-2016 %G eng %U https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4941964/ %N 143S2 %! The Milbank Quarterly %R 10.1111/1468-0009.12182 %0 Journal Article %J PLOS ONE %D 2015 %T Satellite Based Assessment of Hydroclimatic Conditions Related to Cholera in Zimbabwe %A Jutla, Antarpreet %A Aldaach, Haidar %A Billian, Hannah %A Akanda, Ali %A Huq, Anwar %A Rita R Colwell %E Schumann, Guy J-P. %X Introduction Cholera, an infectious diarrheal disease, has been shown to be associated with large scale hydroclimatic processes. The sudden and sporadic occurrence of epidemic cholera is linked with high mortality rates, in part, due to uncertainty in timing and location of outbreaks. Improved understanding of the relationship between pathogenic abundance and climatic processes allows prediction of disease outbreak to be an achievable goal. In this study, we show association of large scale hydroclimatic processes with the cholera epidemic in Zimbabwe reported to have begun in Chitungwiza, a city in Mashonaland East province, in August, 2008. Principal Findings Climatic factors in the region were found to be associated with triggering cholera outbreak and are shown to be related to anomalies of temperature and precipitation, validating the hypothesis that poor conditions of sanitation, coupled with elevated temperatures, and followed by heavy rainfall can initiate outbreaks of cholera. Spatial estimation by satellite of precipitation and global gridded air temperature captured sensitivities in hydroclimatic conditions that permitted identification of the location in the region where the disease outbreak began. Discussion Satellite derived hydroclimatic processes can be used to capture environmental conditions related to epidemic cholera, as occurred in Zimbabwe, thereby providing an early warning system. Since cholera cannot be eradicated because the causative agent, Vibrio cholerae, is autochthonous to the aquatic environment, prediction of conditions favorable for its growth and estimation of risks of triggering the disease in a given population can be used to alert responders, potentially decreasing infection and saving lives. %B PLOS ONE %P e0137828 %8 May-09-2017 %G eng %U https://dx.plos.org/10.1371/journal.pone.0137828 %N 9Suppl 1 %! PLoS ONE %R 10.1371/journal.pone.0137828 %0 Conference Paper %B BioImage Informatics Conference %D 2015 %T Segmentation and sub-cellular feature-based analysis of microscopy images %A Cardone, Antonio %A Chalfoun, Joe %A Peskin, Adele %A Bajcsy, Peter %A Kociolek, Marcin %A Bhadriraju, Kiran %A Brady, Mary %B BioImage Informatics Conference %8 10/2015 %G eng %0 Journal Article %J BMC bioinformatics %D 2015 %T Survey statistics of automated segmentations applied to optical imaging of mammalian cells %A Bajcsy, Peter %A Cardone, Antonio %A Chalfoun, Joe %A Halter, Michael %A Juba, Derek %A Kociolek, Marcin %A Majurski, Michael %A Peskin, Adele %A Simon, Carl %A Simon, Mylene %A others %B BMC bioinformatics %V 16 %P 1 %G eng %0 Journal Article %J Molecular & Cellular Proteomics %D 2014 %T Stable isotope labeling of phosphoproteins for large-scale phosphorylation rate determination %A Molden, Rosalynn C. %A Goya, Jonathan %A Zia Khan %A Garcia, Benjamin A. %K DYNAMICS %K Phosphoproteins* %K Phosphoproteome %K Phosphorylation %K Post-translational modifications* %K Signal Transduction* %K turnover %X Signals that control response to stimuli and cellular function are transmitted through dynamic phosphorylation of thousands of proteins by protein kinases. Many techniques have been developed to study phosphorylation dynamics, including several mass spectrometry (MS)-based methods. Over the last few decades, substantial developments have been made in MS techniques for the large-scale identification of proteins and their post-translational modifications. Nevertheless, all of the current MS-based techniques for quantifying protein phosphorylation dynamics rely on the measurement of changes in peptide abundance levels and many methods suffer from low confidence in phosphopeptide identification due to poor fragmentation. Here we have optimized an approach for the Stable Isotope Labeling of Amino acids by Phosphate (SILAP) using [gamma-18O4]ATP in nucleo to determine global site-specific phosphorylation rates. The advantages of this metabolic labeling technique are: increased confidence in phosphorylated peptide identification, direct labeling of phosphorylation sites, measurement phosphorylation rates, and the identification of actively phosphorylated sites in a cell-like environment. In this study we calculated approximate rate constants for over 500 phosphorylation sites based on labeling progress curves. We measured a wide range of phosphorylation rate constants from 0.34 min-1 to 0.001 min-1. Finally, we applied SILAP to determine sites that have different phosphorylation kinetics during G1/S and M phase. We found that most sites have very similar phosphorylation rates under both conditions; however a small subset of sites on proteins involved in the mitotic spindle were more actively phosphorylated during M phase, while proteins involved in DNA replication and transcription were more actively phosphorylated during G1/S phase. %B Molecular & Cellular Proteomics %8 2014/02/16/ %@ 1535-9476, 1535-9484 %G eng %U http://www.mcponline.org/content/early/2014/02/16/mcp.O113.036145 %! Mol Cell Proteomics %0 Journal Article %D 2013 %T Scene Text Detection via Integrated Discrimination of Component Appearance and Consensus %A Ye, Q %A David Doermann %X Abstract—In this paper, we propose an approach to scene text detection that leverages both the appearance and consensus of connected components. Component appearance is modeled with an SVM based dictionary classifier and the component consensus is ... %8 0002/00/03 %G eng %U http://lampsrv02.umiacs.umd.edu/pubs/Papers/qixiangye-13/qixiangye-13.pdf %0 Journal Article %J Journal of microscopy %D 2013 %T Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells. %A Chalfoun, J %A Kociolek, M %A Dima, A %A Halter, M %A Cardone, Antonio %A Peskin, A %A Bajcsy, P %A Brady, M. %K Animals %K Cell Adhesion %K Cell Count %K Cell Division %K Cell Shape %K Computational Biology %K Fibroblasts %K Image Processing, Computer-Assisted %K Mice %K Microscopy, Phase-Contrast %K NIH 3T3 Cells %K Reproducibility of results %K Sensitivity and Specificity %K Time-Lapse Imaging %X We present a new method for segmenting phase contrast images of NIH 3T3 fibroblast cells that is accurate even when cells are physically in contact with each other. The problem of segmentation, when cells are in contact, poses a challenge to the accurate automation of cell counting, tracking and lineage modelling in cell biology. The segmentation method presented in this paper consists of (1) background reconstruction to obtain noise-free foreground pixels and (2) incorporation of biological insight about dividing and nondividing cells into the segmentation process to achieve reliable separation of foreground pixels defined as pixels associated with individual cells. The segmentation results for a time-lapse image stack were compared against 238 manually segmented images (8219 cells) provided by experts, which we consider as reference data. We chose two metrics to measure the accuracy of segmentation: the 'Adjusted Rand Index' which compares similarities at a pixel level between masks resulting from manual and automated segmentation, and the 'Number of Cells per Field' (NCF) which compares the number of cells identified in the field by manual versus automated analysis. Our results show that the automated segmentation compared to manual segmentation has an average adjusted rand index of 0.96 (1 being a perfect match), with a standard deviation of 0.03, and an average difference of the two numbers of cells per field equal to 5.39% with a standard deviation of 4.6%. %B Journal of microscopy %V 249 %P 41-52 %8 2013 Jan %G eng %N 1 %1 http://www.ncbi.nlm.nih.gov/pubmed/23126432?dopt=Abstract %R 10.1111/j.1365-2818.2012.03678.x %0 Book Section %B Theory of Cryptography %D 2013 %T Signatures of Correct Computation %A Charalampos Papamanthou %A Shi, Elaine %A Tamassia, Roberto %E Sahai, Amit %K Algorithm Analysis and Problem Complexity %K Computation by Abstract Devices %K Data Encryption %K Systems and Data Security %X We introduce Signatures of Correct Computation (SCC), a new model for verifying dynamic computations in cloud settings. In the SCC model, a trusted source outsources a function f to an untrusted server, along with a public key for that function (to be used during verification). The server can then produce a succinct signature σ vouching for the correctness of the computation of f, i.e., that some result v is indeed the correct outcome of the function f evaluated on some point a. There are two crucial performance properties that we want to guarantee in an SCC construction: (1) verifying the signature should take asymptotically less time than evaluating the function f; and (2) the public key should be efficiently updated whenever the function changes. We construct SCC schemes (satisfying the above two properties) supporting expressive manipulations over multivariate polynomials, such as polynomial evaluation and differentiation. Our constructions are adaptively secure in the random oracle model and achieve optimal updates, i.e., the function’s public key can be updated in time proportional to the number of updated coefficients, without performing a linear-time computation (in the size of the polynomial). We also show that signatures of correct computation imply Publicly Verifiable Computation (PVC), a model recently introduced in several concurrent and independent works. Roughly speaking, in the SCC model, any client can verify the signature σ and be convinced of some computation result, whereas in the PVC model only the client that issued a query (or anyone who trusts this client) can verify that the server returned a valid signature (proof) for the answer to the query. Our techniques can be readily adapted to construct PVC schemes with adaptive security, efficient updates and without the random oracle model. %B Theory of Cryptography %S Lecture Notes in Computer Science %I Springer Berlin Heidelberg %P 222 - 242 %8 2013/01/01/ %@ 978-3-642-36593-5, 978-3-642-36594-2 %G eng %U http://link.springer.com/chapter/10.1007/978-3-642-36594-2_13 %0 Journal Article %J Journal of the Asiatic Society of Bangladesh, Science %D 2013 %T Species composition of limnetic zooplankton from the southern coastal areas (Mathbaria and Bakerganj) in Bangladesh %A Mozumder, Pronob K %A Nahar, Samsun %A Naser, M Niamul %A Alam, Munirul %A Huq, Anwar %A Sack, R Bradley %A Rita R Colwell %X We studied the coastal zooplankton community structure of six waterbodies of Mathbaria and Bakerganj from January 2008 to June 2009. In total 35 zooplankton species were identified under 26 genera under 20 families under 8 orders from Mathbaria. Among them 6 were protozoans, 24 were rotifers, 3 were copepods, 1 was cladocerans and 1 was ostracods. From Bakergonj a total of 42 zooplankton species were identified under 23 genera under 17 Families under 7 orders. Among them 3 were protozoans, 25 were rotifers, 7 were copepods, 6 were cladocerans and 1 was ostracods. Results showed that abundance of rotifera group from both area was higher in Mathbaria (64.86%) and Bakerganj (60.98%) than other groups while abundance of ostracoda of Bakerganj area was lowest. %B Journal of the Asiatic Society of Bangladesh, Science %V 38 %8 Apr-06-2014 %G eng %U http://banglajol.info/index.php/JASBS/article/view/15326 %N 1 %! J. Asiat. Soc. Bangladesh, Sci. %R 10.3329/jasbs.v38i1.15326 %0 Journal Article %J The Journal of Physical Chemistry B %D 2013 %T Specific and Non-Specific Protein Association in Solution: Computation of Solvent Effects and Prediction of First-Encounter Modes for Efficient Configurational Bias Monte Carlo Simulations %A Cardone, Antonio %A Pant, Harish %A Hassan, Sergio A. %B The Journal of Physical Chemistry B %V 117 %P 12360 - 12374 %8 May-10-2014 %G eng %U http://pubs.acs.org/doi/abs/10.1021/jp4050594 %N 41 %! J. Phys. Chem. B %R 10.1021/jp4050594 %0 Journal Article %D 2013 %T Spoiler Alert: Machine Learning Approaches to Detect Social Media Posts with Revelatory Information %A Jordan Boyd-Graber %A Glasgow, K %A Zajac, J S %X ABSTRACT Spoilers—critical plot information about works of fiction that “spoil” a viewer's enjoyment—have prompted elaborate conventions on social media to allow readers to insulate themselves from spoilers. However, these solutions depend on the ... %8 2013/00/01 %G eng %U http://www.umiacs.umd.edu/~jbg/docs/2013_spoiler.pdf %0 Book Section %B Advances in Cryptology – EUROCRYPT 2013 %D 2013 %T Streaming Authenticated Data Structures %A Charalampos Papamanthou %A Shi, Elaine %A Tamassia, Roberto %A Yi, Ke %E Johansson, Thomas %E Nguyen, Phong Q. %K Algorithm Analysis and Problem Complexity %K Data Encryption %K Discrete Mathematics in Computer Science %K Systems and Data Security %X We consider the problem of streaming verifiable computation, where both a verifier and a prover observe a stream of n elements x 1,x 2,…,x n and the verifier can later delegate some computation over the stream to the prover. The prover must return the output of the computation, along with a cryptographic proof to be used for verifying the correctness of the output. Due to the nature of the streaming setting, the verifier can only keep small local state (e.g., logarithmic) which must be updatable in a streaming manner and with no interaction with the prover. Such constraints make the problem particularly challenging and rule out applying existing verifiable computation schemes. We propose streaming authenticated data structures, a model that enables efficient verification of data structure queries on a stream. Compared to previous work, we achieve an exponential improvement in the prover’s running time: While previous solutions have linear prover complexity (in the size of the stream), even for queries executing in sublinear time (e.g., set membership), we propose a scheme with O(logM logn)O(\log M\ log n) prover complexity, where n is the size of the stream and M is the size of the universe of elements. Our schemes support a series of expressive queries, such as (non-)membership, successor, range search and frequency queries, over an ordered universe and even in higher dimensions. The central idea of our construction is a new authentication tree, called generalized hash tree. We instantiate our generalized hash tree with a hash function based on lattices assumptions, showing that it enjoys suitable algebraic properties that traditional Merkle trees lack. We exploit such properties to achieve our results. %B Advances in Cryptology – EUROCRYPT 2013 %S Lecture Notes in Computer Science %I Springer Berlin Heidelberg %P 353 - 370 %8 2013/01/01/ %@ 978-3-642-38347-2, 978-3-642-38348-9 %G eng %U http://link.springer.com/chapter/10.1007/978-3-642-38348-9_22 %0 Journal Article %J Pattern Recognition Letters %D 2013 %T Structural similarity for document image classification and retrieval %A Kumar, Jayant %A Ye, Peng %A David Doermann %X Abstract This paper presents a novel approach to defining document image structural similarity for the applications of classification and retrieval. We first build a codebook of SURF descriptors extracted from a set of representative training images. We then encode ... %B Pattern Recognition Letters %8 2013/00/01 %G eng %U http://linkinghub.elsevier.com/retrieve/pii/S0167865513004224 %! Pattern Recognition Letters %R 10.1016/j.patrec.2013.10.030 %0 Journal Article %J Computer Networks %D 2013 %T A study of unpredictability in fault-tolerant middleware %A Tudor Dumitras %A Narasimhan, Priya %K Fault tolerance %K latency %K Middleware %K Remote procedure call %K Unpredictability %X In enterprise applications relying on fault-tolerant middleware, it is a common engineering practice to establish service-level agreements (SLAs) based on the 95th or the 99th percentiles of the latency, to allow a margin for unexpected variability. However, the extent of this unpredictability has not been studied systematically. We present an extensive empirical study of unpredictability in 16 distributed systems, ranging from simple transport protocols to fault-tolerant, middleware-based enterprise applications, and we show that the inherent unpredictability in the systems examined arises from at most 1% of the remote invocations. In the normal, fault-free operating mode most remote invocations have a predictable end-to-end latency, but the maximum latency follows unpredictable trends and is comparable with the time needed to recover from a fault. The maximum latency is not influenced by the system’s workload, cannot be regulated through configuration parameters and is not correlated with the system’s resource consumption. The high-latency outliers (up to three orders of magnitude higher than the average latency) have multiple causes and may originate in any component of the system. However, after filtering out 1% of the invocations with the highest recorded response-times, the latency becomes bounded with high statistical confidence (p < 0.01). We have verified this result on different operating systems (Linux 2.4, Linux 2.6, Linux-rt, TimeSys), middleware platforms (CORBA and EJB), programming languages (C, C++ and Java), replication styles (active and warm passive) and applications (e-commerce and online gaming). Moreover, this phenomenon occurs at all the layers of middleware-based systems, from the communication protocols to the business logic. %B Computer Networks %V 57 %P 682 - 698 %8 2013/02/26/ %@ 1389-1286 %G eng %U http://www.sciencedirect.com/science/article/pii/S1389128612003696 %N 3 %! Computer Networks %0 Book %D 2012 %T Scientific Freedom and Human Rights %A Minker, Jack %K Biography & Autobiography / Science & Technology %X There is a great deal of difference between feeling empathy for those whose human rights are being violated around the world and actually doing something about it. This memoir, written by the Vice-Chair Computer Science (CS) of the Committee of Concerned Scientists (CCS), 1962-present, and Vice-Chair of the Committee on Scientific Freedom and Human Rights (CSFHR) of the ACM, 1980-1989, is a first-hand account of computer scientists working with numerous other constituencies to safeguard or advance the human rights of scientists throughout the world. Drawing from the author's considerable archives from the period, "Scientific Freedom and Human Rights" is a treasure trove of historical information about a critical -- and relatively unsung -- human rights campaign, its successes and heartbreaking challenges, and possible lessons to be applied to future human rights campaigns. "The solidarity of the global scientific community was especially important in giving moral support to the intellectual leaders of the struggle for Soviet Jewry, helping them to continue their scientific activity even in a time of persecution. Their activism also helped to link scientific cooperation with the Soviet Union with freedom within the Soviet Union.... You will read these stories and see the support given many scientists throughout the world in this book." -- Natan Sharansky, Jewish Agency Chairman of the Executive "It is not very often that solidarity among scientists is brought to the public eye, and it is certainly not common for people outside science to associate scientists with heroic struggles for human rights, freedom, and dignity. Jack Minker's new book will change this perception." -- Professor Judea Pearl, University of California at Los Angeles %I IEEE Computer Society Press %P 564 %8 2012 %@ 9780769546605 %G eng %0 Journal Article %J Topics in Cryptology–CT-RSA 2012 %D 2012 %T Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces %A Choi,S. %A Hwang,K.W. %A Katz, Jonathan %A Malkin,T. %A Rubenstein,D. %X Protocols for generic secure multi-party computation (MPC) generally come in two forms: they either represent the function being computed as a boolean circuit, or as an arithmetic circuit over a large field. Either type of protocol can be used for any function, but the choice of which protocol to use can have a significant impact on efficiency. The magnitude of the effect, however, has never been quantified.With this in mind, we implement the MPC protocol of Goldreich, Micali, and Wigderson [13], which uses a boolean representation and is secure against a semi-honest adversary corrupting any number of parties. We then consider applications of secure MPC in on-line marketplaces, where customers select resources advertised by providers and it is desired to ensure privacy to the extent possible. Problems here are more naturally formulated in terms of boolean circuits, and we study the performance of our MPC implementation relative to existing ones that use an arithmetic-circuit representation. Our protocol easily handles tens of customers/providers and thousands of resources, and outperforms existing implementations including FairplayMP [3], VIFF [11], and SEPIA [7]. %B Topics in Cryptology–CT-RSA 2012 %P 416 - 432 %8 2012/// %G eng %R 10.1007/978-3-642-27954-6_26 %0 Book Section %B Advances in Cryptology – CRYPTO 2012 %D 2012 %T Securing Circuits against Constant-Rate Tampering %A Dana Dachman-Soled %A Kalai, Yael Tauman %E Safavi-Naini, Reihaneh %E Canetti, Ran %K circuit compiler %K Computer Communication Networks %K computers and society %K Data Encryption %K Discrete Mathematics in Computer Science %K Management of Computing and Information Systems %K PCP of proximity %K side-channel attacks %K Systems and Data Security %K tampering %X We present a compiler that converts any circuit into one that remains secure even if a constant fraction of its wires are tampered with. Following the seminal work of Ishai et. al. (Eurocrypt 2006), we consider adversaries who may choose an arbitrary set of wires to corrupt, and may set each such wire to 0 or to 1, or may toggle with the wire. We prove that such adversaries, who continuously tamper with the circuit, can learn at most logarithmically many bits of secret information (in addition to black-box access to the circuit). Our results are information theoretic. %B Advances in Cryptology – CRYPTO 2012 %S Lecture Notes in Computer Science %I Springer Berlin Heidelberg %P 533 - 551 %8 2012/01/01/ %@ 978-3-642-32008-8, 978-3-642-32009-5 %G eng %U http://link.springer.com/chapter/10.1007/978-3-642-32009-5_31 %0 Conference Paper %B International Conference on Pattern Recognition (ICPR 2012) %D 2012 %T Sharpness Estimation for Document and Scene Images %A Kumar,Jayant %A Chen, Francine %A David Doermann %X Images of document pages have different characteristics than images of natural scenes, and so the sharpness measures developed for natural scene images do not necessarily extend to document images primarily composed of text. We present an efficient and simple method for effectively estimating the sharpness/ blurriness of document images that also performs well on natural scenes. Our method can be used to predict the sharpness in scenarios where images are blurred due to camera-motion (or hand-shake), defocus, or inherent properties of the imaging system. The proposed method outperforms the perceptually-based, no-reference sharpness work of [1] and [4], which was shown to perform better than 14 other no-reference sharpness measures on the LIVE dataset. %B International Conference on Pattern Recognition (ICPR 2012) %P 3292-3295 %0 Journal Article %J Association for Computational Linguistics %D 2012 %T SITS: A Hierarchical Nonparametric Model using Speaker Identity for Topic Segmentation in Multiparty Conversations %A Nguyen,Viet-An %A Jordan Boyd-Graber %A Resnik, Philip %X One of the key tasks for analyzing conversa- tional data is segmenting it into coherent topic segments. However, most models of topic segmentation ignore the social aspect of con- versations, focusing only on the words used. We introduce a hierarchical Bayesian nonpara- metric model, Speaker Identity for Topic Seg- mentation (SITS), that discovers (1) the top- ics used in a conversation, (2) how these top- ics are shared across conversations, (3) when these topics shift, and (4) a person-specific tendency to introduce new topics. We eval- uate against current unsupervised segmenta- tion models to show that including person- specific information improves segmentation performance on meeting corpora and on po- litical debates. Moreover, we provide evidence that SITS captures an individual’s tendency to introduce new topics in political contexts, via analysis of the 2008 US presidential debates and the television program Crossfire. %B Association for Computational Linguistics %8 2012/// %G eng %0 Journal Article %J Journal of Computing and Information Science in Engineering %D 2012 %T Speeding Up Particle Trajectory Simulations under Moving Force Fields using GPUs %A Patro,R. %A Dickerson,J. P. %A Bista,S. %A Gupta,S.K. %A Varshney, Amitabh %X In this paper, we introduce a GPU-based framework forsimulating particle trajectories under both static and dynamic force fields. By exploiting the highly parallel nature of the problem and making efficient use of the available hardware, our simulator exhibits a significant speedup over its CPU- based analog. We apply our framework to a specific experi- mental simulation: the computation of trapping probabilities associated with micron-sized silica beads in optical trapping workbenches. When evaluating large numbers of trajectories (4096), we see approximately a 356 times speedup of the GPU-based simulator over its CPU-based counterpart. %B Journal of Computing and Information Science in Engineering %8 2012/// %G eng %0 Journal Article %J Biochimica et Biophysica Acta (BBA) - Molecular Cell Research %D 2012 %T Structural and biochemical studies of the open state of Lys48-linked diubiquitin %A Lai,Ming-Yih %A Zhang,Daoning %A LaRonde-LeBlanc,Nicole %A Fushman, David %K Lys48-linked diubiquitin %K Lysine-48 linkage selectivity %K polyubiquitin %K ubiquitin %K Ubiquitin-associated domain %X Ubiquitin (Ub) is a small protein highly conserved among eukaryotes and involved in practically all aspects of eukaryotic cell biology. Polymeric chains assembled from covalently-linked Ub monomers function as molecular signals in the regulation of a host of cellular processes. Our previous studies have shown that the predominant state of Lys48-linked di- and tetra-Ub chains at near-physiological conditions is a closed conformation, in which the Ub–Ub interface is formed by the hydrophobic surface residues of the adjacent Ub units. Because these very residues are involved in (poly)Ub interactions with the majority of Ub-binding proteins, their sequestration at the Ub–Ub interface renders the closed conformation of polyUb binding incompetent. Thus the existence of open conformation(s) and the interdomain motions opening and closing the Ub–Ub interface is critical for the recognition of Lys48-linked polyUb by its receptors. Knowledge of the conformational properties of a polyUb signal is essential for our understanding of its specific recognition by various Ub-receptors. Despite their functional importance, open states of Lys48-linked chains are poorly characterized. Here we report a crystal structure of the open state of Lys48-linked di-Ub. Moreover, using NMR, we examined interactions of the open state of this chain (at pH4.5) with a Lys48-linkage-selective receptor, the UBA2 domain of a shuttle protein hHR23a. Our results show that di-Ub binds UBA2 in the same mode and with comparable affinity as the closed state. Our data suggest a mechanism for polyUb signal recognition, whereby Ub-binding proteins select specific conformations out of the available ensemble of polyUb chain conformations. This article is part of a Special Issue entitled: Ubiquitin Drug Discovery and Diagnostics. %B Biochimica et Biophysica Acta (BBA) - Molecular Cell Research %8 2012/// %@ 0167-4889 %G eng %U http://www.sciencedirect.com/science/article/pii/S0167488912000948 %R 10.1016/j.bbamcr.2012.04.003 %0 Journal Article %J Nature %D 2012 %T Structure, function and diversity of the healthy human microbiome %A Huttenhower, C. %A Gevers, D. %A Knight,R. %A Abubucker, S. %A Badger, J.H. %A Chinwalla, A.T. %A Creasy, H.H. %A Earl, A.M. %A Fitzgerald, M.G. %A Fulton, R.S. %A others %X Studies of the human microbiome have revealed that even healthy individuals differ remarkably in the microbes that occupy habitats such as the gut, skin and vagina. Much of this diversity remains unexplained, although diet, environment, host genetics and early microbial exposure have all been implicated. Accordingly, to characterize the ecology of human-associated microbial communities, the Human Microbiome Project has analysed the largest cohort and set of distinct, clinically relevant body habitats so far. We found the diversity and abundance of each habitat’s signature microbes to vary widely even among healthy subjects, with strong niche specialization both within and among individuals. The project encountered an estimated 81–99% of the genera, enzyme families and community configurations occupied by the healthy Western microbiome. Metagenomic carriage of metabolic pathways was stable among individuals despite variation in community structure, and ethnic/racial background proved to be one of the strongest associations of both pathways and microbes with clinical metadata. These results thus delineate the range of structural and functional configurations normal in the microbial communities of a healthy population, enabling future characterization of the epidemiology, ecology and translational applications of the human microbiome. %B Nature %V 486 %P 207 - 214 %8 2012 %G eng %0 Conference Paper %B the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12 %D 2012 %T Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions %A Martineau, Justin %A Mokashi,Ronil %A Chapman, David %A Grasso, Michael %A Brady,Mary %A Yesha,Yelena %A Yesha,Yaacov %A Cardone, Antonio %A Dima, Alden %Y Luo, Gang %Y Liu, Jiming %Y Nahapetian, Ani %Y Mahoui, Malika %B the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12 %I ACM Press %C Miami, Florida, USANew York, New York, USA %P 399 %@ 9781450307819 %! IHI '12 %R 10.1145/211036310.1145/2110363.2110409 %0 Conference Paper %B IEEE conference on Computer Vision and Pattern Recognition %D 2012 %T Submodular Dictionary Learning for Sparse Coding %A Zhuolin Jiang %A Zhang, G. %A Davis, Larry S. %X A greedy-based approach to learn a compact and dis-criminative dictionary for sparse representation is pre- sented. We propose an objective function consisting of two components: entropy rate of a random walk on a graph and a discriminative term. Dictionary learning is achieved by finding a graph topology which maximizes the objec- tive function. By exploiting the monotonicity and submod- ularity properties of the objective function and the matroid constraint, we present a highly efficient greedy-based op- timization algorithm. It is more than an order of magni- tude faster than several recently proposed dictionary learn- ing approaches. Moreover, the greedy algorithm gives a near-optimal solution with a (1/2)-approximation bound. Our approach yields dictionaries having the property that feature points from the same class have very similar sparse codes. Experimental results demonstrate that our approach outperforms several recently proposed dictionary learning techniques for face, action and object category recognition. %B IEEE conference on Computer Vision and Pattern Recognition %8 2012/// %G eng %0 Patent %D 2012 %T Systems and Methods for Energy Harvesting in a Contained Fluid Circuit %A Campbell,Tim %A Larson,Eric %A Cohn, Gabriel %A Alcaide,Ramses %A Jon Froehlich %A Patel,Shwetak %K Systems and Methods for Energy Harvesting in a Contained Fluid Circuit %X Systems and methods for harvesting energy from a closed fluid circuit, such as a water pipe system in a building. An energy harvester can be installed at a point in a water circuit and can generate energy from pressure differentials caused when a valve is opened or closed at any other point in the water circuit that is in fluid communication with the energy harvester. The energy can be used to power, for example, a sensor and/or a transmitter., L'invention concerne des systèmes et des procédés de collecte de l'énergie qui provient d'un circuit de fluide fermé, comme un système de conduites d'eau dans un immeuble. Un collecteur d'énergie peut être installé à un certain point au sein d'un circuit d'eau et peut générer de l'énergie à partir des différentiels de pression provoqués lorsqu'une soupape est ouverte ou fermée à n'importe quel autre point au sein du circuit d'eau qui est en communication fluidique avec le collecteur d'énergie. L'énergie peut être utilisée pour alimenter, par exemple, un capteur et/ou un émetteur. %I UNIVERSITY OF WASHINGTON THROUGH ITS CENTER FOR COMMERCIALIZATION, CAMPBELL, Tim, LARSON, Eric, COHN, Gabriel, ALCAIDE, Ramses, FROEHLICH, Jon, PATEL, Shwetak %8 2012 %@ WO/2012/021551 %G eng %U http://patentscope.wipo.int/search/en/WO2012021551 %0 Journal Article %J Visualization and Computer Graphics, IEEE Transactions on %D 2011 %T Saliency-Assisted Navigation of Very Large Landscape Images %A Ip, Cheuk Yiu %A Varshney, Amitabh %K acquisition;data %K acquisition;saliency %K analysis; %K assisted %K image %K images;robotic %K Internet;camera %K navigation;statistical %K processing;image %K resolution;image %K resolution;interactive %K sensors;image %K sensors;statistical %K signatures;data %K visualisation;geophysical %K visualization;landscape %X The field of visualization has addressed navigation of very large datasets, usually meshes and volumes. Significantly less attention has been devoted to the issues surrounding navigation of very large images. In the last few years the explosive growth in the resolution of camera sensors and robotic image acquisition techniques has widened the gap between the display and image resolutions to three orders of magnitude or more. This paper presents the first steps towards navigation of very large images, particularly landscape images, from an interactive visualization perspective. The grand challenge in navigation of very large images is identifying regions of potential interest. In this paper we outline a three-step approach. In the first step we use multi-scale saliency to narrow down the potential areas of interest. In the second step we outline a method based on statistical signatures to further cull out regions of high conformity. In the final step we allow a user to interactively identify the exceptional regions of high interest that merit further attention. We show that our approach of progressive elicitation is fast and allows rapid identification of regions of interest. Unlike previous work in this area, our approach is scalable and computationally reasonable on very large images. We validate the results of our approach by comparing them to user-tagged regions of interest on several very large landscape images from the Internet. %B Visualization and Computer Graphics, IEEE Transactions on %V 17 %P 1737 - 1746 %8 2011/12// %@ 1077-2626 %G eng %N 12 %R 10.1109/TVCG.2011.231 %0 Conference Paper %B High Performance Computing, Networking, Storage and Analysis (SC), 2011 International Conference for %D 2011 %T Scalable fast multipole methods on distributed heterogeneous architectures %A Hu,Qi %A Gumerov, Nail A. %A Duraiswami, Ramani %K accelerators;OpenMP;analysis %K algorithm;iterative %K and %K architecture;CUDA;FMM %K architectures; %K architectures;divide-and-conquer %K based %K conquer %K CPU-GPU %K CPU;scalable %K data %K fast %K heterogeneous %K loop;data %K loop;multicore %K methods;graphics %K methods;multiprocessing %K methods;time %K multipole %K parts;distributed %K PROCESSING %K stepping %K structures;divide %K structures;GPU %K systems;parallel %K translation %K units;iterative %X We fundamentally reconsider implementation of the Fast Multipole Method (FMM) on a computing node with a heterogeneous CPU-GPU architecture with multicore CPU(s) and one or more GPU accelerators, as well as on an interconnected cluster of such nodes. The FMM is a divide- and-conquer algorithm that performs a fast N-body sum using a spatial decomposition and is often used in a time- stepping or iterative loop. Using the observation that the local summation and the analysis-based translation parts of the FMM are independent, we map these respectively to the GPUs and CPUs. Careful analysis of the FMM is performed to distribute work optimally between the multicore CPUs and the GPU accelerators. We first develop a single node version where the CPU part is parallelized using OpenMP and the GPU version via CUDA. New parallel algorithms for creating FMM data structures are presented together with load balancing strategies for the single node and distributed multiple-node versions. Our implementation can perform the N-body sum for 128M particles on 16 nodes in 4.23 seconds, a performance not achieved by others in the literature on such clusters. %B High Performance Computing, Networking, Storage and Analysis (SC), 2011 International Conference for %P 1 - 12 %8 2011/11// %G eng %0 Conference Paper %B Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security %D 2011 %T Seam carving estimation using forensic hash %A Lu,Wenjun %A M. Wu %K forensic hash %K seam carving %K sift %K visual words %X Seam carving is an adaptive multimedia retargeting technique to resize multimedia data for different display sizes. This technique has found promising applications in media consumption on mobile devices such as tablets and smartphones. However, seam carving can also be used to maliciously alter image content and when combined with other tampering operations, makes tampering detection very difficult by traditional multimedia forensic techniques. In this paper, we study the problem of seam carving estimation and tampering localization using very compact side information called forensic hash. The forensic hash technique bridges two related areas, namely robust image hashing and blind multimedia forensics, to answer a broader scope of forensic questions in a more efficient and accurate manner. We show that our recently proposed forensic hash construction can be extended to accurately estimate seam carving and detect local tampering. %B Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security %S MM&Sec '11 %I ACM %C New York, NY, USA %P 9 - 14 %8 2011/// %@ 978-1-4503-0806-9 %G eng %U http://doi.acm.org/10.1145/2037252.2037255 %R 10.1145/2037252.2037255 %0 Report %D 2011 %T Secure computation with sublinear amortized work %A Gordon,D. %A Katz, Jonathan %A Kolesnikov,V. %A Malkin,T. %A Raykova,M. %A Vahlis,Y. %X Traditional approaches to secure computation begin by representing the function f beingcomputed as a circuit. For any function f that depends on each of its inputs, this implies a protocol with complexity at least linear in the input size. In fact, linear running time is inherent for secure computation of non-trivial functions, since each party must “touch” every bit of their input lest information about other party’s input be leaked. This seems to rule out many interesting applications of secure computation in scenarios where at least one of the inputs is huge and sublinear-time algorithms can be utilized in the insecure setting; private database search is a prime example. We present an approach to secure two-party computation that yields sublinear-time proto- cols, in an amortized sense, for functions that can be computed in sublinear time on a random access machine (RAM). Furthermore, a party whose input is “small” is required to maintain only small state. We provide a generic protocol that achieves the claimed complexity, based on any oblivious RAM and any protocol for secure two-party computation. We then present an optimized version of this protocol, where generic secure two-party computation is used only for evaluating a small number of simple operations. %I Cryptology ePrint Archive, Report 2011/482 %8 2011/// %G eng %0 Book Section %B Applied Cryptography and Network Security %D 2011 %T Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications %A Dana Dachman-Soled %A Malkin, Tal %A Raykova, Mariana %A Yung, Moti %E Lopez, Javier %E Tsudik, Gene %K additive homomorphic encryption %K Algorithm Analysis and Problem Complexity %K Computer Communication Networks %K Data Encryption %K Discrete Mathematics in Computer Science %K Management of Computing and Information Systems %K multiparty set intersection %K multivariate polynomial evaluation %K secret sharing %K secure multiparty computation %K Systems and Data Security %K threshold cryptosystems %X We present a robust secure methodology for computing functions that are represented as multivariate polynomials where parties hold different variables as private inputs. Our generic efficient protocols are fully black-box and employ threshold additive homomorphic encryption; they do not assume honest majority, yet are robust in detecting any misbehavior. We achieve solutions that take advantage of the algebraic structure of the polynomials, and are polynomial-time in all parameters (security parameter, polynomial size, polynomial degree, number of parties). We further exploit a “round table” communication paradigm to reduce the complexity in the number of parties. A large collection of problems are naturally and efficiently represented as multivariate polynomials over a field or a ring: problems from linear algebra, statistics, logic, as well as operations on sets represented as polynomials. In particular, we present a new efficient solution to the multi-party set intersection problem, and a solution to a multi-party variant of the polynomial reconstruction problem. %B Applied Cryptography and Network Security %S Lecture Notes in Computer Science %I Springer Berlin Heidelberg %P 130 - 146 %8 2011/01/01/ %@ 978-3-642-21553-7, 978-3-642-21554-4 %G eng %U http://link.springer.com/chapter/10.1007/978-3-642-21554-4_8 %0 Conference Paper %B Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on %D 2011 %T Secure video processing: Problems and challenges %A Lu,Wenjun %A Varna,A. %A M. Wu %K data;video %K fashion;secure %K management;secure %K of %K online %K privacy-preserving %K processing; %K processing;security %K signal %K video %X Secure signal processing is an emerging technology to enable signal processing tasks in a secure and privacy-preserving fashion. It has attracted a great amount of research attention due to the increasing demand to enable rich functionalities for private data stored online. Desirable functionalities may include search, analysis, clustering, etc. In this paper, we discuss the research issues and challenges in secure video processing with focus on the application of secure online video management. Video is different from text due to its large data volume and rich content diversity. To be practical, secure video processing requires efficient solutions that may involve a trade-off between security and complexity. We look at three representative video processing tasks and review existing techniques that can be applied. Many of the tasks do not have efficient solutions yet, and we discuss the challenges and research questions that need to be addressed. %B Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on %P 5856 - 5859 %8 2011/05// %G eng %R 10.1109/ICASSP.2011.5947693 %0 Conference Paper %B Proceedings of the 19th ACM international conference on Multimedia %D 2011 %T "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing %A Garg,Ravi %A Varna,Avinash L. %A M. Wu %K electric network frequency %K information forensics %K timestamp %K video authentication %X Electric Network Frequency (ENF) fluctuates slightly over time from its nominal value of 50 Hz/60 Hz. The fluctuations in the ENF remain consistent across the entire power grid even when measured at physically distant locations. The near-invisible flickering of fluorescent lights connected to the power mains reflect these fluctuations present in the ENF. In this paper, mechanisms using optical sensors and video cameras to record and validate the presence of the ENF fluctuations in fluorescent lighting are presented. Signal processing techniques are applied to demonstrate a high correlation between the fluctuations in the ENF signal captured from fluorescent lighting and the ENF signal captured directly from power mains supply. The proposed technique is then used to demonstrate the presence of the ENF signal in video recordings taken in various geographical areas. Experimental results show that the ENF signal can be used as a natural timestamp for optical sensor recordings and video surveillance recordings from indoor environments under fluorescent lighting. Application of the ENF signal analysis to tampering detection of surveillance video recordings is also demonstrated. %B Proceedings of the 19th ACM international conference on Multimedia %S MM '11 %I ACM %C New York, NY, USA %P 23 - 32 %8 2011/// %@ 978-1-4503-0616-4 %G eng %U http://doi.acm.org/10.1145/2072298.2072303 %R 10.1145/2072298.2072303 %0 Conference Paper %B Intl. Conf. on Document Analysis and Recognition (ICDAR 11) %D 2011 %T Segmentation of Handwritten Textlines in Presence of Touching Components %A Kumar,Jayant %A Kang,Le %A David Doermann %A Abd-Almageed, Wael %X This paper presents an approach to textline extraction in handwritten document images which combines local and global techniques. We propose a graph-based technique to detect touching and proximity errors that are common with handwritten text lines. In a refinement step, we use Expectation-Maximization (EM) to iteratively split the error segments to obtain correct text-lines. We show improvement in accuracies using our correction method on datasets of Arabic document images. Results on a set of artificially generated proximity images show that the method is effective for handling touching errors in handwritten document images. %B Intl. Conf. on Document Analysis and Recognition (ICDAR 11) %P 109 - 113 %8 2011/// %G eng %0 Conference Paper %B Twenty-Fifth AAAI Conference on Artificial Intelligence %D 2011 %T Selective transfer between learning tasks using task-based boosting %A Eaton,E. %A desJardins, Marie %A others %B Twenty-Fifth AAAI Conference on Artificial Intelligence %8 2011/// %G eng %0 Journal Article %J Arxiv preprint arXiv:1105.5444 %D 2011 %T Semantic similarity in a taxonomy: An information-based measure and its application to problems of ambiguity in natural language %A Resnik, Philip %B Arxiv preprint arXiv:1105.5444 %8 2011/// %G eng %0 Journal Article %J arXiv:1105.0106 [cs] %D 2011 %T Semantic Solutions to Program Analysis Problems %A Tobin-Hochstadt, Sam %A David Van Horn %K Computer Science - Programming Languages %X Problems in program analysis can be solved by developing novel program semantics and deriving abstractions conventionally. For over thirty years, higher-order program analysis has been sold as a hard problem. Its solutions have required ingenuity and complex models of approximation. We claim that this difficulty is due to premature focus on abstraction and propose a new approach that emphasizes semantics. Its simplicity enables new analyses that are beyond the current state of the art. %B arXiv:1105.0106 [cs] %8 2011/04/30/ %G eng %U http://arxiv.org/abs/1105.0106 %0 Conference Paper %B Proceedings of the 2011 international conference on Management of data %D 2011 %T Sensitivity analysis and explanations for robust query evaluation in probabilistic databases %A Kanagal,B. %A Li,J. %A Deshpande, Amol %X Probabilistic database systems have successfully established them-selves as a tool for managing uncertain data. However, much of the research in this area has focused on efficient query evaluation and has largely ignored two key issues that commonly arise in uncer- tain data management: First, how to provide explanations for query results, e.g., “Why is this tuple in my result?” or “Why does this output tuple have such high probability?”. Second, the problem of determining the sensitive input tuples for the given query, e.g., users are interested to know the input tuples that can substantially alter the output, when their probabilities are modified (since they may be unsure about the input probability values). Existing systems pro- vide the lineage/provenance of each of the output tuples in addition to the output probabilities, which is a boolean formula indicating the dependence of the output tuple on the input tuples. However, lineage does not immediately provide a quantitative relationship and it is not informative when we have multiple output tuples. In this paper, we propose a unified framework that can handle both the issues mentioned above to facilitate robust query processing. We formally define the notions of influence and explanations and provide algorithms to determine the top-l influential set of variables and the top-l set of explanations for a variety of queries, including conjunctive queries, probabilistic threshold queries, top-k queries and aggregation queries. Further, our framework naturally enables highly efficient incremental evaluation when input probabilities are modified (e.g., if uncertainty is resolved). Our preliminary exper- imental results demonstrate the benefits of our framework for per- forming robust query processing over probabilistic databases. %B Proceedings of the 2011 international conference on Management of data %P 841 - 852 %8 2011/// %G eng %0 Report %D 2011 %T Seven guiding scenarios for information visualization evaluation %A Lam,H. %A Bertini,E. %A Isenberg,P. %A Plaisant, Catherine %A Carpendale,S. %X We take a new, scenario based look at evaluation in information visualization. Our seven scenarios, evaluatingvisual data analysis and reasoning, evaluating user performance, evaluating user experience, evaluating environments and work practices, evaluating communication through visualization, automated evaluation of visualizations, and evaluating collaborative data analysis were derived through an extensive literature review of over 800 visualization publications. These scenarios are described through their goals, the types of questions they embody and illustrated through example studies. Through this broad survey and the distillation of these scenarios we make two contributions. One, we encapsulate the current practices in the information visualization research community and, two, we provide a different approach to reaching decisions about what might be the most effective evaluation of a given information visualization. For example, if the research goals or evaluative questions are known they can be used to map to specific scenarios, where practical existing examples can be considered for effective evaluation approaches. %I Department of Computer Science, University of Calgary %V 2011-992-04 %8 2011/// %G eng %0 Conference Paper %B Document Recognition and Retrieval %D 2011 %T Shape Codebook based Handwritten and Machine Printed Text Zone Extraction %A Kumar,Jayant %A Prasad,Rohit %A Cao,Huiagu %A Abd-Almageed, Wael %A David Doermann %A Natarajan,Prem %X We present a novel method for extracting handwritten and printed text zones from noisy document images with mixed content. We use Triple-Adjacent-Segment (TAS) based features which encode local shape characteristics of text in a consistent manner. We first construct two different codebooks of the shape features extracted from a set of handwritten and printed text documents. In the next step, we compute the normalized histogram of codewords for each segmented zone and use it to train Support Vector Machine (SVM) classifier. Due to a codebook based approach, our method is robust to the background noise present in the image. The TAS features used are invariant to translation, scale and rotation of text. In our experimental results, we show that a pixel-weighted zone classification accuracy of 98% can be achieved for noisy Arabic documents. Further, we demonstrate the effectiveness of our method for document page classification and show that a high precision can be achieved for machine printed documents. The proposed method is robust to the size of zones, which may contain text content at word, line or paragraph level. %B Document Recognition and Retrieval %C San Francisco %P 7874:1-8 - 7874:1-8 %8 2011/01// %G eng %0 Journal Article %J Computer Vision and Image Understanding %D 2011 %T Silhouette-based gesture and action recognition via modeling trajectories on Riemannian shape manifolds %A Abdelkader,Mohamed F. %A Abd-Almageed, Wael %A Srivastava,Anuj %A Chellapa, Rama %K Action recognition %K Gesture recognition %K Riemannian manifolds %K Shape space %K Silhouette-based approaches %X This paper addresses the problem of recognizing human gestures from videos using models that are built from the Riemannian geometry of shape spaces. We represent a human gesture as a temporal sequence of human poses, each characterized by a contour of the associated human silhouette. The shape of a contour is viewed as a point on the shape space of closed curves and, hence, each gesture is characterized and modeled as a trajectory on this shape space. We propose two approaches for modeling these trajectories. In the first template-based approach, we use dynamic time warping (DTW) to align the different trajectories using elastic geodesic distances on the shape space. The gesture templates are then calculated by averaging the aligned trajectories. In the second approach, we use a graphical model approach similar to an exemplar-based hidden Markov model, where we cluster the gesture shapes on the shape space, and build non-parametric statistical models to capture the variations within each cluster. We model each gesture as a Markov model of transitions between these clusters. To evaluate the proposed approaches, an extensive set of experiments was performed using two different data sets representing gesture and action recognition applications. The proposed approaches not only are successfully able to represent the shape and dynamics of the different classes for recognition, but are also robust against some errors resulting from segmentation and background subtraction. %B Computer Vision and Image Understanding %V 115 %P 439 - 455 %8 2011/03// %@ 1077-3142 %G eng %U http://www.sciencedirect.com/science/article/pii/S1077314210002377 %N 3 %R 16/j.cviu.2010.10.006 %0 Journal Article %J 2nd USENIX Workshop on Hot Topics in Cloud Computing %D 2011 %T SilverLine: Data and Network Isolation for Cloud Services %A Mundada,Y. %A Ramachandran,A. %A Feamster, Nick %X Although cloud computing service providers offer op-portunities for improving the administration, reliability, and maintenance of hosted services, they also concen- trate network resources and data in a small number of cloud service providers. The concentration of data and resources also entails various associated risks, including sharing the underlying infrastructure with unknown (and untrusted) tenants and relying on the availability and se- curity of the underlying infrastructure itself. These se- curity risks represent some of the most significant bar- riers to the adoption of cloud-based services. To begin tackling these risks, a cloud hosting infrastructure should provide strong guarantees for resource and data isolation. This paper examines data and network isolation prob- lems with today’s cloud hosting infrastructures and pro- poses SilverLine, a collection of techniques to improve data and network isolation for a cloud tenants’ service. %B 2nd USENIX Workshop on Hot Topics in Cloud Computing %8 2011/// %G eng %0 Journal Article %J Computer Graphics Forum %D 2011 %T Simplex and Diamond Hierarchies: Models and Applications %A Weiss,K. %A De Floriani, Leila %K hierarchy of diamonds %K hierarchy of simplices %K I.3.5 [Computer Graphics]: Computational Geometry and Object Modelling— Hierarchy and geometric transformations %K I.3.6 [Computer Graphics]: Methodology and Techniques—Graphics data structures and data types %K interactive terrain visualization %K mesh‐based multiresolution models %K multiresolution isosurfaces %K nested refinement schemes %K Regular simplex bisection %K scalar field visualization %K spatial access structures %X Hierarchical spatial decompositions are a basic modelling tool in a variety of application domains. Several papers on this subject deal with hierarchical simplicial decompositions generated through regular simplex bisection. Such decompositions, originally developed for finite elements, are extensively used as the basis for multi-resolution models of scalar fields, such as terrains, and static or time-varying volume data. They have also been used as an alternative to quadtrees and octrees as spatial access structures. The primary distinction among all such approaches is whether they treat the simplex or clusters of simplices, called diamonds, as the modelling primitive. This leads to two classes of data structures and to different query approaches. We present the hierarchical models in a dimension-independent manner, and organize the description of the various applications, primarily interactive terrain rendering and isosurface extraction, according to the dimension of the domain. %B Computer Graphics Forum %V 30 %P 2127 - 2155 %8 2011/11/24/ %@ 1467-8659 %G eng %U http://onlinelibrary.wiley.com/doi/10.1111/j.1467-8659.2011.01853.x/abstract?userIsAuthenticated=false&deniedAccessCustomisedMessage= %N 8 %R 10.1111/j.1467-8659.2011.01853.x %0 Conference Paper %B Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems %D 2011 %T Simplifying morphological representations of 2D and 3D scalar fields %A Čomić,Lidija %A De Floriani, Leila %A Iuricich,Federico %K morphological representations %K Morse complexes %K multi-dimensional data sets %K simplification %X We describe a dual graph-based representation for the ascending and descending Morse complexes of a scalar field, and a compact and dimension-independent data structure based on it, which assumes a discrete representation of the field as a simplicial mesh. We present atomic dimension-independent simplification operators on the graph-based representation. Based on such operators, we have developed a simplification algorithm, which allows generalization of the ascending and descending Morse complexes at different levels of resolution. We show here the results of our implementation, discussing the computation times and the size of the resulting simplified graphs, also in comparison with the size of the original full-resolution graph. %B Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems %S GIS '11 %I ACM %C New York, NY, USA %P 437 - 440 %8 2011/// %@ 978-1-4503-1031-4 %G eng %U http://doi.acm.org/10.1145/2093973.2094042 %R 10.1145/2093973.2094042 %0 Conference Paper %B Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom) %D 2011 %T Simulating Audiences: Automating Analysis of Values, Attitudes, and Sentiment %A Templeton,T.C. %A Fleischmann,K.R. %A Jordan Boyd-Graber %K audience simulation %K behavioural sciences computing %K crowdsourcing %K Educational institutions %K human values %K HUMANS %K learning (artificial intelligence) %K machine learning %K moral argument %K natural language processing %K Park51 project %K Presses %K public controversy %K public discussion %K Security %K social sciences computing %K support vector machines %K Weaving %X Current events such as the Park51 Project in downtown Manhattan create "critical discourse moments," explosions of discourse around a topic that can be exploited for data gathering. Policymakers have a need to understand the dynamics of public discussion in real time. Human values, which are cognitively related to attitudes and serve as reference points in moral argument, are important indicators of what's at stake in a public controversy. This work shows that it is possible to link values data with reader behavior to infer values implicit in a topical corpus, and that it is possible to automate this process using machine learning. %B Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom) %I IEEE %P 734 - 737 %8 2011/10/09/11 %@ 978-1-4577-1931-8 %G eng %R 10.1109/PASSAT/SocialCom.2011.238 %0 Conference Paper %B Discrete Geometry for Computer Imagery %D 2011 %T Smale-like decomposition and forman theory for discrete scalar fields %A Čomić,L. %A Mesmoudi,M. %A De Floriani, Leila %X Forman theory, which is a discrete alternative for cell complexes to the well-known Morse theory, is currently finding several applications in areas where the data to be handled are discrete, such as image processing and computer graphics. Here, we show that a discrete scalar field f, defined on the vertices of a triangulated multidimensional domain Σ, and its gradient vector field Grad f through the Smale-like decomposition of f [6], are both the restriction of a Forman function F and its gradient field Grad F that extends f over all the simplexes of Σ. We present an algorithm that gives an explicit construction of such an extension. Hence, the scalar field f inherits the properties of Forman gradient vector fields and functions from field Grad F and function F. %B Discrete Geometry for Computer Imagery %P 477 - 488 %8 2011/// %G eng %R 10.1007/978-3-642-19867-0_40 %0 Patent %D 2011 %T Smart task-driven video collection %A Lim,Ser-Nam %A Mittal,Anurag %A Davis, Larry S. %E Siemens Corporation %X A multi-camera system that collects images and videos of moving objects in dynamic and crowded scenes, subject to task constraints is disclosed. The system constructs “task visibility intervals” comprising information about what can be sensed in future time intervals. Methods for constructing these intervals applying prediction of future object motion and including consideration of factors such as object occlusion and camera control parameters are also disclosed. Using a plane-sweep algorithm, these atomic intervals can be combined in a method to form multi-task intervals, during which a single camera can collect videos suitable for multiple tasks simultaneously. Methods for fast camera scheduling that yield solutions within a small constant factor of an optimal solution are also disclosed. %V 11/649,393 %8 2011/06/14/ %G eng %U http://www.google.com/patents?id=pgPnAQAAEBAJ %N 7961215 %0 Conference Paper %B Proceedings of the 8th ACM conference on Creativity and cognition %D 2011 %T Social discovery framework: building capacity and seeking solutions %A Shneiderman, Ben %K Collaboration %K collective intelligence %K community %K creativity support tools %K crowdsourcing %K search %K social discovery %K User interfaces %X While journalists often portray discovery as the thrilling insight of a brilliant individual, many discoveries require years of work by competing and collaborating teams. Often large amounts of foundational work are necessary and dialogs among participants help clarify goals. The Social Discovery Framework suggests that (1) there are important processes in building capacity and then seeking solutions and (2) those that initiate requests are often as important as those who seek solutions. The implications of the Social Discovery Framework are that improved social tools to build capacity, initiate requests, and support dialog would accelerate the discovery process as much as the more visible tools for individuals seeking solutions. %B Proceedings of the 8th ACM conference on Creativity and cognition %S C&C '11 %I ACM %C New York, NY, USA %P 307 - 308 %8 2011/// %@ 978-1-4503-0820-5 %G eng %U http://doi.acm.org/10.1145/2069618.2069669 %R 10.1145/2069618.2069669 %0 Journal Article %J Information Services and Use %D 2011 %T Social discovery in an information abundant world: Designing to create capacity and seek solutions %A Shneiderman, Ben %X The first generation of search tools provided remarkable capabilities to many researchers for finding specific information, navigating to desired websites or tracking down needed documents. A second generation of tools is helping researchers conduct exploratory search in situations where the goals are less clear, where complete coverage is necessary, and where proof of absence is required (patents, legal precedents, etc.). However, the third generation of tools turns search into social discovery, in which colleagues, informal groups, companies, non-profit organizations, professional societies, and international federations are motivated to find, filter, organize, annotate and summarize voluminous information resources. The Reader-to-Leader framework describes the usability and sociability design features needed to motivate readers, contributors, collaborators and leaders. The Social Discovery framework, proposed in this paper, suggests that effective design enables people to engage in dialogs over weeks and months to create capacity (in the manner described by the Reader-to-Leader framework), and become more effective solution seekers. Much work remains to be done to validate these social discovery frameworks and refine them to fit diverse contexts. %B Information Services and Use %V 31 %P 3 - 13 %8 2011/01/01/ %G eng %U http://dx.doi.org/10.3233/ISU-2011-0628 %N 1 %R 10.3233/ISU-2011-0628 %0 Journal Article %J Computer Graphics and Applications, IEEE %D 2011 %T Social Snapshot: A System for Temporally Coupled Social Photography %A Patro,R. %A Ip, Cheuk Yiu %A Bista,S. %A Varshney, Amitabh %K 3D %K acquisition;data %K acquisition;photography;social %K computing; %K coupled %K data %K photography;data %K photography;temporally %K reconstruction;social %K sciences %K snapshot;spatiotemporal %K social %X Social Snapshot actively acquires and reconstructs temporally dynamic data. The system enables spatiotemporal 3D photography using commodity devices, assisted by their auxiliary sensors and network functionality. It engages users, making them active rather than passive participants in data acquisition. %B Computer Graphics and Applications, IEEE %V 31 %P 74 - 84 %8 2011/02//jan %@ 0272-1716 %G eng %N 1 %R 10.1109/MCG.2010.107 %0 Conference Paper %B Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference %D 2011 %T Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems %A Ramachandran,Anirudh %A Dasgupta,Anirban %A Feamster, Nick %A Weinberger,Kilian %X Web mail providers rely on users to "vote" to quickly and col-laboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections of compromised Web mail accounts not just to send spam, but also to vote "not spam" on incoming spam emails in an attempt to thwart collaborative filtering. We call this practice a vote gaming attack. This attack confuses spam filters, since it causes spam messages to be mislabeled as legitimate; thus, spammer IP addresses can continue sending spam for longer. In this paper, we introduce the vote gaming attack and study the extent of these attacks in practice, using four months of email voting data from a large Web mail provider. We develop a model for vote gaming attacks, explain why existing detection mechanisms cannot detect them, and develop a new, scalable clustering-based detection method that identifies compromised accounts that engage in vote-gaming attacks. Our method detected 1.1 million potentially compromised accounts with only a 0.17% false positive rate, which is nearly 10 times more effective than existing clustering methods used to detect bots that send spam from compromised Web mail accounts. %B Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference %S CEAS '11 %I ACM %C New York, NY, USA %P 210 - 219 %8 2011/// %@ 978-1-4503-0788-8 %G eng %U http://doi.acm.org/10.1145/2030376.2030401 %R 10.1145/2030376.2030401 %0 Conference Paper %B 2011 IEEE International Conference on Computer Vision (ICCV) %D 2011 %T Sparse dictionary-based representation and recognition of action attributes %A Qiang Qiu %A Zhuolin Jiang %A Chellapa, Rama %K action attributes %K appearance information %K class distribution %K Dictionaries %K dictionary learning process %K Encoding %K Entropy %K Gaussian process model %K Gaussian processes %K Histograms %K HUMANS %K Image coding %K image representation %K information maximization %K learning (artificial intelligence) %K modeled action categories %K Mutual information %K Object recognition %K probabilistic logic %K sparse coding property %K sparse dictionary-based recognition %K sparse dictionary-based representation %K sparse feature space %K unmodeled action categories %X We present an approach for dictionary learning of action attributes via information maximization. We unify the class distribution and appearance information into an objective function for learning a sparse dictionary of action attributes. The objective function maximizes the mutual information between what has been learned and what remains to be learned in terms of appearance information and class distribution for each dictionary item. We propose a Gaussian Process (GP) model for sparse representation to optimize the dictionary objective function. The sparse coding property allows a kernel with a compact support in GP to realize a very efficient dictionary learning process. Hence we can describe an action video by a set of compact and discriminative action attributes. More importantly, we can recognize modeled action categories in a sparse feature space, which can be generalized to unseen and unmodeled action categories. Experimental results demonstrate the effectiveness of our approach in action recognition applications. %B 2011 IEEE International Conference on Computer Vision (ICCV) %I IEEE %P 707 - 714 %8 2011/11/06/13 %@ 978-1-4577-1101-5 %G eng %R 10.1109/ICCV.2011.6126307 %0 Journal Article %J Applied OpticsAppl. Opt. %D 2011 %T Sparsity-motivated automatic target recognition %A Patel, Vishal M. %A Nasrabadi,Nasser M. %A Chellapa, Rama %K IMAGE PROCESSING %K Image recognition, algorithms and filters %K pattern recognition %K Vision - patterns and recognition %X We present an automatic target recognition algorithm using the recently developed theory of sparse representations and compressive sensing. We show how sparsity can be helpful for efficient utilization of data for target recognition. We verify the efficacy of the proposed algorithm in terms of the recognition rate and confusion matrices on the well known Comanche (Boeing–Sikorsky, USA) forward-looking IR data set consisting of ten different military targets at different orientations. %B Applied OpticsAppl. Opt. %V 50 %P 1425 - 1433 %8 2011/04/01/ %G eng %U http://ao.osa.org/abstract.cfm?URI=ao-50-10-1425 %N 10 %R 10.1364/AO.50.001425 %0 Journal Article %J IEEE Transactions on Circuits and Systems for Video Technology %D 2011 %T Special Issue on Video Analysis on Resource-Limited Systems %A Chellapa, Rama %A Cavallaro, A. %A Wu,Y. %A Shan, C. %A Fu, Y. %A Pulli, K. %K computational complexity %K Image Enhancement %K Special issues and sections %K Video compression %X The 17 papers in this special issue focus on resource-limited systems. %B IEEE Transactions on Circuits and Systems for Video Technology %V 21 %P 1349 - 1352 %8 2011/10// %@ 1051-8215 %G eng %N 10 %R 10.1109/TCSVT.2011.2165795 %0 Book Section %B Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction %D 2011 %T Speeding Up Network Layout and Centrality Measures for Social Computing Goals %A Sharma,Puneet %A Khurana,Udayan %A Shneiderman, Ben %A Scharrenbroich,Max %A Locke,John %E Salerno,John %E Yang,Shanchieh %E Nau, Dana S. %E Chai,Sun-Ki %X This paper presents strategies for speeding up calculation of graph metrics and layout by exploiting the parallel architecture of modern day Graphics Processing Units (GPU), specifically Compute Unified Device Architecture ( CUDA ) by Nvidia . Graph centrality metrics like Eigenvector , Betweenness , Page Rank and layout algorithms like Fruchterman − Rheingold are essential components of Social Network Analysis ( SNA ). With the growth in adoption of SNA in different domains and increasing availability of huge networked datasets for analysis, social network analysts require faster tools that are also scalable. Our results, using NodeXL, show up to 802 times speedup for a Fruchterman-Rheingold graph layout and up to 17,972 times speedup for Eigenvector centrality metric calculations on a 240 core CUDA-capable GPU. %B Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 6589 %P 244 - 251 %8 2011/// %@ 978-3-642-19655-3 %G eng %U http://dx.doi.org/10.1007/978-3-642-19656-0_35 %0 Conference Paper %B 2011 IEEE 27th International Conference on Data Engineering Workshops (ICDEW) %D 2011 %T State transfer for clear and efficient runtime updates %A Hayden,C.M. %A Smith,E. K %A Hicks, Michael W. %A Foster, Jeffrey S. %K C++ language %K C++ program %K Cognition %K complex tool support %K dynamic software updating %K efficient runtime update %K in-place DSU approach %K Libraries %K Operating systems %K program modification %K Program processors %K program transfer %K program version %K Runtime %K servers %K software libraries %K Software maintenance %K state transfer update %K Steady-state %K updating library %K VSFTPD %X Dynamic software updating (DSU), the practice of updating software while it executes, is a lively area of research. The DSU approach most prominent in both commercial and research systems is in-place updating, in which patches containing program modifications are loaded into a running process. However, in-place updating suffers from several problems: it requires complex tool support, it may adversely affect the performance of normal execution, it requires challenging reasoning to understand the behavior of an updated program, and it requires extra effort to modify program state to be compatible with an update. This paper presents preliminary work investigating the potential for state transfer updating to address these problems. State transfer updates work by launching a new process running the updated program version and transferring program state from the running process to the updated version. In this paper, we describe the use and implementation of Ekiden, a new state transfer updating library for C/C++ programs. Ekiden seeks to redress the difficulties of in-place updating, and we report on our experience updating VSFTPD using Ekiden. This initial experience suggests that state transfer provides the availability benefits of in-place DSU approaches while addressing many of their shortcomings. %B 2011 IEEE 27th International Conference on Data Engineering Workshops (ICDEW) %I IEEE %P 179 - 184 %8 2011/04/11/16 %@ 978-1-4244-9195-7 %G eng %R 10.1109/ICDEW.2011.5767632 %0 Journal Article %J IEEE Transactions on Pattern Analysis and Machine Intelligence %D 2011 %T Statistical Computations on Grassmann and Stiefel Manifolds for Image and Video-Based Recognition %A Turaga,P. %A Veeraraghavan,A. %A Srivastava, A. %A Chellapa, Rama %K activity based video clustering %K activity recognition %K computational geometry %K Computational modeling %K Data models %K face recognition %K feature representation %K finite dimensional linear subspaces %K geometric properties %K Geometry %K Grassmann Manifolds %K Grassmann. %K HUMANS %K Image and video models %K image recognition %K linear dynamic models %K linear subspace structure %K Manifolds %K maximum likelihood classification %K maximum likelihood estimation %K Object recognition %K Riemannian geometry %K Riemannian metrics %K SHAPE %K statistical computations %K statistical models %K Stiefel %K Stiefel Manifolds %K unsupervised clustering %K video based face recognition %K video based recognition %K video signal processing %X In this paper, we examine image and video-based recognition applications where the underlying models have a special structure-the linear subspace structure. We discuss how commonly used parametric models for videos and image sets can be described using the unified framework of Grassmann and Stiefel manifolds. We first show that the parameters of linear dynamic models are finite-dimensional linear subspaces of appropriate dimensions. Unordered image sets as samples from a finite-dimensional linear subspace naturally fall under this framework. We show that an inference over subspaces can be naturally cast as an inference problem on the Grassmann manifold. To perform recognition using subspace-based models, we need tools from the Riemannian geometry of the Grassmann manifold. This involves a study of the geometric properties of the space, appropriate definitions of Riemannian metrics, and definition of geodesics. Further, we derive statistical modeling of inter and intraclass variations that respect the geometry of the space. We apply techniques such as intrinsic and extrinsic statistics to enable maximum-likelihood classification. We also provide algorithms for unsupervised clustering derived from the geometry of the manifold. Finally, we demonstrate the improved performance of these methods in a wide variety of vision applications such as activity recognition, video-based face recognition, object recognition from image sets, and activity-based video clustering. %B IEEE Transactions on Pattern Analysis and Machine Intelligence %V 33 %P 2273 - 2286 %8 2011/11// %@ 0162-8828 %G eng %N 11 %R 10.1109/TPAMI.2011.52 %0 Conference Paper %B International Conference on Document Analysis and Recognition %D 2011 %T Stroke-like Pattern Noise Removal in Binary Document Images %A Agrawal,Mudit %A David Doermann %X This paper presents a two-phased stroke-like pattern noise (SPN) removal algorithm for binary document images. The proposed approach aims at understanding script-independent prominent text component features using supervised classification as a first step. It then uses their cohesiveness and stroke-width properties to filter and associate smaller text components with them using an unsupervised classification technique. In order to perform text extraction, and hence noise removal, at diacritic-level, this divide-and-conquer technique does not assume the availability of accurate and large amounts of ground-truth data at component-level for training purposes. The method was tested on a collection of degraded and noisy, machine-printed and handwritten binary Arabic text documents. Results show pixel-level precision and recall of 98% and 97% respectively. %B International Conference on Document Analysis and Recognition %P 17 - 21 %8 2011/// %G eng %0 Journal Article %J F1000 Biology ReportsF1000 Biol Rep %D 2011 %T Structure and recognition of polyubiquitin chains of different lengths and linkage %A Fushman, David %A Wilkinson,Keith D. %X The polyubiquitin signal is post-translationally attached to a large number of proteins, often directing formation of macromolecular complexes resulting in the translocation, assembly or degradation of the attached protein. Recent structural and functional studies reveal general mechanisms by which different architectures and length of the signal are distinguished. %B F1000 Biology ReportsF1000 Biol Rep %V 3 %8 2011/12/01/ %@ 1757-594X %G eng %U http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3229271/ %R 10.3410/B3-26 %0 Journal Article %J Electronic Journal of Biotechnology %D 2011 %T Suppression subtractive hybridization PCR isolation of cDNAs from a Caribbean soft coral %A Lopez, J.V. %A Ledger, A. %A Santiago-Vázquez, L.Z. %A Pop, Mihai %A Sommer, D.D. %A Ranzer, L.K. %A Feldman, R.A. %A Russell, G.K. %B Electronic Journal of Biotechnology %V 14 %P 8 - 9 %8 2011 %G eng %N 1 %0 Journal Article %J Communications Magazine, IEEE %D 2011 %T A survey of virtual LAN usage in campus networks %A Yu,Minlan %A Rexford,J. %A Sun,Xin %A Rao,Sanjay %A Feamster, Nick %K academic department %K campus network %K educational computing %K Educational institutions %K Ethernet scalability %K Local area networks %K network policy support %K university campus %K virtual LAN usage %K VLAN %X VLANs are widely used in today's enterprise networks to improve Ethernet scalability and support network policies. However, manuals and textbooks offer very little information about how VLANs are actually used in practice. Through discussions with network administrators and analysis of configuration data, we describe how three university campuses and one academic department use VLANs to achieve a variety of goals. We argue that VLANs are ill-suited to some of these goals (e.g., VLANs are often used to realize access control policies, but constrain the types of policies that can be expressed). Furthermore, the use of VLANs leads to significant complexity in the configuration of network devices. %B Communications Magazine, IEEE %V 49 %P 98 - 103 %8 2011/07// %@ 0163-6804 %G eng %N 7 %R 10.1109/MCOM.2011.5936161 %0 Conference Paper %B 2011 International Joint Conference on Biometrics (IJCB) %D 2011 %T Synthesis-based recognition of low resolution faces %A Shekhar, S. %A Patel, Vishal M. %A Chellapa, Rama %K Dictionaries %K Face %K face images %K face recognition %K face recognition literature %K face recognition systems %K illumination variations %K image resolution %K low resolution faces %K Organizations %K PROBES %K support vector machines %K synthesis based recognition %X Recognition of low resolution face images is a challenging problem in many practical face recognition systems. Methods have been proposed in the face recognition literature for the problem when the probe is of low resolution, and a high resolution gallery is available for recognition. These methods modify the probe image such that the resultant image provides better discrimination. We formulate the problem differently by leveraging the information available in the high resolution gallery image and propose a generative approach for classifying the probe image. An important feature of our algorithm is that it can handle resolution changes along with illumination variations. The effective- ness of the proposed method is demonstrated using standard datasets and a challenging outdoor face dataset. It is shown that our method is efficient and can perform significantly better than many competitive low resolution face recognition algorithms. %B 2011 International Joint Conference on Biometrics (IJCB) %I IEEE %P 1 - 6 %8 2011/10/11/13 %@ 978-1-4577-1358-3 %G eng %R 10.1109/IJCB.2011.6117545 %0 Patent %D 2011 %T SYSTEM AND METHOD FOR DATA MANAGEMENT IN LARGE DATA NETWORKS %A BROECHELER,M. %A V.S. Subrahmanian %A Pugliese, A. %X A system and method for storing an input data network, in the form of graph is provided. The system includes a master node and a plurality of slave nodes. The master node is operable to receive the data network in the form of a graph, the graph including a plurality of vertices connected by edges; calculate a probability of co-retrieval for each of the plurality of vertices; and assign each of the plurality of vertices to one of the plurality of compute nodes based on the calculated probability of co-retrieval. Another method and system are provided for converting a dataset into a graph based index and storing the index on disk. Respective systems and methods of querying such data networks are also provided. %V WO/2011/032077 %8 2011/03// %G eng %N WO/2011/032077 %0 Journal Article %J arXiv:1107.3539 [cs] %D 2011 %T Systematic Abstraction of Abstract Machines %A David Van Horn %A Might, Matthew %K Computer Science - Programming Languages %X We describe a derivational approach to abstract interpretation that yields novel and transparently sound static analyses when applied to well-established abstract machines for higher-order and imperative programming languages. To demonstrate the technique and support our claim, we transform the CEK machine of Felleisen and Friedman, a lazy variant of Krivine's machine, and the stack-inspecting CM machine of Clements and Felleisen into abstract interpretations of themselves. The resulting analyses bound temporal ordering of program events; predict return-flow and stack-inspection behavior; and approximate the flow and evaluation of by-need parameters. For all of these machines, we find that a series of well-known concrete machine refactorings, plus a technique of store-allocated continuations, leads to machines that abstract into static analyses simply by bounding their stores. We demonstrate that the technique scales up uniformly to allow static analysis of realistic language features, including tail calls, conditionals, side effects, exceptions, first-class continuations, and even garbage collection. In order to close the gap between formalism and implementation, we provide translations of the mathematics as running Haskell code for the initial development of our method. %B arXiv:1107.3539 [cs] %8 2011/07/18/ %G eng %U http://arxiv.org/abs/1107.3539 %0 Journal Article %J Scientific Visualization: Advanced Concepts %D 2010 %T Saliency Guided Summarization of Molecular Dynamics Simulations %A Patro,R. %A Ip,C. Y %A Varshney, Amitabh %A Hagen,H. %X We present a novel method to measure saliency in molecular dynamics simulation data. This saliency measure is based on a multiscale center-surround mechanism, which is fast and efficient to compute. We explore the use of the saliency function to guide the selection of representative and anomalous timesteps for summarization of simulations. To this end, we also introduce a multiscale keyframe selection procedure which automatically provides keyframes representing the simulation at varying levels of coarseness. We compare our saliency guided keyframe approach against other methods, and show that it consistently selects superior keyframes as measured by their predictive power in reconstructing the simulation. %B Scientific Visualization: Advanced Concepts %V 1 %P 321 - 335 %8 2010/// %G eng %0 Conference Paper %B 2010 IEEE Workshop on Signal Processing Systems (SIPS) %D 2010 %T Scalable representation of dataflow graph structures using topological patterns %A Sane, N. %A Kee, Hojin %A Seetharaman, G. %A Bhattacharyya, Shuvra S. %K arrays %K data flow graphs %K Dataflow graphs %K DIF language %K Digital signal processing %K directed graphs %K DSP specification languages %K embedded signal processing design flows %K embedded systems %K Field programmable gate arrays %K graphical user interface %K Graphical user interfaces %K High-level languages %K modelbased design %K optimisation %K optimizations %K scalable dataflow graph structures representation %K semantics %K Signal processing %K Signal processing systems %K Specification languages %K text based languages %K Topological patterns %K Topology %K Transform coding %X Tools for designing signal processing systems with their semantic foundation in dataflow modeling often use high-level graphical user interface (GUI) or text based languages that allow specifying applications as directed graphs. Such graphical representations serve as an initial reference point for further analysis and optimizations that lead to platform-specific implementations. For large-scale applications, the underlying graphs often consist of smaller substructures that repeat multiple times. To enable more concise representation and direct analysis of such substructures in the context of high level DSP specification languages and design tools, we develop the modeling concept of topological patterns, and propose ways for supporting this concept in a high-level language. We augment the DIF language - a language for specifying DSP-oriented dataflow graphs - with constructs for supporting topological patterns, and we show how topological patterns can be effective in various aspects of embedded signal processing design flows using specific application examples. %B 2010 IEEE Workshop on Signal Processing Systems (SIPS) %P 13 - 18 %8 2010 %G eng %0 Conference Paper %B Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on %D 2010 %T Scaling Populations of a Genetic Algorithm for Job Shop Scheduling Problems Using MapReduce %A Di-Wei Huang %A Jimmy Lin %K algorithm;job %K algorithms;job %K computing;genetic %K data %K large-scale %K MapReduce;cloud %K problems;parallel %K processing; %K processing;cloud %K scheduling %K scheduling;parallel %K shop %X Inspired by Darwinian evolution, a genetic algorithm (GA) approach is one popular heuristic method for solving hard problems such as the Job Shop Scheduling Problem (JSSP), which is one of the hardest problems lacking efficient exact solutions today. It is intuitive that the population size of a GA may greatly affect the quality of the solution, but it is unclear what are the effects of having population sizes that are significantly greater than typical experiments. The emergence of MapReduce, a framework running on a cluster of computers that aims to provide large-scale data processing, offers great opportunities to investigate this issue. In this paper, a GA is implemented to scale the population using MapReduce. Experiments are conducted on a large cluster, and population sizes up to 107 are inspected. It is shown that larger population sizes not only tend to yield better solutions, but also require fewer generations. Therefore, it is clear that when dealing with a hard problem such as JSSP, an existing GA can be improved by massively scaling up populations with MapReduce, so that the solution can be parallelized and completed in reasonable time. %B Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on %P 780 - 785 %8 2010/// %G eng %R 10.1109/CloudCom.2010.18 %0 Journal Article %J Commun. ACM %D 2010 %T SCORE: agile research group management %A Hicks, Michael W. %A Foster, Jeffrey S. %X Adapting agile software development methodology toward more efficient management of academic research groups. %B Commun. ACM %V 53 %P 30 - 31 %8 2010/10// %@ 0001-0782 %G eng %U http://doi.acm.org/10.1145/1831407.1831421 %N 10 %R 10.1145/1831407.1831421 %0 Conference Paper %B 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) %D 2010 %T Sectored Random Projections for Cancelable Iris Biometrics %A Pillai,J.K. %A Patel, Vishal M. %A Chellapa, Rama %A Ratha,N. K %K biometric pattern %K Biometrics %K Cancelable Biometrics %K cancelable iris biometrics %K data mining %K data privacy %K Degradation %K Eyelashes %K Eyelids %K Iris %K iris recognition %K pattern recognition %K privacy %K random processes %K Random Projections %K Robustness %K sectored random projection %K Secure Biometrics %K Security %K security of data %X Privacy and security are essential requirements in practical biometric systems. In order to prevent the theft of biometric patterns, it is desired to modify them through revocable and non invertible transformations called Cancelable Biometrics. In this paper, we propose an efficient algorithm for generating a Cancelable Iris Biometric based on Sectored Random Projections. Our algorithm can generate a new pattern if the existing one is stolen, retain the original recognition performance and prevent extraction of useful information from the transformed patterns. Our method also addresses some of the drawbacks of existing techniques and is robust to degradations due to eyelids and eyelashes. %B 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) %I IEEE %P 1838 - 1841 %8 2010/03// %@ 978-1-4244-4295-9 %G eng %R 10.1109/ICASSP.2010.5495383 %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 2010 %T Secure and robust iris recognition using random projections and sparse representations %A Pillai, J. %A Patel, Vishal M. %A Chellapa, Rama %A Ratha, N. %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %P 1 - 1 %8 2010/// %G eng %N 99 %0 Journal Article %J Public Key Cryptography–PKC 2010 %D 2010 %T Secure network coding over the integers %A Gennaro,R. %A Katz, Jonathan %A Krawczyk,H. %A Rabin,T. %X Network coding offers the potential to increase throughput and improve robustness without any centralized control. Unfortunately, network coding is highly susceptible to “pollution attacks” in which malicious nodes modify packets improperly so as to prevent message recovery at the recipient(s); such attacks cannot be prevented using standard end-to-end cryptographic authentication because network coding mandates that intermediate nodes modify data packets in transit.Specialized “network coding signatures” addressing this problem have been developed in recent years using homomorphic hashing and homomorphic signatures. We contribute to this area in several ways: • We show the first homomorphic signature scheme based on the RSA assumption (in the random oracle model). • We give a homomorphic hashing scheme that is more efficient than existing schemes, and which leads to network coding signatures based on the hardness of factoring (in the standard model). • We describe variants of existing schemes that reduce the communication overhead for moderate-size networks, and improve computational efficiency (in some cases quite dramatically – e.g., we achieve a 20-fold speedup in signature generation at intermediate nodes). Underlying our techniques is a modified approach to random linear network coding where instead of working in a vector space over a field, we work in a module over the integers (with small coefficients). %B Public Key Cryptography–PKC 2010 %P 142 - 160 %8 2010/// %G eng %R 10.1007/978-3-642-13013-7_9 %0 Conference Paper %B Proceedings of the 17th ACM conference on Computer and communications security %D 2010 %T Secure text processing with applications to private DNA matching %A Katz, Jonathan %A Malka,Lior %K COMPUTATION %K secure %X Motivated by the problem of private DNA matching, we consider the design of efficient protocols for secure text processing. Here, informally, a party P1 holds a text T and a party P2 holds a pattern p and some additional information y, and P2 wants to learn {f(T,j,y)} for all locations j where p is found as a substring in T. (In particular, this generalizes the basic pattern matching problem.) We aim for protocols with full security against a malicious P2 that also preserve privacy against a malicious P1 (i.e., one-sided security). We show how to modify Yao's garbled circuit approach to obtain a protocol where the size of the garbled circuit is linear in the number of occurrences of p in T (rather than linear in $|T|$). Along the way we show a new keyword search protocol that may be of independent interest. %B Proceedings of the 17th ACM conference on Computer and communications security %S CCS '10 %I ACM %C New York, NY, USA %P 485 - 492 %8 2010/// %@ 978-1-4503-0245-6 %G eng %U http://doi.acm.org/10.1145/1866307.1866361 %R 10.1145/1866307.1866361 %0 Journal Article %J Image Processing (ICIP) %D 2010 %T Security analysis for privacy preserving search of multimedia %A Lu,W. %A Varna,A.L. %A Wu,M. %X With the increasing popularity of digital multimedia such asimages and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive mul- timedia data are being stored and managed over the network cloud. To provide enhanced security and privacy protection beyond traditional access control techniques, privacy preserv- ing multimedia retrieval techniques have been proposed re- cently to allow content-based multimedia retrieval directly over encrypted databases and achieve accurate retrieval com- parable to conventional retrieval schemes. In this paper, we introduce a security definition for the privacy preserving re- trieval scenario and show that the recently proposed schemes are secure under the proposed security definition. %B Image Processing (ICIP) %P 26 - 29 %8 2010/// %G eng %0 Journal Article %J The Journal of Chemical Physics %D 2010 %T Selective excitation of LI2 by chirped laser pulses with all possible interstate radiative couplings %A Chatterjee, Souvik %A Bhattacharyya, Shuvra S. %X We have numerically explored the feasibility and the mechanism of population transfer to the excited E 1Σg electronic state of Li2 from the v = 0 level of the ground electronic state X 1Σg using the A 1Σu state as an intermediate. In this system, the use of transform limited pulses with a frequency difference greater than the maximum Rabi frequency does not produce population transfer when all possible radiative couplings are taken into account. We have employed two synchronous pulses far detuned from the allowed transition frequencies, mainly with the lower frequency pulse positively chirped, and both pulses coupling the successive pair of states, X-A and A-E. The adiabaticity of the process has been investigated by a generalized Floquet calculation in the basis of 12 field dressed molecular states, and the results have been compared with those obtained from the full solution of time dependent Schrödinger equation. The conventional representation of the process in terms of three (or four) adiabatic potentials is not valid. It has been found that for cases of almost complete population transfer in full calculations with the conservation of the vibrational quantum number, adiabatic passage is attained with the 12 state Floquet model but not with the six state model. The agreement between the full calculations and the 12 state Floquet calculations is generally good when the transfer is adiabatic. Another characteristic feature of this work is the gaining of control over the vibrational state preparation in the final electronic state by careful tuning of the laser parameters as well as the chirp rate sign. This causes time dependent changes in the adiabatic potentials and nonadiabatic transfers can be made to occur between them. %B The Journal of Chemical Physics %V 133 %P 164313 - 164313-9 %8 2010 %@ 00219606 %G eng %U http://jcp.aip.org/resource/1/jcpsa6/v133/i16/p164313_s1 %N 16 %0 Journal Article %J Swarm Intelligence %D 2010 %T Self-assembly of neural networks viewed as swarm intelligence %A Martin,C. E %A Reggia, James A. %B Swarm Intelligence %V 4 %P 1 - 36 %8 2010/// %G eng %N 1 %0 Book Section %B Video Search and MiningVideo Search and Mining %D 2010 %T Semantic Video Content Analysis %A Albanese,Massimiliano %A Turaga,Pavan %A Chellapa, Rama %A Pugliese,Andrea %A Subrahmanian,V. %E Schonfeld,Dan %E Shan,Caifeng %E Tao,Dacheng %E Wang,Liang %X In recent years, there has been significant interest in the area of automatically recognizing activities occurring in a camera’s field of view and detecting abnormalities. The practical applications of such a system could include airport tarmac monitoring, or monitoring of activities in secure installations, to name a few. The difficulty of the problem is compounded by several factors: detection of primitive actions in spite of changes in illumination, occlusions and noise; complexmultiagent interaction;mapping of higher-level activities to lower-level primitive actions; variations in which the same semantic activity can be performed. In this chapter, we develop a theory of semantic activity analysis that addresses each of these issues in an integrated manner. Specifically, we discuss ontological representations of knowledge of a domain, integration of domain knowledge and statistical models for achieving semantic mappings, definition of logical languages to describe activities, and design of frameworks which integrate all the above aspects in a coherent way, thus laying the foundations of effective Semantic Video Content Analysis systems. %B Video Search and MiningVideo Search and Mining %S Studies in Computational Intelligence %I Springer Berlin / Heidelberg %V 287 %P 147 - 176 %8 2010/// %@ 978-3-642-12899-8 %G eng %U http://dx.doi.org/10.1007/978-3-642-12900-1_6 %0 Conference Paper %B Information Forensics and Security (WIFS), 2010 IEEE International Workshop on %D 2010 %T Semi non-intrusive training for cell-phone camera model linkage %A Chuang,Wei-Hong %A M. Wu %K accuracy;training %K analysis;cameras;cellular %K analysis;image %K camera %K Color %K colour %K complexity;training %K content %K dependency;variance %K feature;cell %K forensics;digital %K forensics;image %K image %K Interpolation %K linkage;component %K matching;interpolation; %K matching;semi %K model %K nonintrusive %K phone %K radio;computer %K training;testing %X This paper presents a study of cell-phone camera model linkage that matches digital images against potential makes / models of cell-phone camera sources using camera color interpolation features. The matching performance is examined and the dependency on the content of training image collection is evaluated via variance analysis. Training content dependency can be dealt with under the framework of component forensics, where cell-phone camera model linkage is seen as a combination of semi non-intrusive training and completely non-intrusive testing. Such a viewpoint suggests explicitly the goodness criterion of testing accuracy for training data selection. It also motivates other possible alternative training procedures based on different criteria, such as the training complexity, for which preliminary but promising experiment designs and results have been obtained. %B Information Forensics and Security (WIFS), 2010 IEEE International Workshop on %P 1 - 6 %8 2010/12// %G eng %R 10.1109/WIFS.2010.5711468 %0 Patent %D 2010 %T Sensing Events Affecting Liquid Flow in a Liquid Distribution System %A Patel,Shwetak N. %A Fogarty,James A. %A Jon Froehlich %A Larson,Eric C. %X By monitoring pressure transients in a liquid within a liquid distribution system using only a single sensor, events such as the opening and closing of valves at specific fixtures are readily detected. The sensor, which can readily be coupled to a faucet bib, transmits an output signal to a computing device. Each such event can be identified by the device based by comparing characteristic features of the pressure transient waveform with previously observed characteristic features for events in the system. These characteristic features, which can include the varying pressure, derivative, and real Cepstrum of the pressure transient waveform, can be used to select a specific fixture where a valve open or close event has occurred. Flow to each fixture and leaks in the system can also be determined from the pressure transient signal. A second sensor disposed at a point disparate from the first sensor provides further event information. %I University of Washington %8 2010 %G eng %U http://www.google.com/patents?id=2JXnAAAAEBAJ %0 Book Section %B Computational BiologyComputational Biology %D 2010 %T Sequencing and Genome Assembly Using Next-Generation Technologies %A Nagarajan,Niranjan %A Pop, Mihai %E Fenyö,David %X Several sequencing technologies have been introduced in recent years that dramatically outperform the traditional Sanger technology in terms of throughput and cost. The data generated by these technologies are characterized by generally shorter read lengths (as low as 35 bp) and different error characteristics than Sanger data. Existing software tools for assembly and analysis of sequencing data are, therefore, ill-suited to handle the new types of data generated. This paper surveys the recent software packages aimed specifically at analyzing new generation sequencing data. %B Computational BiologyComputational Biology %S Methods in Molecular Biology %I Humana Press %V 673 %P 1 - 17 %8 2010/// %@ 978-1-60761-842-3 %G eng %U http://dx.doi.org/10.1007/978-1-60761-842-3_1 %0 Journal Article %J Software: Practice and Experience %D 2010 %T Serializing C intermediate representations for efficient and portable parsing %A Meister,Jeffrey A %A Foster, Jeffrey S. %A Hicks, Michael W. %K C %K intermediate representations %K parsing %K static analysis %K XDR %K XML %X C static analysis tools often use intermediate representations (IRs) that organize program data in a simple, well-structured manner. However, the C parsers that create IRs are slow, and because they are difficult to write, only a few implementations exist, limiting the languages in which a C static analysis can be written. To solve these problems, we investigate two language-independent, on-disk representations of C IRs: one using XML and the other using an Internet standard binary encoding called eXternal Data Representation (XDR). We benchmark the parsing speeds of both options, finding the XML to be about a factor of 2 slower than parsing C and the XDR over 6 times faster. Furthermore, we show that the XML files are far too large at 19 times the size of C source code, whereas XDR is only 2.2 times the C size. We also demonstrate the portability of our XDR system by presenting a C source code querying tool in Ruby. Our solution and the insights we gained from building it will be useful to analysis authors and other clients of C IRs. We have made our software freely available for download at http://www.cs.umd.edu/projects/PL/scil/. Copyright © 2010 John Wiley&Sons, Ltd. %B Software: Practice and Experience %V 40 %P 225 - 238 %8 2010/03/01/ %@ 1097-024X %G eng %U http://onlinelibrary.wiley.com/doi/10.1002/spe.954/abstract %N 3 %R 10.1002/spe.954 %0 Journal Article %J Environmental Microbiology Reports %D 2010 %T Serodiversity and ecological distribution of Vibrio parahaemolyticus in the Venetian Lagoon, Northeast Italy %A Caburlotto,Greta %A Haley,Bradd J. %A Lleò,Maria M. %A Huq,Anwar %A Rita R Colwell %X Vibrio parahaemolyticus is a natural inhabitant of estuarine and marine environments constituting part of the autochthonous microflora. This species is associated with human gastroenteritis caused by ingestion of contaminated water and undercooked seafood. During the past several years, the number of V. parahaemolyticus gastroenteritis cases have increased worldwide, causing over half of all food-poisoning outbreaks of bacterial origin. Vibrio populations in water are known to be influenced by environmental factors. Notably, it has been shown that in different parts of the world the distribution of V. parahaemolyticus in the marine environment is related to the water temperature. In this study, we identified environmental determinants affecting distribution of V. parahaemolyticus in the Venetian Lagoon, in the Italian North Adriatic Sea. Data obtained revealed that sea surface temperature constitutes the key factor influencing occurrence of V. parahaemolyticus, but salinity and chlorophyll concentration are also important. Serotyping of a collection of V. parahaemolyticus environmental isolates revealed high serodiversity, with serotypes O3:KUT and O1:KUT, belonging to the ‘pandemic group’, occurring with higher frequency. From our results, we conclude that there is no correlation between serotype and specific geographic site or season of the year. However, certain serotypes were isolated in the Lagoon during the entire 18 months of the study, strongly suggesting persistence in this environment. %B Environmental Microbiology Reports %V 2 %P 151 - 157 %8 2010/02/01/ %@ 1758-2229 %G eng %U http://onlinelibrary.wiley.com/doi/10.1111/j.1758-2229.2009.00123.x/abstract?userIsAuthenticated=false&deniedAccessCustomisedMessage= %N 1 %R 10.1111/j.1758-2229.2009.00123.x %0 Journal Article %J International Journal of Computational Intelligence and Applications %D 2010 %T THE SHAKY LADDER HYPERPLANE-DEFINED FUNCTIONS AND CLASSIC DYNAMIC PROBLEMS %A Alharbi,Abir %A Rand, William %X To improve the understanding of the GA in dynamic environments we explore a set of test problems, the shaky ladder hyper-defined functions (sl-hdf), and extend these functions to create versions that are equivalent to many classical dynamic problems. We do this by constraining the space of all sl-hdfs to create representations of these classical functions. We have examined three classical problems, and compared sl-hdf versions of these problems with their standard representations. These results show that the sl-hdfs are representative of a larger class of problems, and can represent a larger class of test suite. Previous results on sl-hdf showed that GA performance is best in the Defined Cliffs variant of the sl-hdf. We build upon these results to improve GA performance in several classes of real world dynamic problems by modifying the problem representation. These results lend insight into dynamic problems where the GA will perform well. %B International Journal of Computational Intelligence and Applications %V 09 %P 33 - 33 %8 2010/// %@ 1469-0268 %G eng %U http://www.worldscinet.com/ijcia/09/0901/S1469026810002756.html %N 01 %R 10.1142/S1469026810002756 %0 Journal Article %J IEEE transactions on pattern analysis and machine intelligence %D 2010 %T Shape analysis and its applications in image understanding %A Zhe Lin %A Davis, Larry S. %X We propose a shape-based, hierarchical part-template matching approach to simultaneous human detection and segmentation combining local part-based and global shape-template-based schemes. The approach relies on the key idea of matching a part-template tree to images hierarchically to detect humans and estimate their poses. For learning a generic human detector, a pose-adaptive feature computation scheme is developed based on a tree matching approach. Instead of traditional concatenation-style image location-based feature encoding, we extract features adaptively in the context of human poses and train a kernel-SVM classifier to separate human/nonhuman patterns. Specifically, the features are collected in the local context of poses by tracing around the estimated shape boundaries. We also introduce an approach to multiple occluded human detection and segmentation based on an iterative occlusion compensation scheme. The output of our learned generic human detector can be used as an initial set of human hypotheses for the iterative optimization. We evaluate our approaches on three public pedestrian data sets (INRIA, MIT-CBCL, and USC-B) and two crowded sequences from Caviar Benchmark and Munich Airport data sets. %B IEEE transactions on pattern analysis and machine intelligence %V 32 %P 604 - 618 %8 2010/// %G eng %N 4 %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 2010 %T Shape-based human detection and segmentation via hierarchical part-template matching %A Lin,Z. %A Davis, Larry S. %X We propose a shape-based, hierarchical part-template matching approach to simultaneous human detection and segmentation combining local part-based and global shape-template-based schemes. The approach relies on the key idea of matching a part-template tree to images hierarchically to detect humans and estimate their poses. For learning a generic human detector, a pose-adaptive feature computation scheme is developed based on a tree matching approach. Instead of traditional concatenation-style image location-based feature encoding, we extract features adaptively in the context of human poses and train a kernel-SVM classifier to separate human/nonhuman patterns. Specifically, the features are collected in the local context of poses by tracing around the estimated shape boundaries. We also introduce an approach to multiple occluded human detection and segmentation based on an iterative occlusion compensation scheme. The output of our learned generic human detector can be used as an initial set of human hypotheses for the iterative optimization. We evaluate our approaches on three public pedestrian data sets (INRIA, MIT-CBCL, and USC-B) and two crowded sequences from Caviar Benchmark and Munich Airport data sets. %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %V 32 %P 604 - 618 %8 2010/// %G eng %N 4 %0 Journal Article %J Proc. VLDB Endow. %D 2010 %T Sharing-aware horizontal partitioning for exploiting correlations during query processing %A Tzoumas,Kostas %A Deshpande, Amol %A Jensen,Christian S. %X Optimization of join queries based on average selectivities is suboptimal in highly correlated databases. In such databases, relations are naturally divided into partitions, each partition having substantially different statistical characteristics. It is very compelling to discover such data partitions during query optimization and create multiple plans for a given query, one plan being optimal for a particular combination of data partitions. This scenario calls for the sharing of state among plans, so that common intermediate results are not recomputed. We study this problem in a setting with a routing-based query execution engine based on eddies [1]. Eddies naturally encapsulate horizontal partitioning and maximal state sharing across multiple plans. We define the notion of a conditional join plan, a novel representation of the search space that enables us to address the problem in a principled way. We present a low-overhead greedy algorithm that uses statistical summaries based on graphical models. Experimental results suggest an order of magnitude faster execution time over traditional optimization for high correlations, while maintaining the same performance for low correlations. %B Proc. VLDB Endow. %V 3 %P 542 - 553 %8 2010/09// %@ 2150-8097 %G eng %U http://dl.acm.org/citation.cfm?id=1920841.1920911 %N 1-2 %0 Journal Article %J Handbook of Signal Processing Systems %D 2010 %T Signal Processing for Audio HCI %A Zotkin,Dmitry N %A Duraiswami, Ramani %X This chapter reviews recent advances in computer audio processing from the viewpoint of improving the human-computer interface. Microphone arrays are described as basic tools for untethered audio acquisition, and principles for the synthesis of realistic virtual audio are outlined. The influence of room acoustics on audio acquisition and production is also considered. The chapter finishes with a review of several relevant signal processing systems, including a fast head-related transfer function (HRTF) measurement system and a complete system for capture, visualization, and reproduction of auditory scenes. %B Handbook of Signal Processing Systems %P 243 - 265 %8 2010/// %G eng %0 Journal Article %J IEEE Signal Processing Magazine %D 2010 %T Signal Processing on Platforms with Multiple Cores: Part 2-Applications and Design [From the Guest Editors] %A Chen,Y. %A Chakrabarti,C. %A Bhattacharyya, Shuvra S. %A Bougard, B. %K Concurrent computing %K Embedded system %K Energy management %K Graphics %K Multicore processing %K Portable computers %K Resource management %K Signal design %K Signal processing %K Signal processing algorithms %X Platforms with multiple cores are now prevalent everywhere from desktops and graphics processors to laptops and embedded systems. By adding more parallel computational resources while managing power consumption, multicore platforms offer better programmability, performance, and power efficiency. Signal processing systems of tomorrow will be and must be implemented on platforms with multiple cores. Writing efficient parallel applications that utilize the computing capability of many processing cores require some effort. Signal processing algorithm designers must understand the nuances of a multicore computing engine; only then can the tremendous computing power that such platforms provide be harnessed efficiently. To give a thorough perspective of the area, we have organized two special issues on this topic. %B IEEE Signal Processing Magazine %V 27 %P 20 - 21 %8 2010 %@ 1053-5888 %G eng %N 2 %0 Book Section %B Financial Cryptography and Data Security %D 2010 %T Signatures of Reputation %A Bethencourt, John %A Elaine Shi %A Song, Dawn %E Sion, Radu %K Computer science %B Financial Cryptography and Data Security %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 6052 %P 400 - 407 %8 2010 %@ 978-3-642-14576-6 %G eng %U http://www.springerlink.com/content/8484428n77226512/abstract/ %0 Conference Paper %B 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) %D 2010 %T Simulating dynamic communication systems using the core functional dataflow model %A Sane, N. %A Chia-Jui Hsu %A Pino,J. L %A Bhattacharyya, Shuvra S. %K adaptive modulation %K Analytical models %K Application software %K Computational modeling %K core functional dataflow model %K Dataflow %K dataflow modeling semantics %K design tools %K Digital signal processing %K dynamic communication systems %K functional specification %K Hardware %K modeling and simulation %K Power system modeling %K Predictive models %K Processor scheduling %K Production %K Signal processing %K software tools %K wireless communication %X The latest communication technologies invariably consist of modules with dynamic behavior. There exists a number of design tools for communication system design with their foundation in dataflow modeling semantics. These tools must not only support the functional specification of dynamic communication modules and subsystems but also provide accurate estimation of resource requirements for efficient simulation and implementation. We explore this trade-off - between flexible specification of dynamic behavior and accurate estimation of resource requirements - using a representative application employing an adaptive modulation scheme. We propose an approach for precise modeling of such applications based on a recently-introduced form of dynamic dataflow called core functional dataflow. From our proposed modeling approach, we show how parameterized looped schedules can be generated and analyzed to simulate applications with low run-time overhead as well as guaranteed bounded memory execution. We demonstrate our approach using the Advanced Design System from Agilent Technologies, Inc., which is a commercial tool for design and simulation of communication systems. %B 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) %P 1538 - 1541 %8 2010 %G eng %0 Journal Article %J BMC Bioinformatics %D 2010 %T Sites Inferred by Metabolic Background Assertion Labeling (SIMBAL): adapting the Partial Phylogenetic Profiling algorithm to scan sequences for signatures that predict protein function. %A Jeremy D Selengut %A Rusch, Douglas B %A Haft, Daniel H %K algorithms %K Amino Acid Sequence %K Gene Expression Profiling %K Molecular Sequence Data %K Phylogeny %K Proteins %K Sequence Analysis, Protein %K Structure-Activity Relationship %X

BACKGROUND: Comparative genomics methods such as phylogenetic profiling can mine powerful inferences from inherently noisy biological data sets. We introduce Sites Inferred by Metabolic Background Assertion Labeling (SIMBAL), a method that applies the Partial Phylogenetic Profiling (PPP) approach locally within a protein sequence to discover short sequence signatures associated with functional sites. The approach is based on the basic scoring mechanism employed by PPP, namely the use of binomial distribution statistics to optimize sequence similarity cutoffs during searches of partitioned training sets.

RESULTS: Here we illustrate and validate the ability of the SIMBAL method to find functionally relevant short sequence signatures by application to two well-characterized protein families. In the first example, we partitioned a family of ABC permeases using a metabolic background property (urea utilization). Thus, the TRUE set for this family comprised members whose genome of origin encoded a urea utilization system. By moving a sliding window across the sequence of a permease, and searching each subsequence in turn against the full set of partitioned proteins, the method found which local sequence signatures best correlated with the urea utilization trait. Mapping of SIMBAL "hot spots" onto crystal structures of homologous permeases reveals that the significant sites are gating determinants on the cytosolic face rather than, say, docking sites for the substrate-binding protein on the extracellular face. In the second example, we partitioned a protein methyltransferase family using gene proximity as a criterion. In this case, the TRUE set comprised those methyltransferases encoded near the gene for the substrate RF-1. SIMBAL identifies sequence regions that map onto the substrate-binding interface while ignoring regions involved in the methyltransferase reaction mechanism in general. Neither method for training set construction requires any prior experimental characterization.

CONCLUSIONS: SIMBAL shows that, in functionally divergent protein families, selected short sequences often significantly outperform their full-length parent sequence for making functional predictions by sequence similarity, suggesting avenues for improved functional classifiers. When combined with structural data, SIMBAL affords the ability to localize and model functional sites.

%B BMC Bioinformatics %V 11 %P 52 %8 2010 %G eng %R 10.1186/1471-2105-11-52 %0 Conference Paper %B ACM SIGGRAPH ASIA 2010 Courses %D 2010 %T Sorting in space: multidimensional, spatial, and metric data structures for computer graphics applications %A Samet, Hanan %X The representation of spatial data is an important issue in game programming, computer graphics, visualization, solid modeling, and related areas including computer vision and geographic information systems (GIS). Many representations are currently used. Recently, there has been much interest in hierarchical representations such as quadtrees, octrees, and pyramids which are based on image hierarchies, as well methods that use bounding boxes which are based on object hierarchies. The key advantage of these representations is that they provide a way to index into space. In fact, they are little more than multidimensional sorts. They are compact and depending on the nature of the spatial data they save space as well as time and also facilitate operations such as search. This course provides a brief overview of hierarchical spatial data structures and related algorithms that make use of them. We describe hierarchical representations of points, lines, collections of small rectangles, regions, surfaces, and volumes. For region data, we point out the dimension-reduction property of the region quadtree and octree, as how to navigate between nodes in the same tree, thereby leading to the popularity of these representations in ray tracing applications. We also demonstrate how to use these representations for both raster and vector data. In the case of nonregion data, we show how these data structures can be used to compute nearest objects in an incremental fashion so that the number of objects need not be known in advance. We also review a number of different tessellations and show why hierarchical decomposition into squares instead of triangles or hexagons is preferred. In addition a demonstration of the SAND spatial browser based on the SAND spatial database system and of the VASCO JAVA applet illustrating these methods (found at http://www.cs.umd.edu/~hjs/quadtree/index.html) will be presented. %B ACM SIGGRAPH ASIA 2010 Courses %S SA '10 %I ACM %C New York, NY, USA %P 3:1–3:52 - 3:1–3:52 %8 2010/// %@ 978-1-4503-0527-3 %G eng %U http://doi.acm.org/10.1145/1900520.1900523 %R 10.1145/1900520.1900523 %0 Conference Paper %B Control Automation Robotics Vision (ICARCV), 2010 11th International Conference on %D 2010 %T Sparse representations and Random Projections for robust and cancelable biometrics %A Patel, Vishal M. %A Chellapa, Rama %A Tistarelli,M. %K Biometric identification %K Cancelable Biometrics %K Compressed sensing %K face data %K face recognition %K iris data %K iris recognition %K personal biometric data %K Random Projections %K robust biometrics %K sparse representations %X In recent years, the theories of Sparse Representation (SR) and Compressed Sensing (CS) have emerged as powerful tools for efficiently processing data in non-traditional ways. An area of promise for these theories is biome #x0301;trie identification. In this paper, we review the role of sparse representation and CS for efficient biome #x0301;trie identification. Algorithms to perform identification from face and iris data are reviewed. By applying Random Projections it is possible to purposively hide the biome #x0301;trie data within a template. This procedure can be effectively employed for securing and protecting personal biome #x0301;trie data against theft. Some of the most compelling challenges and issues that confront research in biometrics using sparse representations and CS are also addressed. %B Control Automation Robotics Vision (ICARCV), 2010 11th International Conference on %P 1 - 6 %8 2010/12// %G eng %R 10.1109/ICARCV.2010.5707955 %0 Journal Article %J Proceedings of SPIE %D 2010 %T Sparsity inspired automatic target recognition %A Patel, Vishal M. %A Nasrabadi,Nasser M. %A Chellapa, Rama %X In this paper, we develop a framework for using only the needed data for automatic target recognition (ATR) algorithms using the recently developed theory of sparse representations and compressive sensing (CS). We show how sparsity can be helpful for efficient utilization of data, with the possibility of developing real-time, robust target classification. We verify the efficacy of the proposed algorithm in terms of the recognition rate on the well known Comanche forward-looking infrared (FLIR) data set consisting of ten different military targets at different orientations. %B Proceedings of SPIE %V 7696 %P 76960Q-76960Q-8 - 76960Q-76960Q-8 %8 2010/04/23/ %@ 0277786X %G eng %U http://spiedigitallibrary.org/proceedings/resource/2/psisdg/7696/1/76960Q_1?isAuthorized=no %N 1 %R doi:10.1117/12.850533 %0 Report %D 2010 %T Sparsity Motivated Automated Target Recognition %A Chellapa, Rama %K *ALGORITHMS %K *INFRARED IMAGES %K *TARGET RECOGNITION %K ARMY RESEARCH %K efficiency %K FORWARD LOOKING INFRARED SYSTEMS %K IMAGE PROCESSING %K NUMERICAL MATHEMATICS %K OPTICS %K PE611102 %K TARGET DETECTION %K TARGET DIRECTION, RANGE AND POSITION FINDING %X Sparsity-based methods have recently been suggested for tasks such as face and iris recognition. In this project, we evaluated the effectiveness of such methods for automatic target recognition in infrared images. We show how sparsity can be helpful for efficient utilization of data for target recognition. We evaluated the effectiveness of the proposed algorithm in terms of recognition rate and confusion matrices on the well known Comanche forward-looking infrared (FLIR) data set consisting of ten different military targets at different orientations. This work was done in collaboration with Dr. Nasser Nasrabadi, Chief Scientist, SEDD, Army research laboratory. This work will be presented at the International Conference on Image Processing being held in Hong Kong in September 2010. A journal paper reporting our work is under preparation. %8 2010/09/29/ %G eng %U http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA535014 %0 Report %D 2010 %T Sparsity-Inspired Recognition of Targets in Infrared Images %A Chellapa, Rama %K *FORWARD LOOKING INFRARED SYSTEMS %K *IMAGE PROCESSING %K *TARGET RECOGNITION %K algorithms %K ARMY RESEARCH %K ATR(AUTOMATIC TARGET RECOGNITION) %K AUTOMATIC %K CNN(CONVENTIONAL NEURAL NETWORKS) %K CS(COMPRESSIVE SENSING) %K DISCRIMINANT ANALYSIS %K FLIR(FORWARD LOOKING INFRARED) %K INFRARED DETECTION AND DETECTORS %K INFRARED IMAGES %K LDA(LINEAR DISCRIMINANT ANALYSIS) %K MILITARY OPERATIONS %K MNN(MODULAR NEURAL NETWORKS) %K neural nets %K PCA(PRINCIPAL COMPONENT ANALYSIS) %K PE611102 %K SPARSITY %K TARGET DIRECTION, RANGE AND POSITION FINDING %X Sparsity-based methods have recently been suggested for tasks such as face and iris recognition. In this project, we evaluated the effectiveness of such methods for automatic target recognition in infrared images. We show how sparsity can be helpful for efficient utilization of data for target recognition. We evaluated the effectiveness of the proposed algorithm in terms of recognition rate and confusion matrices on the well known Comanche forward-looking infrared (FLIR) data set consisting of ten different military targets at different orientations. This work was done in collaboration with Dr. Nasser Nasrabadi, Chief Scientist, SEDD, Army research laboratory. This work will be presented at the International Conference on Image Processing being held in Hong Kong in September 2010. A journal paper reporting our work is under preparation. %8 2010/09/29/ %G eng %U http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA535424 %0 Conference Paper %B Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems %D 2010 %T Spatial indexing on tetrahedral meshes %A De Floriani, Leila %A Fellegara,Riccardo %A Magillo,Paola %K kd-trees %K octrees %K spatial indexes %K tetrahedral meshes %X We address the problem of performing spatial queries on tetrahedral meshes. These latter arise in several application domains including 3D GIS, scientific visualization, finite element analysis. We have defined and implemented a family of spatial indexes, that we call tetrahedral trees. Tetrahedral trees subdivide a cubic domain containing the mesh in an octree or 3D kd-tree fashion, with three different subdivision criteria. Here, we present and compare such indexes, their memory usage, and spatial queries on them. %B Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems %S GIS '10 %I ACM %C New York, NY, USA %P 506 - 509 %8 2010/// %@ 978-1-4503-0428-3 %G eng %U http://doi.acm.org/10.1145/1869790.1869873 %R 10.1145/1869790.1869873 %0 Journal Article %J Algorithms–ESA 2010 %D 2010 %T Spatio-temporal range searching over compressed kinetic sensor data %A Friedler,S. %A Mount, Dave %X As sensor networks increase in size and number, efficient techniques are required to process the very large data sets that they generate. Frequently, sensor networks monitor objects in motion within their vicinity; the data associated with the movement of these objects are known as kinetic data. In an earlier paper we introduced an algorithm which, given a set of sensor observations, losslessly compresses this data to a size that is within a constant factor of the asymptotically optimal joint entropy bound. In this paper we present an efficient algorithm for answering spatio-temporal range queries. Our algorithm operates on a compressed representation of the data, without the need to decompress it. We analyze the efficiency of our algorithm in terms of a natural measure of information content, the joint entropy of the sensor outputs. We show that with space roughly equal to entropy, queries can be answered in time that is roughly logarithmic in entropy. In addition, we show experimentally that on real-world data our range searching structures use less space and have faster query times than the naive versions. These results represent the first solutions to range searching problems over compressed kinetic sensor data. %B Algorithms–ESA 2010 %P 386 - 397 %8 2010/// %G eng %R 10.1007/978-3-642-15775-2_33 %0 Journal Article %J Image Processing, IEEE Transactions on %D 2010 %T Special Section on Distributed Camera Networks: Sensing, Processing, Communication, and Implementation %A Chellapa, Rama %A Heinzelman, W. %A Konrad, J. %A Schonfeld, D. %A Wolf, M. %X The eight papers in this special section span across theoretical and practical considerations of various aspects of distributed camera networks, including adaptive sensing, distributed processing, efficient communications, and versatile implementations. %B Image Processing, IEEE Transactions on %V 19 %P 2513 - 2515 %8 2010/10// %@ 1057-7149 %G eng %N 10 %R 10.1109/TIP.2010.2063650 %0 Journal Article %J IEEE Transactions on Pattern Analysis and Machine Intelligence %D 2010 %T SPECIAL SECTION ON SHAPE ANALYSIS AND ITS APPLICATIONS IN IMAGE UNDERSTANDING %A Srivastava, A. %A Damon,J.N. %A Dryden,I.L. %A Jermyn,I.H. %A Das,S. %A Vaswani, N. %A Huckemann,S. %A Hotz,T. %A Munk,A. %A Lin,Z. %A others %B IEEE Transactions on Pattern Analysis and Machine Intelligence %V 32 %P 0162 - 8828 %8 2010/// %G eng %N 4 %0 Journal Article %J Magnetics, IEEE Transactions on %D 2010 %T On Stability of Magnetization Dynamics in Nanoparticles %A Mayergoyz, Issak D %A Serpico,C. %A Bertotti,G. %K (electron);magnetic %K DYNAMICS %K ellipsoidal %K field;magnetization %K inequality;exchange %K INTERACTIONS %K magnetization %K nanoparticles;spatially %K nonuniform %K oscillations;spin-wave %K particles;magnetisation;nanoparticles;spin %K perturbations;exchange %K perturbations;spatially %K Poincare %K stability;small %K uniform %K waves; %X It is rigorously demonstrated that spatially uniform magnetization oscillations in sufficiently small ellipsoidal nanoparticles can be unconditionally stable with respect to spatially nonuniform perturbations. The proof reveals the dominant stabilizing effect of exchange field which is mathematically manifested through the Poincare inequality. %B Magnetics, IEEE Transactions on %V 46 %P 1718 - 1721 %8 2010/06// %@ 0018-9464 %G eng %N 6 %R 10.1109/TMAG.2009.2039119 %0 Conference Paper %B 2010 IEEE Symposium on Visual Analytics Science and Technology (VAST) %D 2010 %T The state of visual analytics: Views on what visual analytics is and where it is going %A May,R. %A Hanrahan,P. %A Keim,D. A %A Shneiderman, Ben %A Card,S. %K analytical reasoning %K Data analysis %K data mining %K data visualisation %K European VisMaster program %K interactive visual interfaces %K knowledge discovery %K United States %K visual analytics %K VisWeek community %X In the 2005 publication "Illuminating the Path" visual analytics was defined as "the science of analytical reasoning facilitated by interactive visual interfaces." A lot of work has been done in visual analytics over the intervening five years. While visual analytics started in the United States with a focus on security, it is now a worldwide research agenda with a broad range of application domains. This is evidenced by efforts like the European VisMaster program and the upcoming Visual Analytics and Knowledge Discovery (VAKD) workshop, just to name two.There are still questions concerning where and how visual analytics fits in the large body of research and applications represented by the VisWeek community. This panel will present distinct viewpoints on what visual analytics is and its role in understanding complex information in a complex world. The goal of this panel is to engender discussion from the audience on the emergence and continued advancement of visual analytics and its role relative to fields of related research. Four distinguished panelists will provide their perspective on visual analytics focusing on what it is, what it should be, and thoughts about a development path between these two states. The purpose of the presentations is not to give a critical review of the literature but rather to give a review on the field and to provide a contextual perspective based on the panelists' years of experience and accumulated knowledge. %B 2010 IEEE Symposium on Visual Analytics Science and Technology (VAST) %I IEEE %P 257 - 259 %8 2010/10/25/26 %@ 978-1-4244-9488-0 %G eng %R 10.1109/VAST.2010.5649078 %0 Book Section %B Video Search and MiningVideo Search and Mining %D 2010 %T Statistical Analysis on Manifolds and Its Applications to Video Analysis %A Turaga,Pavan %A Veeraraghavan,Ashok %A Srivastava,Anuj %A Chellapa, Rama %E Schonfeld,Dan %E Shan,Caifeng %E Tao,Dacheng %E Wang,Liang %X The analysis and interpretation of video data is an important component of modern vision applications such as biometrics, surveillance, motionsynthesis and web-based user interfaces. A common requirement among these very different applications is the ability to learn statistical models of appearance and motion from a collection of videos, and then use them for recognizing actions or persons in a new video. These applications in video analysis require statistical inference methods to be devised on non-Euclidean spaces or more formally on manifolds. This chapter outlines a broad survey of applications in video analysis that involve manifolds. We develop the required mathematical tools needed to perform statistical inference on manifolds and show their effectiveness in real video-understanding applications. %B Video Search and MiningVideo Search and Mining %S Studies in Computational Intelligence %I Springer Berlin / Heidelberg %V 287 %P 115 - 144 %8 2010/// %@ 978-3-642-12899-8 %G eng %U http://dx.doi.org/10.1007/978-3-642-12900-1_5 %0 Book %D 2010 %T Statistical Methods and Models for Video-Based Tracking, Modeling, and Recognition %A Chellapa, Rama %A Sankaranarayanan,Aswin C. %A Veeraraghavan,Ashok %K Computers / Computer Vision & Pattern Recognition %K Computers / Image Processing %K Technology & Engineering / Electronics / General %K Technology & Engineering / General %X Computer vision systems attempt to understand a scene and its components from mostly visual information. The geometry exhibited by the real world, the influence of material properties on scattering of incident light, and the process of imaging introduce constraints and properties that are key to solving some of these tasks. In the presence of noisy observations and other uncertainties, the algorithms make use of statistical methods for robust inference. Statistical Methods and Models for Video-based Tracking, Modeling, and Recognition highlights the role of geometric constraints in statistical estimation methods, and how the interplay of geometry and statistics leads to the choice and design of algorithms. In particular, it illustrates the role of imaging, illumination, and motion constraints in classical vision problems such as tracking, structure from motion, metrology, activity analysis and recognition, and appropriate statistical methods used in each of these problems. %I Now Publishers Inc %8 2010/// %@ 9781601983145 %G eng %0 Journal Article %J Journal of Computing and Information Science in Engineering %D 2010 %T Stochastic simulations with graphics hardware: Characterization of accuracy and performance %A Balijepalli,A. %A LeBrun,T. W. %A Gupta,S.K. %B Journal of Computing and Information Science in Engineering %V 10 %P 011010 - 011010 %8 2010/// %G eng %0 Conference Paper %D 2010 %T Strategy generation in multi-agent imperfect-information pursuit games %A Raboin,Eric %A Nau, Dana S. %A Kuter,Ugur %A Gupta, Satyandra K. %A Svec,Petr %K game tree search %K multi-agent planning %K visibility-based pursuit-evasion games %X We describe a formalism and algorithms for game-tree search in partially-observable Euclidean space, and implementation and tests in a scenario where a multi-agent team, called tracking agents, pursues a target agent that wants to evade the tracking agents. Our contributions include--- • A formalism that combines geometric elements (agents' locations and trajectories and observable regions, and obstacles that restrict mobility and observability) with game-theoretic elements (information sets, utility functions, and strategies). • A recursive formula for information-set minimax values based on our formalism, and a implementation of the formula in a game-tree search algorithm. • A heuristic evaluation function for use at the leaf nodes of the game-tree search. It works by doing a quick lookahead search of its own, in a relaxed version of the problem. • Experimental results in 500 randomly generated trials. With the strategies generated by our heuristic, the tracking agents were more than twice as likely to know the target agent's location at the end of the game than with the strategies generated by heuristics that compute estimates of the target's possible locations. %S AAMAS '10 %I International Foundation for Autonomous Agents and Multiagent Systems %C Richland, SC %P 947 - 954 %8 2010/// %@ 978-0-9826571-1-9 %G eng %U http://dl.acm.org/citation.cfm?id=1838206.1838333 %0 Journal Article %J Journal of molecular biology %D 2010 %T Structural and dynamic determinants of ligand binding and regulation of cyclin-dependent kinase 5 by pathological activator p25 and inhibitory peptide CIP. %A Cardone, Antonio %A Hassan, S A %A Albers,R.W. %A Sriram,R.D. %A Pant,H.C. %K Crystallography, X-Ray %K Cyclin-Dependent Kinase 5 %K Cyclin-Dependent Kinase Inhibitor Proteins %K HUMANS %K Ligands %K molecular dynamics simulation %K Nerve Tissue Proteins %K Principal component analysis %K Protein Binding %K Protein Conformation %X The crystal structure of the cdk5/p25 complex has provided information on possible molecular mechanisms of the ligand binding, specificity, and regulation of the kinase. Comparative molecular dynamics simulations are reported here for physiological conditions. This study provides new insight on the mechanisms that modulate such processes, which may be exploited to control pathological activation by p25. The structural changes observed in the kinase are stabilized by a network of interactions involving highly conserved residues within the cyclin-dependent kinase (cdk) family. Collective motions of the proteins (cdk5, p25, and CIP) and their complexes are identified by principal component analysis, revealing two conformational states of the activation loop upon p25 complexation, which are absent in the uncomplexed kinase and not apparent from the crystal. Simulations of the uncomplexed inhibitor CIP show structural rearrangements and increased flexibility of the interfacial loop containing the critical residue E240, which becomes fully hydrated and available for interactions with one of several positively charged residues in the kinase. These changes provide a rationale for the observed high affinity and enhanced inhibitory action of CIP when compared to either p25 or the physiological activators of cdk5. %B Journal of molecular biology %V 401 %P 478-92 %8 2010 Aug 20 %G eng %N 3 %1 http://www.ncbi.nlm.nih.gov/pubmed/20599546?dopt=Abstract %R 10.1016/j.jmb.2010.06.040 %0 Journal Article %J J. Am. Chem. Soc. %D 2010 %T Structural Assembly of Molecular Complexes Based on Residual Dipolar Couplings %A Berlin,Konstantin %A O’Leary,Dianne P. %A Fushman, David %X We present and evaluate a rigid-body molecular docking method, called PATIDOCK, that relies solely on the three-dimensional structure of the individual components and the experimentally derived residual dipolar couplings (RDCs) for the complex. We show that, given an accurate ab initio predictor of the alignment tensor from a protein structure, it is possible to accurately assemble a protein?protein complex by utilizing the RDCs? sensitivity to molecular shape to guide the docking. The proposed docking method is robust against experimental errors in the RDCs and computationally efficient. We analyze the accuracy and efficiency of this method using experimental or synthetic RDC data for several proteins, as well as synthetic data for a large variety of protein?protein complexes. We also test our method on two protein systems for which the structure of the complex and steric-alignment data are available (Lys48-linked diubiquitin and a complex of ubiquitin and a ubiquitin-associated domain) and analyze the effect of flexible unstructured tails on the outcome of docking. The results demonstrate that it is fundamentally possible to assemble a protein?protein complex solely on the basis of experimental RDC data and the prediction of the alignment tensor from 3D structures. Thus, despite the purely angular nature of RDCs, they can be converted into intermolecular distance/translational constraints. Additionally, we show a method for combining RDCs with other experimental data, such as ambiguous constraints from interface mapping, to further improve structure characterization of protein complexes.We present and evaluate a rigid-body molecular docking method, called PATIDOCK, that relies solely on the three-dimensional structure of the individual components and the experimentally derived residual dipolar couplings (RDCs) for the complex. We show that, given an accurate ab initio predictor of the alignment tensor from a protein structure, it is possible to accurately assemble a protein?protein complex by utilizing the RDCs? sensitivity to molecular shape to guide the docking. The proposed docking method is robust against experimental errors in the RDCs and computationally efficient. We analyze the accuracy and efficiency of this method using experimental or synthetic RDC data for several proteins, as well as synthetic data for a large variety of protein?protein complexes. We also test our method on two protein systems for which the structure of the complex and steric-alignment data are available (Lys48-linked diubiquitin and a complex of ubiquitin and a ubiquitin-associated domain) and analyze the effect of flexible unstructured tails on the outcome of docking. The results demonstrate that it is fundamentally possible to assemble a protein?protein complex solely on the basis of experimental RDC data and the prediction of the alignment tensor from 3D structures. Thus, despite the purely angular nature of RDCs, they can be converted into intermolecular distance/translational constraints. Additionally, we show a method for combining RDCs with other experimental data, such as ambiguous constraints from interface mapping, to further improve structure characterization of protein complexes. %B J. Am. Chem. Soc. %V 132 %P 8961 - 8972 %8 2010/// %@ 0002-7863 %G eng %U http://dx.doi.org/10.1021/ja100447p %N 26 %R 10.1021/ja100447p %0 Journal Article %J ACM SIGKDD Explorations Newsletter %D 2010 %T Summary of the first ACM SIGKDD workshop on knowledge discovery from uncertain data (U'09) %A Pei,Jian %A Getoor, Lise %A de Keijzer,Ander %B ACM SIGKDD Explorations Newsletter %V 11 %P 90 - 91 %8 2010/05// %@ 1931-0145 %G eng %U http://doi.acm.org/10.1145/1809400.1809419 %N 2 %R 10.1145/1809400.1809419 %0 Journal Article %J Link Mining: Models, Algorithms, and Applications %D 2010 %T A survey of link mining tasks for analyzing noisy and incomplete networks %A Namata,G.M. %A Sharara,H. %A Getoor, Lise %X Many data sets of interest today are best described as networks or graphs of interlinked entities. Examples include Web and text collections, social networks and social media sites, information, transaction and communication networks, and all manner of scientific networks, including biological networks. Unfortunately, often the data collection and extraction process for gathering these network data sets is imprecise, noisy, and/or incomplete. In this chapter, we review a collection of link mining algorithms that are well suited to analyzing and making inferences about networks, especially in the case where the data is noisy or missing. %B Link Mining: Models, Algorithms, and Applications %P 107 - 133 %8 2010/// %G eng %R 10.1007/978-1-4419-6515-8_4 %0 Journal Article %J SIGCOMM Comput. Commun. Rev. %D 2010 %T SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware %A Anwer,Muhammad Bilal %A Motiwala,Murtaza %A Bin Tariq,Mukarram %A Feamster, Nick %K netfpga %K network virtualization %X We present SwitchBlade, a platform for rapidly deploying custom protocols on programmable hardware. SwitchBlade uses a pipeline-based design that allows individual hardware modules to be enabled or disabled on the fly, integrates software exception handling, and provides support for forwarding based on custom header fields. SwitchBlade's ease of programmability and wire-speed performance enables rapid prototyping of custom data-plane functions that can be directly deployed in a production network. SwitchBlade integrates common packet-processing functions as hardware modules, enabling different protocols to use these functions without having to resynthesize hardware. SwitchBlade's customizable forwarding engine supports both longest-prefix matching in the packet header and exact matching on a hash value. SwitchBlade's software exceptions can be invoked based on either packet or flow-based rules and updated quickly at runtime, thus making it easy to integrate more flexible forwarding function into the pipeline. SwitchBlade also allows multiple custom data planes to operate in parallel on the same physical hardware, while providing complete isolation for protocols running in parallel. We implemented SwitchBlade using NetFPGA board, but SwitchBlade can be implemented with any FPGA. To demonstrate SwitchBlade's flexibility, we use SwitchBlade to implement and evaluate a variety of custom network protocols: we present instances of IPv4, IPv6, Path Splicing, and an OpenFlow switch, all running in parallel while forwarding packets at line rate. %B SIGCOMM Comput. Commun. Rev. %V 40 %P 183 - 194 %8 2010/08// %@ 0146-4833 %G eng %U http://doi.acm.org/10.1145/1851275.1851206 %N 4 %R 10.1145/1851275.1851206 %0 Conference Paper %B Proceedings of the 17th ACM conference on Computer and communications security %D 2010 %T Symbolic security analysis of ruby-on-rails web applications %A Chaudhuri,A. %A Foster, Jeffrey S. %B Proceedings of the 17th ACM conference on Computer and communications security %P 585 - 594 %8 2010/// %G eng %0 Journal Article %J arXiv:1002.4665v1 %D 2010 %T Syntactic Topic Models %A Jordan Boyd-Graber %A Blei,David M. %K Computer Science - Artificial Intelligence %K Computer Science - Computation and Language %K Mathematics - Statistics Theory %X The syntactic topic model (STM) is a Bayesian nonparametric model of language that discovers latent distributions of words (topics) that are both semantically and syntactically coherent. The STM models dependency parsed corpora where sentences are grouped into documents. It assumes that each word is drawn from a latent topic chosen by combining document-level features and the local syntactic context. Each document has a distribution over latent topics, as in topic models, which provides the semantic consistency. Each element in the dependency parse tree also has a distribution over the topics of its children, as in latent-state syntax models, which provides the syntactic consistency. These distributions are convolved so that the topic of each word is likely under both its document and syntactic context. We derive a fast posterior inference algorithm based on variational methods. We report qualitative and quantitative studies on both synthetic data and hand-parsed documents. We show that the STM is a more predictive model of language than current models based only on syntax or only on topics. %B arXiv:1002.4665v1 %8 2010/02/24/ %G eng %U http://arxiv.org/abs/1002.4665 %0 Patent %D 2010 %T System and method for analysis of an opinion expressed in documents with regard to a particular topic %A V.S. Subrahmanian %A Picariello,Antonio %A Dorr, Bonnie J %A Reforgiato,Diego Recupero %A Cesarano,Carmine %A Sagoff,Amelia %X System and method for analysis of an opinion expressed in documents on a particular topic computes opinion strength on a continuous numeric scale, or qualitatively. A variety of opinion scoring techniques are plugged in to score opinion expressing words and sentences in documents. These scores are aggregated to measure the opinion intensity of documents. Multilingual opinion analysis is supported by capability to concurrently identify and visualize the opinion intensity expressed in documents in multiple languages. A multi-dimensional representation of the measured opinion intensity is generated which is agreeable with multi-lingual domain. %V 11/808,278 %8 2010//01/28 %G eng %U http://www.google.com/patents?id=j9fLAAAAEBAJ %0 Patent %D 2010 %T System and Method for Confidentiality-Preserving Rank-Ordered Search %A Swaminathan,Ashwin %A Mao,Yinian %A Su,Guan-Ming %A Gou,Hongmei %A Varna,Avinash L. %A He,Shan %A M. Wu %A Oard, Douglas %X A confidentiality preserving system and method for performing a rank-ordered search and retrieval of contents of a data collection. The system includes at least one computer system including a search and retrieval algorithm using term frequency and/or similar features for rank-ordering selective contents of the data collection, and enabling secure retrieval of the selective contents based on the rank-order. The search and retrieval algorithm includes a baseline algorithm, a partially server oriented algorithm, and/or a fully server oriented algorithm. The partially and/or fully server oriented algorithms use homomorphic and/or order preserving encryption for enabling search capability from a user other than an owner of the contents of the data collection. The confidentiality preserving method includes using term frequency for rank-ordering selective contents of the data collection, and retrieving the selective contents based on the rank-order. %V 12/608,724 %8 2010/06/10/ %G eng %U http://www.google.com/patents?id=kInVAAAAEBAJ %0 Conference Paper %D 2010 %T A Systematic Methodology for Accurate Design-Stage Estimation of Energy Consumption for Injection Molded Parts %A Weissman,A. %A Ananthanarayanan,A. %A Gupta,S.K. %A Sriram,R.D. %X Today's ubiquitous use of plastics in product designand manufacturing presents significant environmental and human health challenges. Injection molding, one of the most commonly used processes for making plastic products, consumes a significant amount of energy. A methodology for accurately estimating the energy consumed to injection-mold a part would enable environmentally conscious decision making during the product design. Unfortunately, only limited information is available at the design stage. Therefore, accurately estimating energy consumption before the part has gone into production can be challenging. In this paper, we describe a methodology for energy estimation that works with the limited amount of data available during the design stage, namely the CAD model of the part, the material name, and the production requirements. This methodology uses this data to estimate the parameters of the runner system and an appropriately sized molding machine. It then uses these estimates to compute the machine setup time and the cycle time required for the injection molding operation. This is done by appropriately abstracting information available from the mold flow simulation tools and analytical models that are traditionally used during the manufacturing stage. These times are then multiplied by the power consumed by the appropriately sized machine during each stage of the molding cycle to compute the estimated energy consumption per part. %8 2010/// %G eng %U http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.165.4139&rep=rep1&type=pdf %0 Journal Article %J SIGPLAN Not. %D 2009 %T Safe and timely updates to multi-threaded programs %A Neamtiu,Iulian %A Hicks, Michael W. %K dynamic software updating %K multi-threading %K update safety %K update timeliness %X Many dynamic updating systems have been developed that enable a program to be patched while it runs, to fix bugs or add new features. This paper explores techniques for supporting dynamic updates to multi-threaded programs, focusing on the problem of applying an update in a timely fashion while still producing correct behavior. Past work has shown that this tension of safety versus timeliness can be balanced for single-threaded programs. For multi-threaded programs, the task is more difficult because myriad thread interactions complicate understanding the possible program states to which a patch could be applied. Our approach allows the programmer to specify a few program points (e.g., one per thread) at which a patch may be applied, which simplifies reasoning about safety. To improve timeliness, a combination of static analysis and run-time support automatically expands these few points to many more that produce behavior equivalent to the originals. Experiments with thirteen realistic updates to three multi-threaded servers show that we can safely perform a dynamic update within milliseconds when more straightforward alternatives would delay some updates indefinitely. %B SIGPLAN Not. %V 44 %P 13 - 24 %8 2009/06// %@ 0362-1340 %G eng %U http://doi.acm.org/10.1145/1543135.1542479 %N 6 %R 10.1145/1543135.1542479 %0 Journal Article %J IEICE TRANSACTIONS on Information and Systems %D 2009 %T Saliency-guided lighting %A Lee,C. H %A Kim,Y. %A Varshney, Amitabh %B IEICE TRANSACTIONS on Information and Systems %V 2 %P 369 - 73 %8 2009/// %G eng %0 Conference Paper %B Computer Graphics and Image Processing (SIBGRAPI), 2009 XXII Brazilian Symposium on %D 2009 %T Salient Clustering for View-dependent Multiresolution Rendering %A Barni,R. %A Comba,J. %A Varshney, Amitabh %K (computer %K algorithms;cluster %K analysis;mesh %K attention;mesh %K AUTOMATIC %K centred %K clustering %K clustering;rendering %K clustering;user-centric %K clusters;low-level %K dependent %K design; %K framework;salient %K graphics);user %K graphics;face %K human %K information;propagative %K mesh %K multiresolution %K rendering;image %K representation;mesh %K resolution;image %K saliency;mesh %K seed %K segmentation %K segmentation;pattern %K segmentation;perceptual %K selection;computer %K system;view %K visual %X Perceptual information is quickly gaining importance in mesh representation, analysis and rendering. User studies, eye tracking and other techniques are able to provide ever more useful insights for many user-centric systems, which form the bulk of computer graphics applications. In this work we build upon the concept of Mesh Saliency - an automatic measure of visual importance for triangle meshes based on models of low-level human visual attention - applying it to the problem of mesh segmentation and view-dependent rendering. We introduce a technique for segmentation that partitions an object into a set of face clusters, each encompassing a group of locally interesting features; Mesh Saliency is incorporated in a propagative mesh clustering framework, guiding cluster seed selection and triangle propagation costs and leading to a convergence of face clusters around perceptually important features. We compare our technique with different fully automatic segmentation algorithms, showing that it provides similar or better segmentation without the need for user input. We illustrate application of our clustering results through a saliency-guided view-dependent rendering system, achieving significant frame rate increases with little loss of visual detail. %B Computer Graphics and Image Processing (SIBGRAPI), 2009 XXII Brazilian Symposium on %P 56 - 63 %8 2009/10// %G eng %R 10.1109/SIBGRAPI.2009.34 %0 Journal Article %J GPU Technology Conference %D 2009 %T Scaling kernel machine learning algorithm via the use of GPUs %A Srinivasan,B.V. %A Duraiswami, Ramani %B GPU Technology Conference %8 2009/// %G eng %0 Journal Article %J Proceedings of the International Conference on Computer Vision %D 2009 %T Scene it or not? incremental multiple kernel learning for object detection %A Kembhavi,A. %A Siddiquie,B. %A Miezianko,R. %A McCloskey,S. %A Davis, Larry S. %A Schwartz, W.R. %A Harwood,D. %A Gupta,A. %A Farrell,R. %A Luo,Y. %A others %B Proceedings of the International Conference on Computer Vision %8 2009/// %G eng %0 Journal Article %J Algorithmica %D 2009 %T Scheduling on Unrelated Machines under Tree-Like Precedence Constraints %A Anil Kumar,V. %A Marathe,Madhav %A Parthasarathy,Srinivasan %A Srinivasan, Aravind %X We present polylogarithmic approximations for the R | prec | C max and R | prec |∑ j w j C j problems, when the precedence constraints are “treelike”—i.e., when the undirected graph underlying the precedences is a forest. These are the first non-trivial generalizations of the job shop scheduling problem to scheduling with precedence constraints that are not just chains. These are also the first non-trivial results for the weighted completion time objective on unrelated machines with precedence constraints of any kind . We obtain improved bounds for the weighted completion time and flow time for the case of chains with restricted assignment—this generalizes the job shop problem to these objective functions. We use the same lower bound of “congestion + dilation”, as in other job shop scheduling approaches (e.g. Shmoys, Stein and Wein, SIAM J. Comput. 23, 617–632, 1994 ). The first step in our algorithm for the R | prec | C max problem with treelike precedences involves using the algorithm of Lenstra, Shmoys and Tardos to obtain a processor assignment with the congestion + dilation value within a constant factor of the optimal. We then show how to generalize the random-delays technique of Leighton, Maggs and Rao to the case of trees. For the special case of chains, we show a dependent rounding technique which leads to a bicriteria approximation algorithm for minimizing the flow time, a notoriously hard objective function. %B Algorithmica %V 55 %P 205 - 226 %8 2009/// %@ 0178-4617 %G eng %U http://dx.doi.org/10.1007/s00453-007-9004-y %N 1 %0 Conference Paper %B Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures %D 2009 %T Scheduling to minimize staleness and stretch in real-time data warehouses %A Bateni,M. H %A Golab,L. %A Hajiaghayi, Mohammad T. %A Karloff,H. %B Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures %P 29 - 38 %8 2009/// %G eng %0 Book %D 2009 %T Scientific Computing with Case Studies %A O'Leary, Dianne P. %X This book is a practical guide to the numerical solution of linear and nonlinear equations, differential equations, optimization problems, and eigenvalue problems. It treats standard problems and introduces important variants such as sparse systems, differential-algebraic equations, constrained optimization, Monte Carlo simulations, and parametric studies. Stability and error analysis are emphasized, and the Matlab algorithms are grounded in sound principles of software design and understanding of machine arithmetic and memory management. Nineteen case studies provide experience in mathematical modeling and algorithm design, motivated by problems in physics, engineering, epidemiology, chemistry, and biology. The topics included go well beyond the standard first-course syllabus, introducing important problems such as differential-algebraic equations and conic optimization problems, and important solution techniques such as continuation methods. The case studies cover a wide variety of fascinating applications, from modeling the spread of an epidemic to determining truss configurations. %I SIAM %8 2009 %@ 9780898717723 %G eng %0 Conference Paper %B Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement %D 2009 %T Scope error detection and handling concerning software estimation models %A Sarcia,Salvatore Alessandro %A Basili, Victor R. %A Cantone,Giovanni %X Over the last 25+ years, the software community has been searching for the best models for estimating variables of interest (e.g., cost, defects, and fault proneness). However, little research has been done to improve the reliability of the estimates. Over the last decades, scope error and error analysis have been substantially ignored by the community. This work attempts to fill this gap in the research and enhance a common understanding within the community. Results provided in this study can eventually be used to support human judgment-based techniques and be an addition to the portfolio. The novelty of this work is that, we provide a way of detecting and handling the scope error arising from estimation models. The answer whether or not scope error will occur is a pre-condition to safe use of an estimation model. We also provide a handy procedure for dealing with outliers as to whether or not to include them in the training set for building a new version of the estimation model. The majority of the work is empirically based, applying computational intelligence techniques to some COCOMO model variations with respect to a publicly available cost estimation data set in the PROMISE repository. %B Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement %S ESEM '09 %I IEEE Computer Society %C Washington, DC, USA %P 123 - 132 %8 2009/// %@ 978-1-4244-4842-5 %G eng %U http://dx.doi.org/10.1109/ESEM.2009.5316020 %R 10.1109/ESEM.2009.5316020 %0 Conference Paper %B Proceedings of IS&T Archiving 2009 %D 2009 %T Search and Access Strategies for Web Archives %A Song,Sangchul %A JaJa, Joseph F. %B Proceedings of IS&T Archiving 2009 %8 2009/// %G eng %0 Conference Paper %B Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval %D 2009 %T Searching documentation using text, OCR, and image %A Tom Yeh %A Katz,Boris %K Computer vision %K content-based image retrieval %K multimodal search %X We describe a mixed-modality method to index and search software documentation in three ways: plain text, OCR text of embedded figures, and visual features of these figures. Using a corpus of 102 computer books with a total of 62,943 pages and 75,800 figures, we empirically demonstrate that our method achieves better precision/recall than do alternatives based on single modalities. %B Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval %S SIGIR '09 %I ACM %C New York, NY, USA %P 776 - 777 %8 2009/// %@ 978-1-60558-483-6 %G eng %U http://doi.acm.org/10.1145/1571941.1572123 %R 10.1145/1571941.1572123 %0 Journal Article %J Genome Biology %D 2009 %T Searching for SNPs with cloud computing %A Langmead,Ben %A Schatz,Michael C %A Jimmy Lin %A Pop, Mihai %A Salzberg,Steven L. %X As DNA sequencing outpaces improvements in computer speed, there is a critical need to accelerate tasks like alignment and SNP calling. Crossbow is a cloud-computing software tool that combines the aligner Bowtie and the SNP caller SOAPsnp. Executing in parallel using Hadoop, Crossbow analyzes data comprising 38-fold coverage of the human genome in three hours using a 320-CPU cluster rented from a cloud computing service for about $85. Crossbow is available from http://bowtie-bio.sourceforge.net/crossbow/. %B Genome Biology %V 10 %P R134 - R134 %8 2009/11/20/ %@ 1465-6906 %G eng %U http://genomebiology.com/2009/10/11/R134 %N 11 %R 10.1186/gb-2009-10-11-r134 %0 Conference Paper %D 2009 %T Second ACM Workshop on Hot Topics in Software Upgrades (HotSWUp 2009) %A Tudor Dumitras %A Neamtiu, Iulian %A Tilevich, Eli %K software %K upgrades %X The goal of HotSWUp is to identify cutting-edge research ideas for implementing software upgrades. In the presence of modified user requirements, deployment environments, and bug fixes, actively-used software must be upgraded continuously to ensure its utility and safety. The upgrades incorporate changes to the structure, behavior, configuration, data, or topology of a computer system. Whether applied offline or directly to a live system, such upgrades may have a significant impact on the performance and reliability of the software. Indeed, recent studies and a large body of anecdotal evidence suggest that, in practice, upgrades are failure-prone and can lead to outages, data corruption or latent errors. These problems not only inconvenience end users - they create a significant burden for organizations due to the associated downtime and high administrative costs. %S OOPSLA '09 %I ACM %P 705 - 706 %8 2009/// %@ 978-1-60558-768-4 %G eng %U http://doi.acm.org/10.1145/1639950.1639974 %0 Conference Paper %B Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on %D 2009 %T Secure image retrieval through feature protection %A Lu,Wenjun %A Varna,A.L. %A Swaminathan,A. %A M. Wu %K bit-plane %K confidentiality;data %K database;image %K databases; %K encoding;signal %K extraction;image %K feature %K processes;visual %K processing;content-based %K projection;randomized %K protection;image %K randomization;cryptographic %K retrieval;cryptography;feature %K retrieval;random %K storage;encrypted %K technique;data %K unary %X This paper addresses the problem of image retrieval from an encrypted database, where data confidentiality is preserved both in the storage and retrieval process. The paper focuses on image feature protection techniques which enable similarity comparison among protected features. By utilizing both signal processing and cryptographic techniques, three schemes are investigated and compared, including bit-plane randomization, random projection, and randomized unary encoding. Experimental results show that secure image retrieval can achieve comparable retrieval performance to conventional image retrieval techniques without revealing information about image content. This work enriches the area of secure information retrieval and can find applications in secure online services for images and videos. %B Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on %P 1533 - 1536 %8 2009/04// %G eng %R 10.1109/ICASSP.2009.4959888 %0 Journal Article %J International journal of computer vision %D 2009 %T Segmentation using appearance of mesostructure roughness %A Yacoob,Yaser %A Davis, Larry S. %X This paper introduces mesostructure roughness as an effective cue in image segmentation. Mesostructure roughness corresponds to small-scale bumps on the macrostructure (i.e., geometry) of objects. Specifically, the focus is on the texture that is created by the projection of the mesostructure roughness on the camera plane. Three intrinsic images are derived: reflectance, smooth-surface shading and mesostructure roughness shading (meta-texture images). A constructive approach is proposed for computing a meta-texture image by preserving, equalizing and enhancing the underlying surface-roughness across color, brightness and illumination variations. We evaluate the performance on sample images and illustrate quantitatively that different patches of the same material, in an image, are normalized in their statistics despite variations in color, brightness and illumination. We develop an algorithm for segmentation of an image into patches that share salient mesostructure roughness. Finally, segmentation by line-based boundary-detection is proposed and results are provided and compared to known algorithms. %B International journal of computer vision %V 83 %P 248 - 273 %8 2009/// %G eng %N 3 %0 Conference Paper %B Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval %D 2009 %T Selecting hierarchical clustering cut points for web person-name disambiguation %A Gong,Jun %A Oard, Douglas %K clustering %K person-name disambiguation %X Hierarchical clustering is often used to cluster person-names referring to the same entities. Since the correct number of clusters for a given person-name is not known a priori, some way of deciding where to cut the resulting dendrogram to balance risks of over- or under-clustering is needed. This paper reports on experiments in which outcome-specific and result-set measures are used to learn a global similarity threshold. Results on the Web People Search (WePS)-2 task indicate that approximately 85% of the optimal F1 measure can be achieved on held-out data. %B Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval %S SIGIR '09 %I ACM %C New York, NY, USA %P 778 - 779 %8 2009/// %@ 978-1-60558-483-6 %G eng %U http://doi.acm.org/10.1145/1571941.1572124 %R 10.1145/1571941.1572124 %0 Journal Article %J SCALE summer workshop final report, Human Language Technology Center Of Excellence %D 2009 %T Semantically informed machine translation (SIMT) %A Baker,K. %A Bethard,S. %A Bloodgood,M. %A Brown,R. %A Callison-Burch,C. %A Coppersmith,G. %A Dorr, Bonnie J %A Filardo,W. %A Giles,K. %A Irvine,A. %A others %B SCALE summer workshop final report, Human Language Technology Center Of Excellence %8 2009/// %G eng %0 Journal Article %J Image Analysis and Processing–ICIAP 2009 %D 2009 %T Semantic-based segmentation and annotation of 3d models %A Papaleo,L. %A De Floriani, Leila %X 3D objects have become widely available and used in different application domains. Thus, it is becoming fundamental to use, integrate and develop techniques for extracting and maintaining their embedded knowledge. These techniques should be encapsulated in portable and intelligent systems able to semantically annotate the 3D object models in order to improve their usability and indexing, especially in innovative web cooperative environments. Lately, we are moving in this direction, with the definition and development of data structures, methods and interfaces for structuring and semantically annotating 3D complex models (and scenes) - even changing in time - according to ontology-driven metadata and following ontology-driven processes. Here, we concentrate on the tools for segmenting manifold 3D models and on the underline structural representation that we build and manipulate. We also describe the first prototype of an annotation tool which allows a hierarchical semantic-driven tagging of the segmented model and provides an interface from which the user can inspect and browse the entire segmentation graph. %B Image Analysis and Processing–ICIAP 2009 %P 103 - 112 %8 2009/// %G eng %R 10.1007/978-3-642-04146-4_13 %0 Journal Article %J SIAM Journal on Matrix Analysis and Applications %D 2009 %T On the Semidefinite B-Arnoldi Method %A Stewart, G.W. %K Arnoldi's method %K B-inner product %K null-space component %K semidefinite B %X The B-Arnoldi method is a variant of the ordinary Arnoldi method in which orthogonalization is done with respect to the inner product generated by a positive definite matrix $B$. It arises in connection with the generalized eigenvalue problem $Ax = \lambda Bx$. When $B$ is semidefinite, the algorithm can proceed formally, with “orthogonalization” taking place in the semi-inner product generated by $B$. However, it has been observed that components of the Arnoldi vectors lying in the null space of $B$ can grow rapidly. In this paper we examine the source and consequences of this growth. %B SIAM Journal on Matrix Analysis and Applications %V 31 %P 1458 - 1468 %8 2009/// %G eng %U http://link.aip.org/link/?SML/31/1458/1 %N 3 %R 10.1137/090759252 %0 Conference Paper %B Proceedings of the NAACL HLT Workshop on Semisupervised Learning for Natural Language Processing %D 2009 %T Semi-supervised or semi-unsupervised? %A Daumé, Hal %B Proceedings of the NAACL HLT Workshop on Semisupervised Learning for Natural Language Processing %P 84 - 85 %8 2009/// %G eng %0 Conference Paper %B International Joint Conference on Artificial Intelligence %D 2009 %T Sensing and predicting the pulse of the city through shared bicycling %A Jon Froehlich %A Neumann, J. %A Oliver,N. %B International Joint Conference on Artificial Intelligence %P 1420 - 1426 %8 2009/// %G eng %0 Conference Proceedings %B Proc. CHI Workshop on Defining the Role of HCI in the Challenge of Sustainability %D 2009 %T Sensing opportunities for personalized feedback technology to reduce consumption %A Jon Froehlich %A Everitt,K. %A Fogarty,J. %A Patel,S. %A Landay,J. %B Proc. CHI Workshop on Defining the Role of HCI in the Challenge of Sustainability %8 2009 %G eng %0 Journal Article %J Journal of Ambient Intelligence and Smart Environments %D 2009 %T Sensory grammars for sensor networks %A Aloimonos, J. %B Journal of Ambient Intelligence and Smart Environments %V 1 %P 15 - 21 %8 2009/// %G eng %N 1 %0 Journal Article %J Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %D 2009 %T Serogroup, Virulence, and Genetic Traits of Vibrio Parahaemolyticus in the Estuarine Ecosystem of Bangladesh %A Alam,Munirul %A Chowdhury,Wasimul B. %A Bhuiyan,N. A. %A Islam,Atiqul %A Hasan,Nur A. %A Nair,G. Balakrish %A Watanabe,H. %A Siddique,A. K. %A Huq,Anwar %A Sack,R. Bradley %A Akhter,M. Z. %A Grim,Christopher J. %A Kam,K.-M. %A Luey,C. K. Y. %A Endtz,Hubert P. %A Cravioto,Alejandro %A Rita R Colwell %X Forty-two strains of Vibrio parahaemolyticus were isolated from Bay of Bengal estuaries and, with two clinical strains, analyzed for virulence, phenotypic, and molecular traits. Serological analysis indicated O8, O3, O1, and K21 to be the major O and K serogroups, respectively, and O8:K21, O1:KUT, and O3:KUT to be predominant. The K antigen(s) was untypeable, and pandemic serogroup O3:K6 was not detected. The presence of genes toxR and tlh were confirmed by PCR in all but two strains, which also lacked toxR. A total of 18 (41%) strains possessed the virulence gene encoding thermostable direct hemolysin (TDH), and one had the TDH-related hemolysin (trh) gene, but not tdh. Ten (23%) strains exhibited Kanagawa phenomenon that surrogates virulence, of which six, including the two clinical strains, possessed tdh. Of the 18 tdh-positive strains, 17 (94%), including the two clinical strains, had the seromarker O8:K21, one was O9:KUT, and the single trh-positive strain was O1:KUT. None had the group-specific or ORF8 pandemic marker gene. DNA fingerprinting employing pulsed-field gel electrophoresis (PFGE) of SfiI-digested DNA and cluster analysis showed divergence among the strains. Dendrograms constructed using PFGE (SfiI) images from a soft database, including those of pandemic and nonpandemic strains of diverse geographic origin, however, showed that local strains formed a cluster, i.e., “clonal cluster,” as did pandemic strains of diverse origin. The demonstrated prevalence of tdh-positive and diarrheagenic serogroup O8:K21 strains in coastal villages of Bangladesh indicates a significant human health risk for inhabitants. %B Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %V 75 %P 6268 - 6274 %8 2009/10/01/ %@ 0099-2240, 1098-5336 %G eng %U http://aem.asm.org/content/75/19/6268 %N 19 %R 10.1128/AEM.00266-09 %0 Report %D 2009 %T A set of tools for Representing, Decomposing and Visualizing non manifold Cellular Complexes %A De Floriani, Leila %A Panozzo,D. %A Hui,A. %X Modeling and understanding complex non-manifold shapes is a key issue in shape analysis and retrieval. The topological structure of a non-manifold shape can be analyzed through its decomposition into a collection of components with a simpler topology. Here, we consider a decomposition of a non-manifold shape into components which are almost manifolds, and we present a novel graph representation which highlights the non-manifold singularities shared by the components as well as their connectivity relations. We describe an algorithm for computing the decomposition and its associated graph representation. We present a new tool for visualizing the shape decomposition and its graph as an effective support to modeling, analyzing and understanding non-manifold shapes. We describe a new data structure for non-manifold simplicial complex that we used in our decomposition software and we provide a complete description of all functionalities of the library we developed. %I Department of Computer Science and Information Science, University of Genoa %V DISI-TR-09-06 %8 2009/// %G eng %0 Conference Paper %B Data Mining Workshops, 2009. ICDMW '09. IEEE International Conference on %D 2009 %T Set-Based Boosting for Instance-Level Transfer %A Eaton,Eric %A desJardins, Marie %X The success of transfer to improve learning on a target task is highly dependent on the selected source data. Instance-based transfer methods reuse data from the source tasks to augment the training data for the target task. If poorly chosen, this source data may inhibit learning, resulting in negative transfer. The current best performing algorithm for instance-based transfer, TrAdaBoost, performs poorly when given irrelevant source data. We present a novel set-based boosting technique for instance-based transfer. The proposed algorithm, TransferBoost, boosts both individual instances and collective sets of instances from each source task. In effect, TransferBoost boosts each source task, assigning higher weight to those source tasks which show positive transferability to the target task, and then adjusts the weights of the instances within each source task via AdaBoost. The results demonstrate that TransferBoost significantly improves transfer performance over existing instance-based algorithms when given a mix of relevant and irrelevant source data. %B Data Mining Workshops, 2009. ICDMW '09. IEEE International Conference on %I IEEE %P 422 - 428 %8 2009/12// %@ 978-1-4244-5384-9 %G eng %U http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5360442&tag=1 %R 10.1109/ICDMW.2009.97 %0 Thesis %D 2009 %T Shape Identification in Temporal Data Sets %A Gregory,M.B. %A Shneiderman, Ben %X Shapes are a concise way to describe temporal variable behaviors.Some commonly used shapes are spikes, sinks, rises, and drops. A spike describes a set of variable values that rapidly increase, then immediately rapidly decrease. The variable may be the value of a stock or a person’s blood sugar levels. Shapes are abstract. Details such as the height of spike or its rate increase, are lost in the ab- straction. These hidden details make it difficult to define shapes and compare one to another. For example, what attributes of a spike determine its “spikiness”? The ability to define and com- pare shapes is important because it allows shapes to be identified and ranked, according to an attribute of interest. Work has been done in the area of shape identification through pattern matching and other data mining techniques, but ideas combining the identifi- cation and comparison of shapes have received less attention. This paper fills the gap by presenting a set of shapes and the attributes by which they can identified, compared, and ranked. Neither the set of shapes, nor their attributes presented in this paper are exhaustive, but it provides an example of how a shape’s attributes can be used for identification and comparison. The intention of this paper is not to replace any particular mathematical method of identifying a par- ticular behavior, but to provide a toolset for knowledge discovery and an intuitive method of data mining for novices. Spikes, sinks, rises, drops, lines, plateaus, valleys, and gaps are the shapes pre- sented in this paper. Several attributes for each shape are defined. These attributes will be the basis for constructing definitions that allow the shapes to be identified and ranked. The second contri- bution is an information visualization tool, TimeSearcher: Shape Search Edition (SSE), which allows users to explore data sets using the identification and ranking ideas in this paper. %I Master’s thesis, University of Maryland %8 2009/// %G eng %0 Book Section %B Semantic Mining Technologies for Multimedia DatabasesSemantic Mining Technologies for Multimedia Databases %D 2009 %T Shape Matching for Foliage Database Retrieval %A Ling,H. %A Jacobs, David W. %B Semantic Mining Technologies for Multimedia DatabasesSemantic Mining Technologies for Multimedia Databases %P 100 - 100 %8 2009/// %G eng %0 Journal Article %J IEEE Transactions on Image Processing %D 2009 %T Shearlet-Based Deconvolution %A Patel, Vishal M. %A Easley,G. R %A Healy,D. M %K approximation inversion operator %K contourlets %K curvelets %K Deconvolution %K distributed discontinuities %K generalized cross validation %K image restoration %K M-channel implementation %K shearlet-based deconvolution %K shearlets %K Wavelet transforms %K wavelets %X In this paper, a new type of deconvolution algorithm is proposed that is based on estimating the image from a shearlet decomposition. Shearlets provide a multidirectional and multiscale decomposition that has been mathematically shown to represent distributed discontinuities such as edges better than traditional wavelets. Constructions such as curvelets and contourlets share similar properties, yet their implementations are significantly different from that of shearlets. Taking advantage of unique properties of a new M-channel implementation of the shearlet transform, we develop an algorithm that allows for the approximation inversion operator to be controlled on a multiscale and multidirectional basis. A key improvement over closely related approaches such as ForWaRD is the automatic determination of the threshold values for the noise shrinkage for each scale and direction without explicit knowledge of the noise variance using a generalized cross validation (GCV). Various tests show that this method can perform significantly better than many competitive deconvolution algorithms. %B IEEE Transactions on Image Processing %V 18 %P 2673 - 2685 %8 2009/12// %@ 1057-7149 %G eng %N 12 %R 10.1109/TIP.2009.2029594 %0 Journal Article %J IEEETransactions on Pattern Analysis and Machine Intelligence %D 2009 %T Signature Detection and Matching for Document Image Retrieval %A Zhu,Guangyu %A Yefeng Zheng %A David Doermann %A Jaeger,Stefan %X As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multi-scale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2-D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant non-rigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error, and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in off-line signature verification. Extensive experiments using large real world collections of English and Arabic machine printed and handwritten documents demonstrate the excellent performance of our approaches. %B IEEETransactions on Pattern Analysis and Machine Intelligence %V 31 %P 2015 - 2031 %8 2009/11// %G eng %N 11 %0 Journal Article %J Advances in Cryptology–ASIACRYPT 2009 %D 2009 %T Signature schemes with bounded leakage resilience %A Katz, Jonathan %A Vaikuntanathan,V. %X A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information about the secret key (and possibly other internal state information) is leaked to an adversary. Denote the length of the secret key by n. We show:• A full-fledged signature scheme tolerating leakage of n − n ε bits of information about the secret key (for any constant ε> 0), based on general assumptions. • A one-time signature scheme, based on the minimal assumption of one-way functions, tolerating leakage of (41−)n bits of information about the signer’s entire state. • A more efficient one-time signature scheme, that can be based on several specific assumptions, tolerating leakage of (21−)n bits of information about the signer’s entire state. The latter two constructions extend to give leakage-resilient t-time signature schemes. All the above constructions are in the standard model. %B Advances in Cryptology–ASIACRYPT 2009 %P 703 - 720 %8 2009/// %G eng %R 10.1007/978-3-642-10366-7_41 %0 Journal Article %J Public Key Cryptography–PKC 2009 %D 2009 %T Signing a linear subspace: Signature schemes for network coding %A Boneh,D. %A Freeman,D. %A Katz, Jonathan %A Waters,B. %X Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, network coding requires intermediate nodes to modify data packets en route; for this reason, standard signature schemes are inapplicable and it is a challenge to provide resilience to tampering by malicious nodes.We propose two signature schemes that can be used in conjunction with network coding to prevent malicious modification of data. Our schemes can be viewed as signing linear subspaces in the sense that a signature σ on a subspace V authenticates exactly those vectors in V. Our first scheme is (suitably) homomorphic and has constant public-key size and per-packet overhead. Our second scheme does not rely on random oracles and is based on weaker assumptions. We also prove a lower bound on the length of signatures for linear subspaces showing that our schemes are essentially optimal in this regard. %B Public Key Cryptography–PKC 2009 %P 68 - 87 %8 2009/// %G eng %R 10.1007/978-3-642-00468-1_5 %0 Conference Paper %B Proceedings of the 22nd annual ACM symposium on User interface software and technology %D 2009 %T Sikuli: using GUI screenshots for search and automation %A Tom Yeh %A Chang,Tsung-Hsiang %A Miller,Robert C. %K Automation %K image search %K online help %X We present Sikuli, a visual approach to search and automation of graphical user interfaces using screenshots. Sikuli allows users to take a screenshot of a GUI element (such as a toolbar button, icon, or dialog box) and query a help system using the screenshot instead of the element's name. Sikuli also provides a visual scripting API for automating GUI interactions, using screenshot patterns to direct mouse and keyboard events. We report a web-based user study showing that searching by screenshot is easy to learn and faster to specify than keywords. We also demonstrate several automation tasks suitable for visual scripting, such as map navigation and bus tracking, and show how visual scripting can improve interactive help systems previously proposed in the literature. %B Proceedings of the 22nd annual ACM symposium on User interface software and technology %S UIST '09 %I ACM %C New York, NY, USA %P 183 - 192 %8 2009/// %@ 978-1-60558-745-5 %G eng %U http://doi.acm.org/10.1145/1622176.1622213 %R 10.1145/1622176.1622213 %0 Book Section %B Theory of Cryptography %D 2009 %T Simple, Black-Box Constructions of Adaptively Secure Protocols %A Choi, Seung Geol %A Dana Dachman-Soled %A Malkin, Tal %A Wee, Hoeteck %E Reingold, Omer %K Algorithm Analysis and Problem Complexity %K computers and society %K Data Encryption %K Discrete Mathematics in Computer Science %K Management of Computing and Information Systems %K Systems and Data Security %X We present a compiler for transforming an oblivious transfer (OT) protocol secure against an adaptive semi-honest adversary into one that is secure against an adaptive malicious adversary. Our compiler achieves security in the universal composability framework, assuming access to an ideal commitment functionality, and improves over previous work achieving the same security guarantee in two ways: it uses black-box access to the underlying protocol and achieves a constant multiplicative overhead in the round complexity. As a corollary, we obtain the first constructions of adaptively secure protocols in the stand-alone model using black-box access to a low-level primitive. %B Theory of Cryptography %S Lecture Notes in Computer Science %I Springer Berlin Heidelberg %P 387 - 402 %8 2009/01/01/ %@ 978-3-642-00456-8, 978-3-642-00457-5 %G eng %U http://link.springer.com/chapter/10.1007/978-3-642-00457-5_23 %0 Journal Article %J Advances in Cryptology–ASIACRYPT 2009 %D 2009 %T Smooth projective hashing and password-based authenticated key exchange from lattices %A Katz, Jonathan %A Vaikuntanathan,V. %X We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against chosen-ciphertext attacks while admitting (a variant of) smooth projective hashing. This encryption scheme suffices to construct a protocol for password-based authenticated key exchange (PAKE) that can be proven secure based on the LWE assumption in the standard model. We thus obtain the first PAKE protocol whose security relies on a lattice-based assumption. %B Advances in Cryptology–ASIACRYPT 2009 %P 636 - 652 %8 2009/// %G eng %R 10.1007/978-3-642-10366-7_37 %0 Journal Article %J GeoSpatial Visual Analytics %D 2009 %T Sorting Spatial Data by Spatial Occupancy %A Samet, Hanan %X The increasing popularity of web-based mapping services such as Microsoft Virtual Earth and Google Maps/Earth has led to a dramatic increase in awareness of the importance of location as a component of data for the purposes of further processing as a means of enhancing the value of the nonspatial data and of visualization. Both of these purposes inevitably involve searching. The efficiency of searching is dependent on the extent to which the underlying data is sorted. The sorting is encapsulated by the data structure known as an index that is used to represent the spatial data thereby making it more accessible. The traditional role of the indexes is to sort the data, which means that they order the data. However, since generally no ordering exists in dimensions greater than 1 without a transformation of the data to one dimension, the role of the sort process is one of differentiating between the data and what is usually done is to sort the spatial objects with respect to the space that they occupy. The resulting ordering should be implicit rather than explicit so that the data need not be resorted (i.e., the index need not be rebuilt) when the queries change. The indexes are said to order the space and the characteristics of such indexes are explored further. %B GeoSpatial Visual Analytics %P 31 - 43 %8 2009/// %G eng %R 10.1007/978-90-481-2899-0_3 %0 Journal Article %J Journal of the ACM (JACM) %D 2009 %T Space-time tradeoffs for approximate nearest neighbor searching %A Arya,Sunil %A Malamatos,Theocharis %A Mount, Dave %K nearest neighbor searching %K space-time tradeoffs %X Nearest neighbor searching is the problem of preprocessing a set of n point points in d-dimensional space so that, given any query point q, it is possible to report the closest point to q rapidly. In approximate nearest neighbor searching, a parameter ϵ > 0 is given, and a multiplicative error of (1 + ϵ) is allowed. We assume that the dimension d is a constant and treat n and ϵ as asymptotic quantities. Numerous solutions have been proposed, ranging from low-space solutions having space O(n) and query time O(log n + 1/ϵd−1) to high-space solutions having space roughly O((n log n)/ϵd) and query time O(log (n/ϵ)). We show that there is a single approach to this fundamental problem, which both improves upon existing results and spans the spectrum of space-time tradeoffs. Given a tradeoff parameter γ, where 2 ≤ γ ≤ 1/ϵ, we show that there exists a data structure of space O(nγd−1 log(1/ϵ)) that can answer queries in time O(log(nγ) + 1/(ϵγ)(d−1)/2. When γ = 2, this yields a data structure of space O(n log (1/ϵ)) that can answer queries in time O(log n + 1/ϵ(d−1)/2). When γ = 1/ϵ, it provides a data structure of space O((n/ϵd−1)log(1/ϵ)) that can answer queries in time O(log(n/ϵ)). Our results are based on a data structure called a (t,ϵ)-AVD, which is a hierarchical quadtree-based subdivision of space into cells. Each cell stores up to t representative points of the set, such that for any query point q in the cell at least one of these points is an approximate nearest neighbor of q. We provide new algorithms for constructing AVDs and tools for analyzing their total space requirements. We also establish lower bounds on the space complexity of AVDs, and show that, up to a factor of O(log (1/ϵ)), our space bounds are asymptotically tight in the two extremes, γ = 2 and γ = 1/ϵ. %B Journal of the ACM (JACM) %V 57 %P 1:1–1:54 - 1:1–1:54 %8 2009/11// %@ 0004-5411 %G eng %U http://doi.acm.org/10.1145/1613676.1613677 %N 1 %R 10.1145/1613676.1613677 %0 Conference Paper %B Computer Vision, 2009 IEEE 12th International Conference on %D 2009 %T Sparse representation of cast shadows via ℓ1-regularized least squares %A Mei,Xue %A Ling,Haibin %A Jacobs, David W. %K #x2113;1-regularized %K approximations;lighting; %K formulation;Lambertian %K least %K representation;image %K representation;least %K scene;cast %K sensing;sparse %K shadows;compressive %K squares %X Scenes with cast shadows can produce complex sets of images. These images cannot be well approximated by low-dimensional linear subspaces. However, in this paper we show that the set of images produced by a Lambertian scene with cast shadows can be efficiently represented by a sparse set of images generated by directional light sources. We first model an image with cast shadows as composed of a diffusive part (without cast shadows) and a residual part that captures cast shadows. Then, we express the problem in an #x2113;1-regularized least squares formulation, with nonnegativity constraints. This sparse representation enjoys an effective and fast solution, thanks to recent advances in compressive sensing. In experiments on both synthetic and real data, our approach performs favorably in comparison to several previously proposed methods. %B Computer Vision, 2009 IEEE 12th International Conference on %P 583 - 590 %8 2009/// %G eng %R 10.1109/ICCV.2009.5459185 %0 Conference Paper %B Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on %D 2009 %T Sparsity inspired selection and recognition of iris images %A Pillai,J.K. %A Patel, Vishal M. %A Chellapa, Rama %K biometrics (access control) %K image recognition %K Image segmentation %K iris image recognition %K iris image selection %K iris video stream %K sparsity inspired selection %K video signal processing %K video streaming %X Iris images acquired from a partially cooperating subject often suffer from blur, occlusion due to eyelids, and specular reflections. The performance of existing iris recognition systems degrade significantly on these images. Hence it is essential to select good images from the incoming iris video stream, before they are input to the recognition algorithm. In this paper, we propose a sparsity based algorithm for selection of good iris images and their subsequent recognition. Unlike most existing algorithms for iris image selection, our method can handle segmentation errors and a wider range of acquisition artifacts common in iris image capture. We perform selection and recognition in a single step which is more efficient than devising separate specialized algorithms for the two. Recognition from partially cooperating users is a significant step towards deploying iris systems in a wide variety of applications. %B Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on %P 1 - 6 %8 2009/09// %G eng %R 10.1109/BTAS.2009.5339067 %0 Conference Paper %B Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems %D 2009 %T Spatio-textual spreadsheets: geotagging via spatial coherence %A Lieberman,Michael D. %A Samet, Hanan %A Sankaranarayanan,Jagan %A Sperling,Jon %K geotagging %K spatial coherence %K spatio-textual %K spreadsheets %X The spatio-textual spreadsheet is a conventional spreadsheet where spatial attribute values are specified textually. Techniques are presented to automatically find the textually-specified spatial attributes that are present in spreadsheets. Once the spatial attributes have been identified, an accurate translation of the values of the spatial attributes to their actual geographic locations is needed (known as geotagging). The key observation is that spreadsheets with spatial data exhibit spatial coherence --- that is, cells with spatial data that are nearby in the spreadsheet contain data that share spatial characteristics in the real world. These techniques also allow richer search engine results by returning actual tuples from spreadsheets instead of simply links to the spreadsheets. Moreover, when the search key is a particular location, results in proximity to the query can be provided rather than just exact matches. %B Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems %S GIS '09 %I ACM %C New York, NY, USA %P 524 - 527 %8 2009/// %@ 978-1-60558-649-6 %G eng %U http://doi.acm.org/10.1145/1653771.1653860 %R 10.1145/1653771.1653860 %0 Patent %D 2009 %T Spawn-join instruction set architecture for providing explicit multithreading %A Vishkin, Uzi %X The invention presents a unique computational paradigm that provides the tools to take advantage of the parallelism inherent in parallel algorithms to the full spectrum from algorithms through architecture to implementation. The invention provides a new processing architecture that extends the standard instruction set of the conventional uniprocessor architecture. The architecture used to implement this new computational paradigm includes a thread control unit (34), a spawn control unit (38), and an enabled instruction memory (50). The architecture initiates multiple threads and executes them in parallel. Control of the threads is provided such that the threads may be suspended or allowed to execute each at its own pace. %V 10/236,934 %8 2009/04/21/ %G eng %U http://www.google.com/patents?id=YQTDAAAAEBAJ %N 7523293 %0 Conference Paper %B Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility %D 2009 %T Speaking through pictures: images vs. icons %A Ma,Xiaojuan %A Jordan Boyd-Graber %A Nikolova,Sonya %A Cook,Perry R. %K aphasia %K computerized visual communication (C-VIC) %K visual communication (VIC) %X People with aphasia, a condition that impairs the ability to understand or generate written or spoken language, are aided by assistive technology that helps them communicate through a vocabulary of icons. These systems are akin to language translation systems, translating icon arrangements into spoken or written language and vice versa. However, these icon-based systems have little vocabulary breadth or depth, making it difficult for people with aphasia to apply their usage to multiple real world situations. Pictures from the web are numerous, varied, and easily accessible and thus, could potentially address the small size issues of icon-based systems. We present results from two studies that investigate this potential and demonstrate that images can be as effective as icons when used as a replacement for English language communication. The first study uses elderly subjects to investigate the efficacy of images vs. icons in conveying word meaning; the second study examines the retention of word-level meaning by both images and icons with a population of aphasics. We conclude that images collected from the web are as functional as icons in conveying information and thus, are feasible to use in assistive technology that supports people with aphasia. %B Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility %S Assets '09 %I ACM %C New York, NY, USA %P 163 - 170 %8 2009/// %@ 978-1-60558-558-1 %G eng %U http://doi.acm.org/10.1145/1639642.1639672 %R 10.1145/1639642.1639672 %0 Journal Article %J Knowledge and Data Engineering, IEEE Transactions on %D 2009 %T SPOT Databases: Efficient Consistency Checking and Optimistic Selection in Probabilistic Spatial Databases %A Parker,A. %A Infantes,G. %A Grant,J. %A V.S. Subrahmanian %K Cartesian %K checking;database %K database;data %K databases; %K databases;visual %K indexing;inference %K indexing;linear %K integrity;database %K mechanisms;linear %K probabilistic %K problem;spatial %K problems;temporal %K processing;search %K program;optimistic %K programming;probability;query %K query;probabilistic %K reasoning;search %K selection %K selection;consistency %K space;cautious %K temporal %X Spatial probabilistic temporal (SPOT) databases are a paradigm for reasoning with probabilistic statements about where a vehicle may be now or in the future. They express statements of the form "Object O is in spatial region R at some time t with some probability in the interval [L,U]." Past work on SPOT databases has developed selection operators based on selecting SPOT atoms that are entailed by the SPOT database-we call this "cautious" selection. In this paper, we study several problems. First, we note that the runtime of consistency checking and cautious selection algorithms in past work is influenced greatly by the granularity of the underlying Cartesian space. In this paper, we first introduce the notion of "optimistic" selection, where we are interested in returning all SPOT atoms in a database that are consistent with respect to a query, rather than having an entailment relationship. We then develop an approach to scaling SPOT databases that has three main contributions: 1) We develop methods to eliminate variables from the linear programs used in past work, thus greatly reducing the size of the linear programs used-the resulting advances apply to consistency checking, optimistic selection, and cautious selection. 2) We develop a host of theorems to show how we can prune the search space when we are interested in optimistic selection. 3) We use the above contributions to build an efficient index to execute optimistic selection queries over SPOT databases. Our approach is superior to past work in two major respects: First, it makes fewer assumptions than all past works on this topic except that in. Second, our experiments, which are based on real-world data about ship movements, show that our algorithms are much more efficient than those in. %B Knowledge and Data Engineering, IEEE Transactions on %V 21 %P 92 - 107 %8 2009/01// %@ 1041-4347 %G eng %N 1 %R 10.1109/TKDE.2008.93 %0 Conference Paper %B Proceedings of the 2009 ACM symposium on Applied Computing %D 2009 %T Static type inference for Ruby %A Furr,Michael %A An,Jong-hoon (David) %A Foster, Jeffrey S. %A Hicks, Michael W. %K Contracts %K dynamic typing %K ruby %K Type inference %X Many general-purpose, object-oriented scripting languages are dynamically typed, which provides flexibility but leaves the programmer without the benefits of static typing, including early error detection and the documentation provided by type annotations. This paper describes Diamondback Ruby (DRuby), a tool that blends Ruby's dynamic type system with a static typing discipline. DRuby provides a type language that is rich enough to precisely type Ruby code we have encountered, without unneeded complexity. When possible, DRuby infers static types to discover type errors in Ruby programs. When necessary, the programmer can provide DRuby with annotations that assign static types to dynamic code. These annotations are checked at run time, isolating type errors to unverified code. We applied DRuby to a suite of benchmarks and found several bugs that would cause run-time type errors. DRuby also reported a number of warnings that reveal questionable programming practices in the benchmarks. We believe that DRuby takes a major step toward bringing the benefits of combined static and dynamic typing to Ruby and other object-oriented languages. %B Proceedings of the 2009 ACM symposium on Applied Computing %S SAC '09 %I ACM %C New York, NY, USA %P 1859 - 1866 %8 2009/// %@ 978-1-60558-166-8 %G eng %U http://doi.acm.org/10.1145/1529282.1529700 %R 10.1145/1529282.1529700 %0 Journal Article %J PLoS Comput Biology %D 2009 %T Statistical Methods for Detecting Differentially Abundant Features in Clinical Metagenomic Samples %A White,James Robert %A Nagarajan,Niranjan %A Pop, Mihai %X The emerging field of metagenomics aims to understand the structure and function of microbial communities solely through DNA analysis. Current metagenomics studies comparing communities resemble large-scale clinical trials with multiple subjects from two general populations (e.g. sick and healthy). To improve analyses of this type of experimental data, we developed a statistical methodology for detecting differentially abundant features between microbial communities, that is, features that are enriched or depleted in one population versus another. We show our methods are applicable to various metagenomic data ranging from taxonomic information to functional annotations. We also provide an assessment of taxonomic differences in gut microbiota between lean and obese humans, as well as differences between the functional capacities of mature and infant gut microbiomes, and those of microbial and viral metagenomes. Our methods are the first to statistically address differential abundance in comparative metagenomics studies with multiple subjects, and we hope will give researchers a more complete picture of how exactly two environments differ. %B PLoS Comput Biology %V 5 %P e1000352 - e1000352 %8 2009/04/10/ %G eng %U UR - http://dx.doi.org/10.1371/journal.pcbi.1000352,http://dx.doi.org/10.1371/journal.pcbi.1000352 %N 4 %R 10.1371/journal.pcbi.1000352 %0 Journal Article %J Relation %D 2009 %T The Story of One: Humanity scholarship with visualization and text analysis %A Clement,T. %A Plaisant, Catherine %A Vuillemot,R. %B Relation %V 10 %P 8485 - 8485 %8 2009/// %G eng %N 1.43 %0 Conference Paper %B Proceedings of the 21st international jont conference on Artifical intelligence %D 2009 %T Streamed learning: one-pass SVMs %A Rai,P. %A Daumé, Hal %A Venkatasubramanian,S. %B Proceedings of the 21st international jont conference on Artifical intelligence %P 1211 - 1216 %8 2009/// %G eng %0 Conference Paper %B Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics %D 2009 %T Streaming for large scale NLP: Language modeling %A Goyal,A. %A Daumé, Hal %A Venkatasubramanian,S. %B Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics %P 512 - 520 %8 2009/// %G eng %0 Journal Article %J Scientific Programming %D 2009 %T Streaming model based volume ray casting implementation for Cell Broadband Engine %A Kim,Jusub %A JaJa, Joseph F. %X Interactive high quality volume rendering is becoming increasingly more important as the amount of more complex volumetric data steadily grows. While a number of volumetric rendering techniques have been widely used, ray casting has been recognized as an effective approach for generating high quality visualization. However, for most users, the use of ray casting has been limited to datasets that are very small because of its high demands on computational power and memory bandwidth. However the recent introduction of the Cell Broadband Engine (Cell B.E.) processor, which consists of 9 heterogeneous cores designed to handle extremely demanding computations with large streams of data, provides an opportunity to put the ray casting into practical use. In this paper, we introduce an efficient parallel implementation of volume ray casting on the Cell B.E. The implementation is designed to take full advantage of the computational power and memory bandwidth of the Cell B.E. using an intricate orchestration of the ray casting computation on the available heterogeneous resources. Specifically, we introduce streaming model based schemes and techniques to efficiently implement acceleration techniques for ray casting on Cell B.E. In addition to ensuring effective SIMD utilization, our method provides two key benefits: there is no cost for empty space skipping and there is no memory bottleneck on moving volumetric data for processing. Our experimental results show that we can interactively render practical datasets on a single Cell B.E. processor. %B Scientific Programming %V 17 %P 173 - 184 %8 2009/01/01/ %G eng %U http://dx.doi.org/10.3233/SPR-2009-0267 %N 1 %R 10.3233/SPR-2009-0267 %0 Journal Article %J Molecular Cell %D 2009 %T Structure of the S5a:K48-Linked Diubiquitin Complex and Its Interactions with Rpn13 %A Zhang,Naixia %A Wang,Qinghua %A Ehlinger,Aaron %A Randles,Leah %A Lary,Jeffrey W. %A Kang,Yang %A Haririnia,Aydin %A Storaska,Andrew J. %A Cole,James L. %A Fushman, David %A Walters,Kylie J. %K Proteins %X SummaryDegradation by the proteasome typically requires substrate ubiquitination. Two ubiquitin receptors exist in the proteasome, S5a/Rpn10 and Rpn13. Whereas Rpn13 has only one ubiquitin-binding surface, S5a binds ubiquitin with two independent ubiquitin-interacting motifs (UIMs). Here, we use nuclear magnetic resonance (NMR) and analytical ultracentrifugation to define at atomic level resolution how S5a binds K48-linked diubiquitin, in which K48 of one ubiquitin subunit (the “proximal” one) is covalently bonded to G76 of the other (the “distal” subunit). We demonstrate that S5a's UIMs bind the two subunits simultaneously with a preference for UIM2 binding to the proximal subunit while UIM1 binds to the distal one. In addition, NMR experiments reveal that Rpn13 and S5a bind K48-linked diubiquitin simultaneously with subunit specificity, and a model structure of S5a and Rpn13 bound to K48-linked polyubiquitin is provided. Altogether, our data demonstrate that S5a is highly adaptive and cooperative toward binding ubiquitin chains. %B Molecular Cell %V 35 %P 280 - 290 %8 2009/08/14/ %@ 1097-2765 %G eng %U http://www.sciencedirect.com/science/article/pii/S1097276509004018 %N 3 %R 10.1016/j.molcel.2009.06.010 %0 Journal Article %J Visualization and Computer Graphics, IEEE Transactions on %D 2009 %T Supercubes: A High-Level Primitive for Diamond Hierarchies %A Weiss,K. %A De Floriani, Leila %K (computer %K adaptive %K approach;nested %K bisection %K crack-free %K datasets;computational %K decomposition;nested %K diamond %K generation;rendering %K geometry;mesh %K graphics); %K hierarchies;edge %K mesh;supercubes;tetrahedra %K meshes;polyhedral %K representations;multiresolution %K rule;highly %K sharing;volumetric %K tetrahedral %X Volumetric datasets are often modeled using a multiresolution approach based on a nested decomposition of the domain into a polyhedral mesh. Nested tetrahedral meshes generated through the longest edge bisection rule are commonly used to decompose regular volumetric datasets since they produce highly adaptive crack-free representations. Efficient representations for such models have been achieved by clustering the set of tetrahedra sharing a common longest edge into a structure called a diamond. The alignment and orientation of the longest edge can be used to implicitly determine the geometry of a diamond and its relations to the other diamonds within the hierarchy. We introduce the supercube as a high-level primitive within such meshes that encompasses all unique types of diamonds. A supercube is a coherent set of edges corresponding to three consecutive levels of subdivision. Diamonds are uniquely characterized by the longest edge of the tetrahedra forming them and are clustered in supercubes through the association of the longest edge of a diamond with a unique edge in a supercube. Supercubes are thus a compact and highly efficient means of associating information with a subset of the vertices, edges and tetrahedra of the meshes generated through longest edge bisection. We demonstrate the effectiveness of the supercube representation when encoding multiresolution diamond hierarchies built on a subset of the points of a regular grid. We also show how supercubes can be used to efficiently extract meshes from diamond hierarchies and to reduce the storage requirements of such variable-resolution meshes. %B Visualization and Computer Graphics, IEEE Transactions on %V 15 %P 1603 - 1610 %8 2009/// %@ 1077-2626 %G eng %N 6 %R 10.1109/TVCG.2009.186 %0 Conference Paper %B Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1 %D 2009 %T Supervised and unsupervised methods in employing discourse relations for improving opinion polarity classification %A Somasundaran,Swapna %A Namata,Galileo %A Wiebe,Janyce %A Getoor, Lise %X This work investigates design choices in modeling a discourse scheme for improving opinion polarity classification. For this, two diverse global inference paradigms are used: a supervised collective classification framework and an unsupervised optimization framework. Both approaches perform substantially better than baseline approaches, establishing the efficacy of the methods and the underlying discourse scheme. We also present quantitative and qualitative analyses showing how the improvements are achieved. %B Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1 %S EMNLP '09 %I Association for Computational Linguistics %C Stroudsburg, PA, USA %P 170 - 179 %8 2009/// %@ 978-1-932432-59-6 %G eng %U http://dl.acm.org/citation.cfm?id=1699510.1699533 %0 Journal Article %J International Journal of Computer Vision %D 2009 %T Surface reconstruction from gradient fields via gradient transformations %A Agrawal,A. %A Raskar, R. %A Chellapa, Rama %B International Journal of Computer Vision %8 2009/// %G eng %0 Journal Article %J Computer-Aided Design %D 2009 %T A survey of CAD model simplification techniques for physics-based simulation applications %A Thakur,Atul %A Banerjee,Ashis Gopal %A Gupta, Satyandra K. %K CAD model simplification %K Physics-based simulation %X Automated CAD model simplification plays an important role in effectively utilizing physics-based simulation during the product realization process. Currently a rich body of literature exists that describe many successful techniques for fully-automatic or semi-automatic simplification of CAD models for a wide variety of applications. The purpose of this paper is to compile a list of the techniques that are relevant for physics-based simulations problems and to characterize them based on their attributes. We have classified them into the following four categories: techniques based on surface entity based operators, volume entity based operators, explicit feature based operators, and dimension reduction operators. This paper also presents the necessary background information in the CAD model representation to assist the new readers. We conclude the paper by outlining open research directions in this field. %B Computer-Aided Design %V 41 %P 65 - 80 %8 2009/02// %@ 0010-4485 %G eng %U http://www.sciencedirect.com/science/article/pii/S0010448508002285 %N 2 %R 10.1016/j.cad.2008.11.009 %0 Journal Article %J Bioinspiration & Biomimetics %D 2009 %T A survey of snake-inspired robot designs %A Hopkins,James K. %A Spranklin,Brent W. %A Gupta, Satyandra K. %X Body undulation used by snakes and the physical architecture of a snake body may offer significant benefits over typical legged or wheeled locomotion designs in certain types of scenarios. A large number of research groups have developed snake-inspired robots to exploit these benefits. The purpose of this review is to report different types of snake-inspired robot designs and categorize them based on their main characteristics. For each category, we discuss their relative advantages and disadvantages. This review will assist in familiarizing a newcomer to the field with the existing designs and their distinguishing features. We hope that by studying existing robots, future designers will be able to create new designs by adopting features from successful robots. The review also summarizes the design challenges associated with the further advancement of the field and deploying snake-inspired robots in practice. %B Bioinspiration & Biomimetics %V 4 %P 021001 - 021001 %8 2009/06/01/ %@ 1748-3182, 1748-3190 %G eng %U http://iopscience.iop.org/1748-3182/4/2/021001 %N 2 %R 10.1088/1748-3182/4/2/021001 %0 Conference Paper %B Proceedings of the 6th USENIX symposium on Networked systems design and implementation %D 2009 %T Symbiotic relationships in internet routing overlays %A Lumezanu,Cristian %A Baden,Randy %A Levin,Dave %A Spring, Neil %A Bhattacharjee, Bobby %X We propose to construct routing overlay networks using the following principle: that overlay edges should be based on mutual advantage between pairs of hosts. Upon this principle, we design, implement, and evaluate Peer-Wise, a latency-reducing overlay network. To show the feasibility of PeerWise, we must show first that mutual advantage exists in the Internet: perhaps contrary to expectation, that there are not only "haves" and "have nots" of low-latency connectivity. Second, we must provide a scalable means of finding promising edges and overlay routes; we seek embedding error in network coordinates to expose both shorter-than-default "detour" routes and longer-than-expected default routes. We evaluate the cost of limiting PeerWise to mutually advantageous links, then build the intelligent components that put PeerWise into practice. We design and evaluate "virtual" network coordinates for destinations not participating in the overlay, neighbor selection algorithms to find promising relays, and relay selection algorithms to choose the neighbor to traverse for a good detour. Finally, we show that PeerWise is practical through a wide-area deployment and evaluation. %B Proceedings of the 6th USENIX symposium on Networked systems design and implementation %S NSDI'09 %I USENIX Association %C Berkeley, CA, USA %P 467 - 480 %8 2009/// %G eng %U http://dl.acm.org/citation.cfm?id=1558977.1559009 %0 Journal Article %J Machine Translation %D 2009 %T Symbolic-to-statistical hybridization: extending generation-heavy machine translation %A Habash,Nizar %A Dorr, Bonnie J %A Monz,Christof %X The last few years have witnessed an increasing interest in hybridizing surface-based statistical approaches and rule-based symbolic approaches to machine translation (MT). Much of that work is focused on extending statistical MT systems with symbolic knowledge and components. In the brand of hybridization discussed here, we go in the opposite direction: adding statistical bilingual components to a symbolic system. Our base system is Generation-heavy machine translation (GHMT), a primarily symbolic asymmetrical approach that addresses the issue of Interlingual MT resource poverty in source-poor/target-rich language pairs by exploiting symbolic and statistical target-language resources. GHMT’s statistical components are limited to target-language models, which arguably makes it a simple form of a hybrid system . We extend the hybrid nature of GHMT by adding statistical bilingual components. We also describe the details of retargeting it to Arabic–English MT. The morphological richness of Arabic brings several challenges to the hybridization task. We conduct an extensive evaluation of multiple system variants. Our evaluation shows that this new variant of GHMT—a primarily symbolic system extended with monolingual and bilingual statistical components—has a higher degree of grammaticality than a phrase-based statistical MT system, where grammaticality is measured in terms of correct verb-argument realization and long-distance dependency translation. %B Machine Translation %V 23 %P 23 - 63 %8 2009/// %@ 0922-6567 %G eng %U http://dx.doi.org/10.1007/s10590-009-9056-7 %N 1 %0 Journal Article %J Arxiv preprint arXiv:0905.1053 %D 2009 %T A synthesis for exactly 3-edge-connected graphs %A Kingsford, Carl %A Marçais,G. %B Arxiv preprint arXiv:0905.1053 %8 2009/// %G eng %0 Patent %D 2009 %T System and method for fast illumination-invariant background subtraction ... %A Lim,Ser-Nam %A Mittal,Anurag %A Davis, Larry S. %E Siemens Corporate Research, Inc. %X A method for eliminating errors in foreground object detection in digitized images comprises providing a reference camera and a secondary camera, vertically aligning each said camera with a baseline that is approximately perpendicular to a ground plane, wherein said reference camera is placed lower than said secondary camera, selecting a foreground pixel in a reference view of a first point in a foreground object, finding a conjugate pixel of the foreground pixel in a secondary view, using the foreground and conjugate pixels to determine an image base pixel of a base point in the reference view, wherein said base point is a point on the ground plane below the first point, and using the foreground and image base pixels to find a location where the ground plane is first visible. %V 11/282,513 %8 2009/03/31/ %G eng %U http://www.google.com/patents?id=8yK_AAAAEBAJ %N 7512250 %0 Patent %D 2009 %T System and Method for Spatio-Temporal-Context Aware Interaction of Users ... %A Agrawala, Ashok K. %A Varshney, Amitabh %A Almazan,Christian B. %E University of Maryland %X A multifunctional interaction system which is capable of spatio-temporal context localization of users and of communication of audio/video streams to an entity of interest defined by the user, includes a communication domain supporting a predefined localization service, a server associated with the communication domain, client devices, and a dynamically changing context database which is customized in accord with the dynamics of interaction sessions of client devices with the server. The client communicates with the system to either request services therefrom or to send a message to the entity of interest. The system is provided with a panic alert mechanism which, upon actuation, transmits an audio/video data stream along with the client location tag, time stamp, and client ID, to a police precinct for prompt action. %V 12/267,921 %8 2009/05/14/ %G eng %U http://www.google.com/patents?id=nZbGAAAAEBAJ %0 Patent %D 2009 %T SYSTEM AND METHOD FOR THREAD HANDLING IN MULTITHREADED PARALLEL COMPUTING OF NESTED THREADS %A Wen,Xingzhi %A Vishkin, Uzi %X An Explicit Multi-Threading (XMT) system and method is provided for processing multiple spawned threads associated with SPAWN-type commands of an XMT program. The method includes executing a plurality of child threads by a plurality of TCUs including a first TCU executing a child thread which is allocated to it; completing execution of the child thread by the first TCU; announcing that the first TCU is available to execute another child thread; executing by a second TCU a parent child thread that includes a nested spawn-type command for spawning additional child threads of the plurality of child threads, wherein the parent child thread is related in a parent-child relationship to the child threads that are spawned in conjunction with the nested spawn-type command; assigning a thread ID (TID) to each child thread, wherein the TID is unique with respect to the other TIDs; and allocating a new child thread to the first TCU. %V 12/158,004 %8 2009/05/14/ %G eng %U http://www.google.com/patents?id=qJjGAAAAEBAJ %0 Journal Article %J Journal of Mechanical Design %D 2009 %T A systematic approach for designing multifunctional thermally conducting polymer structures with embedded actuators %A Bejgerowski,W. %A Gupta,S.K. %A Bruck,H. A. %B Journal of Mechanical Design %V 131 %P 111009 - 111009 %8 2009/// %G eng %0 Conference Paper %B In Proceedings of the ACM International Workshop on Timing Issues in the Specification and Synthesis of Digital Systems, Austin, Texas, February 2009. %D 2009 %T System-level Clustering and Timing Analysis for GALS-based Dataflow Architectures %A Shen,C. %A Bhattacharyya, Shuvra S. %X In this paper, we propose an approach based ondataflow techniques for modeling application-specific, globally asynchronous, locally synchronous (GALS) architectures for digital signal processing (DSP) applications, and analyzing the performance of such architectures. Dataflow-based techniques are attractive for DSP applications because they allow applica- tion behavior to be represented formally, analyzed at a high level of abstraction, and synthesized to software/hardware implementations through an optimized, automated process. In our proposed methodology, we employ dataflow-based compu- tational models to expose relevant structure in the targeted applications, and facilitate the manual or automatic derivation of efficient implementations. We demonstrate the utility of our modeling and analysis techniques by applying them as core parts of a novel clustering algorithm that is geared towards optimizing the throughput of GALS-based DSP architectures. %B In Proceedings of the ACM International Workshop on Timing Issues in the Specification and Synthesis of Digital Systems, Austin, Texas, February 2009. %8 2009/// %G eng %0 Conference Paper %B Game Theory for Networks, 2009. GameNets '09. International Conference on %D 2009 %T Systems-compatible incentives %A Levin,D. %A Spring, Neil %A Bhattacharjee, Bobby %K computing; %K incentives;game %K Internet;distributed %K system;distributed %K systems;game %K systems;systems-compatible %K theory;incentive-compatible %K theory;peer-to-peer %X Selfish participants in a distributed system attempt to gain from the system without regard to how their actions may affect others. To maintain desirable system-wide properties in the presence of selfish users, designers are increasingly turning to the powerful mechanisms offered by economics and game theory. Combining the two fields of economics and systems design introduces new challenges of achieving incentive-compatibility in systems we can deploy in today's Internet. In this paper, we explore the interactions between systems and the mechanisms that give users incentives to cooperate. Using findings from recent work on incentive-compatible systems, we discuss several economic mechanisms and assumptions: money, punishment, and altruism. We seek to understand when these mechanisms violate system properties. Among the potential pitfalls we present is a phenomenon we call the price of altruism: altruistic peers can impose a loss of social good in some systems. We also discuss systems-compatible mechanisms that have been used in real, distributed systems, and attempt to extract the underlying design principles that have led to their success. %B Game Theory for Networks, 2009. GameNets '09. International Conference on %P 100 - 106 %8 2009/05// %G eng %R 10.1109/GAMENETS.2009.5137390 %0 Conference Paper %B Data Engineering, International Conference on %D 2008 %T Satisfying Complex Data Needs using Pull-Based Online Monitoring of Volatile Data Sources %A Roitman,Haggai %A Gal,Avigdor %A Raschid, Louiqa %X Emerging applications on the Web require better management of volatile data in pull-based environments. In a pull based setting, data may be periodically removed from the server. Data may also become obsolete, no longer serving client needs. In both cases, we consider such data to be volatile. To model such constraints on data usability, and support complex user needs we define profiles to specify which data sources are to be monitored and when. Using a novel abstraction of execution intervals we model complex profiles that access simultaneously several servers to gain from the used data. Given some budgetary constraints (e.g., bandwidth), the paper formalizes the problem of maximizing completeness. %B Data Engineering, International Conference on %I IEEE Computer Society %C Los Alamitos, CA, USA %P 1465 - 1467 %8 2008/// %@ 978-1-4244-1836-7 %G eng %R http://doi.ieeecomputersociety.org/10.1109/ICDE.2008.4497591 %0 Journal Article %J Bioinformatics %D 2008 %T Scaffolding and Validation of Bacterial Genome Assemblies Using Optical Restriction Maps %A Nagarajan,Niranjan %A Read,Timothy D. %A Pop, Mihai %X Motivation: New, high-throughput sequencing technologies have made it feasible to cheaply generate vast amounts of sequence information from a genome of interest. The computational reconstruction of the complete sequence of a genome is complicated by specific features of these new sequencing technologies, such as the short length of the sequencing reads and absence of mate-pair information. In this article we propose methods to overcome such limitations by incorporating information from optical restriction maps.Results: We demonstrate the robustness of our methods to sequencing and assembly errors using extensive experiments on simulated datasets. We then present the results obtained by applying our algorithms to data generated from two bacterial genomes Yersinia aldovae and Yersinia kristensenii. The resulting assemblies contain a single scaffold covering a large fraction of the respective genomes, suggesting that the careful use of optical maps can provide a cost-effective framework for the assembly of genomes. Availability: The tools described here are available as an open-source package at ftp://ftp.cbcb.umd.edu/pub/software/soma Contact: mpop@umiacs.umd.edu %B Bioinformatics %V 24 %P 1229 - 1235 %8 2008/05/15/ %@ 1367-4803, 1460-2059 %G eng %U http://bioinformatics.oxfordjournals.org/content/24/10/1229 %N 10 %R 10.1093/bioinformatics/btn102 %0 Journal Article %J International Journal of Cooperative Information Systems %D 2008 %T SCALABLE CATALOG INFRASTRUCTURE FOR MANAGING ACCESS COSTS AND SOURCE SELECTION IN WIDE AREA NETWORKS %A Zadorozhny,V. %A Raschid, Louiqa %A Gal,A. %B International Journal of Cooperative Information Systems %V 17 %P 77 - 109 %8 2008/// %G eng %N 1 %0 Conference Paper %B Computer Vision and Pattern Recognition Workshops, 2008. CVPRW'08. IEEE Computer Society Conference on %D 2008 %T Scalable classifiers for Internet vision tasks %A Tom Yeh %A Lee,John J %A Darrell,Trevor %X Object recognition systems designed for Internet applications typically need to adapt to userspsila needs in a flexible fashion and scale up to very large data sets. In this paper, we analyze the complexity of several multiclass SVM-based algorithms and highlight the computational bottleneck they suffer at test time: comparing the input image to every training image. We propose an algorithm that overcomes this bottleneck; it offers not only the efficiency of a simple nearest-neighbor classifier, by voting on class labels based on the k nearest neighbors quickly determined by a vocabulary tree, but also the recognition accuracy comparable to that of a complex SVM classifier, by incorporating SVM parameters into the voting scores incrementally accumulated from individual image features. Empirical results demonstrate that adjusting votes by relevant support vector weights can improve the recognition accuracy of a nearest-neighbor classifier without sacrificing speed. Compared to existing methods, our algorithm achieves a ten-fold speed increase while incurring an acceptable accuracy loss that can be easily offset by showing about two more labels in the result. The speed, scalability, and adaptability of our algorithm makes it suitable for Internet vision applications. %B Computer Vision and Pattern Recognition Workshops, 2008. CVPRW'08. IEEE Computer Society Conference on %I IEEE %P 1 - 8 %8 2008/06// %@ 978-1-4244-2339-2 %G eng %U http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4562958 %R 10.1109/CVPRW.2008.4562958 %0 Journal Article %J Future Generation Computer Systems %D 2008 %T A scalable key management and clustering scheme for wireless ad hoc and sensor networks %A Li,Jason H. %A Bhattacharjee, Bobby %A Yu,Miao %A Levy,Renato %K ad hoc networks %K clustering %K Group communications %K Key management %K sensor networks %X This paper describes a scalable key management and clustering scheme for secure group communications in ad hoc and sensor networks. The scalability problem is solved by partitioning the communicating devices into subgroups, with a leader in each subgroup, and further organizing the subgroups into hierarchies. Each level of the hierarchy is called a tier or layer. Key generation, distribution, and actual data transmissions follow the hierarchy. The distributed, efficient clustering approach (DECA) provides robust clustering to form subgroups, and analytical and simulation results demonstrate that DECA is energy-efficient and resilient against node mobility. Comparing with most other schemes, our approach is extremely scalable and efficient, provides more security guarantees, and is selective, adaptive and robust. %B Future Generation Computer Systems %V 24 %P 860 - 869 %8 2008/10// %@ 0167-739X %G eng %U http://www.sciencedirect.com/science/article/pii/S0167739X08000782 %N 8 %R 10.1016/j.future.2008.03.007 %0 Conference Paper %B Proceedings of the Conference on Empirical Methods in Natural Language Processing %D 2008 %T Scalable language processing algorithms for the masses: a case study in computing word co-occurrence matrices with MapReduce %A Jimmy Lin %X This paper explores the challenge of scaling up language processing algorithms to increasingly large datasets. While cluster computing has been available in commercial environments for several years, academic researchers have fallen behind in their ability to work on large datasets. I discuss two barriers contributing to this problem: lack of a suitable programming model for managing concurrency and difficulty in obtaining access to hardware. Hadoop, an open-source implementation of Google's MapReduce framework, provides a compelling solution to both issues. Its simple programming model hides system-level details from the developer, and its ability to run on commodity hardware puts cluster computing within the reach of many academic research groups. This paper illustrates these points with a case study in building word cooccurrence matrices from large corpora. I conclude with an analysis of an alternative computing model based on renting instead of buying computer clusters. %B Proceedings of the Conference on Empirical Methods in Natural Language Processing %S EMNLP '08 %I Association for Computational Linguistics %C Stroudsburg, PA, USA %P 419 - 428 %8 2008/// %G eng %U http://dl.acm.org/citation.cfm?id=1613715.1613769 %0 Conference Paper %B Proceedings of the 2008 ACM SIGMOD international conference on Management of data %D 2008 %T Scalable network distance browsing in spatial databases %A Samet, Hanan %A Sankaranarayanan,Jagan %A Alborzi,Houman %K decoupling %K nearest neighbor %K scalability %K shortest path quadtree %K spatial networks %X An algorithm is presented for finding the k nearest neighbors in a spatial network in a best-first manner using network distance. The algorithm is based on precomputing the shortest paths between all possible vertices in the network and then making use of an encoding that takes advantage of the fact that the shortest paths from vertex u to all of the remaining vertices can be decomposed into subsets based on the first edges on the shortest paths to them from u. Thus, in the worst case, the amount of work depends on the number of objects that are examined and the number of links on the shortest paths to them from q, rather than depending on the number of vertices in the network. The amount of storage required to keep track of the subsets is reduced by taking advantage of their spatial coherence which is captured by the aid of a shortest path quadtree. In particular, experiments on a number of large road networks as well as a theoretical analysis have shown that the storage has been reduced from O(N3) to O(N1.5) (i.e., by an order of magnitude equal to the square root). The precomputation of the shortest paths along the network essentially decouples the process of computing shortest paths along the network from that of finding the neighbors, and thereby also decouples the domain S of the query objects and that of the objects from which the neighbors are drawn from the domain V of the vertices of the spatial network. This means that as long as the spatial network is unchanged, the algorithm and underlying representation of the shortest paths in the spatial network can be used with different sets of objects. %B Proceedings of the 2008 ACM SIGMOD international conference on Management of data %S SIGMOD '08 %I ACM %C New York, NY, USA %P 43 - 54 %8 2008/// %@ 978-1-60558-102-6 %G eng %U http://doi.acm.org/10.1145/1376616.1376623 %R 10.1145/1376616.1376623 %0 Conference Paper %B Computer Vision, Graphics Image Processing, 2008. ICVGIP '08. Sixth Indian Conference on %D 2008 %T A Scalable Projective Bundle Adjustment Algorithm using the L infinity Norm %A Mitra, K. %A Chellapa, Rama %K adjustment %K algorithm;structure %K bundle %K complexity;convex %K complexity;iteration %K error;scalable %K estimation; %K estimation;cameras;computational %K Linfin %K method;large %K methods;parameter %K norm;camera;computational %K OPTIMIZATION %K parameter %K problem;memory %K problem;projection %K problem;reprojection %K programming;image %K projective %K reconstruction;iterative %K reconstruction;quasiconvex %K requirement;motion %K scale %X The traditional bundle adjustment algorithm for structure from motion problem has a computational complexity of O((m+n)3) per iteration and memory requirement of O(mn(m+n)), where m is the number of cameras and n is the number of structure points. The sparse version of bundle adjustment has a computational complexity of O(m3+mn) per iteration and memory requirement of O(mn). Here we propose an algorithm that has a computational complexity of O(mn(radicm+radicn)) per iteration and memory requirement of O(max(m,n)). The proposed algorithm is based on minimizing the Linfin norm of reprojection error. It alternately estimates the camera and structure parameters, thus reducing the potentially large scale optimization problem to many small scale subproblems each of which is a quasi-convex optimization problem and hence can be solved globally. Experiments using synthetic and real data show that the proposed algorithm gives good performance in terms of minimizing the reprojection error and also has a good convergence rate. %B Computer Vision, Graphics Image Processing, 2008. ICVGIP '08. Sixth Indian Conference on %P 79 - 86 %8 2008/12// %G eng %R 10.1109/ICVGIP.2008.51 %0 Conference Paper %B Proceedings of the 17th international conference on World Wide Web %D 2008 %T Scaling RDF with Time %A Pugliese,Andrea %A Udrea,Octavian %A V.S. Subrahmanian %K RDF indexing %K resource description framework %K temporal RDF %X The World Wide Web Consortium's RDF standard primarily consists of (subject, property, object) triples that specify the value that a given subject has for a given property. However, it is frequently the case that even for a fixed subject and property, the value varies with time. As a consequence, efforts have been made to annotate RDF triples with "valid time" intervals. However, to date, no proposals exist for efficient indexing of such temporal RDF databases. It is clearly beneficial to store RDF data in a relational DB - however, standard relational indexes are inadequately equipped to handle RDF's graph structure. In this paper, we propose the tGRIN index structure that builds a specialized index for temporal RDF that is physically stored in an RDBMS. Past efforts to store RDF in relational stores include Jena2 from HP, Sesame from OpenRDF.org, and 3store from the University of Southampton. We show that even when these efforts are augmented with well known temporal indexes like R+ trees, SR-trees, ST-index, and MAP21, the tGRIN index exhibits superior performance. In terms of index build time, tGRIN takes two thirds or less of the time used by any other system, and it uses a comparable amount of memory and less disk space than Jena, Sesame and 3store. More importantly, tGRIN can answer queries three to six times faster for average query graph patterns and five to ten times faster for complex queries than these systems. %B Proceedings of the 17th international conference on World Wide Web %S WWW '08 %I ACM %C New York, NY, USA %P 605 - 614 %8 2008/// %@ 978-1-60558-085-2 %G eng %U http://doi.acm.org/10.1145/1367497.1367579 %R 10.1145/1367497.1367579 %0 Journal Article %J IEEETransactions on Pattern Analysis and Machine Intelligence %D 2008 %T Script-Independent Text Line Segmentation in Freestyle Handwritten Documents %A Yi,L. %A Zheng,Y. %A David Doermann %A Jaeger,S. %X Text line segmentation in freestyle handwritten documents remains an open document analysis problem. Curvilinear text lines and small gaps between neighboring text lines present a challenge to algorithms developed for machine printed or hand-printed documents. In this paper, we propose a novel approach based on density estimation and a state-of-the-art image segmentation technique, the level set method. From an input document image, we estimate a probability map, where each element represents the probability of the underlying pixel belonging to a text line. The level set method is then exploited to determine the boundary of neighboring text lines by evolving an initial estimate. Unlike connected component based methods ( [1] and [2] for example), the proposed algorithm does not use any script-specific knowledge. Extensive quantitative experiments on freestyle handwritten documents with diverse scripts, such as Arabic, Chinese, Korean, and Hindi in the University of Maryland Multilingual database, demonstrate that our algorithm consistently outperforms previous methods [1]–[3]. Further experiments show the proposed algorithm is robust to scale change, rotation, and noise. %B IEEETransactions on Pattern Analysis and Machine Intelligence %P 1313 - 1329 %8 2008/08// %G eng %0 Journal Article %J AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc %D 2008 %T Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga %A Plaisant, Catherine %A Lam,Stanley %A Shneiderman, Ben %A Smith,Mark S. %A Roseman,David %A Marchand,Greg %A Gillam,Michael %A Feied,Craig %A Handler,Jonathan %A Rappaport,Hank %X As electronic health records (EHR) become more widespread, they enable clinicians and researchers to pose complex queries that can benefit immediate patient care and deepen understanding of medical treatment and outcomes. However, current query tools make complex temporal queries difficult to pose, and physicians have to rely on computer professionals to specify the queries for them. This paper describes our efforts to develop a novel query tool implemented in a large operational system at the Washington Hospital Center (Microsoft Amalga, formerly known as Azyxxi). We describe our design of the interface to specify temporal patterns and the visual presentation of results, and report on a pilot user study looking for adverse reactions following radiology studies using contrast. %B AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc %V 2008 %P 601 - 605 %8 2008/// %@ 1942-597X %G eng %0 Journal Article %J Computer Vision–ECCV 2008 %D 2008 %T Searching the world’s herbaria: A system for visual identification of plant species %A Belhumeur,P. %A Chen,D. %A Feiner,S. %A Jacobs, David W. %A Kress,W. %A Ling,H. %A Lopez,I. %A Ramamoorthi,R. %A Sheorey,S. %A White,S. %X We describe a working computer vision system that aids in the identification of plant species. A user photographs an isolated leaf on a blank background, and the system extracts the leaf shape and matches it to the shape of leaves of known species. In a few seconds, the system displays the top matching species, along with textual descriptions and additional images. This system is currently in use by botanists at the Smithsonian Institution National Museum of Natural History. The primary contributions of this paper are: a description of a working computer vision system and its user interface for an important new application area; the introduction of three new datasets containing thousands of single leaf images, each labeled by species and verified by botanists at the US National Herbarium; recognition results for two of the three leaf datasets; and descriptions throughout of practical lessons learned in constructing this system. %B Computer Vision–ECCV 2008 %P 116 - 129 %8 2008/// %G eng %R 10.1007/978-3-540-88693-8_9 %0 Journal Article %J Emerging Infectious DiseasesEmerg Infect Dis %D 2008 %T Seasonal Cholera from Multiple Small Outbreaks, Rural Bangladesh %A Stine,O. Colin %A Alam,Munirul %A Tang,Li %A Nair,G. Balakrish %A Siddique,A. Kasem %A Faruque,Shah M. %A Huq,Anwar %A Rita R Colwell %A Sack,R. Bradley %A Morris,J. Glenn %X Clinical and environmental Vibrio cholerae organisms collected from February 2004 through April 2005 were systematically isolated from 2 rural Bangladeshi locales. Their genetic relatedness was evaluated at 5 loci that contained a variable number of tandem repeats (VNTR). The observed minimal overlap in VNTR patterns between the 2 communities was consistent with sequential, small outbreaks from local sources. %B Emerging Infectious DiseasesEmerg Infect Dis %V 14 %P 831 - 833 %8 2008/05// %@ 1080-6040 %G eng %N 5 %R 10.3201/eid1405.071116 %0 Journal Article %J Special Interest Group on Data Communication %D 2008 %T Securing enterprise networks using traffic tainting %A Ramachandran,A. %A Mundada,Y. %A Tariq,M.B. %A Feamster, Nick %X Enterprise networks are vulnerable to attacks ranging from dataleaks to the spread of malware to insider threats. Previous defenses have largely focused on securing hosts; unfortunately, when hosts are compromised, these defenses become ineffective. Rather than attempting to harden the host against every possible attack (which is impractical) or constraining the software that can run on a host (which is inconvenient), we place a small amount of trusted code on the host to assist with tracking the provenance of network traf- fic, moving the rest of the trust and function to the network. We present Pedigree, a system that tracks information flow across pro- cesses and hosts within a network by annotating traffic with taints that reflect the process that generated the traffic and the inputs that process has taken (we call this function traffic tainting). A tagger on the host annotates network traffic with information about the “taints” that the sending process has acquired. Network devices act as arbiters to take appropriate actions (e.g., blocking) based on the taints associated with the traffic and the enterprise network’s secu- rity policy. We have implemented Pedigree’s host-based tagger as a Linux kernel module and the arbiter using the OpenFlow platform. This demonstration presents a prototype deployment of Pedigree that identifies and prevents both sensitive data leaks and the spread of malware in a typical enterprise network setting. The demon- stration will show that Pedigree can defend against these attacks without significant overhead at the host or the filtering device. %B Special Interest Group on Data Communication %8 2008/// %G eng %0 Journal Article %J AI Magazine %D 2008 %T A self-help guide for autonomous systems %A Anderson,M. L %A Fults,S. %A Josyula,D. P %A Oates,T. %A Perlis, Don %A Wilson,S. %A Wright,D. %B AI Magazine %V 29 %P 67 - 67 %8 2008/// %G eng %N 2 %0 Journal Article %J Molecular and Biochemical Parasitology %D 2008 %T Sequence diversity and evolution of multigene families in Trypanosoma cruzi %A Cerqueira,Gustavo C. %A Bartholomeu,Daniella C. %A DaRocha,Wanderson D. %A Hou,Lihua %A Freitas-Silva,Danielle M. %A Machado,Carlos Renato %A El‐Sayed, Najib M. %A Teixeira,Santuza M.R. %K Amastin %K Gene conversion %K Genetic diversity %K Multigene families %K Trypanosoma cruzi %X Several copies of genes belonging to three multigene families present in the genome of Trypanosoma cruzi were sequenced and comparatively analyzed across six different strains of the parasite belonging to the T. cruzi I lineage (Colombiana, Silvio X10 and Dm28c), the T. cruzi II lineage (Esmeraldo and JG) and a hybrid strain (CL Brener). For all three gene families analyzed, our results support the division in T. cruzi I and II lineages. Furthermore, in agreement with its hybrid nature, sequences derived from the CL Brener clone clustered together with T. cruzi II sequences as well as with a third group of sequences. Paralogous sequences encoding Amastin, an amastigote surface glycoprotein and TcAG48, an antigenic RNA binding protein, which are clustered in the parasite genome, present higher intragenomic variability in T. cruzi II and CL Brener strains, when compared to T. cruzi I strains. Paralogous sequences derived from the TcADC gene family, which encode various isoforms of adenylyl cyclases and are dispersed throughout the T. cruzi genome, exhibit similar degree of variability in all strains, except in the CL Brener strain, in which the sequences were more divergent. Several factors including mutation rates and gene conversion mechanisms, acting differently within the T. cruzi population, may contribute to create such distinct levels of sequence diversity in multigene families that are clustered in the T. cruzi genome. %B Molecular and Biochemical Parasitology %V 157 %P 65 - 72 %8 2008/01// %@ 0166-6851 %G eng %U http://www.sciencedirect.com/science/article/pii/S0166685107002769 %N 1 %R 16/j.molbiopara.2007.10.002 %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 2008 %T Sequential Kernel Density Approximation and Its Application to Real-Time Visual Tracking %A Han,Bohyung %A Comaniciu, D. %A Zhu,Ying %A Davis, Larry S. %K Automated;Reproducibility of Results;Sensitivity and Specificity;Statistical Distributions;Subtraction Technique; %K Computer-Assisted;Models %K Gaussian estimation;kernel density estimation;mean-shift mode finding algorithm;online target appearance modeling;probability density function;real-time computer vision application;real-time visual tracking;sequential kernel density approximation;visual f %K Statistical;Motion;Pattern Recognition %X Visual features are commonly modeled with probability density functions in computer vision problems, but current methods such as a mixture of Gaussians and kernel density estimation suffer from either the lack of flexibility by fixing or limiting the number of Gaussian components in the mixture or large memory requirement by maintaining a nonparametric representation of the density. These problems are aggravated in real-time computer vision applications since density functions are required to be updated as new data becomes available. We present a novel kernel density approximation technique based on the mean-shift mode finding algorithm and describe an efficient method to sequentially propagate the density modes over time. Although the proposed density representation is memory efficient, which is typical for mixture densities, it inherits the flexibility of nonparametric methods by allowing the number of components to be variable. The accuracy and compactness of the sequential kernel density approximation technique is illustrated by both simulations and experiments. Sequential kernel density approximation is applied to online target appearance modeling for visual tracking, and its performance is demonstrated on a variety of videos. %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %V 30 %P 1186 - 1197 %8 2008/07// %@ 0162-8828 %G eng %N 7 %R 10.1109/TPAMI.2007.70771 %0 Journal Article %J Circulation: Cardiovascular Genetics %D 2008 %T Sex and Age Dimorphism of Myocardial Gene Expression in Nonischemic Human Heart Failure %A Fermin,David R. %A Barac,Ana %A Lee,Sangjin %A Polster,Sean P. %A Hannenhalli, Sridhar %A Bergemann,Tracy L. %A Grindle,Suzanne %A Dyke,David B. %A Pagani,Francis %A Miller,Leslie W. %A Tan,Sarah %A dos Remedios,Cris %A Cappola,Thomas P. %A Margulies,Kenneth B. %A Hall,Jennifer L. %X Background— We report the first comprehensive analysis of gene expression differences by sex and age in left ventricular samples from 102 patients with dilated cardiomyopathy.Methods and Results— Gene expression data (HG-U133A gene chip, Affymetrix) were analyzed from 30 females and 72 males from 3 separate centers. More than 1800 genes displayed sexual dimorphism in the heart (adjusted P value <0.05). A significant number of these genes were highly represented in gene ontology pathways involved in ion transport and G-protein-coupled receptor signaling. Localization of these genes revealed enrichment on both the sex chromosomes as well as chromosomes 3, 4, and 14. The second goal of this study was to determine the effect of age on gene expression. Within the female cohort, >140 genes were differentially expressed in the <55 years age group compared with the >55 years age group. These genes were highly represented in gene ontology pathways involved in DNA damage. In contrast, zero genes in the male cohort <55 years met statistical significance when compared with the >55 years age group.Conclusions— Gene expression in dilated cardiomyopathy displayed evidence of sexual dimorphism similar to other somatic tissues and age dimorphism within the female cohort. %B Circulation: Cardiovascular Genetics %V 1 %P 117 - 125 %8 2008/12/01/ %G eng %U http://circgenetics.ahajournals.org/content/1/2/117.abstract %N 2 %R 10.1161/CIRCGENETICS.108.802652 %0 Book %D 2008 %T Shape Analysis and Structuring %A De Floriani, Leila %A Spagnuolo,Michela %K Computer Graphics %K Computer vision %K Computers / Computer Graphics %K Computers / Image Processing %K Geometrical models %K Geometry %K Geometry, Analytic %K Image analysis %K IMAGE PROCESSING %K Mathematics / Functional Analysis %K Mathematics / Geometry / General %K Mathematics / Graphic Methods %K Mathematics / Mathematical Analysis %K shapes %K Technology & Engineering / Engineering (General) %K Visualization %X With a lot of recent developments in the field, this much-needed book has come at just the right time. It covers a variety of topics related to preserving and enhancing shape information at a geometric level. The contributors also cover subjects that are relevant to effectively capturing the structure of a shape by identifying relevant shape components and their mutual relationships. %I Springer %8 2008/// %@ 9783540332640 %G eng %0 Journal Article %J Proc. of NIPS %D 2008 %T A “Shape Aware” Model for semi-supervised Learning of Objects and its Context %A Gupta,A. %A Shi,J. %A Davis, Larry S. %X We present an approach that combines bag-of-words and spatial models to performsemantic and syntactic analysis for recognition of an object based on its internal appearance and its context. We argue that while object recognition requires mod- eling relative spatial locations of image features within the object, a bag-of-word is sufficient for representing context. Learning such a model from weakly labeled data involves labeling of features into two classes: foreground(object) or “infor- mative” background(context). We present a “shape-aware” model which utilizes contour information for efficient and accurate labeling of features in the image. Our approach iterates between an MCMC-based labeling and contour based la- beling of features to integrate co-occurrence of features and shape similarity. %B Proc. of NIPS %8 2008/// %G eng %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 2008 %T Shape-and-Behavior Encoded Tracking of Bee Dances %A Veeraraghavan,A. %A Chellapa, Rama %A Srinivasan, M. %K Automated;Reproducibility of Results;Sensitivity and Specificity;Social Behavior; %K Computer-Assisted;Imaging %K Markov model;bee dance;behavior analysis;shape model;social insect;three-tier hierarchical motion model;tracking;video sequence;waggle dance;Markov processes;image sequences;optical tracking;video signal processing;zoology;Algorithms;Animal Communication; %K Three-Dimensional;Information Storage and Retrieval;Male;Pattern Recognition %X Behavior analysis of social insects has garnered impetus in recent years and has led to some advances in fields like control systems and flight navigation. Manual labeling of insect motions required for analyzing the behaviors of insects requires significant investment of time and effort. In this paper, we propose certain general principles that help in simultaneous automatic tracking and behavior analysis, with applications in tracking bees and recognizing specific behaviors that they exhibit. The state space for tracking is defined using the position, orientation, and current behavior of the insect being tracked. The position and the orientation are parameterized using a shape model, whereas the behavior is explicitly modeled using a three-tier hierarchical motion model. The first tier (dynamics) models the local motions exhibited, and the models built in this tier act as a vocabulary for behavior modeling. The second tier is a Markov motion model built on top of the local motion vocabulary, which serves as the behavior model. The third tier of the hierarchy models the switching between behaviors, and this is also modeled as a Markov model. We address issues in learning the three-tier behavioral model, in discriminating between models, and in detecting and modeling abnormal behaviors. Another important aspect of this work is that it leads to joint tracking and behavior analysis instead of the traditional "track-and-then-recognize" approach. We apply these principles for tracking bees in a hive while they are executing the waggle dance and the round dance. %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %V 30 %P 463 - 476 %8 2008/03// %@ 0162-8828 %G eng %N 3 %R 10.1109/TPAMI.2007.70707 %0 Conference Paper %B The 10th European Conference on Computer Vision (ECCV 2008) %D 2008 %T Signature-based Document Image Retrieval %A Zhu,Guangyu %A Yefeng Zheng %A David Doermann %X As the most pervasive method of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. In this work, we developed a fully automatic signature-based document image retrieval system that handles: 1) Automatic detection and segmentation of signatures from document images and 2) Translation, scale, and rotation invariant signature matching for document image retrieval. We treat signature retrieval in the unconstrained setting of non-rigid shape matching and retrieval, and quantitatively study shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple query instances in document image retrieval. Extensive experiments using large real world collections of English and Arabic machine printed and handwritten documents demonstrate the excellent performance of our system. To the best of our knowledge, this is the first automatic retrieval system for general document images by using signatures as queries, without manual annotation of the image collection. %B The 10th European Conference on Computer Vision (ECCV 2008) %C Marseille, France %P 752 - 765 %8 2008/// %G eng %0 Journal Article %J BioScience %D 2008 %T Silent Sputnik %A Rita R Colwell %B BioScience %V 58 %P 3 - 3 %8 2008/// %@ 0006-3568 %G eng %U http://www.bioone.org/doi/abs/10.1641/B580101 %N 1 %R 10.1641/B580101 %0 Journal Article %J Journal of Microbiological Methods %D 2008 %T A simple binomial test for estimating sequencing errors in public repository 16S rRNA sequences %A Zo,Young-Gun %A Rita R Colwell %K 16S rRNA %K Binomial model %K Sequence similarity coefficient %K Sequencing error %K SSU rRNA %X Sequences in public databases may contain a number of sequencing errors. A double binomial model describing the distribution of indel-excluded similarity coefficients (S) among repeatedly sequenced 16S rRNA was previously developed and it produced a confidence interval of S useful for testing sequence identity among sequences of 400-bp length. We characterized patterns in sequencing errors found in nearly complete 16S rRNA sequences of Vibrionaceae as highly variable in reported sequence length and containing a small number of indels. To accommodate these characteristics, a simple binomial model for distribution of the similarity coefficient (H) that included indels was derived from the double binomial model for S. The model showed good fit to empirical data. By using either a pre-determined or bootstrapping estimated standard probability of base matching, we were able to use the exact binomial test to determine the relative level of sequencing error for a given pair of duplicated sequences. A limitation of the method is the requirement that duplicated sequences for the same template sequence be paired, but this can be overcome by using only conserved regions of 16S rRNA sequences and pairing a given sequence with its highest scoring BLAST search hit from the nr database of GenBank. %B Journal of Microbiological Methods %V 72 %P 166 - 179 %8 2008/02// %@ 0167-7012 %G eng %U http://www.sciencedirect.com/science/article/pii/S0167701207003910 %N 2 %R 10.1016/j.mimet.2007.11.013 %0 Journal Article %J Information Processing & Management %D 2008 %T Single-document and multi-document summarization techniques for email threads using sentence compression %A Zajic, David %A Dorr, Bonnie J %A Jimmy Lin %K Email summarization %K Enron %K Informal media %K Sentence compression %K Trimming %X We present two approaches to email thread summarization: collective message summarization (CMS) applies a multi-document summarization approach, while individual message summarization (IMS) treats the problem as a sequence of single-document summarization tasks. Both approaches are implemented in our general framework driven by sentence compression. Instead of a purely extractive approach, we employ linguistic and statistical methods to generate multiple compressions, and then select from those candidates to produce a final summary. We demonstrate these ideas on the Enron email collection – a very challenging corpus because of the highly technical language. Experimental results point to two findings: that CMS represents a better approach to email thread summarization, and that current sentence compression techniques do not improve summarization performance in this genre. %B Information Processing & Management %V 44 %P 1600 - 1610 %8 2008/07// %@ 0306-4573 %G eng %U http://www.sciencedirect.com/science/article/pii/S0306457307001768 %N 4 %R 10.1016/j.ipm.2007.09.007 %0 Report %D 2008 %T SNARE: Spatio-temporal Network-level Automatic Reputation Engine %A Feamster, Nick %A Gray,A.G. %A Krasser,S. %A Syed,N.A. %X Current spam filtering techniques classify email based oncontent and IP reputation blacklists or whitelists. Unfortu- nately, spammers can alter spam content to evade content- based filters, and spammers continually change the IP ad- dresses from which they send spam. Previous work has sug- gested that filters based on network-level behavior might be more efficient and robust, by making decisions based on how messages are sent, as opposed to what is being sent or who is sending them. This paper presents a technique to identify spammers based on features that exploit the network-level spatio- temporal behavior of email senders to differentiate the spam- ming IPs from legitimate senders. Our behavioral classifier has two benefits: (1) it is early (i.e., it can automatically detect spam without seeing a large amount of email from a sending IP address—sometimes even upon seeing only a single packet); (2) it is evasion-resistant (i.e., it is based on spatial and temporal features that are difficult for a sender to change). We build classifiers based on these features us- ing two different machine learning methods, support vec- tor machine and decision trees, and we study the efficacy of these classifiers using labeled data from a deployed com- mercial spam-filtering system. Surprisingly, using only fea- tures from a single IP packet header (i.e., without looking at packet contents), our classifier can identify spammers with about 93% accuracy and a reasonably low false-positive rate (about 7%). After looking at a single message spammer identification accuracy improves to more than 94% with a false rate of just over 5%. These suggest an effective sender reputation mechanism. %I Georgia Institute of Technology %V GT-CSE-08-02 %8 2008/// %G eng %U http://hdl.handle.net/1853/25135 %0 Journal Article %J Proceedings of ACL-08: HLT %D 2008 %T Soft syntactic constraints for hierarchical phrased-based translation %A Marton,Y. %A Resnik, Philip %B Proceedings of ACL-08: HLT %P 1003 - 1011 %8 2008/// %G eng %0 Conference Paper %B First Intl. Workshop on Social Computing, Behavioral Modeling and Prediction %D 2008 %T The soma terror organization portal (stop): Social network and analytic tools for the real-time analysis of terror groups %A Martinez,V. %A Simari,G. %A Sliva,A. %A V.S. Subrahmanian %X Stochastic Opponent Modeling Agents (SOMA) have been proposed as a paradigm for reasoning about cultural groups, terror groups, and other socioeconomic-political-military organizations worldwide. In this paper, we describe the SOMA Terror Organization Portal (STOP). STOP provides a single point of contact through which analysts may access data about terror groups world wide. In order to analyze this data, SOMA provides three major components: the SOMA Extraction Engine (SEE), the SOMA Adversarial Forecast Engine (SAFE), and the SOMA Analyst NEtwork (SANE) that allows analysts to find other analysts doing similar work, share findings with them, and let consensus findings emerge. This paper describes the STOP framework. %B First Intl. Workshop on Social Computing, Behavioral Modeling and Prediction %8 2008/// %G eng %R 10.1007/978-0-387-77672-9_2 %0 Journal Article %J Social Computing, Behavioral Modeling, and Prediction %D 2008 %T The SOMA Terror Organization Portal (STOP): social network and analytic tools for the real-time analysis of terror groups %A Sliva,A. %A V.S. Subrahmanian %A Martinez,V. %A Simari,G. I %X Stochastic Opponent Modeling Agents (SOMA) have been proposed as a paradigm for reasoning about cultural groups, terror groups, and other socioeconomic-political-military organizations worldwide. In this paper, we describe the SOMA Terror Organization Portal (STOP). STOP provides a single point of contact through which analysts may access data about terror groups world wide. In order to analyze this data, SOMA provides three major components: the SOMA Extraction Engine (SEE), the SOMA Adversarial Forecast Engine (SAFE), and the SOMA Analyst NEtwork (SANE) that allows analysts to find other analysts doing similar work, share findings with them, and let consensus findings emerge. This paper describes the STOP framework. %B Social Computing, Behavioral Modeling, and Prediction %P 9 - 18 %8 2008/// %G eng %R 10.1007/978-0-387-77672-9_2 %0 Conference Paper %B ACM SIGGRAPH 2008 classes %D 2008 %T A sorting approach to indexing spatial data %A Samet, Hanan %X Spatial data is distinguished from conventional data by having extent. Therefore, spatial queries involve both the objects and the space that they occupy. The handling of queries that involve spatial data is facilitated by building an index on the data. The traditional role of the index is to sort the data, which means that it orders the data. However, since generally no ordering exists in dimensions greater than 1 without a transformation of the data to one dimension, the role of the sort process is one of differentiating between the data and what is usually done is to sort the spatial objects with respect to the space that they occupy. The resulting ordering is usually implicit rather than explicit so that the data need not be resorted (i.e., the index need not be rebuilt) when the queries change (e.g., the query reference objects). The index is said to order the space and the characteristics of such indexes are explored further. %B ACM SIGGRAPH 2008 classes %S SIGGRAPH '08 %I ACM %C New York, NY, USA %P 91:1–91:15 - 91:1–91:15 %8 2008/// %G eng %U http://doi.acm.org/10.1145/1401132.1401250 %R 10.1145/1401132.1401250 %0 Conference Paper %B IEEE International Conference on Acoustics, Speech and Signal Processing, 2008. ICASSP 2008 %D 2008 %T Sound field decomposition using spherical microphone arrays %A Zotkin,Dmitry N %A Duraiswami, Ramani %A Gumerov, Nail A. %K Acoustic applications %K Acoustic arrays %K Acoustic fields %K acoustic position measurement %K Acoustic propagation %K acoustic signal processing %K acoustic waves %K array signal processing %K Equations %K far-field signature function %K Layout %K least-squares fitting %K microphone arrays %K scene reconstruction algorithms %K Signal processing algorithms %K sound field decomposition %K spherical microphone arrays %K Surface acoustic waves %X Spherical microphone arrays offer a number of attractive properties such as direction-independent acoustic behavior and ability to reconstruct the sound field in the vicinity of the array. Such ability is necessary in applications such as ambisonics and recreating auditory environment over headphones. We compare the performance of two scene reconstruction algorithms - one based on least-squares fitting the observed potentials and another based on computing the far-field signature function directly from the microphone measurements. A number of features important for the design and operation of spherical microphone arrays in real applications are revealed. Results indicate that it is possible to reconstruct the sound scene up to order p with p2 microphones. %B IEEE International Conference on Acoustics, Speech and Signal Processing, 2008. ICASSP 2008 %I IEEE %P 277 - 280 %8 2008/// %@ 978-1-4244-1483-3 %G eng %R 10.1109/ICASSP.2008.4517600 %0 Journal Article %J Algorithms-ESA 2008 %D 2008 %T Space-time tradeoffs for proximity searching in doubling spaces %A Arya,S. %A Mount, Dave %A Vigneron,A. %A Xia,J. %X We consider approximate nearest neighbor searching in metric spaces of constant doubling dimension. More formally, we are given a set S of n points and an error bound ε> 0. The objective is to build a data structure so that given any query point q in the space, it is possible to efficiently determine a point of S whose distance from q is within a factor of (1 + ε) of the distance between q and its nearest neighbor in S. In this paper we obtain the following space-time tradeoffs. Given a parameter γ ∈ [2,1/ε], we show how to construct a data structure of space nO(dim)log(1) space that can answer queries in time O(log(n))+(1())O(dim) . This is the first result that offers space-time tradeoffs for approximate nearest neighbor queries in doubling spaces. At one extreme it nearly matches the best result currently known for doubling spaces, and at the other extreme it results in a data structure that can answer queries in time O(log(n/ε)), which matches the best query times in Euclidean space. Our approach involves a novel generalization of the AVD data structure from Euclidean space to doubling space. %B Algorithms-ESA 2008 %P 112 - 123 %8 2008/// %G eng %R 10.1007/978-3-540-87744-8_10 %0 Conference Paper %B Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems %D 2008 %T Sparse terrain pyramids %A Weiss,Kenneth %A De Floriani, Leila %K diamond hierarchies %K longest edge bisection %K multiresolution terrain models %K nested triangle meshes %X Bintrees based on longest edge bisection and hierarchies of diamonds are popular multiresolution techniques on regularly sampled terrain datasets. In this work, we consider Sparse Terrain Pyramids as a compact multiresolution representation for terrain datasets whose samples are a subset of those lying on a regular grid. While previous diamond-based approaches can efficiently represent meshes built on a complete grid of resolution (2k +1)2, this is not suitable when the field values are uniform in large areas or simply non-existent. We explore properties of diamonds to simplify an encoding of the implicit dependency relationship between diamonds. Additionally, we introduce a diamond clustering technique to further reduce the geometric and topological overhead of such representations. We demonstrate the coherence of our clustering technique as well as the compactness of our representation. %B Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems %S GIS '08 %I ACM %C New York, NY, USA %P 15:1–15:10 - 15:1–15:10 %8 2008/// %@ 978-1-60558-323-5 %G eng %U http://doi.acm.org/10.1145/1463434.1463454 %R 10.1145/1463434.1463454 %0 Conference Paper %B Hands-Free Speech Communication and Microphone Arrays, 2008. HSCMA 2008 %D 2008 %T Spherical Arrays Near Boundaries %A Duraiswami, Ramani %A Gumerov, Nail A. %A O'Donovan,A. %K analysis;audio %K analysis;microphone %K array %K arrays; %K arrays;sound %K arrays;spherical %K cameras;beamforming;solid %K capture;spherical %K field %K microphone %K spherical %X Summary form only given. Solid spherical microphone arrays are beginning to be used for purposes such as beamforming, sound field capture and as audio cameras. They rely on the scattering of sound off their surface to achieve their purpose. This behavior is significantly affected in the presence of boundaries (floors, walls, ceilings), and the edges and corners they form. Algorithms designed for array analysis in a free field will work erroneously in this situation. We describe adaptation of the spherical microphone analysis algorithms to constructively use the scattering off the boundaries to significantly improve array performance. We also assess the influence of walls on beamforming algorithms for regular spherical arrays. Both synthetic and experimental results are presented. %B Hands-Free Speech Communication and Microphone Arrays, 2008. HSCMA 2008 %P 1 - 1 %8 2008/05// %G eng %R 10.1109/HSCMA.2008.4538675 %0 Journal Article %J Proc. ICAD %D 2008 %T Spherical microphone array based immersive audio scene rendering %A O’donovan,A.M. %A Zotkin,Dmitry N %A Duraiswami, Ramani %X In many applications such as entertainment, education, mil-itary training, remote telepresence, surveillance, etc. it is necessary to capture an acoustic field and present it to listen- ers with a goal of creating the same acoustic perception for them as if they were actually present at the scene. Currently, there is much interest in the use of spherical microphone ar- rays for acoustic scene capture and reproduction. We de- scribe a 32-microphone spherical array based system im- plemented for spatial audio capture and reproduction. Our array embeds hardware that is traditionally external, such as preamplifiers, filters, digital-to-analog converters, and USB adaptor, resulting in a portable lightweight solution and re- quiring no hardware on the PC side whatsoever other than a high-speed USB port. We provide capability analysis of the array and describe software suite developed for the applica- tion. %B Proc. ICAD %8 2008/// %G eng %0 Report %D 2008 %T A spherical microphone array based system for immersive audio scene rendering %A O'donovan,Adam %A Zotkin,Dmitry N %A Duraiswami, Ramani %K Technical Report %X For many applications it is necessary to capture an acoustic field and present it for human listeners, creating the same acoustic perception for them as if they were actually present in the scene. Possible applications of this technique include entertainment, education, military training, remote telepresence, surveillance, and others. Recently, there is much interest on the use of spherical microphone arrays in acoustic scene capture and reproduction application. We describe a 32-microphone spherical array based system implemented for spatial audio capture and reproduction. The array embeds hardware that is traditionally external, such as preamplifiers, filters, digital-to-analog converters, and USB interface adapter, resulting in a portable lightweight solution and requiring no hardware on PC side whatsoever other than a high-speed USB port. We provide capability analysis of the array and describe software suite developed for the application. %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %V UMIACS-TR-2008-09 %8 2008/03/25/ %G eng %U http://drum.lib.umd.edu//handle/1903/7556 %0 Conference Paper %B Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on %D 2008 %T Statistical analysis on Stiefel and Grassmann manifolds with applications in computer vision %A Turaga,P. %A Veeraraghavan,A. %A Chellapa, Rama %K algorithm;learning %K analysis;computer %K analysis;statistical %K analysis;video %K based %K classification;image %K classification;spatio-temporal %K distribution %K distributions; %K Face %K functions;shape %K Grassmann %K invariant %K manifold;activity %K manifold;Stiefel %K matching;inference %K matching;spatiotemporal %K measures;estimation %K modeling;statistical %K parameters;pattern %K phenomena;statistical %K recognition;affine %K recognition;computer %K recognition;probability %K SHAPE %K structure;image %K technique;geometric %K theory;manifold-valued %K vision;distance %K vision;image %X Many applications in computer vision and pattern recognition involve drawing inferences on certain manifold-valued parameters. In order to develop accurate inference algorithms on these manifolds we need to a) understand the geometric structure of these manifolds b) derive appropriate distance measures and c) develop probability distribution functions (pdf) and estimation techniques that are consistent with the geometric structure of these manifolds. In this paper, we consider two related manifolds - the Stiefel manifold and the Grassmann manifold, which arise naturally in several vision applications such as spatio-temporal modeling, affine invariant shape analysis, image matching and learning theory. We show how accurate statistical characterization that reflects the geometry of these manifolds allows us to design efficient algorithms that compare favorably to the state of the art in these very different applications. In particular, we describe appropriate distance measures and parametric and non-parametric density estimators on these manifolds. These methods are then used to learn class conditional densities for applications such as activity recognition, video based face recognition and shape classification. %B Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on %P 1 - 8 %8 2008/06// %G eng %R 10.1109/CVPR.2008.4587733 %0 Report %D 2008 %T Statistical Relational Learning as an Enabling Technology for Data Acquisition and Data Fusion in Heterogeneous Sensor Networks %A Jacobs, David W. %A Getoor, Lise %K *ALGORITHMS %K *CLASSIFICATION %K data acquisition %K DATA FUSION %K Detectors %K Feature extraction %K HMM(HIDDEN MARKOV MODELS) %K NETWORKS %K NUMERICAL MATHEMATICS %K PE611102 %K RANDOM FIELDS %K STATISTICS AND PROBABILITY %K TEST SETS %K VIDEO SIGNALS %X Our work has focused on developing new cost sensitive feature acquisition and classification algorithms, mapping these algorithms onto camera networks, and creating a test bed of video data and implemented vision algorithms that we can use to implement these. First, we will describe a new algorithm that we have developed for feature acquisition in Hidden Markov Models (HMMs). This is particularly useful for inference tasks involving video from a single camera, in which the relationship between frames of video can be modeled as a Markov chain. We describe this algorithm in the context of using background subtraction results to identify portions of video that contain a moving object. Next, we will describe new algorithms that apply to general graphical models. These can be tested using existing test sets that are drawn from a range of domains in addition to sensor networks. %I OFFICE OF RESEARCH ADMINISTRATION AND ADVANCEMENT, UNIVERSITY OF MARYLAND COLLEGE PARK %8 2008/06/29/ %G eng %U http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA500520 %0 Conference Paper %B Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on %D 2008 %T Stochastic fusion of multi-view gradient fields %A Sankaranarayanan,A. C %A Chellapa, Rama %K application;brightness;cameras;gradient %K application;image %K camera %K estimators;multiview %K fields;projective %K fusion;image %K fusion;textured %K gradient %K gradients;linear %K gradients;scene %K imaging;scene %K map;stochastic %K methods;image %K noise;graphics %K planar %K radiance;scene %K reconstruction;image %K reconstruction;scene %K scene;vision %K TEXTURE %K texture; %K view;corrupting %X Image gradients form powerful cues in a host of vision and graphics applications. In this paper, we consider multiple views of a textured planar scene and consider the problem of estimating the scene texture map using these multi-view inputs. Modeling each camera view as a projective transformation of the scene, we show that the problem is equivalent to that of studying the effect of noise (and the projective imaging) on the gradient fields induced by this texture map. We show that these noisy gradient fields can be modeled as complete observers of the scene radiance. Further, the corrupting noise can be shown to be additive and linear, although spatially varying. However, the specific form of the noise term can be exploited to design linear estimators that fuse the gradient fields obtained from each of the individual views. The fused gradient field forms a robust estimate of the scene gradients and can be used for scene reconstruction. %B Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on %P 1324 - 1327 %8 2008/10// %G eng %R 10.1109/ICIP.2008.4712007 %0 Journal Article %J Proceedings of ICCCD %D 2008 %T Stochastic opponent modeling agents: A case study with Hamas %A Mannes,A. %A Sliva,A. %A V.S. Subrahmanian %A Wilkenfeld,J. %X Stochastic Opponent Modeling Agents (SOMA) have beenproposed as a paradigm for reasoning about cultural groups, terror groups, and other socio-economic-political-military organizations worldwide. In this paper, we describe a case study that shows how SOMA was used to model the behavior of the terrorist organization, Hamas. Our team, consisting of a mix of computer scientists, policy experts, and political scientists, were able to understand new facts about Hamas of which even seasoned Hamas experts may not have been aware. This paper briefly overviews SOMA rules, explains how several thousand SOMA rules for Hamas were automatically derived, and then describes a few key findings about Hamas, enabled by this framework. %B Proceedings of ICCCD %8 2008/// %G eng %0 Journal Article %J Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques %D 2008 %T Streaming algorithms for k-center clustering with outliers and with anonymity %A Matthew McCutchen,R. %A Khuller, Samir %X Clustering is a common problem in the analysis of large data sets. Streaming algorithms, which make a single pass over the data set using small working memory and produce a clustering comparable in cost to the optimal offline solution, are especially useful. We develop the first streaming algorithms achieving a constant-factor approximation to the cluster radius for two variations of the k-center clustering problem. We give a streaming (4 + ε)-approximation algorithm using O(ε − 1 kz) memory for the problem with outliers, in which the clustering is allowed to drop up to z of the input points; previous work used a random sampling approach which yields only a bicriteria approximation. We also give a streaming (6 + ε)-approximation algorithm using O(ε − 1 ln (ε − 1) k + k 2) memory for a variation motivated by anonymity considerations in which each cluster must contain at least a certain number of input points. %B Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques %P 165 - 178 %8 2008/// %G eng %R 10.1007/978-3-540-85363-3_14 %0 Journal Article %J Probabilistic, Logical and Relational Learning-A Further Synthesis %D 2008 %T Structural Sampling for Statistical Software Testing %A Baskiotis,N. %A Sebag,M. %A De Raedt,L. %A Dietterich,T. %A Getoor, Lise %A Kersting,K. %A Muggleton,S. H %X Structural Statistical Software Testing exploits the control flow graph of the program being tested to construct test cases. While test cases can easily be extracted from {em feasible paths} in the control flow graph, that is, paths which are actually exerted for some values of the program input, the feasible path region is a tiny fraction of the graph paths (less than $10^{-5}]$ for medium size programs). The S4T algorithm presented in this paper aims to address this limitation; as an Active Relational Learning Algorithm, it uses the few feasible paths initially available to sample new feasible paths. The difficulty comes from the non-Markovian nature of the feasible path concept, due to the long-range dependencies between the nodes in the control flow graph. Experimental validation on real-world and artificial problems demonstrates significant improvements compared to the state of the art. %B Probabilistic, Logical and Relational Learning-A Further Synthesis %8 2008/// %G eng %0 Journal Article %J Machine Learning %D 2008 %T Structured machine learning: the next ten years %A Dietterich,T. G %A Domingos,P. %A Getoor, Lise %A Muggleton,S. %A Tadepalli,P. %X The field of inductive logic programming (ILP) has made steady progress, since the first ILP workshop in 1991, based on a balance of developments in theory, implementations and applications. More recently there has been an increased emphasis on Probabilistic ILP and the related fields of Statistical Relational Learning (SRL) and Structured Prediction. The goal of the current paper is to consider these emerging trends and chart out the strategic directions and open problems for the broader area of structured machine learning for the next 10 years. %B Machine Learning %V 73 %P 3 - 23 %8 2008/// %G eng %N 1 %R 10.1007/s10994-008-5079-1 %0 Conference Paper %D 2008 %T A Survey of the Virtual Environments-based Assembly Training Applications %A Gupta,S.K. %A Anand,D. K. %A Brough,J. E. %A Kavetsky,R. A. %A Schwartz,M. %A Thakur,A. %X The advent of virtual environments is presenting new ways of trainingtomorrow’s workforce. Virtual environments offer numerous benefits in training applications. First, virtual environments allow extensive user interactions in a very convenient and natural manner. This interaction is greatly beneficial for increasing the user’s retention of spatial information compared to text-based or video-based instructions that are non-interactive in nature. Second, virtual environments provide users with a 3D immersive experience. This feature helps users gain a better understanding of spatial relationships compared to 2D displays. Third, virtual environments support multi-media instructions. One can watch standard videos, view 3D animations, view text instructions, listen to audio instructions, and interact with 3D objects in the scene. This paper describes representative research and associated systems that use of virtual environments in assembly training applications. %8 2008/// %G eng %U http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.151.2892&rep=rep1&type=pdf %0 Conference Paper %B In Proceedings of the 23rd AAAI Conference on Artificial Intelligence (Student Abstract %D 2008 %T The swarm application framework %A Miner,D. %A desJardins, Marie %X The Swarm Application Framework (SAF) is a tool that makes the development of swarm applications more intuitive. Traditionally, swarm applications are created by programming several low-level rules. This approach leads to several problems in designing and testing swarms, which serve as inspiration for the features of SAF. SAF encourages a new paradigm for designing swarm applications: engineers can interact with a swarm at the abstract (swarm) level instead of the individual (agent) level. In this paper, we discuss the design of the framework, how agents and rules in SAF operate, and a planned rule abstraction feature. %B In Proceedings of the 23rd AAAI Conference on Artificial Intelligence (Student Abstract %8 2008/// %G eng %0 Journal Article %J Multimedia, IEEE Transactions on %D 2008 %T Synthesis of Silhouettes and Visual Hull Reconstruction for Articulated Humans %A Yue,Zhanfeng %A Chellapa, Rama %K active %K algorithm;articulated %K algorithm;inner %K body %K camera;visual %K collection;virtual %K computation;contour-based %K Context %K detection;image %K distance %K distance;turntable %K estimation;shape %K function %K hull %K human %K image %K image;approximate %K localization %K measurement;silhouette %K measurement;turning %K part %K pose;circular %K reality; %K recognition;virtual %K reconstruction;approximation %K reconstruction;image %K segmentation %K segmentation;pose %K SHAPE %K similarity %K synthesis;silhouette %K technique;human %K theory;cameras;edge %K Trajectory %X In this paper, we propose a complete framework for improved synthesis and understanding of the human pose from a limited number of silhouette images. It combines the active image-based visual hull (IBVH) algorithm and a contour-based body part segmentation technique. We derive a simple, approximate algorithm to decide the extrinsic parameters of a virtual camera, and synthesize the turntable image collection of the person using the IBVH algorithm by actively moving the virtual camera on a properly computed circular trajectory around the person. Using the turning function distance as the silhouette similarity measurement, this approach can be used to generate the desired pose-normalized images for recognition applications. In order to overcome the inability of the visual hull (VH) method to reconstruct concave regions, we propose a contour-based human body part localization algorithm to segment the silhouette images into convex body parts. The body parts observed from the virtual view are generated separately from the corresponding body parts observed from the input views and then assembled together for a more accurate VH reconstruction. Furthermore, the obtained turntable image collection helps to improve the body part segmentation and identification process. By using the inner distance shape context (IDSC) measurement, we are able to estimate the body part locations more accurately from a synthesized view where we can localize the body part more precisely. Experiments show that the proposed algorithm can greatly improve body part segmentation and hence shape reconstruction results. %B Multimedia, IEEE Transactions on %V 10 %P 1565 - 1577 %8 2008/12// %@ 1520-9210 %G eng %N 8 %R 10.1109/TMM.2008.2007321 %0 Conference Paper %D 2008 %T Synthesis of strategies from interaction traces %A Au,Tsz-Chiu %A Kraus,Sarit %A Nau, Dana S. %K agents %K interaction %K learning %K multi-agent systems %K prisoner's dilemma %K repeated games %X We describe how to take a set of interaction traces produced by different pairs of players in a two-player repeated game, and combine them into a composite strategy. We provide an algorithm that, in polynomial time, can generate the best such composite strategy. We describe how to incorporate the composite strategy into an existing agent, as an enhancement of the agent's original strategy. We provide experimental results using interaction traces from 126 agents (most of them written by students as class projects) for the Iterated Prisoner's Dilemma, Iterated Chicken Game, and Iterated Battle of the Sexes. We compared each agent with the enhanced version of that agent produced by our algorithm. The enhancements improved the agents' scores by about 5% in the IPD, 11% in the ICG, and 26% in the IBS, and improved their rank by about 12% in the IPD, 38% in the ICG, and 33% in the IBS. %S AAMAS '08 %I International Foundation for Autonomous Agents and Multiagent Systems %C Richland, SC %P 855 - 862 %8 2008/// %@ 978-0-9817381-1-6 %G eng %U http://dl.acm.org/citation.cfm?id=1402298.1402343 %0 Conference Paper %B Proceedings of the 13th international conference on Intelligent user interfaces %D 2008 %T Systematic yet flexible discovery: guiding domain experts through exploratory data analysis %A Perer,Adam %A Shneiderman, Ben %K exploratory data analysis %K guides %K Information Visualization %K social networks %K systematic yet flexible %K wizards %X During exploratory data analysis, visualizations are often useful for making sense of complex data sets. However, as data sets increase in size and complexity, static information visualizations decrease in comprehensibility. Interactive techniques can yield valuable discoveries, but current data analysis tools typically support only opportunistic exploration that may be inefficient and incomplete. We present a refined architecture that uses systematic yet flexible (SYF) design goals to guide domain expert users through complex exploration of data over days, weeks and months. The SYF system aims to support exploratory data analysis with some of the simplicity of an e-commerce check-out while providing added flexibility to pursue insights. The SYF system provides an overview of the analysis process, suggests unexplored states, allows users to annotate useful states, supports collaboration, and enables reuse of successful strategies. The affordances of the SYF system are demonstrated by integrating it into a social network analysis tool employed by social scientists and intelligence analysts. The SYF system is a tool-independent component and can be incorporated into other data analysis tools. %B Proceedings of the 13th international conference on Intelligent user interfaces %S IUI '08 %I ACM %C New York, NY, USA %P 109 - 118 %8 2008/// %@ 978-1-59593-987-6 %G eng %U http://doi.acm.org/10.1145/1378773.1378788 %R 10.1145/1378773.1378788 %0 Conference Paper %D 2008 %T System-Level Optimization Model for a Snake-Inspired Robot Based on a Rectilinear Gait %A Hopkins,James K. %A Spranklin,Brent W. %A Gupta, Satyandra K. %X Physical parameters of modules and gait parameters affect the overall snake-inspired robot performance. Hence the system-level optimization model has to concurrently optimize the module parameters and the gait. The equations of motion associated with the rectilinear gait are quite complex due to the changing topology of the rectilinear gait. Embedding these equations in the system-level optimization model leads to a computationally challenging formulation. This paper presents a system-level optimization model that utilizes a hierarchical optimization approach and meta-models of the pre-computed optimal gaits to reduce the complexity of the optimization model. This approach enabled us to use an experimentally validated physics-based model of the rectilinear gait and yet at the same time enabled us to create a system-level optimization model with a manageable complexity. A detailed case study is presented to show the importance of concurrently optimizing the module parameters and the gait using our model to obtain the optimal performance for a given mission. %I ASME %P 913 - 924 %8 2008/// %@ 978-0-7918-4326-0 %G eng %U http://link.aip.org/link/ASMECP/v2008/i43260/p913/s1&Agg=doi %R 10.1115/DETC2008-49972 %0 Journal Article %J Proceedings of 4th USENIX Symposium on Networked Systems Design & Implementation %D 2007 %T SAAR: A shared control plane for overlay multicast %A Nandi,A. %A Ganjam,A. %A Druschel,P. %A Ng,T. S.E %A Stoica,I. %A Zhang,H. %A Bhattacharjee, Bobby %X Many cooperative overlay multicast systems of diverse designs have been implemented and deployed. In this paper, we explore a new architecture for overlay multicast: we factor out the control plane into a separate overlay that provides a single primitive: a configurable anycast for peer selection. This separation of control and data overlays has several advantages. Data overlays can be optimized for efficient content delivery, while the control overlay can be optimized for flexible and efficient peer selection. Several data channels can share a control plane for fast switching among content channels, which is particularly important for IPTV. And, the control overlay can be reused in multicast systems with different data plane organizations.We designed and evaluated a decentralized control overlay for endsystem multicast. The overlay proactively aggregates system state and implements a powerful anycast primitive for peer selection. We demonstrate that SAAR's efficiency in locating peers reduces channel switching time, improves the quality of content delivery, and reduces overhead, even under dynamic conditions and at scale. An experimental evaluation demonstrates that the system can efficiently support single-tree, multi-tree and block-based multicast systems. %B Proceedings of 4th USENIX Symposium on Networked Systems Design & Implementation %P 57 - 72 %8 2007/// %G eng %0 Journal Article %J Journal of Cryptology %D 2007 %T Scalable protocols for authenticated group key exchange %A Katz, Jonathan %A Yung,M. %X We consider the problem of authenticated group key exchange among n parties communicating over an insecure public network. A number of solutions to this problem have been proposed; however, all prior provably secure solutions do not scale well and, in particular, require O(n) rounds. Our main contribution is the first scalable protocol for this problem along with a rigorous proof of security in the standard model under the DDH assumption; our protocol uses a constant number of rounds and requires only O(1) "full" modular exponentiations per user. Toward this goal (and adapting work of Bellare, Canetti, and Krawczyk), we first present an efficient compiler that transforms any group key-exchange protocol secure against a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls all communication in the network. This compiler adds only one round and O(1) communication (per user) to the original scheme. We then prove secure—against a passive adversary—a variant of the two-round group key-exchange protocol of Burmester and Desmedt. Applying our compiler to this protocol results in a provably secure three-round protocol for authenticated group key exchange which also achieves forward secrecy. %B Journal of Cryptology %V 20 %P 85 - 113 %8 2007/// %G eng %N 1 %R 10.1007/s00145-006-0361-5 %0 Book %D 2007 %T Scalable Uncertainty Management: First International Conference, SUM 2007, Washington, DC, USA, October 10-12, 2007 : Proceedings %A Prade,Henri %A V.S. Subrahmanian %K Artificial intelligence %K Computers / Information Theory %K Computers / Intelligence (AI) & Semantics %K Electronic books %K Mathematics / Logic %K Uncertainty (Information theory) %X This book constitutes the refereed proceedings of the First International Conference on Scalable Uncertainty Management, SUM 2007, held in Washington, DC, USA, in Oktober 2007.The 20 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book. The papers address artificial intelligence researchers, database researchers, and practitioners to demonstrate theoretical techniques required to manage the uncertainty that arises in large scale real world applications. The papers deal with the following topics: uncertainty models, probabilistic logics, fuzzy logics, and annotated logics, inconsistency logics, database algebras and calculi, scalable database systems, spatial, temporal, mobile and multimedia databases, as well as implementations, and applications. %I Springer %8 2007/11/14/ %@ 9783540754077 %G eng %0 Journal Article %J Journal of Computational Physics %D 2007 %T A scalar potential formulation and translation theory for the time-harmonic Maxwell equations %A Gumerov, Nail A. %A Duraiswami, Ramani %K Debye potentials %K Electromagnetic scattering %K Fast Multipole Method %K Helmholtz equation %K Maxwell equations %K Mie scattering %K T-matrix method %K Translation operators %X We develop a computational method based on the Debye scalar potential representation, which efficiently reduces the solution of Maxwell’s equations to the solution of two scalar Helmholtz equations. One of the key contributions of this paper is a theory for the translation of Maxwell solutions using such a representation, since the scalar potential form is not invariant with respect to translations. The translation theory is developed by introducing “conversion” operators, which enable the representation of the electric and magnetic vector fields via scalar potentials in an arbitrary reference frame. Advantages of this representation include the fact that only two Helmholtz equations need be solved, and moreover, the divergence free constraints are satisfied automatically by construction. Truncation error bounds are also presented. The availability of a translation theory and error bounds for this representation can find application in methods such as the Fast Multipole Method.For illustration of the use of the representation and translation theory we implemented an algorithm for the simulation of Mie scattering off a system of spherical objects of different sizes and dielectric properties using a variant of the T-matrix method. The resulting system was solved using an iterative method based on GMRES. The results of the computations agree well with previous computational and experimental results. %B Journal of Computational Physics %V 225 %P 206 - 236 %8 2007/07/01/ %@ 0021-9991 %G eng %U http://www.sciencedirect.com/science/article/pii/S0021999106005845 %N 1 %R 10.1016/j.jcp.2006.11.025 %0 Conference Paper %B Proceedings of the nineteenth annual ACM symposium on Parallel algorithms and architectures %D 2007 %T Scheduling to minimize gaps and power consumption %A Demaine,E. D %A Ghodsi,M. %A Hajiaghayi, Mohammad T. %A Sayedi-Roshkhar,A. S %A Zadimoghaddam,M. %B Proceedings of the nineteenth annual ACM symposium on Parallel algorithms and architectures %P 46 - 54 %8 2007/// %G eng %0 Journal Article %J Experimental Parasitology %D 2007 %T Schistosoma mansoni genome: Closing in on a final gene set %A Haas,Brian J. %A Berriman,Matthew %A Hirai,Hirohisa %A Cerqueira,Gustavo G. %A LoVerde,Philip T. %A El‐Sayed, Najib M. %K Annotation %K Gene finding %K Genome %K Schistosoma mansoni %X The Schistosoma mansoni genome sequencing consortium has recently released the latest versions of the genome assembly as well as an automated preliminary gene structure annotation. The combined datasets constitute a vast resource for researchers to exploit in a variety of post-genomic studies with an emphasis of transcriptomic and proteomic tools. Here we present an innovative method used for combining diverse sources of evidence including ab initio gene predictions, protein and transcript sequence homologies, and cross-genome sequence homologies between S. mansoni and Schistosoma japonicum to define a comprehensive list of protein-coding genes. %B Experimental Parasitology %V 117 %P 225 - 228 %8 2007/11// %@ 0014-4894 %G eng %U http://www.sciencedirect.com/science/article/pii/S0014489407001683 %N 3 %R 16/j.exppara.2007.06.005 %0 Journal Article %J ACM SIGIR Forum %D 2007 %T Searching spontaneous conversational speech %A Jong,Franciska De %A Oard, Douglas %A Ordelman,Roeland %A Raaijmakers,Stephan %B ACM SIGIR Forum %V 41 %P 104 - 104 %8 2007/12/01/ %@ 01635840 %G eng %U http://dl.acm.org/citation.cfm?id=1328982 %R 10.1145/1328964.1328982 %0 Journal Article %J Technical Reports of the Computer Science Department, CS-TR-4884 %D 2007 %T A Secure DHT via the Pigeonhole Principle %A Baden,Randy %A Bender,Adam %A Levin,Dave %A Sherwood,Rob %A Spring, Neil %A Bhattacharjee, Bobby %K Technical Report %X The standard Byzantine attack model assumes no more than some fixedfraction of the participants are faulty. This assumption does not accurately apply to peer-to-peer settings, where Sybil attacks and botnets are realistic threats. We propose an attack model that permits an arbitrary number of malicious nodes under the assumption that each node can be classified based on some of its attributes, such as autonomous system number or operating system, and that the number of classes with malicious nodes is bounded (e.g., an attacker may exploit at most a few operating systems at a time). In this model, we present a secure DHT, evilTwin, which replaces a single, large DHT with sufficiently many smaller instances such that it is impossible for an adversary to corrupt every instance. Our system ensures high availability and low-latency lookups, is easy to implement, does not require a complex Byzantine agreement protocol, and its proof of security is a straightforward application of the pigeonhole principle. The cost of security comes in the form of increased storage and bandwidth overhead; we show how to reduce these costs by replicating data and adaptively querying participants who historically perform well. We use implementation and simulation to show that evilTwin imposes a relatively small additional cost compared to conventional DHTs. %B Technical Reports of the Computer Science Department, CS-TR-4884 %8 2007/09/24/ %G eng %U http://drum.lib.umd.edu/handle/1903/7136 %0 Journal Article %J WRAITS 2007 %D 2007 %T Secure lookup without (constrained) flooding %A Bhattacharjee, Bobby %A Rodrigues,R. %A Kouznetsov,P. %B WRAITS 2007 %8 2007/// %G eng %0 Conference Paper %B Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on %D 2007 %T Segmentation using Meta-texture Saliency %A Yacoob,Yaser %A Davis, Larry S. %K analysis;image %K colour %K enhancement;image %K image %K image;salient %K patches;image %K segmentation;image %K segmentation;meta-texture %K surface-roughness;image %K texture; %X We address segmentation of an image into patches that have an underlying salient surface-roughness. Three intrinsic images are derived: reflectance, shading and meta- texture images. A constructive approach is proposed for computing a meta-texture image by preserving, equalizing and enhancing the underlying surface-roughness across color, brightness and illumination variations. We evaluate the performance on sample images and illustrate quantitatively that different patches of the same material, in an image, are normalized in their statistics despite variations in color, brightness and illumination. Finally, segmentation by line-based boundary-detection is proposed and results are provided and compared to known algorithms. %B Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on %P 1 - 8 %8 2007/10// %G eng %R 10.1109/ICCV.2007.4408930 %0 Conference Paper %B Proceedings of the semantic and digital media technologies 2nd international conference on Semantic Multimedia %D 2007 %T A semantic web environment for digital shapes understanding %A De Floriani, Leila %A Hui,Annie %A Papaleo,Laura %A Huang,May %A Hendler,James %K digital shapes %K semantic annotation %K semantic web %K shape analysis %K shape understanding %X In the last few years, the volume of multimedia content available on the Web significantly increased. This led to the need for techniques to handle such data. In this context, we see a growing interest in considering the Semantic Web in action and in the definition of tools capable of analyzing and organizing digital shape models. In this paper, we present a Semantic Web environment, be-SMART, for inspecting 3D shapes and for structuring and annotating such shapes according to ontology-driven metadata. Specifically, we describe in details the first module of be-SMART, the Geometry and Topology Analyzer, and the algorithms we have developed for extracting geometrical and topological information from 3D shapes. We also describe the second module, the Topological Decomposer, which produces a graph-based representation of the decomposition of the shape into manifold components. This is successively modified by the third and the fourth modules, which perform the automatic and manual segmentation of the manifold parts. %B Proceedings of the semantic and digital media technologies 2nd international conference on Semantic Multimedia %S SAMT'07 %I Springer-Verlag %C Berlin, Heidelberg %P 226 - 239 %8 2007/// %@ 3-540-77033-X, 978-3-540-77033-6 %G eng %U http://dl.acm.org/citation.cfm?id=1780533.1780565 %0 Journal Article %J Software Engineering, IEEE Transactions on %D 2007 %T Semantics-Preserving Design of Embedded Control Software from Synchronous Models %A Mangeruca,L. %A Baleani,M. %A Ferrari,A. %A Sangiovanni-Vincentelli,A. %K embedded control software %K embedded systems %K multiprocessing programs %K multiprocessor %K multitasking %K semantics-preserving design %K software engineering %K software implementation %K systems analysis %X The design of embedded controllers is experiencing a growth in complexity as embedded systems increase their functionality while they become ubiquitous in electronic appliances, cars, airplanes, etc. As requirements become more challenging, mathematical models gain importance for mastering complexity. Among the different computational models proposed, synchronous models have proved to be the most widely used for control dominated applications. While synchronous models simplify the way of dealing with concurrency by decoupling functional and timing aspects, their software implementation on multitasking and multiprocessor platforms is far from straightforward, because of the asynchronous nature of most industrial software platforms. Known solutions in the literature either restrict the solution space or focus on special cases. We present a method for preserving the synchronous semantics through buffer-based intertask communication mechanisms, grounded on an abstraction of the target platform. This allows us to deal with any task set and, most importantly, being independent of the implementation, to explore the design space effectively. %B Software Engineering, IEEE Transactions on %V 33 %P 497 - 509 %8 2007/08// %@ 0098-5589 %G eng %N 8 %R 10.1109/TSE.2007.70718 %0 Journal Article %J Interacting with Computers %D 2007 %T Semi-automatic photo annotation strategies using event based clustering and clothing based person recognition %A Suh,B. %A Bederson, Benjamin B. %B Interacting with Computers %V 19 %P 524 - 544 %8 2007/// %G eng %N 4 %0 Journal Article %J Numerische Mathematik %D 2007 %T On Sensitivity of Gauss-Christoffel Quadrature %A O'Leary, Dianne P. %A Strakoš,Zdeněk %A Tichý,Petr %X In numerical computations the question how much does a function change under perturbations of its arguments is of central importance. In this work, we investigate sensitivity of Gauss–Christoffel quadrature with respect to small perturbations of the distribution function. In numerical quadrature, a definite integral is approximated by a finite sum of functional values evaluated at given quadrature nodes and multiplied by given weights. Consider a sufficiently smooth integrated function uncorrelated with the perturbation of the distribution function. Then it seems natural that given the same number of function evaluations, the difference between the quadrature approximations is of the same order as the difference between the (original and perturbed) approximated integrals. That is perhaps one of the reasons why, to our knowledge, the sensitivity question has not been formulated and addressed in the literature, though several other sensitivity problems, motivated, in particular, by computation of the quadrature nodes and weights from moments, have been thoroughly studied by many authors. We survey existing particular results and show that even a small perturbation of a distribution function can cause large differences in Gauss–Christoffel quadrature estimates. We then discuss conditions under which the Gauss–Christoffel quadrature is insensitive under perturbation of the distribution function, present illustrative examples, and relate our observations to known conjectures on some sensitivity problems. %B Numerische Mathematik %V 107 %P 147 - 174 %8 2007/// %G eng %U doi:10.1007/s00211-007-0078-xdoi:10.1007/s00211-007-0078-x %0 Conference Paper %B Proceedings of the International Conference on Weblogs and Social Media (ICWSM) %D 2007 %T Sentiment analysis: Adjectives and adverbs are better than adjectives alone %A Benamara,F. %A Cesarano,C. %A Picariello, A. %A Reforgiato,D. %A V.S. Subrahmanian %X Most past work on determining the strength of subjective expres-sions within a sentence or a document use specific parts of speech such as adjectives, verbs and nouns. To date, there is almost no work on the use of adverbs in sentiment analysis, nor has there been any work on the use of adverb-adjective combinations (AACs). We propose an AAC-based sentiment analysis technique that uses a lin- guistic analysis of adverbs of degree. We define a set of general axioms (based on a classification of adverbs of degree into five cat- egories) that all adverb scoring techniques must satisfy. Instead of aggregating scores of both adverbs and adjectives using simple scor- ing functions, we propose an axiomatic treatment of AACs based on the linguistic classification of adverbs. Three specific AAC scor- ing methods that satisfy the axioms are presented. We describe the results of experiments on an annotated set of 200 news articles (an- notated by 10 students) and compare our algorithms with some exist- ing sentiment analysis algorithms. We show that our results lead to higher accuracy based on Pearson correlation with human subjects. %B Proceedings of the International Conference on Weblogs and Social Media (ICWSM) %8 2007/// %G eng %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 2007 %T Shape Classification Using the Inner-Distance %A Ling,Haibin %A Jacobs, David W. %K Automated;Reproducibility of Results;Sensitivity and Specificity; %K Computer-Assisted;Imaging %K Euclidean distance;articulation invariant signatures;computer vision;inner distance;multidimensional scaling;part structure;shape classification;shape descriptors;shape silhouette;shortest path;computational geometry;computer vision;graph theory;image cla %K Three-Dimensional;Pattern Recognition %X Part structure and articulation are of fundamental importance in computer and human vision. We propose using the inner-distance to build shape descriptors that are robust to articulation and capture part structure. The inner-distance is defined as the length of the shortest path between landmark points within the shape silhouette. We show that it is articulation insensitive and more effective at capturing part structures than the Euclidean distance. This suggests that the inner-distance can be used as a replacement for the Euclidean distance to build more accurate descriptors for complex shapes, especially for those with articulated parts. In addition, texture information along the shortest path can be used to further improve shape classification. With this idea, we propose three approaches to using the inner-distance. The first method combines the inner-distance and multidimensional scaling (MDS) to build articulation invariant signatures for articulated shapes. The second method uses the inner-distance to build a new shape descriptor based on shape contexts. The third one extends the second one by considering the texture information along shortest paths. The proposed approaches have been tested on a variety of shape databases, including an articulated shape data set, MPEG7 CE-Shape-1, Kimia silhouettes, the ETH-80 data set, two leaf data sets, and a human motion silhouette data set. In all the experiments, our methods demonstrate effective performance compared with other algorithms %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %V 29 %P 286 - 299 %8 2007/02// %@ 0162-8828 %G eng %N 2 %R 10.1109/TPAMI.2007.41 %0 Conference Paper %B Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on %D 2007 %T A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing %A M. Wu %A Mao,Yinian %A Swaminathan,Ashwin %X An image hash is a content-based compact representation of an image and finds applications in image authentication, watermarking, and image similarity comparison. This paper reviews representative approaches developed by the research community in constructing robust and secure image hash. A unified framework and case studies on representative image hash schemes are presented to demonstrate important roles of signal processing and controlled randomization in constructing and evaluating robust and secure hashing for visual data. %B Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on %P 166 - 170 %8 2007/08// %G eng %R 10.1109/SSP.2007.4301240 %0 Journal Article %J Signal Processing Magazine, IEEE %D 2007 %T Signal Processing for Biometric Systems [DSP Forum] %A Jain, A.K. %A Chellapa, Rama %A Draper, S.C. %A Memon, N. %A Phillips,P.J. %A Vetro, A. %K (access %K biometric %K control);security;signal %K forum;signal %K magazine %K PROCESSING %K processing; %K security;biometric %K standardization;fusion %K systems %K technique;multibiometric %K technique;signal %K technology;biometrics %X This IEEE signal processing magazine (SPM) forum discuses signal processing applications, technologies, requirements, and standardization of biometric systems. The forum members bring their expert insights into issues such as biometric security, privacy, and multibiometric and fusion techniques. The invited forum members are Prof. Anil K. Jain of Michigan State University, Prof. Rama Chellappa of the University of Maryland, Dr. Stark C. Draper of theUniversity of Wisconsin in Madison, Prof. Nasir Memon of Polytechnic University, and Dr. P. Jonathon Phillips of the National Institute of Standards and Technology. The moderator of the forum is Dr. Anthony Vetro of Mitsubishi Electric Research Labs, and associate editor of SPM. %B Signal Processing Magazine, IEEE %V 24 %P 146 - 152 %8 2007/11// %@ 1053-5888 %G eng %N 6 %R 10.1109/MSP.2007.905886 %0 Journal Article %J Signal Processing Magazine, IEEE %D 2007 %T Signal Processing Magazine E-Newsletter: Inside Out [From the Editor] %A Wu,M. %B Signal Processing Magazine, IEEE %V 24 %P 2 - 8 %8 2007/11// %@ 1053-5888 %G eng %N 6 %R 10.1109/MSP.2007.905887 %0 Conference Paper %B Information Visualization, 2007. IV '07. 11th International Conference %D 2007 %T Similarity-Based Forecasting with Simultaneous Previews: A River Plot Interface for Time Series Forecasting %A Buono,P. %A Plaisant, Catherine %A Simeone,A. %A Aris,A. %A Shneiderman, Ben %A Shmueli,G. %A Jank,W. %K data driven forecasting method %K data visualisation %K Data visualization %K Economic forecasting %K forecasting preview interface %K Graphical user interfaces %K historical time series dataset %K Laboratories %K new stock offerings %K partial time series %K pattern matching %K pattern matching search %K Predictive models %K river plot interface %K Rivers %K similarity-based forecasting %K Smoothing methods %K Technological innovation %K Testing %K time series %K time series forecasting %K Weather forecasting %X Time-series forecasting has a large number of applications. Users with a partial time series for auctions, new stock offerings, or industrial processes desire estimates of the future behavior. We present a data driven forecasting method and interface called similarity-based forecasting (SBF). A pattern matching search in an historical time series dataset produces a subset of curves similar to the partial time series. The forecast is displayed graphically as a river plot showing statistical information about the SBF subset. A forecasting preview interface allows users to interactively explore alternative pattern matching parameters and see multiple forecasts simultaneously. User testing with 8 users demonstrated advantages and led to improvements. %B Information Visualization, 2007. IV '07. 11th International Conference %I IEEE %P 191 - 196 %8 2007/07/04/6 %@ 0-7695-2900-3 %G eng %R 10.1109/IV.2007.101 %0 Journal Article %J ACM Transactions on Algorithms (TALG) %D 2007 %T A simple entropy-based algorithm for planar point location %A Arya,Sunil %A Malamatos,Theocharis %A Mount, Dave %K Entropy %K expected-case complexity %K Point location %K polygonal subdivision %K randomized algorithms %K trapezoidal maps %X Given a planar polygonal subdivision S, point location involves preprocessing this subdivision into a data structure so that given any query point q, the cell of the subdivision containing q can be determined efficiently. Suppose that for each cell z in the subdivision, the probability pz that a query point lies within this cell is also given. The goal is to design the data structure to minimize the average search time. This problem has been considered before, but existing data structures are all quite complicated. It has long been known that the entropy H of the probability distribution is the dominant term in the lower bound on the average-case search time. In this article, we show that a very simple modification of a well-known randomized incremental algorithm can be applied to produce a data structure of expected linear size that can answer point-location queries in O(H) average time. We also present empirical evidence for the practical efficiency of this approach. %B ACM Transactions on Algorithms (TALG) %V 3 %8 2007/05// %@ 1549-6325 %G eng %U http://doi.acm.org/10.1145/1240233.1240240 %N 2 %R 10.1145/1240233.1240240 %0 Conference Paper %B Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on %D 2007 %T Simulation and Analysis of Human Walking Motion %A Nandy, K. %A Chellapa, Rama %K 3D %K algorithm;revolute %K analysis;image %K chain;mechanical %K DYNAMICS %K Euler %K extraction;image %K geometry;angle %K inverse %K joints;rigid %K links;surveillance;time %K method;feature %K model;recursive %K models;torque %K MOTION %K motion;kinematic %K Newton %K patterns;Newton %K problems;time %K sequences;dynamic %K sequences;inverse %K sequences;walking %K series %K series;time %K simulation;torque; %K TIME %K walking %K warp %K warping;healthcare;human %X Simulation and analysis of human walking motion has applications in surveillance and healthcare. In this paper we discuss an approach for modeling human walking motion using a mechanical model in the form of a kinematic chain consisting of rigid links and revolute joints. Our goal is to discriminate different types of walking motions using information such as joint torque and angle sequences extracted from the model. The angle sequences are initially extracted using 3D geometry. From these angle sequences we extract the torque sequences using a recursive Newton Euler inverse dynamics algorithm. Time series models and dynamic time warping of the torque and angle sequences are used to characterize and discriminate different walking patterns. A forward dynamics algorithm is also presented for synthesizing different walking sequences like limping from a normal walking torque sequence %B Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on %V 1 %P I-797 -I-800 - I-797 -I-800 %8 2007/04// %G eng %R 10.1109/ICASSP.2007.366028 %0 Conference Paper %B Proceedings of the 8th Asian conference on Computer vision - Volume Part II %D 2007 %T Simultaneous appearance modeling and segmentation for matching people under occlusion %A Zhe Lin %A Davis, Larry S. %A David Doermann %A DeMenthon,Daniel %X We describe an approach to segmenting foreground regions corresponding to a group of people into individual humans. Given background subtraction and ground plane homography, hierarchical parttemplate matching is employed to determine a reliable set of human detection hypotheses, and progressive greedy optimization is performed to estimate the best configuration of humans under a Bayesian MAP framework. Then, appearance models and segmentations are simultaneously estimated in an iterative sampling-expectation paradigm. Each human appearance is represented by a nonparametric kernel density estimator in a joint spatial-color space and a recursive probability update scheme is employed for soft segmentation at each iteration. Additionally, an automatic occlusion reasoning method is used to determine the layered occlusion status between humans. The approach is evaluated on a number of images and videos, and also applied to human appearance matching using a symmetric distance measure derived from the Kullback-Leiber divergence. %B Proceedings of the 8th Asian conference on Computer vision - Volume Part II %S ACCV'07 %I Springer-Verlag %C Berlin, Heidelberg %P 404 - 413 %8 2007/// %@ 3-540-76389-9, 978-3-540-76389-5 %G eng %U http://dl.acm.org/citation.cfm?id=1775728.1775777 %0 Journal Article %J Software Engineering, IEEE Transactions on %D 2007 %T Skoll: A Process and Infrastructure for Distributed Continuous Quality Assurance %A Porter, Adam %A Yilmaz,C. %A Memon, Atif M. %A Schmidt,D. C %A Natarajan,B. %K ACE+TAO communication software package %K component assembly %K component deployment %K distributed continuous quality assurance %K distributed development teams %K distributed processing %K end-user customization %K flexible product design %K incremental development %K object-oriented programming %K Skoll %K software engineering %K Software quality %K systems analysis %X Software engineers increasingly emphasize agility and flexibility in their designs and development approaches. They increasingly use distributed development teams, rely on component assembly and deployment rather than green field code writing, rapidly evolve the system through incremental development and frequent updating, and use flexible product designs supporting extensive end-user customization. While agility and flexibility have many benefits, they also create an enormous number of potential system configurations built from rapidly changing component implementations. Since today's quality assurance (QA) techniques do not scale to handle highly configurable systems, we are developing and validating novel software QA processes and tools that leverage the extensive computing resources of user and developer communities in a distributed, continuous manner to improve software quality significantly. This paper provides several contributions to the study of distributed, continuous QA (DCQA). First, it shows the structure and functionality of Skoll, which is an environment that defines a generic around-the-world, around-the-clock QA process and several sophisticated tools that support this process. Second, it describes several novel QA processes built using the Skoll environment. Third, it presents two studies using Skoll: one involving user testing of the Mozilla browser and another involving continuous build, integration, and testing of the ACE+TAO communication software package. The results of our studies suggest that the Skoll environment can manage and control distributed continuous QA processes more effectively than conventional QA processes. For example, our DCQA processes rapidly identified problems that had taken the ACE+TAO developers much longer to find and several of which they had not found. Moreover, the automatic analysis of QA results provided developers information that enabled them to quickly find the root causes of problems %B Software Engineering, IEEE Transactions on %V 33 %P 510 - 525 %8 2007/08// %@ 0098-5589 %G eng %N 8 %R 10.1109/TSE.2007.70719 %0 Conference Paper %B 3rd International Workshop on Semantic Web Enabled Software Engineering (SWESE 2007), Innsubruk, Austria %D 2007 %T Software configuration management using ontologies %A Shahri,H. H %A Hendler,J. A %A Porter, Adam %B 3rd International Workshop on Semantic Web Enabled Software Engineering (SWESE 2007), Innsubruk, Austria %8 2007/// %G eng %0 Journal Article %J IMA journal of numerical analysis %D 2007 %T Solving the stochastic steady-state diffusion problem using multigrid %A Elman, Howard %A Furnival, D. %B IMA journal of numerical analysis %V 27 %P 675 - 675 %8 2007/// %G eng %N 4 %0 Conference Paper %B Proc. 2007 Intl. Conf. on Computational Cultural Dynamics %D 2007 %T Soma models of the behaviors of stakeholders in the afghan drug economy: A preliminary report %A Sliva,A. %A Martinez,V. %A Simari,G. I %A V.S. Subrahmanian %X Most cultural reasoning today is done by anthropologists andsociologists who use their detailed knowledge of culture to make predictions about how a given group will respond to a given situation. The main problem with this is that experts in a particular culture or subculture are few and not readily accessible to the many who might suddenly need to tap their expertise (e.g. in cases of war or conflict). In this paper, we briefly describe how the SOMA (Stochastic Opponent Mod- eling Agents) paradigm proposed by the authors can and has been used to model the behaviors of various stake-holders in the drug trade in Afghanistan. %B Proc. 2007 Intl. Conf. on Computational Cultural Dynamics %P 78 - 86 %8 2007/// %G eng %0 Journal Article %J Computing and Visualization in Science %D 2007 %T Some observations on multigrid convergence for convection–diffusion equations %A Ramage, A. %A Elman, Howard %B Computing and Visualization in Science %V 10 %P 43 - 56 %8 2007/// %G eng %N 1 %0 Journal Article %J Proceedings of the Digital Humanities Conference %D 2007 %T Something that is interesting is interesting then: Using text minig and visualizations to aid interpreting repetition in Gertrude Stein’s The Making of Americans %A Clement,T. %A Don,A. %A Plaisant, Catherine %A Auvil,L. %A Pape,G. %A Goren,V. %B Proceedings of the Digital Humanities Conference %P 40 - 44 %8 2007/// %G eng %0 Conference Paper %B International Conference on Computer Graphics and Interactive Techniques %D 2007 %T Sorting in space: multidimensional, spatial, and metric data structures for computer graphics applications %A Samet, Hanan %B International Conference on Computer Graphics and Interactive Techniques %8 2007/// %G eng %0 Journal Article %J ACM Trans. Database Syst. %D 2007 %T Spatial join techniques %A Jacox,Edwin H. %A Samet, Hanan %K external memory algorithms %K plane-sweep %K Spatial join %X A variety of techniques for performing a spatial join are reviewed. Instead of just summarizing the literature and presenting each technique in its entirety, distinct components of the different techniques are described and each is decomposed into an overall framework for performing a spatial join. A typical spatial join technique consists of the following components: partitioning the data, performing internal-memory spatial joins on subsets of the data, and checking if the full polygons intersect. Each technique is decomposed into these components and each component addressed in a separate section so as to compare and contrast similar aspects of each technique. The goal of this survey is to describe the algorithms within each component in detail, comparing and contrasting competing methods, thereby enabling further analysis and experimentation with each component and allowing the best algorithms for a particular situation to be built piecemeal, or, even better, enabling an optimizer to choose which algorithms to use. %B ACM Trans. Database Syst. %V 32 %8 2007/03// %@ 0362-5915 %G eng %U http://doi.acm.org/10.1145/1206049.1206056 %N 1 %R 10.1145/1206049.1206056 %0 Conference Paper %B Proceedings of the 9th annual conference on Genetic and evolutionary computation %D 2007 %T A spatial model of the red queen effect %A Ottino-Loffler,Jules %A Rand, William %A Wilensky,Uri %K Agent-based modeling %K coevolution %K red queen effect %K spatial modeling %X Van Valen first discovered the "Red Queen Effect" (RQE), where two species can dramatically co-evolve their phenotypes over time but never gain a relative advantage [2]. In the ideal version of the RQE, regardless of the actual values that the species evolve to obtain, they have not moved in relation to each other. Though previous models of the RQE exist, we developed an agent-based model (ABM) which has a base ontology more similar to real world coevolutionary systems than equation-based models (EBMs). For instance, this model contains spatial information and an individuallevel reproduction mechanism. Yet this model recreates traditional EBM results. For instance Dieckmann et al show that there are three possible outcomes of competitive coevolution: predator dominance, prey dominance and evolutionary cycling (RQE) [1]. By reconceptualizing this EBM using an ABM, we make it easier for students and researchers to understand, manipulate, and modify this model [4]. The model is written in the NetLogo agent-based modeling environment [3]. The model is initialized with 150 predator and 150 prey agents. Predator agents have a resistance level r and prey agents have a poison p. The agents are initially randomly distributed on a toroidal real-valued 35 by 35 grid. The initial resistance and poison values for the predators and prey are drawn from normal distributions with means µr and µp and a standard deviation of 1. During a model timestep, each agent moves one unit at a random heading. If at the end of its move a predator is within 1 unit of a prey, then it will challenge the prey. The predator will compare its resistance value to the prey's poison value and which ever agent has the larger value will win the challenge and the other agent will be killed. At the end of an agent's turn if the total number of agents is less than the maximum carrying capacity the agent will reproduce with a 50% probability. The new agent's initial poison / resistance will be drawn from a normal distribution with the parent's poison / resistance as the mean value and a standard deviation of 1. Our goal was to investigate whether this ABMwould replicate the results of the EBM of [1]. Our parameter of interest was µp; we held µr constant at 25 and varied µp from 0 to 50 at increments of 5. For each value we ran the model 10 times for 5000 timesteps. Figure 1 illustrates the final average values of both the resistance and the poison for the various initial values. If there are no predators or prey then a value of 0 is plotted for the respective final trait. In most cases, one species drives the other to extinction, and there is little change in the initial trait values. However when the value of µp is similar to µr then neither species is completely destroyed, but if there is any significant difference between µr and µp then one species will die off. The highest final trait values are found when µp = µr, in this case we see the results of the RQE since the final trait values are much higher than the initial values. These final values are more than 1.5 orders of magnitude larger than the initial values. This model reproduces classical models of the RQE, but has two different mobile species interacting on a spatial grid over time which is a closer representation of reality than traditional models. This closer representation makes ABMs excellent teaching and experimental tools because their basic assumptions can easily be manipulated and explored. Acknowledgments: We thank the National Science Foundation and NICO for supporting this research. %B Proceedings of the 9th annual conference on Genetic and evolutionary computation %S GECCO '07 %I ACM %C New York, NY, USA %P 490 - 491 %8 2007/// %@ 978-1-59593-697-4 %G eng %U http://doi.acm.org/10.1145/1276958.1277064 %R 10.1145/1276958.1277064 %0 Journal Article %J International Journal of Human-Computer Interaction %D 2007 %T Special Issue in Honor of Ben Shneiderman's 60th Birthday: Reflections on Human-Computer Interaction %A Plaisant, Catherine %A North,Chris %B International Journal of Human-Computer Interaction %V 23 %P 195 - 204 %8 2007/// %@ 1044-7318 %G eng %U http://www.tandfonline.com/doi/abs/10.1080/10447310701702766 %N 3 %R 10.1080/10447310701702766 %0 Journal Article %J RNARNA %D 2007 %T Spliceosomal small nuclear RNA genes in 11 insect genomes %A Mount, Stephen M. %A Gotea,Valer %A Lin,Chiao-Feng %A Hernandez,Kristina %A Makałowski,Wojciech %K honeybee %K Insecta %K secondary structure %K snRNA %K spliceosomal snRNA %K U12 introns %X A monthly journal publishing high-quality, peer-reviewed research on all topics related to RNA and its metabolism in all organisms %B RNARNA %V 13 %P 5 - 14 %8 2007/01/01/ %@ 1355-8382, 1469-9001 %G eng %U http://rnajournal.cshlp.org/content/13/1/5 %N 1 %R 10.1261/rna.259207 %0 Journal Article %J Nucleic Acids Research %D 2007 %T SplicePort--An interactive splice-site analysis tool %A Dogan,R. I %A Getoor, Lise %A Wilbur,W. J %A Mount, Stephen M. %X SplicePort is a web-based tool for splice-site analysis that allows the user to make splice-site predictions for submitted sequences. In addition, the user can also browse the rich catalog of features that underlies these predictions, and which we have found capable of providing high classification accuracy on human splice sites. Feature selection is optimized for human splice sites, but the selected features are likely to be predictive for other mammals as well. With our interactive feature browsing and visualization tool, the user can view and explore subsets of features used in splice-site prediction (either the features that account for the classification of a specific input sequence or the complete collection of features). Selected feature sets can be searched, ranked or displayed easily. The user can group features into clusters and frequency plot WebLogos can be generated for each cluster. The user can browse the identified clusters and their contributing elements, looking for new interesting signals, or can validate previously observed signals. The SplicePort web server can be accessed at http://www.cs.umd.edu/projects/SplicePort and http://www.spliceport.org. %B Nucleic Acids Research %V 35 %P W285-W291 - W285-W291 %8 2007/05/08/ %@ 0305-1048, 1362-4962 %G eng %U http://nar.oxfordjournals.org/content/35/suppl_2/W285.short %N Web Server %R 10.1093/nar/gkm407 %0 Journal Article %J Journal of Scientific Computing %D 2007 %T Stencil adaptation properties of a WENO scheme in direct numerical simulations of compressible turbulence %A Taylor,E. M %A Martin, M.P %B Journal of Scientific Computing %V 30 %P 533 - 554 %8 2007/// %G eng %N 3 %0 Conference Paper %B Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems %D 2007 %T STEWARD: architecture of a spatio-textual search engine %A Lieberman,Michael D. %A Samet, Hanan %A Sankaranarayanan,Jagan %A Sperling,Jon %K geocoding %K spatio-textual search engine %K STEWARD %X STEWARD ("Spatio-Textual Extraction on the Web Aiding Retrieval of Documents"), a system for extracting, querying, and visualizing textual references to geographic locations in unstructured text documents, is presented. Methods for retrieving and processing web documents, extracting and disambiguating georeferences, and identifying geographic focus are described. A brief overview of STEWARD's querying capabilities, as well as the design of an intuitive user interface, are provided. Finally, several application scenarios and future extensions to STEWARD are discussed. %B Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems %S GIS '07 %I ACM %C New York, NY, USA %P 25:1–25:8 - 25:1–25:8 %8 2007/// %@ 978-1-59593-914-2 %G eng %U http://doi.acm.org/10.1145/1341012.1341045 %R 10.1145/1341012.1341045 %0 Conference Paper %B Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains %D 2007 %T STEWARD: demo of spatio-textual extraction on the web aiding the retrieval of documents %A Samet, Hanan %A Lieberman,Michael D. %A Sankaranarayanan,Jagan %A Sperling,Jon %K geocoding %K spatio-textual search engine %K STEWARD %X A spatio-textual search engine, termed "STEWARD" is demonstrated where document similarity is based on both the textual similarity as well as the spatial proximity of the locations in the document to the spatial search input. STEWARD's performance is enhanced by the presence of a document tagger that is able to identify textual references to geographical entities. The user-interface of STEWARD provides the ability to browse results, thereby making it a valuable "knowledge discovery" tool. %B Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains %S dg.o '07 %I Digital Government Society of North America %P 300 - 301 %8 2007/// %@ 1-59593-599-1 %G eng %U http://dl.acm.org/citation.cfm?id=1248460.1248529 %0 Journal Article %J VLSI Design %D 2007 %T Stochastic Communication: A New Paradigm for Fault-Tolerant Networks-on-Chip %A Bogdan, Paul %A Dumitraş %A Tudor %A Marculescu, Radu %X As CMOS technology scales down into the deep-submicron (DSM) domain, the costs of design and verification for Systems-on-Chip (SoCs) are rapidly increasing. Relaxing the requirement of 100% correctness for devices and interconnects drastically reduces the costs of design but, at the same time, requires SoCs to be designed with some degree of system-level fault-tolerance. Towards this end, this paper introduces a novel communication paradigm for SoCs, called stochastic communication. This scheme separates communication from computation by allowing the on-chip interconnect to be designed as a reusable IP and also provides a built-in tolerance to DSM failures, without a significant performance penalty. By using this communication scheme, a large percentage of data upsets, packet losses due to buffers overflow, and severe levels of synchronization failures can be tolerated, while providing high levels of performance. %B VLSI Design %V 2007 %8 2007/04/22/ %@ 1065-514X %G eng %U http://www.hindawi.com/journals/vlsi/2007/095348/abs/ %0 Journal Article %J Wireless communications and mobile computing %D 2007 %T Storage routing for dtn congestion control %A Seligman,M. %A Fall,K. %A Mundur, Padma %B Wireless communications and mobile computing %V 7 %P 1183 - 1196 %8 2007/// %G eng %N 10 %0 Journal Article %J Multimedia Tools and Applications %D 2007 %T Story creation from heterogeneous data sources %A Fayzullin,M. %A V.S. Subrahmanian %A Albanese, M. %A Cesarano,C. %A Picariello, A. %X There are numerous applications where there is a need to rapidly infer a story about a given subject from a given set of potentially heterogeneous data sources. In this paper, we formally define a story to be a set of facts about a given subject that satisfies a “story length” constraint. An optimal story is a story that maximizes the value of an objective function measuring the goodness of a story. We present algorithms to extract stories from text and other data sources. We also develop an algorithm to compute an optimal story, as well as three heuristic algorithms to rapidly compute a suboptimal story. We run experiments to show that constructing stories can be efficiently performed and that the stories constructed by these heuristic algorithms are high quality stories. We have built a prototype STORY system based on our model—we briefly describe the prototype as well as one application in this paper. %B Multimedia Tools and Applications %V 33 %P 351 - 377 %8 2007/// %G eng %N 3 %R 10.1007/s11042-007-0100-4 %0 Journal Article %J Nature %D 2007 %T Structural Biology: Analysis of 'downhill' protein folding; Analysis of protein-folding cooperativity (Reply) %A Sadqi,Mourad %A Fushman, David %A Muñoz,Victor %K Astronomy %K astrophysics %K Biochemistry %K Bioinformatics %K Biology %K biotechnology %K cancer %K cell cycle %K cell signalling. %K climate change %K Computational Biology %K development %K developmental biology %K DNA %K drug discovery %K earth science %K ecology %K environmental science %K Evolution %K evolutionary biology %K functional genomics %K Genetics %K Genomics %K geophysics %K immunology %K interdisciplinary science %K life %K marine biology %K materials science %K medical research %K medicine %K metabolomics %K molecular biology %K molecular interactions %K nanotechnology %K Nature %K neurobiology %K neuroscience %K palaeobiology %K pharmacology %K Physics %K proteomics %K quantum physics %K RNA %K Science %K science news %K science policy %K signal transduction %K structural biology %K systems biology %K transcriptomics %X Ferguson et al. and Zhou and Bai criticize the quality of our nuclear magnetic resonance (NMR) data and atom-by-atom analysis of global 'downhill' folding, also claiming that the data are compatible with two-state folding. %B Nature %V 445 %P E17-E18 - E17-E18 %8 2007/02/15/ %@ 0028-0836 %G eng %U http://www.nature.com/nature/journal/v445/n7129/full/nature05645.html?lang=en %N 7129 %R 10.1038/nature05645 %0 Journal Article %J BMC Structural Biology %D 2007 %T Structural Footprinting in Protein Structure Comparison: The Impact of Structural Fragments %A Zotenko,Elena %A Dogan,Rezarta Islamaj %A Wilbur,W. John %A O'Leary, Dianne P. %A Przytycka,Teresa M. %X Abstract Background One approach for speeding-up protein structure comparison is the projection approach, where a protein structure is mapped to a high-dimensional vector and structural similarity is approximated by distance between the corresponding vectors. Structural footprinting methods are projection methods that employ the same general technique to produce the mapping: first select a representative set of structural fragments as models and then map a protein structure to a vector in which each dimension corresponds to a particular model and "counts" the number of times the model appears in the structure. The main difference between any two structural footprinting methods is in the set of models they use; in fact a large number of methods can be generated by varying the type of structural fragments used and the amount of detail in their representation. How do these choices affect the ability of the method to detect various types of structural similarity? Results To answer this question we benchmarked three structural footprinting methods that vary significantly in their selection of models against the CATH database. In the first set of experiments we compared the methods' ability to detect structural similarity characteristic of evolutionarily related structures, i.e., structures within the same CATH superfamily. In the second set of experiments we tested the methods' agreement with the boundaries imposed by classification groups at the Class, Architecture, and Fold levels of the CATH hierarchy. Conclusion In both experiments we found that the method which uses secondary structure information has the best performance on average, but no one method performs consistently the best across all groups at a given classification level. We also found that combining the methods' outputs significantly improves the performance. Moreover, our new techniques to measure and visualize the methods' agreement with the CATH hierarchy, including the threshholded affinity graph, are useful beyond this work. In particular, they can be used to expose a similar composition of different classification groups in terms of structural fragments used by the method and thus provide an alternative demonstration of the continuous nature of the protein structure universe. %B BMC Structural Biology %V 7 %8 2007/// %G eng %U DOI:10.1186/1472-6807-7-53DOI:10.1186/1472-6807-7-53 %N 53 %0 Conference Paper %B Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on %D 2007 %T A Study of Face Recognition as People Age %A Ling,Haibin %A Soatto,S. %A Ramanathan,N. %A Jacobs, David W. %K Bayesian %K difference;passport %K machine;face %K machines; %K magnitude;gradient %K orientation %K photo %K pyramid;hierarchical %K recognition;face %K recognition;support %K representation;face %K task;support %K technique;discriminative %K techniques;intensity %K vector %K verification %K verification;gradient %X In this paper we study face recognition across ages within a real passport photo verification task. First, we propose using the gradient orientation pyramid for this task. Discarding the gradient magnitude and utilizing hierarchical techniques, we found that the new descriptor yields a robust and discriminative representation. With the proposed descriptor, we model face verification as a two-class problem and use a support vector machine as a classifier. The approach is applied to two passport data sets containing more than 1,800 image pairs from each person with large age differences. Although simple, our approach outperforms previously tested Bayesian technique and other descriptors, including the intensity difference and gradient with magnitude. In addition, it works as well as two commercial systems. Second, for the first time, we empirically study how age differences affect recognition performance. Our experiments show that, although the aging process adds difficulty to the recognition task, it does not surpass illumination or expression as a confounding factor. %B Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on %P 1 - 8 %8 2007/10// %G eng %R 10.1109/ICCV.2007.4409069 %0 Journal Article %J Multimedia, IEEE Transactions on %D 2007 %T Super-Resolution of Face Images Using Kernel PCA-Based Prior %A Chakrabarti,Ayan %A Rajagopalan, AN %A Chellapa, Rama %K analysis;learning-based %K analysis;probability; %K component %K Face %K image %K method;prior %K model;face %K principal %K probability %K recognition;image %K reconstruction;image %K reconstruction;kernel %K resolution;principal %K super-resolution;high-resolution %X We present a learning-based method to super-resolve face images using a kernel principal component analysis-based prior model. A prior probability is formulated based on the energy lying outside the span of principal components identified in a higher-dimensional feature space. This is used to regularize the reconstruction of the high-resolution image. We demonstrate with experiments that including higher-order correlations results in significant improvements %B Multimedia, IEEE Transactions on %V 9 %P 888 - 892 %8 2007/06// %@ 1520-9210 %G eng %N 4 %R 10.1109/TMM.2007.893346 %0 Journal Article %J Journal of the American Society for Information Science and Technology %D 2007 %T Supporting elementary-age children's searching and browsing: Design and evaluation using the international children's digital library %A Hutchinson,H.B. %A Druin, Allison %A Bederson, Benjamin B. %B Journal of the American Society for Information Science and Technology %V 58 %P 1618 - 1630 %8 2007/// %G eng %N 11 %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 2007 %T Surface Dependent Representations for Illumination Insensitive Image Comparison %A Osadchy,M. %A Jacobs, David W. %A Lindenbaum,M. %K Automated;Reproducibility of Results;Sensitivity and Specificity;Subtraction Technique; %K Computer-Assisted;Imaging %K Gabor jets;Gaussian random surface;filter whitening;illumination;image comparison;image matching;lighting condition;multiscale oriented filter;surface dependent representation;image matching;image representation;Algorithms;Artificial Intelligence;Image En %K Three-Dimensional;Information Storage and Retrieval;Lighting;Pattern Recognition %X We consider the problem of matching images to tell whether they come from the same scene viewed under different lighting conditions. We show that the surface characteristics determine the type of image comparison method that should be used. Previous work has shown the effectiveness of comparing the image gradient direction for surfaces with material properties that change rapidly in one direction. We show analytically that two other widely used methods, normalized correlation of small windows and comparison of multiscale oriented filters, essentially compute the same thing. Then, we show that for surfaces whose properties change more slowly, comparison of the output of whitening filters is most effective. This suggests that a combination of these strategies should be employed to compare general objects. We discuss indications that Gabor jets use such a mixed strategy effectively, and we propose a new mixed strategy. We validate our results on synthetic and real images %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %V 29 %P 98 - 111 %8 2007/01// %@ 0162-8828 %G eng %N 1 %R 10.1109/TPAMI.2007.250602 %0 Conference Paper %B Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on %D 2007 %T Surface Segmentation through Concentrated Curvature %A Mesmoudi,M. M. %A Danovaro,E. %A De Floriani, Leila %A Port,U. %K curvature;convergence %K curvatures;concentrated %K Gauss-Bonnet %K problems;surface %K processes;image %K segmentation; %K segmentation;terrain %K segmentation;triangulated %K surface;Gaussian %K theorem;Gaussian %X Curvature is one of the most relevant notions that links the metric properties of a surface to its geometry and to its topology (Gauss-Bonnet theorem). In the literature, a variety of approaches exist to compute curvatures in the discrete case. Several techniques are computationally intensive or suffer from convergence problems. In this paper, we discuss the notion of concentrated curvature, introduced by Troyanov [24]. We discuss properties of this curvature and compare with a widely-used technique that estimates the Gaussian curvatures on a triangulated surface. We apply our STD method [13] for terrain segmentation to segment a surface by using different curvature approaches and we illustrate our comparisons through examples. %B Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on %P 671 - 676 %8 2007/09// %G eng %R 10.1109/ICIAP.2007.4362854 %0 Journal Article %J Advances in Complex Systems %D 2007 %T Swarm Intelligence Systems Using Guided Self-Organization for Collective Problem Solving %A RodrIGuez,A. %A Grushin,A. %A Reggia, James A. %A HAUPTMAN,AMI %A SIPPER,M. %A PAN,Z. %A Reggia, James A. %A GAO,D. %A DARABOS,C. %A GIACOBINI,M. %A others %B Advances in Complex Systems %V 10 %P 5 - 34 %8 2007/// %G eng %N 1 %0 Conference Paper %B Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on %D 2007 %T Symmetric Objects are Hardly Ambiguous %A Aggarwal,G. %A Biswas,S. %A Chellapa, Rama %K algorithm;symmetric %K bilaterally %K images;image %K Lambertian %K MATCHING %K matching; %K objects %K objects;illumination-invariant %K objects;symmetric %K symmetric %X Given any two images taken under different illumination conditions, there always exist a physically realizable object which is consistent with both the images even if the lighting in each scene is constrained to be a known point light source at infinity. In this paper, we show that images are much less ambiguous for the class of bilaterally symmetric Lambertian objects. In fact, the set of such objects can be partitioned into equivalence classes such that it is always possible to distinguish between two objects belonging to different equivalence classes using just one image per object. The conditions required for two objects to belong to the same equivalence class are very restrictive, thereby leading to the conclusion that images of symmetric objects are hardly ambiguous. The observation leads to an illumination-invariant matching algorithm to compare images of bilaterally symmetric Lambertian objects. Experiments on real data are performed to show the implications of the theoretical result even when the symmetry and Lambertian assumptions are not strictly satisfied. %B Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on %P 1 - 7 %8 2007/06// %G eng %R 10.1109/CVPR.2007.383289 %0 Journal Article %J Information Retrieval %D 2007 %T Syntactic sentence compression in the biomedical domain: facilitating access to related articles %A Jimmy Lin %A Wilbur,W. J %X We explore a syntactic approach to sentence compression in the biomedical domain, grounded in the context of result presentation for related article search in the PubMed search engine. By automatically trimming inessential fragments of article titles, a system can effectively display more results in the same amount of space. Our implemented prototype operates by applying a sequence of syntactic trimming rules over the parse trees of article titles. Two separate studies were conducted using a corpus of manually compressed examples from MEDLINE: an automatic evaluation using Bleu and a summative evaluation involving human assessors. Experiments show that a syntactic approach to sentence compression is effective in the biomedical domain and that the presentation of compressed article titles supports accurate “interest judgments”, decisions by users as to whether an article is worth examining in more detail. %B Information Retrieval %V 10 %P 393 - 414 %8 2007/// %G eng %N 4 %R 10.1007/s10791-007-9029-5 %0 Report %D 2007 %T System for 802.11 connectivity at high speed %A Frangiadakis,Nikolaos %A Kuklov,Danila %A Roussopoulos, Nick %K Technical Report %X Measurements and ongoing research have shown that WLANconnection for moving vehicles is feasible. However none of the previous work suggests a solution addressing a complete array of the challenges in vehicular WLAN communications. To amend this we designed a system that provides wireless connection roaming at high velocities transparent to user level applications, and does not impose additional requirements to existing infrastructures. It offers simple deployment, security, and scalability. It remains efficient under ­ intermittent connectivity conditions and supports heterogeneous network mediums for increased robustness. %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %V UMIACS-TR-2007-27 %8 2007/05/13/ %G eng %U http://drum.lib.umd.edu//handle/1903/4374 %0 Journal Article %J Science of Computer Programming %D 2006 %T Safe manual memory management in Cyclone %A Swamy,Nikhil %A Hicks, Michael W. %A Morrisett,Greg %A Grossman,Dan %A Jim,Trevor %K cyclone %K Memory management %K memory safety %K Reaps %K Reference counting %K regions %K unique pointers %X The goal of the Cyclone project is to investigate how to make a low-level C-like language safe. Our most difficult challenge has been providing programmers with control over memory management while retaining safety. This paper describes our experience trying to integrate and use effectively two previously-proposed, safe memory-management mechanisms: statically-scoped regions and tracked pointers. We found that these typing mechanisms can be combined to build alternative memory-management abstractions, such as reference counted objects and arenas with dynamic lifetimes, and thus provide a flexible basis. Our experience — porting C programs and device drivers, and building new applications for resource-constrained systems — confirms that experts can use these features to improve memory footprint and sometimes to improve throughput when used instead of, or in combination with, conservative garbage collection. %B Science of Computer Programming %V 62 %P 122 - 144 %8 2006/10/01/ %@ 0167-6423 %G eng %U http://www.sciencedirect.com/science/article/pii/S0167642306000785 %N 2 %R 10.1016/j.scico.2006.02.003 %0 Journal Article %J Visualization and Computer Graphics, IEEE Transactions on %D 2006 %T Saliency-guided Enhancement for Volume Visualization %A Kim,Y. %A Varshney, Amitabh %K Computer-Assisted;Imaging %K Ocular;Humans;Image Enhancement;Image Interpretation %K saliency-guided enhancement;visual-saliency-based operator;volume rendering;volume visualization;data visualisation;rendering (computer graphics);Algorithms;Attention;Computer Graphics;Eye Movements;Fixation %K Three-Dimensional;User-Computer Interface; %X Recent research in visual saliency has established a computational measure of perceptual importance. In this paper we present a visual-saliency-based operator to enhance selected regions of a volume. We show how we use such an operator on a user-specified saliency field to compute an emphasis field. We further discuss how the emphasis field can be integrated into the visualization pipeline through its modifications of regional luminance and chrominance. Finally, we validate our work using an eye-tracking-based user study and show that our new saliency enhancement operator is more effective at eliciting viewer attention than the traditional Gaussian enhancement operator %B Visualization and Computer Graphics, IEEE Transactions on %V 12 %P 925 - 932 %8 2006/10//sept %@ 1077-2626 %G eng %N 5 %R 10.1109/TVCG.2006.174 %0 Conference Paper %B Proceedings of the 2006 international conference on Digital government research %D 2006 %T Scalable data collection and retrieval infrastructure for digital government applications %A Samet, Hanan %A Golubchik,Leana %X In this paper we describe highlights of the project titled "Scalable data collection infrastructure for digital government applications" under the auspices of the Digital Government Research Program of the National Science Foundation. Our research is focused on taking advantage of the distributed nature of data and the interaction with it. Our efforts have been directed at both the systems/theoretical and applications levels. On the systems and theoretical levels, we have continued our development of the BISTRO system (Section 2). On the applications level, work has commenced on the development of a mechanism for spatially tagging text documents for retrieval by search engines based on both content and spatial proximity (Section 3). %B Proceedings of the 2006 international conference on Digital government research %S dg.o '06 %I ACM %C New York, NY, USA %P 301 - 302 %8 2006/// %G eng %U http://doi.acm.org/10.1145/1146598.1146679 %R 10.1145/1146598.1146679 %0 Conference Paper %B Proceedings of the 1st international conference on Scalable information systems %D 2006 %T A scalable key management and clustering scheme for ad hoc networks %A Li,Jason H. %A Levy,Renato %A Yu,Miao %A Bhattacharjee, Bobby %X This paper describes a scalable key management and clustering scheme for secure group communications in ad hoc and sensor networks. The scalability problem is solved by partitioning the communicating devices into subgroups, with a leader in each subgroup, and further organizing the subgroups into hierarchies. Each level of the hierarchy is called a tier or layer. Key generation, distribution, and actual data transmissions follow the hierarchy. The Distributed, Efficient Clustering Approach (DECA) provides robust clustering to form subgroups, and analytical and simulation results demonstrate that DECA is energy-efficient and resilient against node mobility. Comparing with most other schemes, our approach is extremely scalable and efficient, provides more security guarantees, and is selective, adaptive and robust. %B Proceedings of the 1st international conference on Scalable information systems %S InfoScale '06 %I ACM %C New York, NY, USA %8 2006/// %@ 1-59593-428-6 %G eng %U http://doi.acm.org/10.1145/1146847.1146875 %R 10.1145/1146847.1146875 %0 Journal Article %J Circuits and Systems for Video Technology, IEEE Transactions on %D 2006 %T A Scalable Multiuser Framework for Video Over OFDM Networks: Fairness and Efficiency %A Su,Guan-Ming %A Han,Zhu %A M. Wu %A Liu,K. J.R %K algorithm;video %K codec;video %K coding;video %K communication; %K deviation;downlink %K deviation;OFDM %K distortion;multidimensional %K diversity;multiple %K division %K end-to-end %K framework;time %K Frequency %K modulation;diversity %K multiple %K multiplex %K multiuser %K network;efficiency %K networks;video %K objectives;optimization %K of %K OFDM %K orthogonal %K over %K problem;fairness %K problem;maximal %K problems;quality %K programs;multiuser %K PSNR %K QUALITY %K reception;image %K resolution;optimisation;quality %K scalable %K service %K service;scalable %K service;video %K systems;optimal %K video %X In this paper, we propose a framework to transmit multiple scalable video programs over downlink multiuser orthogonal frequency division multiplex (OFDM) networks in real time. The framework explores the scalability of the video codec and multidimensional diversity of multiuser OFDM systems to achieve the optimal service objectives subject to constraints on delay and limited system resources. We consider two essential service objectives, namely, the fairness and efficiency. Fairness concerns the video quality deviation among users who subscribe the same quality of service, and efficiency relates to how to attain the highest overall video quality using the available system resources. We formulate the fairness problem as minimizing the maximal end-to-end distortion received among all users and the efficiency problem as minimizing total end-to-end distortion of all users. Fast suboptimal algorithms are proposed to solve the above two optimization problems. The simulation results demonstrated that the proposed fairness algorithm outperforms a time division multiple (TDM) algorithm by 0.5 3 dB in terms of the worst received video quality among all users. In addition, the proposed framework can achieve a desired tradeoff between fairness and efficiency. For achieving the same average video quality among all users, the proposed framework can provide fairer video quality with 1 1.8 dB lower PSNR deviation than a TDM algorithm %B Circuits and Systems for Video Technology, IEEE Transactions on %V 16 %P 1217 - 1231 %8 2006/10// %@ 1051-8215 %G eng %N 10 %R 10.1109/TCSVT.2006.883513 %0 Journal Article %J The Science of Hysteresis: Mathematical modeling and applications %D 2006 %T Scalar Preisach Models of Hysteresis %A Mayergoyz, Issak D %B The Science of Hysteresis: Mathematical modeling and applications %V 1 %P 293 - 293 %8 2006/// %G eng %0 Journal Article %J Gene %D 2006 %T Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily %A Wu,Wenjie %A Niles,Edward G. %A El‐Sayed, Najib M. %A Berriman,Matthew %A LoVerde,Philip T. %K Nuclear receptors %K Schistosoma mansoni %X Nuclear receptors (NRs) are important transcriptional modulators in metazoans. Sixteen new NRs were identified in the Platyhelminth trematode, Schistosoma mansoni. Three were found to possess novel tandem DNA-binding domains that identify a new subfamily of NR. Two NRs are homologues of the thyroid hormone receptor that previously were thought to be restricted to chordates. This study brings the total number of identified NR in S. mansoni to 21. Phylogenetic and comparative genomic analyses demonstrate that S. mansoni NRs share an evolutionary lineage with that of arthropods and vertebrates. Phylogenic analysis shows that more than half of the S. mansoni nuclear receptors evolved from a second gene duplication. As the second gene duplication of NRs was thought to be specific to vertebrates, our data challenge the current theory of NR evolution. %B Gene %V 366 %P 303 - 315 %8 2006/02/01/ %@ 0378-1119 %G eng %U http://www.sciencedirect.com/science/article/pii/S0378111905005871 %N 2 %R 16/j.gene.2005.09.013 %0 Book %D 2006 %T The Science of Hysteresis: Mathematical modeling and applications %A Bertotti,Giorgio %A Mayergoyz, Issak D %K Business & Economics / Economics / Microeconomics %K Hysteresis %K Magnetism %K Science / Physics / Magnetism %I Academic Press %8 2006/// %@ 9780123694317 %G eng %0 Report %D 2006 %T Script-Independent Text Line Segmentation in Freestyle Handwritten Documents %A Li,Yi %A Yefeng Zheng %A David Doermann %A Jaeger,Stefan %X Text line segmentation in freestyle handwritten documents remains an open document analysis problem. Curvilinear text lines and small gaps between neighboring text lines present a challenge to algorithms developed for machine printed or hand-printed documents. In this paper, we propose a novel approach based on density estimation and a state-of-the-art image segmentation technique, the level set method. From an input document image, we estimate a probability map, where each element represents the probability that the underlying pixel belongs to a text line. The level set method is then exploited to determine the boundary of neighboring text lines by evolving an initial estimate. Unlike most connected component based methods [1, 2], the proposed algorithm does not use any script-specific knowledge. Extensive quantitative experiments on freestyle handwritten documents with diverse scripts, such as Arabic, Chinese, Korean, and Hindi, demonstrate that our algorithm consistently outperforms previous methods [3, 1, 2]. Further experiments show the proposed algorithm is robust to scale change, rotation, and noise. %I University of Maryland, College Park %V LAMP-TR-136, CS-TR-4836, UMIACS-TR-2006-51, CFAR-TR-1017 %8 2006/11// %G eng %0 Journal Article %J Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %D 2006 %T Seasonal Cholera Caused by Vibrio Cholerae Serogroups O1 and O139 in the Coastal Aquatic Environment of Bangladesh %A Alam,Munirul %A Hasan,Nur A. %A Sadique,Abdus %A Bhuiyan,N. A. %A Ahmed,Kabir U. %A Nusrin,Suraia %A Nair,G. Balakrish %A Siddique,A. K. %A Sack,R. Bradley %A Sack,David A. %A Huq,Anwar %A Rita R Colwell %X Since Vibrio cholerae O139 first appeared in 1992, both O1 El Tor and O139 have been recognized as the epidemic serogroups, although their geographic distribution, endemicity, and reservoir are not fully understood. To address this lack of information, a study of the epidemiology and ecology of V. cholerae O1 and O139 was carried out in two coastal areas, Bakerganj and Mathbaria, Bangladesh, where cholera occurs seasonally. The results of a biweekly clinical study (January 2004 to May 2005), employing culture methods, and of an ecological study (monthly in Bakerganj and biweekly in Mathbaria from March 2004 to May 2005), employing direct and enrichment culture, colony blot hybridization, and direct fluorescent-antibody methods, showed that cholera is endemic in both Bakerganj and Mathbaria and that V. cholerae O1, O139, and non-O1/non-O139 are autochthonous to the aquatic environment. Although V. cholerae O1 and O139 were isolated from both areas, most noteworthy was the isolation of V. cholerae O139 in March, July, and September 2004 in Mathbaria, where seasonal cholera was clinically linked only to V. cholerae O1. In Mathbaria, V. cholerae O139 emerged as the sole cause of a significant outbreak of cholera in March 2005. V. cholerae O1 reemerged clinically in April 2005 and established dominance over V. cholerae O139, continuing to cause cholera in Mathbaria. In conclusion, the epidemic potential and coastal aquatic reservoir for V. cholerae O139 have been demonstrated. Based on the results of this study, the coastal ecosystem of the Bay of Bengal is concluded to be a significant reservoir for the epidemic serogroups of V. cholerae. %B Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %V 72 %P 4096 - 4104 %8 2006/06/01/ %@ 0099-2240, 1098-5336 %G eng %U http://aem.asm.org/content/72/6/4096 %N 6 %R 10.1128/AEM.00066-06 %0 Journal Article %J BMC Structural Biology %D 2006 %T Secondary Structure Spatial Conformation Footprint: A Novel Method for Fast Protein Structure Comparison and Classification %A Zotenko,Elena %A O'Leary, Dianne P. %A Przytycka,Teresa M. %X Recently a new class of methods for fast protein structure comparison has emerged. We call the methods in this class projection methods as they rely on a mapping of protein structure into a high-dimensional vector space. Once the mapping is done, the structure comparison is reduced to distance computation between corresponding vectors. As structural similarity is approximated by distance between projections, the success of any projection method depends on how well its mapping function is able to capture the salient features of protein structure. There is no agreement on what constitutes a good projection technique and the three currently known projection methods utilize very different approaches to the mapping construction, both in terms of what structural elements are included and how this information is integrated to produce a vector representation. Results In this paper we propose a novel projection method that uses secondary structure information to produce the mapping. First, a diverse set of spatial arrangements of triplets of secondary structure elements, a set of structural models, is automatically selected. Then, each protein structure is mapped into a high-dimensional vector of "counts" or footprint, where each count corresponds to the number of times a given structural model is observed in the structure, weighted by the precision with which the model is reproduced. We perform the first comprehensive evaluation of our method together with all other currently known projection methods. Conclusion The results of our evaluation suggest that the type of structural information used by a projection method affects the ability of the method to detect structural similarity. In particular, our method that uses the spatial conformations of triplets of secondary structure elements outperforms other methods in most of the tests. %B BMC Structural Biology %V 6 %8 2006/// %G eng %U DOI:10.1186/1472-6807-6-12DOI:10.1186/1472-6807-6-12 %N 12 %0 Conference Paper %B Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on %D 2006 %T Security Issues in Cooperative Communications: Tracing Adversarial Relays %A Mao,Yinian %A M. Wu %K adaptive %K Communication %K communications;adaptive %K construction;multiple %K detection;adversarial %K detection;decoding;radiocommunication;telecommunication %K issues;strategic %K nodes;pseudo-random %K relay %K relay;decode-and-forward %K relays;cooperative %K relays;wireless %K security; %K sequence %K signal %K spectrum %K spread %K strategy;direct %K symbol %K symbols;security %K system;cooperative %K tracing %X Cooperative communication system explores a new dimension of diversity in wireless communications to combat unfriendly wireless environment through strategic relays. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. In this paper we investigate the security issues in cooperative communications that consist of multiple relay nodes using decode-and-forward strategy. In particular, we consider the situation where one of the relay nodes is adversarial and tries to corrupt the communications by sending garbled signals. We show that the conventional physical-layer signal detection will not be effective in such a scenario, and the application-layer cryptography alone is not sufficient to identify the adversarial relay. To combat adversarial relay, we propose a cross-layer scheme that uses pseudo-random tracing symbols, with an adaptive signal detection rule at the physical layer, and direct sequence spread spectrum symbol construction at the application layer for tracing and identifying adversarial relay. Our experimental simulations show that the proposed tracing scheme is effective and efficient %B Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on %V 4 %P IV - IV %8 2006/05// %G eng %R 10.1109/ICASSP.2006.1660907 %0 Conference Paper %B Pattern Recognition, 2006. ICPR 2006. 18th International Conference on %D 2006 %T Segmentation and Probabilistic Registration of Articulated Body Models %A Sundaresan, A. %A Chellapa, Rama %K (mathematics); %K and %K approach;eigenspace;image %K articulated %K body %K data;voxel-based %K eigenfunctions;graph %K estimation;probabilistic %K fitting;voxel %K graph;pose %K models;bottom-up %K registration;eigenvalues %K registration;image %K registration;spline %K segmentation;neighbourhood %K segmentation;probability;splines %K theory;image %X There are different approaches to pose estimation and registration of different body parts using voxel data. We propose a general bottom-up approach in order to segment the voxels into different body parts. The voxels are first transformed into a high dimensional space which is the eigenspace of the Laplacian of the neighbourhood graph. We exploit the properties of this transformation and fit splines to the voxels belonging to different body segments in eigenspace. The boundary of the splines is determined by examination of the error in spline fitting. We then use a probabilistic approach to register the segmented body segments by utilizing their connectivity and prior knowledge of the general structure of the subjects. We present results on real data, containing both simple and complex poses. While we use human subjects in our experiment, the method is fairly general and can be applied to voxel-based registration of any articulated or non-rigid object composed of primarily 1-D parts %B Pattern Recognition, 2006. ICPR 2006. 18th International Conference on %V 2 %P 92 - 96 %8 2006/// %G eng %R 10.1109/ICPR.2006.1034 %0 Journal Article %J International journal of computer vision %D 2006 %T Segmentation of planar objects and their shadows in motion sequences %A Yacoob,Yaser %A Davis, Larry S. %X We investigate segmentation of planar objects and their cast shadows in image sequences. Given two moving image regions in an image sequence we present an algorithm for determining if the two moving regions can be interpreted as a planar object and its cast shadow. Projective geometry and motion properties are employed to directly recover a homology that constrains point correspondences of the outlines of the image regions and determine if they obey an object/shadow relationship. This homology is derived directly from the motions of the regions and therefore is easier to accomplish than determining point-to-point correspondences between candidate object-shadow pairs. Several experiments under approximate point light source illumination are presented. %B International journal of computer vision %V 67 %P 53 - 69 %8 2006/// %G eng %N 1 %0 Conference Paper %B Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks %D 2006 %T Segmenting people in small groups %A Davis, Larry S. %K segmentation %K Surveillance %K video analysis %X In this paper we review prior work on the problem of segmenting small groups of people into individuals in surveillance video. %B Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks %S VSSN '06 %I ACM %C New York, NY, USA %P 1 - 2 %8 2006/// %@ 1-59593-496-0 %G eng %U http://doi.acm.org/10.1145/1178782.1178783 %R 10.1145/1178782.1178783 %0 Journal Article %J PLoS Comput BiolPLoS Comput Biol %D 2006 %T Selection of Target Sites for Mobile DNA Integration in the Human Genome %A Berry,Charles %A Hannenhalli, Sridhar %A Leipzig,Jeremy %A Bushman,Frederic D. %X DNA sequences from retroviruses, retrotransposons, DNA transposons, and parvoviruses can all become integrated into the human genome. Accumulation of such sequences accounts for at least 40% of our genome today. These integrating elements are also of interest as gene-delivery vectors for human gene therapy. Here we present a comprehensive bioinformatic analysis of integration targeting by HIV, MLV, ASLV, SFV, L1, SB, and AAV. We used a mathematical method which allowed annotation of each base pair in the human genome for its likelihood of hosting an integration event by each type of element, taking advantage of more than 200 types of genomic annotation. This bioinformatic resource documents a wealth of new associations between genomic features and integration targeting. The study also revealed that the length of genomic intervals analyzed strongly affected the conclusions drawn—thus, answering the question “What genomic features affect integration?” requires carefully specifying the length scale of interest. %B PLoS Comput BiolPLoS Comput Biol %V 2 %P e157 - e157 %8 2006/11/24/ %G eng %U UR - http://dx.plos.org/10.1371/journal.pcbi.0020157,http://dx.plos.org/10.1371/journal.pcbi.0020157 %N 11 %R 10.1371/journal.pcbi.0020157 %0 Conference Paper %B Pattern Recognition, 2006. ICPR 2006. 18th International Conference on %D 2006 %T Semi-Parametric Model-Based Clustering for DNA Microarray Data %A Han,Bohyung %A Davis, Larry S. %K clustering; %K clustering;DNA;Gaussian %K computing;genetics;pattern %K data;Gaussian %K data;maximum %K DNA %K Expression %K fitting;data %K kernel;Gaussian %K likelihood;mean-shift %K maximization;gene %K Microarray %K mixtures;curvature %K model-based %K procedure;semiparametric %K processes;biology %K representation;expectation %X Various clustering methods have been proposed for the analysis of gene expression data, but conventional clustering algorithms have several critical limitations; how to set parameters such as number of clusters, initial cluster centers, and so on. In this paper, we propose a semi-parametric model-based clustering algorithm in which the underlying model is a mixture of Gaussian. Each gene expression data builds a Gaussian kernel, and the uncertainty of microarray data is naturally integrated in the data representation. Our algorithm provides a principled method to automatically determine parameters - number of components in the mixture, mean, covariance, and weight of each Gaussian - by mean-shift procedure (Comaniciu and Meer, 1999) and curvature fitting. After the initialization, expectation maximization (EM) algorithm is employed for clustering to achieve maximum likelihood (ML). The performance of our algorithm is compared with standard EM algorithm using real data as well as synthetic data %B Pattern Recognition, 2006. ICPR 2006. 18th International Conference on %V 3 %P 324 - 327 %8 2006//00/0 %G eng %R 10.1109/ICPR.2006.1044 %0 Conference Paper %B Proceedings of the 5th international conference on Information processing in sensor networks %D 2006 %T A sensory grammar for inferring behaviors in sensor networks %A Lymberopoulos, Dimitrios %A Ogale, Abhijit S. %A Savvides, Andreas %A Aloimonos, J. %K algorithms %K behavior identification %K human activity %K human factors %K pcfg %K real-time and embedded systems %K sensor grammars %K sensor networks %X The ability of a sensor network to parse out observable activities into a set of distinguishable actions is a powerful feature that can potentially enable many applications of sensor networks to everyday life situations. In this paper we introduce a framework that uses a hierarchy of Probabilistic Context Free Grammars (PCFGs) to perform such parsing. The power of the framework comes from the hierarchical organization of grammars that allows the use of simple local sensor measurements for reasoning about more macroscopic behaviors. Our presentation describes how to use a set of phonemes to construct grammars and how to achieve distributed operation using a messaging model. The proposed framework is flexible. It can be mapped to a network hierarchy or can be applied sequentially and across the network to infer behaviors as they unfold in space and time. We demonstrate this functionality by inferring simple motion patterns using a sequence of simple direction vectors obtained from our camera sensor network testbed. %B Proceedings of the 5th international conference on Information processing in sensor networks %S IPSN '06 %I ACM %C Nashville, Tennessee, USA %P 251 - 259 %8 2006/// %@ 1-59593-334-4 %G eng %R 10.1145/1127777.1127817 %0 Conference Paper %B 2006 6th IEEE-RAS International Conference on Humanoid Robots %D 2006 %T A Sensory-Motor Language for Human Activity Understanding %A Guerra-Filho,G. %A Aloimonos, J. %K Actuators %K associative learning %K atomic segments %K computational linguistics %K Computer science %K Computer vision %K Educational institutions %K grammars %K human activity language %K human activity understanding %K human movement syntax %K Humanoid robots %K HUMANS %K joint angles %K kinetemes %K kinetological system %K Laboratories %K learning (artificial intelligence) %K List key index terms here %K Morphology %K motor information %K No mare than 5 %K parallel learning %K Reproducibility of results %K Robot kinematics %K Robot programming %K robot vision %K sensory-motor language %K sequential language learning %K symbolic nonarbitrary representation %K visual information %X We have empirically discovered that the space of human actions has a linguistic framework. This is a sensory-motor space consisting of the evolution of the joint angles of the human body in movement. The space of human activity has its own phonemes, morphemes, and sentences. We present a human activity language (HAL) for symbolic non-arbitrary representation of visual and motor information. In phonology, we define atomic segments (kinetemes) that are used to compose human activity. We introduce the concept of a kinetological system and propose five basic properties for such a system: compactness, view-invariance, reproducibility, selectivity, and reconstructivity. In morphology, we extend sequential language learning to incorporate associative learning with our parallel learning approach. Parallel learning is effective in identifying the kinetemes and active joints in a particular action. In syntax, we suggest four lexical categories for our human activity language (noun, verb, adjective, and adverb). These categories are combined into sentences through syntax for human movement %B 2006 6th IEEE-RAS International Conference on Humanoid Robots %I IEEE %P 69 - 75 %8 2006/12/04/6 %@ 1-4244-0200-X %G eng %R 10.1109/ICHR.2006.321365 %0 Journal Article %J Proceedings of the 2006 Document Understanding Workshop, New York %D 2006 %T Sentence compression as a component of a multi-document summarization system %A Zajic, David %A Dorr, Bonnie J %A Jimmy Lin %A Schwartz,R. %X We applied a single-document sentence-trimming approach (Trimmer) to the problem of multi-document summariza- tion. Trimmer was designed with the in- tention of compressing a lead sentence into a space consisting of tens of char- acters. In our Multi-Document Trimmer (MDT), we use Trimmer to generate multiple trimmed candidates for each sentence. Sentence selection is used to determine which trimmed candidates provide the best combination of topic coverage and brevity. We demonstrate that we were able to port Trimmer easily to this new problem. We also show that MDT generally ranked higher for recall than for precision, suggesting that MDT is currently more successful at finding relevant content than it is at weeding out irrelevant content. Finally, we present an error analysis that shows that, while sentence compressions is making space for additional sentences, more work is needed in the area of generating and se- lecting the right candidates. %B Proceedings of the 2006 Document Understanding Workshop, New York %8 2006/// %G eng %0 Book Section %B DUC 06 Conference Proceedings %D 2006 %T Sentence Trimming and Selection: Mixing and Matching %A Zajic, David %A Dorr, Bonnie J %A Jimmy Lin %A O'Leary, Dianne P. %A Conroy,John M. %A Schlesinger,Judith D. %X We describe how components from two distinct multi-document summarization systems were combined. Twenty four possible combinations of components were considered. We observed some contrasts between conservative and aggressive sentence compression (i.e., trimming) in the context of multi-document summarization. %B DUC 06 Conference Proceedings %I U.S. National Inst. of Standards and Technology %8 2006/// %G eng %U http://duc.nist.gov/ %0 Journal Article %J FEMS Microbiology Letters %D 2006 %T Septaplex PCR assay for rapid identification of Vibrio cholerae including detection of virulence and int SXT genes %A Mantri,Chinmay K. %A Mohapatra,Saswat S. %A Ramamurthy,Thandavarayan %A Ghosh,Raikamal %A Rita R Colwell %A Singh,Durg V. %K DETECTION %K intsxt %K septaplex PCR %K Vibrio cholerae %K virulence %X In this study, we describe a septaplex PCR assay for rapid identification of Vibrio cholerae including detection of the virulence and intsxt genes. Conditions were optimized to amplify fragments of ISRrRNA (encoding for 16S–23S rRNA gene, Intergenic spacer regions), O1rfb (O1 serogroup specific rfb), O139rfb (O139 serogroup specific rfb), ctxA (cholera toxin subunit A), tcpA (toxin coregulated pilus), and intsxt (sxt integron) simultaneously in a single PCR. The septaplex PCR was evaluated using 211 strains of V. cholerae and six water samples for in situ testing. PCR results were correlated with genotype data obtained by individual PCR and slot-blot assays. The one-step PCR described here can be used to identify V. cholerae accurately and rapidly. Also, the virulence and intsxt genes can be simultaneously detected, providing a useful method for monitoring pathogenic, intsxt-positive and nonpathogenic, intsxt-negative V. cholerae serogroups both in the environment and clinical settings. %B FEMS Microbiology Letters %V 265 %P 208 - 214 %8 2006/12/01/ %@ 1574-6968 %G eng %U http://onlinelibrary.wiley.com/doi/10.1111/j.1574-6968.2006.00491.x/full %N 2 %R 10.1111/j.1574-6968.2006.00491.x %0 Journal Article %J Lecture Notes in Computer Science %D 2006 %T Session 8A-Combinatorial Optimization and Quantum Computing-Lower Bounds on the Deterministic and Quantum Communication Complexities of Hamming-Distance Problems %A Ambainis,A. %A Gasarch,W. %A Srinivasan, Aravind %A Utis,A. %B Lecture Notes in Computer Science %V 4288 %P 628 - 637 %8 2006/// %G eng %0 Journal Article %J Interacting with Computers %D 2006 %T Severity and impact of computer user frustration: A comparison of student and workplace users %A Lazar,Jonathan %A Jones,Adam %A Hackley,Mary %A Shneiderman, Ben %K Computer anxiety %K Computer experience %K Helpdesk %K Training %K User frustration %K user interface design %X User frustration with information and computing technology is a pervasive and persistent problem. When computers crash, network congestion causes delays, and poor user interfaces trigger confusion there are dramatic consequences for individuals, organizations, and society. These frustrations, not only cause personal dissatisfaction and loss of self-efficacy, but may disrupt workplaces, slow learning, and reduce participation in local and national communities. Our exploratory study of 107 student computer users and 50 workplace computer users shows high levels of frustration and loss of 1/3–1/2 of time spent. This paper reports on the incident and individual factors that cause of frustration, and how they raise frustration severity. It examines the frustration impacts on the daily interactions of the users. The time lost and time to fix problem, and importance of task, strongly correlate with frustration levels for both student and workplace users. Differences between students and workplace users are discussed in the paper, as are implications for researchers. %B Interacting with Computers %V 18 %P 187 - 207 %8 2006/03// %@ 0953-5438 %G eng %U http://www.sciencedirect.com/science/article/pii/S0953543805000561 %N 2 %R 10.1016/j.intcom.2005.06.001 %0 Conference Paper %B CAD Conference %D 2006 %T Shape Similarity Assessment Based On Face Alignment Using Attributed Applied Vectors. %A Cardone, Antonio %A Gupta, Satyandra K. %B CAD Conference %0 Conference Paper %B Image Processing, 2006 IEEE International Conference on %D 2006 %T Shape-Regulated Particle Filtering for Tracking Non-Rigid Objects %A Jie Shao %A Chellapa, Rama %A Porikli, F. %K (numerical %K 2D %K algorithm;affine %K based %K contour %K detection;dynamic %K detection;motion %K detection;parameter %K estimation;active %K estimation;object %K estimation;particle %K Filtering %K filtering;probabilistic %K filters; %K map;shape-regulation;affine %K methods);tracking %K model;nonrigid %K MOTION %K object %K scenes;deformation %K tracking;parameter %K transform;cluttered %K transforms;clutter;edge %X This paper presents an active contour based algorithm for tracking non-rigid objects in heavily cluttered scenes. We decompose the non-rigid contour tracking problem into three subproblems: 2D motion estimation, deformation detection, and shape regulation. First, we employ a particle filter to estimate the affine transform parameters between successive frames. Second, by using a dynamic object model, we generate a probabilistic map of deformation to reshape its contour. Finally, we project the updated model onto a trained shape subspace to constrain deformations to be within possible object appearances. Our experiments show that the proposed algorithm significantly improves the performance of the tracker %B Image Processing, 2006 IEEE International Conference on %P 2813 - 2816 %8 2006/10// %G eng %R 10.1109/ICIP.2006.312993 %0 Journal Article %J ACM Trans. Comput.-Hum. Interact. %D 2006 %T Shared family calendars: Promoting symmetry and accessibility %A Plaisant, Catherine %A Clamage,Aaron %A Hutchinson,Hilary Browne %A Bederson, Benjamin B. %A Druin, Allison %K calendar %K digital paper %K elderly %K family technology %K Home %K layered interface %K privacy %K universal usability %X We describe the design and use of a system facilitating the sharing of calendar information between remotely located, multi-generational family members. Most previous work in this area involves software enabling younger family members to monitor their parents. We have found, however, that older adults are equally if not more interested in the activities of younger family members. The major obstacle preventing them from participating in information sharing is the technology itself. Therefore, we developed a multi-layered interface approach that offers simple interaction to older users. In our system, users can choose to enter information into a computerized calendar or write it by hand on digital paper calendars. All of the information is automatically shared among everyone in the distributed family. By making the interface more accessible to older users, we promote symmetrical sharing of information among both older and younger family members. We present our participatory design process, describe the user interface, and report on an exploratory field study in three households of an extended family. %B ACM Trans. Comput.-Hum. Interact. %V 13 %P 313 - 346 %8 2006/09// %@ 1073-0516 %G eng %U http://doi.acm.org/10.1145/1183456.1183458 %N 3 %R 10.1145/1183456.1183458 %0 Book Section %B Human Identification Based on GaitHuman Identification Based on Gait %D 2006 %T Silhouette-Based Approaches %A Nixon, M.S. %A Tan, T. %A Chellapa, Rama %X Of the current approaches, most are based on analysis of silhouettes. This is like the earlier analysis which concerned abstracting a walking subject from the background and then deriving set of measurements that describe the shape and motion of that silhouette in a sequence of images. This is similar in approach the classic computer vision approach to recognize objects by using shape descriptions of objects derived, say, by optimal thresholding. %B Human Identification Based on GaitHuman Identification Based on Gait %P 45 - 105 %8 2006/// %G eng %0 Conference Paper %B Data Mining, 2006. ICDM '06. Sixth International Conference on %D 2006 %T Social Capital in Friendship-Event Networks %A Licamele,L. %A Getoor, Lise %K academic %K based %K capital;Internet;groupware;knowledge %K Collaboration %K friendship;friendship-event %K network;actor-organizer %K network;social %K systems; %X In this paper, we examine a particular form of social network which we call a friendship-event network. A friendship-event network captures both the friendship relationship among a set of actors, and also the organizer and participation relationships of actors in a series of events. Within these networks, we formulate the notion of social capital based on the actor-organizer friendship relationship and the notion of benefit, based on event participation. We investigate appropriate definitions for the social capital of both a single actor and a collection of actors. We ground these definitions in a real-world example of academic collaboration networks, where the actors are researchers, the friendships are collaborations, the events are conferences, the organizers are program committee members and the participants are conference authors. We show that our definitions of capital and benefit capture interesting qualitative properties of event series. In addition, we show that social capital is a better publication predictor than publication history. %B Data Mining, 2006. ICDM '06. Sixth International Conference on %P 959 - 964 %8 2006/// %G eng %R 10.1109/ICDM.2006.149 %0 Report %D 2006 %T SOFTCBIR: Object Searching in Videos Combining Keypoint Matching and Graduated Assignment %A Luo,Ming %A DeMenthon,Daniel %A Yu,Xiaodong %A David Doermann %X This paper proposes a new approach to object searching in video databases, SoftCBIR, which combines a keypoint matching algorithm and a graduated assignment algorithm based on softassign. Compared with previous approaches, SoftCBIR is an innovative combination of two powerful techniques: 1) An energy minimization algorithm is applied to match two groups of keypoints while accounting for both their similarity in descriptor space and the consistency of their geometric configuration. The algorithm computes correspondence and pose transformation between two groups of keypoints iteratively and alternately toward an optimal result. The objective energy function combines normalized distance errors in descriptor space and in the spatial domain. 2) Initial individual keypoint matching relies on Approximate K-Nearest Neighbor (ANN) search. ANN achieves much more accurate initial keypoint matching results in the descriptor space than K-means labeling. Experiments prove the effectiveness of our approach, and demonstrate the performance improvements rising from the combination of the two proposed techniques in the SoftCBIR algorithm. The support of this research by the Department of Defense under contract MDA-9040-2C-0406 is gratefully acknowledged. %I University of Maryland, College Park %V LAMP-TR-132,CAR-TR-1013,CS-TR-4804,UMIACS-TR-2006-25 %8 2006/05// %G eng %0 Conference Paper %B Computer Software and Applications Conference, 2006. COMPSAC '06. 30th Annual International %D 2006 %T A Software Architectural Approach to Security by Design %A Ray,A. %A Cleaveland, Rance %K architecture description notation %K Clocks %K communication semantics %K Computer architecture %K computer crime %K computer security %K Connectors %K Costs %K Degradation %K Delay %K Educational institutions %K security design %K security of data %K Software architecture %K software engineering %X This paper shows how an architecture description notation that has support for timed events can be used to provide a meta-language for specifying exact communication semantics. The advantages of such an approach is that a designer is made fully aware of the ramifications of her design choices so that an attacker can no longer take advantage of hidden assumptions %B Computer Software and Applications Conference, 2006. COMPSAC '06. 30th Annual International %I IEEE %V 2 %P 83 - 86 %8 2006/09/17/21 %@ 0-7695-2655-1 %G eng %R 10.1109/COMPSAC.2006.102 %0 Journal Article %J Proc. LREC %D 2006 %T SParseval: Evaluation metrics for parsing speech %A Roark,B. %A Harper,M. %A Charniak,E. %A Dorr, Bonnie J %A Johnson,M. %A Kahn,J. %A Liu,Y. %A Ostendorf,M. %A Hale,J. %A Krasnyanskaya,A. %A others %X While both spoken and written language processing stand to benefit from parsing, the standard Parseval metrics (Black et al., 1991) andtheir canonical implementation (Sekine and Collins, 1997) are only useful for text. The Parseval metrics are undefined when the words input to the parser do not match the words in the gold standard parse tree exactly, and word errors are unavoidable with automatic speech recognition (ASR) systems. To fill this gap, we have developed a publicly available tool for scoring parses that implements a variety of metrics which can handle mismatches in words and segmentations, including: alignment-based bracket evaluation, alignment-based dependency evaluation, and a dependency evaluation that does not require alignment. We describe the different metrics, how to use the tool, and the outcome of an extensive set of experiments on the sensitivity of the metrics. %B Proc. LREC %8 2006/// %G eng %0 Journal Article %J Proceedings of the IEEE %D 2006 %T Special Issue on Biometrics: Algorithms and Applications %A Chellapa, Rama %A Phillips, J. %A Reynolds, D. %B Proceedings of the IEEE %V 94 %P 1912 - 1914 %8 2006/11// %@ 0018-9219 %G eng %N 11 %R 10.1109/JPROC.2006.886016 %0 Journal Article %J The Journal of the Acoustical Society of America %D 2006 %T Spherical and hemispherical microphone arrays for capture and analysis of sound fields %A Duraiswami, Ramani %A Zhiyun Li %A Zotkin,Dmitry N %A Grassi,Elena %X The capture of the spatial structure of a sound field and analysis is important in many fields including creating virtual environments, source localization and detection, noise suppression, and beamforming. Spherical microphone arrays are a promising development to help achieve such capture and analysis, and have been studied by several groups. We develop a practical spherical microphone array and demonstrate its utility in applications for sound capture, room measurement and for beamforming and tracking. To accommodate equipment failure and manufacturing imprecision we extend their theory to handle arbitrary microphone placement. To handle speech capture and surveillance we describe the development of a new sensor, the hemispherical microphone array. For each array the practical performance follows that predicted by theory. Future applications and improvements are also discussed. [Work supported by NSF.] %B The Journal of the Acoustical Society of America %V 120 %P 3225 - 3225 %8 2006/// %G eng %U http://link.aip.org/link/?JAS/120/3225/3 %N 5 %0 Conference Paper %B Image Processing, 2006 IEEE International Conference on %D 2006 %T Stabilization and Mosaicing of Airborne Videos %A Ramachandran, M. %A Chellapa, Rama %K airborne %K analysis;image %K cameras; %K convergence;low-resolution %K ego-motion %K estimation;iterations %K flow %K measurement;video %K mosaicing;camera %K MOTION %K resolution;image %K segmentation;image %K sequence;optical %K sequences;video %K stabilization;image %K video %K Videos %X We present an algorithm for stabilizing low-quality and low-resolution video sequences obtained from UAVs and MAVs flying over a predominantly planar terrain. The problem is important for the processing of videos captured from airborne platforms where most of the image region gives little information about the image-motion. The algorithm consists of approximately aligning the images using phase correlation, then refining the transformation parameters using available optical flow measurements and finally performing a minimization of the image difference by carefully selecting the image regions to make the iterations converge. In the second part of the paper, we describe an algorithm for camera ego-motion estimation by incorporating available metadata along with the video sequence. The availability of metadata such as IMU measurements provides a good initial solution for the camera orientation and helps the iterations converge faster by reducing the search space %B Image Processing, 2006 IEEE International Conference on %P 345 - 348 %8 2006/10// %G eng %R 10.1109/ICIP.2006.313164 %0 Journal Article %J SIAM J. on Matrix Analysis and Applications %D 2006 %T Stable Factorizations of Symmetric Tridiagonal and Triadic Matrices %A Fang,Haw-ren %A O'Leary, Dianne P. %X We call a matrix triadic if it has no more than two nonzero off-diagonal elements in any column. A symmetric tridiagonal matrix is a special case. In this paper we consider $LXL^T$ factorizations of symmetric triadic matrices, where $L$ is unit lower triangular and $X$ is diagonal, block diagonal with $1\!\times\!1$ and $2\!\times\!2$ blocks, or the identity with $L$ lower triangular. We prove that with diagonal pivoting, the $LXL^T$ factorization of a symmetric triadic matrix is sparse, study some pivoting algorithms, discuss their growth factor and performance, analyze their stability, and develop perturbation bounds. These factorizations are useful in computing inertia, in solving linear systems of equations, and in determining modified Newton search directions. %B SIAM J. on Matrix Analysis and Applications %V 28 %P 576 - 595 %8 2006/// %G eng %0 Conference Paper %D 2006 %T A Statistical Analysis of Attack Data to Separate Attacks %A Michel Cukier %A Berthier,R. %A Panjwani,S. %A Tan,S. %K attack data statistical analysis %K attack separation %K computer crime %K Data analysis %K data mining %K ICMP scans %K K-Means algorithm %K pattern clustering %K port scans %K statistical analysis %K vulnerability scans %X This paper analyzes malicious activity collected from a test-bed, consisting of two target computers dedicated solely to the purpose of being attacked, over a 109 day time period. We separated port scans, ICMP scans, and vulnerability scans from the malicious activity. In the remaining attack data, over 78% (i.e., 3,677 attacks) targeted port 445, which was then statistically analyzed. The goal was to find the characteristics that most efficiently separate the attacks. First, we separated the attacks by analyzing their messages. Then we separated the attacks by clustering characteristics using the K-Means algorithm. The comparison between the analysis of the messages and the outcome of the K-Means algorithm showed that 1) the mean of the distributions of packets, bytes and message lengths over time are poor characteristics to separate attacks and 2) the number of bytes, the mean of the distribution of bytes and message lengths as a function of the number packets are the best characteristics for separating attacks %P 383 - 392 %8 2006/06// %G eng %R 10.1109/DSN.2006.9 %0 Book Section %B Geometric Modeling and Processing - GMP 2006 %D 2006 %T A Step Towards Automated Design of Side Actions in Injection Molding of Complex Parts %A Banerjee,Ashis %A Gupta, Satyandra K. %E Kim,Myung-Soo %E Shimada,Kenji %K Computer science %X Side actions contribute to mold cost by resulting in an additional manufacturing and assembly cost as well as by increasing the molding cycle time. Therefore, generating shapes of side actions requires solving a complex geometric optimization problem. Different objective functions may be needed depending upon different molding scenarios (e.g., prototyping versus large production runs). Manually designing side actions is a challenging task and requires considerable expertise. Automated design of side actions will significantly reduce mold design lead times. This paper describes algorithms for generating shapes of side actions to minimize a customizable molding cost function. %B Geometric Modeling and Processing - GMP 2006 %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 4077 %P 500 - 513 %8 2006/// %@ 978-3-540-36711-6 %G eng %U http://www.springerlink.com/content/w7q3212607500635/abstract/ %0 Journal Article %J Integrated Computer-Aided Engineering %D 2006 %T Stigmergic self-assembly of prespecified artificial structures in a constrained and continuous environment %A Grushin,A. %A Reggia, James A. %B Integrated Computer-Aided Engineering %V 13 %P 289 - 312 %8 2006/// %G eng %N 4 %0 Conference Paper %B Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems %D 2006 %T A stochastic language for modelling opponent agents %A Simari,G. %A Sliva,A. %A Nau, Dana S. %A V.S. Subrahmanian %X There are numerous cases where a reasoning agent needs toreason about the behavior of an opponent agent. In this pa- per, we propose a hybrid probabilistic logic language within which we can express what actions an opponent may take in a given situation. We present the syntaxis and semantics of the language, and the concept of a Maximally Probable Course of Action. %B Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems %P 244 - 246 %8 2006/// %G eng %0 Conference Paper %B Proceedings of the 2006 AVI workshop on BEyond time and errors: novel evaluation methods for information visualization %D 2006 %T Strategies for evaluating information visualization tools: multi-dimensional in-depth long-term case studies %A Shneiderman, Ben %A Plaisant, Catherine %X After an historical review of evaluation methods, we describe an emerging research method called Multi-dimensional In-depth Long-term Case studies (MILCs) which seems well adapted to study the creative activities that users of information visualization systems engage in. We propose that the efficacy of tools can be assessed by documenting 1) usage (observations, interviews, surveys, logging etc.) and 2) expert users' success in achieving their professional goals. We summarize lessons from related ethnography methods used in HCI and provide guidelines for conducting MILCs for information visualization. We suggest ways to refine the methods for MILCs in modest sized projects and then envision ambitious projects with 3-10 researchers working over 1-3 years to understand individual and organizational use of information visualization by domain experts working at the frontiers of knowledge in their fields. %B Proceedings of the 2006 AVI workshop on BEyond time and errors: novel evaluation methods for information visualization %S BELIV '06 %I ACM %C New York, NY, USA %P 1 - 7 %8 2006/// %@ 1-59593-562-2 %G eng %U http://doi.acm.org/10.1145/1168149.1168158 %R 10.1145/1168149.1168158 %0 Conference Paper %B Proceedings of the 6th ACM SIGCOMM conference on Internet measurement %D 2006 %T A structural approach to latency prediction %A Madhyastha,Harsha V. %A Anderson,Thomas %A Krishnamurthy,Arvind %A Spring, Neil %A Venkataramani,Arun %K internet topology %K latency prediction %K route measurements %X Several models have been recently proposed for predicting the latency of end to end Internet paths. These models treat the Internet as a black-box, ignoring its internal structure. While these models are simple, they can often fail systematically; for example, the most widely used models use metric embeddings that predict no benefit to detour routes even though half of all Internet routes can benefit from detours.In this paper, we adopt a structural approach that predicts path latency based on measurements of the Internet's routing topology, PoP connectivity, and routing policy. We find that our approach outperforms Vivaldi, the most widely used black-box model. Furthermore, unlike metric embeddings, our approach successfully predicts 65% of detour routes in the Internet. The number of measurements used in our approach is comparable with that required by black box techniques, but using traceroutes instead of pings. %B Proceedings of the 6th ACM SIGCOMM conference on Internet measurement %S IMC '06 %I ACM %C New York, NY, USA %P 99 - 104 %8 2006/// %@ 1-59593-561-4 %G eng %U http://doi.acm.org/10.1145/1177080.1177092 %R 10.1145/1177080.1177092 %0 Journal Article %J Image Processing, IEEE Transactions on %D 2006 %T Structure From Planar Motion %A Li,Jian %A Chellapa, Rama %K algebra;road %K analysis;matrix %K camera;surveillance %K directional %K matrix;planar %K MOTION %K motion;stationary %K perspective %K processing; %K reconstruction %K signal %K system;image %K uncertainty;measurement %K vehicles;surveillance;video %K videos;vehicle %X Planar motion is arguably the most dominant type of motion in surveillance videos. The constraints on motion lead to a simplified factorization method for structure from planar motion when using a stationary perspective camera. Compared with methods for general motion , our approach has two major advantages: a measurement matrix that fully exploits the motion constraints is formed such that the new measurement matrix has a rank of at most 3, instead of 4; the measurement matrix needs similar scalings, but the estimation of fundamental matrices or epipoles is not needed. Experimental results show that the algorithm is accurate and fairly robust to noise and inaccurate calibration. As the new measurement matrix is a nonlinear function of the observed variables, a different method is introduced to deal with the directional uncertainty in the observed variables. Differences and the dual relationship between planar motion and planar object are also clarified. Based on our method, a fully automated vehicle reconstruction system has been designed %B Image Processing, IEEE Transactions on %V 15 %P 3466 - 3477 %8 2006/11// %@ 1057-7149 %G eng %N 11 %R 10.1109/TIP.2006.881943 %0 Journal Article %J DIMACS Series in Discrete Mathematics and Theoretical Computer Science %D 2006 %T Structure of social contact networks and their impact on epidemics %A Eubank,S. %A Kumar,V. S.A %A Marathe,M. V %A Srinivasan, Aravind %A Wang,N. %X Traditional epidemiological research has focused on rate-based differential-equation models on completely mixing populations. In this paper, we outline an approach based on a combination of net- work theory and discrete-event simulations to study epidemics in large urban areas. We survey some of our results published in Nature (2004) and the Proc. ACM-SIAM Symposium on Discrete Algorithms (2004), and present some new results on: (i) mathematical properties of large social contact networks, as well as (ii) simulation-based dynamic anal- ysis of disease-spread in such networks. We identify a number of new measures that are significant for understanding epidemics and for devel- oping new strategies in policy planning. We also perform a very detailed structural analysis of the social contact networks produced by TRAN- SIMS, a simulator for detailed transportation/traffic studies, and study two random graph models to generate realistic social networks: Chung- Lu’s model and the configuration model. We also develop combinatorial formulations and approximation algorithms for quarantining, vaccina- tion and sensor placement, as aids to decision-making. %B DIMACS Series in Discrete Mathematics and Theoretical Computer Science %V 70 %P 181 - 181 %8 2006/// %G eng %0 Journal Article %J Proceedings of Association for Machine Translation in the Americas %D 2006 %T A study of translation edit rate with targeted human annotation %A Snover,M. %A Dorr, Bonnie J %A Schwartz,R. %A Micciulla,L. %A Makhoul,J. %X We examine a new, intuitive measurefor evaluating machine-translation output that avoids the knowledge intensiveness of more meaning-based approaches, and the labor-intensiveness of human judg- ments. Translation Edit Rate (TER) mea- sures the amount of editing that a hu- man would have to perform to change a system output so it exactly matches a reference translation. We show that the single-reference variant of TER correlates as well with human judgments of MT quality as the four-reference variant of BLEU. We also define a human-targeted TER (or HTER) and show that it yields higher correlations with human judgments than BLEU—even when BLEU is given human-targeted references. Our results in- dicate that HTER correlates with human judgments better than HMETEOR and that the four-reference variants of TER and HTER correlate with human judg- ments as well as—or better than—a sec- ond human judgment does. %B Proceedings of Association for Machine Translation in the Americas %P 223 - 231 %8 2006/// %G eng %0 Conference Paper %B Software Reliability Engineering, 2006. ISSRE '06. 17th International Symposium on %D 2006 %T Studying the Characteristics of a "Good" GUI Test Suite %A Xie,Qing %A Memon, Atif M. %K Fault detection %K Fault diagnosis %K graphical user interface testing %K Graphical user interfaces %K program debugging %K program testing %X The widespread deployment of graphical-user interfaces (GUIs) has increased the overall complexity of testing. A GUI test designer needs to perform the daunting task of adequately testing the GUI, which typically has very large input interaction spaces, while considering tradeoffs between GUI test suite characteristics such as the number of test cases (each modeled as a sequence of events), their lengths, and the event composition of each test case. There are no published empirical studies on GUI testing that a GUI test designer may reference to make decisions about these characteristics. Consequently, in practice, very few GUI testers know how to design their test suites. This paper takes the first step towards assisting in GUI test design by presenting an empirical study that evaluates the effect of these characteristics on testing cost and fault detection effectiveness. The results show that two factors significantly effect the fault-detection effectiveness of a test suite: (1) the diversity of states in which an event executes and (2) the event coverage of the suite. Test designers need to improve the diversity of states in which each event executes by developing a large number of short test cases to detect the majority of "shallow" faults, which are artifacts of modern GUI design. Additional resources should be used to develop a small number of long test cases to detect a small number of "deep" faults %B Software Reliability Engineering, 2006. ISSRE '06. 17th International Symposium on %P 159 - 168 %8 2006/11// %G eng %R 10.1109/ISSRE.2006.45 %0 Book Section %B Human Identification Based on GaitHuman Identification Based on Gait %D 2006 %T Subjects Allied to Gait %A Nixon, M.S. %A Tan, T. %A Chellapa, Rama %X There is considerable support for the notion that each person’s gait is unique. As we shall see, it has been observed in literature that people can be recognized by the way they walk. The same notion has been observed in medicine and biomechanics, though not in the context of biometrics but more as an assertion of individuality. Perhaps driven by these notions, though without reference to them, there has been work in psychology on the human ability to recognize each other by using gait. Those suffering myopia often state that they can use gait as a way of recognizing people. There is other evidence too, which suggests that each person’s gait is unique. People have also studied walking from medical and biomechanical perspectives, and this gives insight into how its properties can change which is of general interest in any biometrie deployment. We shall start with literature, with definitions of meaning. %B Human Identification Based on GaitHuman Identification Based on Gait %P 5 - 15 %8 2006/// %G eng %0 Report %D 2006 %T Summarization-Inspired Temporal-Relation Extraction: Tense-Pair Templates and Treebank-3 Analysis %A Dorr, Bonnie J %A Gaasterland,Terry %K *COMPUTATIONAL LINGUISTICS %K CYBERNETICS %K linguistics %K operations research %K TEMPORALRELATION EXTRACTION %K TENSE-PAIR COMBINATIONS %K TEXT PROCESSING %X This document describes the information used for summarization-inspired temporal-relation extraction [Dorr and Gaasterland, 2007]. We present a set of tense/aspect extraction templates that are applied to a Penn Treebank-style analysis of the input sentence. We also present an analysis of tense-pair combinations for different temporal connectives based on a corpus analysis of complex tense structures in Treebank-3. Finally, we include analysis charts and temporal relation tables for all combinations of intervals/points for each legal BTS combinations. %I Department of Computer Science, University of Maryland, College Park %8 2006/12// %G eng %U http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA460392 %0 Conference Paper %B 36th AIAA Fluid Dynamics Conference and Exhibit %D 2006 %T On Synchronization of Weighted Essentially Non-Oscillatory Methods %A Taylor,E. M %A Martin, M.P %X Weighted essentially non-oscillatory (WENO) methods have been developed to simul-taneously provide robust shock-capturing in compressible fluid flow and avoid excessive damping of fine-scale flow features such as turbulence. Under certain conditions in com- pressible turbulence, however, numerical dissipation remains unacceptably high even after optimization of the linear component that dominates in smooth regions. We demonstrate that a significant nonlinear source of dissipation error is due to a WENO implementa- tion defect that we call the “synchronization deficiency,” and we develop and evaluate a preliminary technique to mitigate its effects. Direct numerical simulations (DNS) include one-dimensional test cases and three-dimensional compressible isotropic turbulence. Al- though we find the current formulation of our mitigation technique to be quite successful for the one-dimensional problems, its efficacy is more modest in the turbulence simulations, and its cost-to-benefit ratio is uncomfortably high. We believe, however, that with further work it will be possible to alleviate these drawbacks. %B 36th AIAA Fluid Dynamics Conference and Exhibit %C San Francisco, CA %8 2006/// %G eng %0 Journal Article %J Software: Practice and Experience %D 2006 %T Synthetic‐perturbation techniques for screening shared memory programs %A Snelick,Robert %A JaJa, Joseph F. %A Kacker,Raghu %A Lyon,Gordon %K Design of experiments %K parallel programs %K performance %K Shared memory programming model %K Synthetic perturbation %X The synthetic-perturbation screening (SPS) methodology is based on an empirical approach; SPS introduces artificial perturbations into the MIMD program and captures the effects of such perturbations by using the modern branch of statistics called design of experiments. SPS can provide the basis of a powerful tool for screening MIMD programs for performance bottlenecks. This technique is portable across machines and architectures, and scales extremely well on massively parallel processors. The purpose of this paper is to explain the general approach and to extend it to address specific features that are the main source of poor performance on the shared memory programming model. These include performance degradation due to load imbalance and insufficient parallelism, and overhead introduced by synchronizations and by accessing shared data structures. We illustrate the practicality of SPS by demonstrating its use on two very different case studies: a large image understanding benchmark and a parallel quicksort. %B Software: Practice and Experience %V 24 %P 679 - 701 %8 2006/10/30/ %@ 1097-024X %G eng %U http://onlinelibrary.wiley.com/doi/10.1002/spe.4380240802/abstract %N 8 %R 10.1002/spe.4380240802 %0 Patent %D 2006 %T SYSTEM AND METHOD FOR FAST ILLUMINATION-INVARIANT BACKGROUND SUBTRACTION USING TWO VIEWS %A Davis, Larry S. %A Lim,S.N. %A Mittal,A. %X A method for eliminating errors in foreground object detection in digitized images comprises providing (1101) a reference camera and a secondary camera, vertically aligning each said camera with a baseline that is approximately perpendicular to a ground plane, wherein said reference camera is placed lower than said secondary camera, selecting (1104) a foreground pixel in a reference view of a first point in a foreground object, finding (1105) a conjugate pixel of the foreground pixel in a secondary view, using (1106) the foreground and conjugate pixels to determine an image base pixel of a base point in the reference view, wherein said base point is a point on the ground plane below the first point, and using (1107) the foreground and image base pixels to find a location where the ground plane is first visible. %V PCT/EP2005/056207 %8 2006/06// %G eng %N WO/2006/056592 %0 Patent %D 2006 %T System and method for locating a closest server in response to a client ... %A Andrews,Matthew %A Hofmann,Markus %A Shepherd,Bruce %A Srinivasan, Aravind %A Winkler,Peter %A Zane,Francis %E Lucent Technologies Inc. %X A scalable system and method for locating a closest server in response to a client request via an interactive distribution network, such as the Internet, are provided. A closest content server is defined as having the least round trip time for responding to a client request. The system including a plurality of content servers; and a local server in communication with a plurality of clients, the local server acting as a proxy for communicating client requests from clients to a redirection server. Client network distance and load information is periodically collected at each content server in the network from clients communicating with each of the respective content servers. The redirection server periodically aggregates the network distance and load information from each content server to create client clusters from both current and previously aggregated network distance and load information. Each client cluster represents a division or partition of the total IP address space. Each... %V 09/726,192 %8 2006/03/28/ %G eng %U http://www.google.com/patents?id=cE54AAAAEBAJ %N 7020698 %0 Book %D 2006 %T System synthesis for optically-connected, multiprocessors on-chip %A Bambha,N. K %A Bhattacharyya, Shuvra S. %A STUDIES,MARYLAND UNIV COLLEGE PARK INST FOR ADVANCED COMPUTER %I Citeseer %8 2006/// %G eng %0 Conference Paper %B Proceedings of the 2005 national conference on Digital government research %D 2005 %T Scalable data collection infrastructure for digital government applications %A Samet, Hanan %A Tanin,Egemen %A Golubchik,Leana %X Highlights are presented of a project on the development of a scalable data collection infrastructure of digital government applications. The approach takes advantage of both the distributed nature of the data and the distributed ways of interacting with it. The approach is three-parted having theoretical, systems, and application components. On the theoretical and systems levels, work has continued on the development of the BISTRO system. On the applications level, work has continued on the investigation of the use of peer-to-peer networks in a number of domains in which the proper handling of spatial data is important. %B Proceedings of the 2005 national conference on Digital government research %S dg.o '05 %I Digital Government Society of North America %P 305 - 306 %8 2005/// %G eng %U http://dl.acm.org/citation.cfm?id=1065226.1065333 %0 Book Section %B Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques %D 2005 %T Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints %A Kumar, V. %A Marathe,Madhav %A Parthasarathy,Srinivasan %A Srinivasan, Aravind %E Chekuri,Chandra %E Jansen,Klaus %E Rolim,José %E Trevisan,Luca %X We present polylogarithmic approximations for the R | prec | C max and R | prec |∑ j w j C j problems, when the precedence constraints are “treelike” – i.e., when the undirected graph underlying the precedences is a forest. We also obtain improved bounds for the weighted completion time and flow time for the case of chains with restricted assignment – this generalizes the job shop problem to these objective functions. We use the same lower bound of “congestion+dilation”, as in other job shop scheduling approaches. The first step in our algorithm for the R | prec | C max problem with treelike precedences involves using the algorithm of Lenstra, Shmoys and Tardos to obtain a processor assignment with the congestion + dilation value within a constant factor of the optimal. We then show how to generalize the random delays technique of Leighton, Maggs and Rao to the case of trees. For the weighted completion time, we show a certain type of reduction to the makespan problem, which dovetails well with the lower bound we employ for the makespan problem. For the special case of chains, we show a dependent rounding technique which leads to improved bounds on the weighted completion time and new bicriteria bounds for the flow time. %B Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 3624 %P 609 - 609 %8 2005/// %@ 978-3-540-28239-6 %G eng %U http://dx.doi.org/10.1007/11538462_13 %0 Conference Paper %B NIPS Workshop on Advances in Structured Learning for Text and Speech Processing, Whistler, Canada %D 2005 %T Search-based structured prediction as classification %A Daumé, Hal %A Langford,J. %A Marcu,D. %B NIPS Workshop on Advances in Structured Learning for Text and Speech Processing, Whistler, Canada %8 2005/// %G eng %0 Journal Article %J Advances in Cryptology–EUROCRYPT 2005 %D 2005 %T Secure remote authentication using biometric data %A Boyen,X. %A Dodis,Y. %A Katz, Jonathan %A Ostrovsky,R. %A Smith,A. %X Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are not uniformly distributed; and (2) they are not exactly reproducible. Recent work, most notably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcome by allowing some auxiliary public information to be reliably sent from a server to the human user. Subsequent work of Boyen has shown how to extend these techniques, in the random oracle model, to enable unidirectional authentication from the user to the server without the assumption of a reliable communication channel.We show two efficient techniques enabling the use of biometric data to achieve mutual authentication or authenticated key exchange over a completely insecure (i.e., adversarially controlled) channel. In addition to achieving stronger security guarantees than the work of Boyen, we improve upon his solution in a number of other respects: we tolerate a broader class of errors and, in one case, improve upon the parameters of his solution and give a proof of security in the standard model. %B Advances in Cryptology–EUROCRYPT 2005 %P 147 - 163 %8 2005/// %G eng %R 10.1007/11426639_9 %0 Journal Article %J Distributed Computing and Internet Technology %D 2005 %T Secure requirements elicitation through triggered message sequence charts %A Ray,A. %A Sengupta,B. %A Cleaveland, Rance %B Distributed Computing and Internet Technology %P 273 - 282 %8 2005/// %G eng %0 Conference Paper %B Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on %D 2005 %T Security of feature extraction in image hashing %A Swaminathan,A. %A Mao,Yinian %A M. Wu %K cryptography; %K differential %K digital %K entropy; %K extraction; %K feature %K functions; %K hash %K hashing; %K image %K metric; %K processing; %K randomness; %K robustness; %K Security %K signature; %K signatures; %X Security and robustness are two important requirements for image hash functions. We introduce "differential entropy" as a metric to quantify the amount of randomness in image hash functions and to study their security. We present a mathematical framework and derive expressions for the proposed security metric for various common image hashing schemes. Using the proposed security metric, we discuss the trade-offs between security and robustness in image hashing. %B Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on %V 2 %P ii/1041 - ii/1044 Vol. 2 - ii/1041 - ii/1044 Vol. 2 %8 2005/03// %G eng %R 10.1109/ICASSP.2005.1415586 %0 Conference Paper %B Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work %D 2005 %T Seeking the source: software source code as a social and technical artifact %A de Souza,Cleidson %A Jon Froehlich %A Dourish,Paul %K data mining %K social networks %K socio-technical systems %K software repositories %B Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work %S GROUP '05 %I ACM %C New York, NY, USA %P 197 - 206 %8 2005/// %@ 1-59593-223-2 %G eng %U http://doi.acm.org/10.1145/1099203.1099239 %R 10.1145/1099203.1099239 %0 Conference Paper %B Image Processing, 2005. ICIP 2005. IEEE International Conference on %D 2005 %T Segmentation and appearance model building from an image sequence %A Liang Zhao %A Davis, Larry S. %K algorithm; %K color-path-length %K expectation-sampling %K image %K iterative %K joint %K kernel-based %K methods; %K PDF; %K person %K segmentation; %K sequence; %K sequences; %K space; %X In this paper we explore the problem of accurately segmenting a person from a video given only approximate location of that person. Unlike previous work which assumes that the appearance model is known in advance, we developed an iterative expectation-sampling (ES) algorithm for solving segmentation and appearance modeling simultaneously The appearance model is encoded with a kernel-based PDF defined in a joint color/path-length space. This appearance model remains unchanged during a short time period, although the object can articulate. Thus, we can perform the ES iteration not only for a single frame but also for an image sequence. The algorithm is iterative, but simple, efficient and gives visually good results. %B Image Processing, 2005. ICIP 2005. IEEE International Conference on %V 1 %P I - 321-4 - I - 321-4 %8 2005/09// %G eng %R 10.1109/ICIP.2005.1529752 %0 Journal Article %J Proceedings of DUC2005 %D 2005 %T A sentence-trimming approach to multi-document summarization %A Zajic, David %A Dorr, Bonnie J %A Jimmy Lin %A Monz,C. %A Schwartz,R. %X We implemented an initial applicationof a sentence-trimming approach (Trim- mer) to the problem of multi-document summarization in the MSE2005 and DUC2005 tasks. Sentence trimming was incorporated into a feature-based summarization system, called Multi- Document Trimmer (MDT), by us- ing sentence trimming as both a pre- processing stage and a feature for sen- tence ranking. We demonstrate that we were able to port Trimmer easily to this new problem. Although the direct im- pact of sentence trimming was minimal compared to other features used in the system, the interaction of the other fea- tures resulted in trimmed sentences ac- counting for nearly half of the selected summary sentences. %B Proceedings of DUC2005 %8 2005/// %G eng %0 Journal Article %J Genome Biology %D 2005 %T Serendipitous discovery of Wolbachia genomes in multiple Drosophila species %A Salzberg,Steven L. %A Hotopp,Julie CD %A Delcher,Arthur L. %A Pop, Mihai %A Smith,Douglas R. %A Eisen,Michael B. %A Nelson,William C. %X The Trace Archive is a repository for the raw, unanalyzed data generated by large-scale genome sequencing projects. The existence of this data offers scientists the possibility of discovering additional genomic sequences beyond those originally sequenced. In particular, if the source DNA for a sequencing project came from a species that was colonized by another organism, then the project may yield substantial amounts of genomic DNA, including near-complete genomes, from the symbiotic or parasitic organism. %B Genome Biology %V 6 %P R23 - R23 %8 2005/02/22/ %@ 1465-6906 %G eng %U http://genomebiology.com/2005/6/3/R23 %N 3 %R 10.1186/gb-2005-6-3-r23 %0 Report %D 2005 %T Severity and Impact of Computer User Frustration: A Comparison of Student and Workplace Users (2002) %A Lazar,Jonathan %A Jones,Adam %A Hackley,Mary %A Shneiderman, Ben %K Technical Report %X User frustration with information and computing technology is a pervasive and persistent problem. When computers crash, network congestion causes delays, and poor user interfaces trigger confusion there are dramatic consequences for individuals, organizations, and society. These frustrations not only cause personal dissatisfaction and loss of self-efficacy, but may disrupt workplaces, slow learning, and reduce participation in local and national communities. Our study of 107 student computer users and 50 workplace computer users shows high levels of frustration and loss of 1/3 to 1/2 of time spent. This paper reports on the incident-specific and user-specific causes of frustration, and they raise frustration severity. It examines the frustration impacts on the daily interactions of the users. The time lost and time to fix problem, and importance of task, strongly correlate with frustration levels for both student and workplace users. Differences between students and workplace users are discussed in the paper. %B Institute for Systems Research Technical Reports %8 2005/// %G eng %U http://drum.lib.umd.edu/handle/1903/6496 %0 Journal Article %J Applications of Evolutionary Computing %D 2005 %T Shaky ladders, hyperplane-defined functions and genetic algorithms: Systematic controlled observation in dynamic environments %A Rand, William %A Riolo,R %X Though recently there has been interest in examining genetic algorithms (GAs) in dynamic environments, work still needs to be done in investigating the fundamental behavior of these algorithms in changing environments. When researching the GA in static environments, it has been useful to use test suites of functions that are designed for the GA so that the performance can be observed under systematic controlled conditions. One example of these suites is the hyperplane-defined functions (hdfs) designed by Holland [1]. We have created an extension of these functions, specifically designed for dynamic environments, which we call the shaky ladder functions. In this paper, we examine the qualities of this suite that facilitate its use in examining the GA in dynamic environments, describe the construction of these functions and present some preliminary results of a GA operating on these functions. %B Applications of Evolutionary Computing %P 600 - 609 %8 2005/// %G eng %R 10.1007/978-3-540-32003-6_63 %0 Journal Article %J Image Processing, IEEE Transactions on %D 2005 %T "Shape Activity": a continuous-state HMM for moving/deforming shapes with application to abnormal activity detection %A Vaswani, N. %A Roy-Chowdhury, A.K. %A Chellapa, Rama %K abnormal activity detection;activity recognition;co-occurrence statistics;continuous-state hidden Markov model;dynamic Bayesian networks;hidden-state vector;particle filtering;scaled Euclidean motion parameter;shape deforming;belief networks;filtering the %K Automated;Subtraction Technique;Video Recording; %K Biological;Models %K Computer-Assisted;Information Storage and Retrieval;Markov Chains;Models %K Statistical;Movement;Pattern Recognition %X The aim is to model "activity" performed by a group of moving and interacting objects (which can be people, cars, or different rigid components of the human body) and use the models for abnormal activity detection. Previous approaches to modeling group activity include co-occurrence statistics (individual and joint histograms) and dynamic Bayesian networks, neither of which is applicable when the number of interacting objects is large. We treat the objects as point objects (referred to as "landmarks") and propose to model their changing configuration as a moving and deforming "shape" (using Kendall's shape theory for discrete landmarks). A continuous-state hidden Markov model is defined for landmark shape dynamics in an activity. The configuration of landmarks at a given time forms the observation vector, and the corresponding shape and the scaled Euclidean motion parameters form the hidden-state vector. An abnormal activity is then defined as a change in the shape activity model, which could be slow or drastic and whose parameters are unknown. Results are shown on a real abnormal activity-detection problem involving multiple moving objects. %B Image Processing, IEEE Transactions on %V 14 %P 1603 - 1616 %8 2005/10// %@ 1057-7149 %G eng %N 10 %R 10.1109/TIP.2005.852197 %0 Journal Article %J International Journal of Computer Vision %D 2005 %T Shape and the stereo correspondence problem %A Ogale, A. S %A Aloimonos, J. %B International Journal of Computer Vision %V 65 %P 147 - 162 %8 2005/// %G eng %N 3 %0 Conference Paper %B 2005 IEEE Symposium on Visual Languages and Human-Centric Computing %D 2005 %T Show Me! Guidelines for producing recorded demonstrations %A Plaisant, Catherine %A Shneiderman, Ben %K animation %K auditory cues %K Computer aided instruction %K Computer animation %K Computer Graphics %K Computer interfaces %K computer literacy %K content guidelines %K documentation %K Government %K Graphical user interfaces %K Guidelines %K Laboratories %K narration %K recorded demonstrations %K screen capture animation %K technical guidelines %K usability %K User interfaces %K visual appeal %K visual cues %X Although recorded demonstrations (screen capture animations with narration) have become a popular form of instruction for user interfaces, little work has been done to describe guidelines for their design. Based on our experience in several projects, we offer a starting set of guidelines for the design of visually appealing and cognitively effective recorded demonstrations. Technical guidelines encourage users to keep file sizes small, strive for universal usability, and ensure user control etc. and provide tips to achieve those goals. Content guidelines include: create short demonstrations that focus on tasks, highlight each step with auditory and visual cues, synchronize narration and animation carefully, and create demonstrations with a clear beginning, middle, and end. %B 2005 IEEE Symposium on Visual Languages and Human-Centric Computing %I IEEE %P 171 - 178 %8 2005/09/20/24 %@ 0-7695-2443-5 %G eng %R 10.1109/VLHCC.2005.57 %0 Report %D 2005 %T Show Me! Guidelines for Producing Recorded Demonstrations (2005) %A Plaisant, Catherine %A Shneiderman, Ben %K Technical Report %X Although recorded demonstrations (screen capture animations with narration) have become a popular form of instruction for user interfaces, little work has been done to describe guidelines for their design. Based on our experience in several projects, we offer a starting set of guidelines for the design of recorded demonstrations. Technical guidelines encourage users to keep file sizes small, strive for universal usability, and ensure user control etc. and provide tips to achieve those goals. Content guidelines include: create short demonstrations that focus on tasks, highlight each step with auditory and visual cues, synchronize narration and animation carefully, and create demonstrations with a clear beginning, middle, and end. %B Institute for Systems Research Technical Reports %8 2005/// %G eng %U http://drum.lib.umd.edu/handle/1903/6533 %0 Journal Article %J Concurrency and Computation: Practice and Experience %D 2005 %T A simulation and data analysis system for large-scale, data-driven oil reservoir simulation studies %A Kurc, T. %A Catalyurek,U. %A Zhang,X. %A Saltz, J. %A Martino,R. %A Wheeler,M. %A Peszyńska,M. %A Sussman, Alan %A Hansen,C. %A Sen,M. %A others %B Concurrency and Computation: Practice and Experience %V 17 %P 1441 - 1467 %8 2005/// %G eng %N 11 %0 Journal Article %J Lecture Notes in Computer Science %D 2005 %T Simulation and Secure Computation-Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs %A Katz, Jonathan %A Lindell,Y. %B Lecture Notes in Computer Science %V 3378 %P 128 - 149 %8 2005/// %G eng %0 Report %D 2005 %T Snap-Together Visualization: A User Interface for Coordinating Visualizations via Relational Schemata (2000) %A North,Chris %A Shneiderman, Ben %K Technical Report %B Institute for Systems Research Technical Reports %8 2005/// %G eng %U http://drum.lib.umd.edu/handle/1903/6470 %0 Journal Article %J Institute for Systems Research Technical Reports %D 2005 %T Social and Psychological Influences on Computer User Frustration (Newhagen book chapter, 2002) %A Bessiere,Katie %A Ceaparu,Irina %A Lazar,Jonathan %A Robinson,John %A Shneiderman, Ben %K Technical Report %X As computer usage has proliferated, so has user frustration. Even devoted and knowledgeable users encounter annoying delays, incomprehensible messages, incompatible files, and indecipherable menus. The frustration generated by these problems can be personally disturbing and socially disruptive. Psychological and social perspectives on frustration may clarify the relationships among variables such as personality types, cultural factors, goal attainment, workplace anger, and computer anxiety. These perspectives may also help designers, managers, and users understand the range of responses to frustration, which could lead to effective interventions such as redesign of software, improved training, better online help, user discipline, and even resetting of national research priorities. %B Institute for Systems Research Technical Reports %8 2005/// %G eng %U http://drum.lib.umd.edu/handle/1903/6497 %0 Book Section %B Foundations of empirical software engineering: the legacy of Victor R. Basili %D 2005 %T Software defect reduction top 10 list %A Boehm,B. %A Basili, Victor R. %B Foundations of empirical software engineering: the legacy of Victor R. Basili %P 426 - 426 %8 2005/// %@ 9783540245476 %G eng %0 Journal Article %J Software, IEEE %D 2005 %T Software process improvement in small organizations: a case study %A Dangle,K.C. %A Larsen,P. %A Shaw,M. %A Zelkowitz, Marvin V %K area; %K aspects; %K capability %K CMM %K development %K improvement; %K key %K management; %K Maturity %K model; %K organisational %K organization; %K process %K small %K software %X The Capability Maturity Model for software has become a major force in software development process improvement. We looked at the role of process improvement in the context of a small organization. Although the Capability Maturity Model integration is replacing the CMM, we focused on the older CMM. We had to look at more than which CMM key process areas apply to small businesses. Our overall goal was to institute good software development practices, we used the language of the CMM to gain the management's cooperation. Applying these practices is essential to managing growth, yet undertaking this effort without prior experience could impede a small company's innovative nature. This case study's purpose was to investigate the success factors of a software process improvement effort for a small software development organization. %B Software, IEEE %V 22 %P 68 - 75 %8 2005/12//nov %@ 0740-7459 %G eng %N 6 %R 10.1109/MS.2005.162 %0 Journal Article %J ACM SIGSOFT Software Engineering Notes %D 2005 %T Software repository mining with Marmoset: an automated programming project snapshot and testing system %A Spacco,J. %A Strecker,J. %A Hovemeyer,D. %A Pugh, William %B ACM SIGSOFT Software Engineering Notes %V 30 %P 1 - 5 %8 2005/// %G eng %N 4 %0 Conference Paper %B Proceedings of the 2005 workshop on Software and compilers for embedded systems %D 2005 %T Software synthesis from the dataflow interchange format %A Hsu,C. J %A Ko,M. Y %A Bhattacharyya, Shuvra S. %B Proceedings of the 2005 workshop on Software and compilers for embedded systems %P 37 - 49 %8 2005/// %G eng %0 Journal Article %J Algorithms and Computation %D 2005 %T Space-efficient and fast algorithms for multidimensional dominance reporting and counting %A JaJa, Joseph F. %A Mortensen,C. %A Shi,Q. %X We present linear-space sub-logarithmic algorithms for handling the 3-dimensional dominance reporting and the 2-dimensional dominance counting problems. Under the RAM model as described in [M. L. Fredman and D. E. Willard. ldquoSurpassing the information theoretic bound with fusion treesrdquo, Journal of Computer and System Sciences, 47:424–436, 1993], our algorithms achieve O(log n/loglog n+f) query time for the 3-dimensional dominance reporting problem, where f is the output size, and O(log n/loglog n) query time for the 2-dimensional dominance counting problem. We extend these results to any constant dimension d ge 3, achieving O(n(log n/loglog n)d – 3) space and O((log n/loglog n)d – 2+ f) query time for the reporting case and O(n(log n/loglog n)d – 2) space and O((log n/loglog n)d – 1) query time for the counting case. %B Algorithms and Computation %P 1755 - 1756 %8 2005/// %G eng %R 10.1007/978-3-540-30551-4_49 %0 Conference Paper %B Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms %D 2005 %T Space-time tradeoffs for approximate spherical range counting %A Arya,Sunil %A Malamatos,Theocharis %A Mount, Dave %X We present space-time tradeoffs for approximate spherical range counting queries. Given a set S of n data points in Rd along with a positive approximation factor ε, the goal is to preprocess the points so that, given any Euclidean ball B, we can return the number of points of any subset of S that contains all the points within a (1 - ε)-factor contraction of B, but contains no points that lie outside a (1 + ε)-factor expansion of B.In many applications of range searching it is desirable to offer a tradeoff between space and query time. We present here the first such tradeoffs for approximate range counting queries. Given 0 < ε ≤ 1/2 and a parameter γ, where 2 ≤ γ ≤ 1/ε, we show how to construct a data structure of space O(nγd log (1/ε)) that allows us to answer ε-approximate spherical range counting queries in time O(log(nγ) + 1/(εγd-1). The data structure can be built in time O(nγd log (n/ε)) log (1/ε)). Here n, ε, and γ are asymptotic quantities, and the dimension d is assumed to be a fixed constant.At one extreme (low space), this yields a data structure of space O(n log (1/e)) that can answer approximate range queries in time O(logn + 1/(ed-1) which, up to a factor of O(n log (1/e) in space, matches the best known result for approximate spherical range counting queries. At the other extreme (high space), it yields a data structure of space O((n/ed) log(1/ε)) that can answer queries in time O(logn + 1/ε). This is the fastest known query time for this problem.We also show how to adapt these data structures to the problem of computing an ε-approximation to the kth nearest neighbor, where k is any integer from 1 to n given at query time. The space bounds are identical to the range searching results, and the query time is larger only by a factor of O(1/(εγ)).Our approach is broadly based on methods developed for approximate Voronoi diagrams (AVDs), but it involves a number of significant extensions from the context of nearest neighbor searching to range searching. These include generalizing AVD node-separation properties from leaves to internal nodes of the tree and constructing efficient generator sets through a radial decomposition of space. We have also developed new arguments to analyze the time and space requirements in this more general setting. %B Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms %S SODA '05 %I Society for Industrial and Applied Mathematics %C Philadelphia, PA, USA %P 535 - 544 %8 2005/// %@ 0-89871-585-7 %G eng %U http://dl.acm.org/citation.cfm?id=1070432.1070505 %0 Conference Paper %B IEEE International Symposium on Cluster Computing and the Grid, 2005. CCGrid 2005 %D 2005 %T Spatial indexing of distributed multidimensional datasets %A Nam,B. %A Sussman, Alan %K centralized global index algorithm %K centralized index server %K Computer science %K database indexing %K distributed databases %K distributed multidimensional dataset %K Educational institutions %K File servers %K Indexing %K Large-scale systems %K Multidimensional systems %K Network servers %K replication protocol %K replication techniques %K scalability %K Sensor systems %K spatial data structures %K spatial indexing %K two-level hierarchical index algorithm %K wide area networks %X While declustering methods for distributed multidimensional indexing of large datasets have been researched widely in the past, replication techniques for multidimensional indexes have not been investigated deeply. In general, a centralized index server may become the performance bottleneck in a wide area network rather than the data servers, since the index is likely to be accessed more often than any of the datasets in the servers. In this paper, we present two different multidimensional indexing algorithms for a distributed environment - a centralized global index and a two-level hierarchical index. Our experimental results show that the centralized scheme does not scale well for either insertion or searching the index. In order to improve the scalability of the index server, we have employed a replication protocol for both the centralized and two-level index schemes that allows some inconsistency between replicas without affecting correctness. Our experiments show that the two-level hierarchical index scheme shows better scalability for both building and searching the index than the non-replicated centralized index, but replication can make the centralized index faster than the two-level hierarchical index for searching in some cases. %B IEEE International Symposium on Cluster Computing and the Grid, 2005. CCGrid 2005 %I IEEE %V 2 %P 743- 750 Vol. 2 - 743- 750 Vol. 2 %8 2005/05/09/12 %@ 0-7803-9074-1 %G eng %R 10.1109/CCGRID.2005.1558637 %0 Journal Article %J Journal of Geographical Systems %D 2005 %T Spatial process and data models: Toward integration of agent-based models and GIS %A Brown,D.G. %A Riolo,R %A Robinson,D.T. %A North,M. %A Rand, William %X The use of object-orientation for both spatial data and spatial process models facilitates their integration, which can allow exploration and explanation of spatial-temporal phenomena. In order to better understand how tight coupling might proceed and to evaluate the possible functional and efficiency gains from such a tight coupling, we identify four key relationships affecting how geographic data (fields and objects) and agent-based process models can interact: identity, causal, temporal and topological. We discuss approaches to implementing tight integration, focusing on a middleware approach that links existing GIS and ABM development platforms, and illustrate the need and approaches with example agent-based models. %B Journal of Geographical Systems %V 7 %P 25 - 47 %8 2005/// %G eng %N 1 %R 10.1007/s10109-005-0148-5 %0 Journal Article %J Speech and Audio Processing, IEEE Transactions on %D 2005 %T Speaker Localization Using Excitation Source Information in Speech %A Raykar,V.C. %A Yegnanarayana,B. %A Prasanna,S. R.M %A Duraiswami, Ramani %K correlation %K correlation; %K cross %K Delay %K error %K error; %K estimation; %K excitation %K generalized %K information; %K localization; %K mean %K methods; %K processing; %K production; %K root %K source %K speaker %K speech %K square %K TIME %X This paper presents the results of simulation and real room studies for localization of a moving speaker using information about the excitation source of speech production. The first step in localization is the estimation of time-delay from speech collected by a pair of microphones. Methods for time-delay estimation generally use spectral features that correspond mostly to the shape of vocal tract during speech production. Spectral features are affected by degradations due to noise and reverberation. This paper proposes a method for localizing a speaker using features that arise from the excitation source during speech production. Experiments were conducted by simulating different noise and reverberation conditions to compare the performance of the time-delay estimation and source localization using the proposed method with the results obtained using the spectrum-based generalized cross correlation (GCC) methods. The results show that the proposed method shows lower number of discrepancies in the estimated time-delays. The bias, variance and the root mean square error (RMSE) of the proposed method is consistently equal or less than the GCC methods. The location of a moving speaker estimated using the time-delays obtained by the proposed method are closer to the actual values, than those obtained by the GCC method. %B Speech and Audio Processing, IEEE Transactions on %V 13 %P 751 - 761 %8 2005/09// %@ 1063-6676 %G eng %N 5 %R 10.1109/TSA.2005.851907 %0 Report %D 2005 %T Stable Policy Routing with Provider Independence %A Feamster, Nick %A Johari,Ramesh %A Balakrishnan,Hari %X Thousands of competing autonomous systems (ASes) mustcooperate with each other to provide global Internet connectivity.These ASes encode various economic, business,and performance decisions in their routing policies. The currentinterdomain routing system enables ASes to express policyusing rankings that determine how each router in an ASorders the different routes to a destination, and filters thatdetermine which routes are hidden from each neighboringAS. Since the Internet is composed of many independent,competing networks, the interdomain routing system shouldallow providers to set their rankings independently, and tohave no constraints on allowed filters. This paper studiesrouting protocol stability under these constraints. We firstdemonstrate that certain rankings that are commonly usedin practice may not ensure routing stability. We then provethat, with ranking independence and unrestricted filtering,guaranteeing that the routing system will converge to a stablepath assignment essentially requires ASes to rank routesbased on AS-path lengths. Finally, we discuss the implicationsof these results for the future of interdomain routing. %I Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory %V MIT-CSAIL-TR-2005-009 %8 2005/02/08/ %G eng %U http://dspace.mit.edu/handle/1721.1/30522 %0 Journal Article %J Image Processing, IEEE Transactions on %D 2005 %T Statistical bias in 3-D reconstruction from a monocular video %A Roy-Chowdhury, A.K. %A Chellapa, Rama %K 3D face models %K 3D video reconstruction %K algorithms %K artifacts %K Artificial intelligence %K Automated;Signal Processing %K bias compensation %K bundle adjustment %K camera motion estimation %K Computer simulation %K Computer-Assisted;Imaging %K Computer-Assisted;Subtraction Technique;Video Recording; %K depth estimate %K error covariance estimation %K error statistics %K generalized Cramer-Rao lower bound %K Image Enhancement %K Image Interpretation %K Image reconstruction %K initialization procedures %K least squares approximations %K linear least-squares framework %K monocular video %K motion compensation %K Motion estimation %K statistical bias %K Statistical;Pattern Recognition %K structure from motion algorithms %K Three-Dimensional;Information Storage and Retrieval;Models %K video signal processing %X The present state-of-the-art in computing the error statistics in three-dimensional (3-D) reconstruction from video concentrates on estimating the error covariance. A different source of error which has not received much attention is the fact that the reconstruction estimates are often significantly statistically biased. In this paper, we derive a precise expression for the bias in the depth estimate, based on the continuous (differentiable) version of structure from motion (SfM). Many SfM algorithms, or certain portions of them, can be posed in a linear least-squares (LS) framework Ax=b. Examples include initialization procedures for bundle adjustment or algorithms that alternately estimate depth and camera motion. It is a well-known fact that the LS estimate is biased if the system matrix A is noisy. In SfM, the matrix A contains point correspondences, which are always difficult to obtain precisely; thus, it is expected that the structure and motion estimates in such a formulation of the problem would be biased. Existing results on the minimum achievable variance of the SfM estimator are extended by deriving a generalized Cramer-Rao lower bound. A detailed analysis of the effect of various camera motion parameters on the bias is presented. We conclude by presenting the effect of bias compensation on reconstructing 3-D face models from rendered images. %B Image Processing, IEEE Transactions on %V 14 %P 1057 - 1062 %8 2005/08// %@ 1057-7149 %G eng %N 8 %R 10.1109/TIP.2005.849775 %0 Journal Article %J ACM Transactions on Graphics %D 2005 %T Statistical geometry representation for efficient transmission and rendering %A Kalaiah,Aravind %A Varshney, Amitabh %K network graphics %K Point-based rendering %K Principal component analysis %K programmable GPU %K progressive transmission %K quasi-random numbers %K view-dependent rendering %X Traditional geometry representations have focused on representing the details of the geometry in a deterministic fashion. In this article we propose a statistical representation of the geometry that leverages local coherence for very large datasets. We show how the statistical analysis of a densely sampled point model can be used to improve the geometry bandwidth bottleneck, both on the system bus and over the network as well as for randomized rendering, without sacrificing visual realism. Our statistical representation is built using a clustering-based hierarchical principal component analysis (PCA) of the point geometry. It gives us a hierarchical partitioning of the geometry into compact local nodes representing attributes such as spatial coordinates, normal, and color. We pack this information into a few bytes using classification and quantization. This allows our representation to directly render from compressed format for efficient remote as well as local rendering. Our representation supports both view-dependent and on-demand rendering. Our approach renders each node using quasi-random sampling utilizing the probability distribution derived from the PCA analysis. We show many benefits of our approach: (1) several-fold improvement in the storage and transmission complexity of point geometry; (2) direct rendering from compressed data; and (3) support for local and remote rendering on a variety of rendering platforms such as CPUs, GPUs, and PDAs. %B ACM Transactions on Graphics %V 24 %P 348 - 373 %8 2005/04// %@ 0730-0301 %G eng %U http://doi.acm.org/10.1145/1061347.1061356 %N 2 %R 10.1145/1061347.1061356 %0 Journal Article %J Molecular Cell %D 2005 %T Structural Determinants for Selective Recognition of a Lys48-Linked Polyubiquitin Chain by a UBA Domain %A Varadan,Ranjani %A Assfalg,Michael %A Raasi,Shahri %A Pickart,Cecile %A Fushman, David %X SummaryAlthough functional diversity in polyubiquitin chain signaling has been ascribed to the ability of differently linked chains to bind in a distinctive manner to effector proteins, structural models of such interactions have been lacking. Here, we use NMR to unveil the structural basis of selective recognition of Lys48-linked di- and tetraubiquitin chains by the UBA2 domain of hHR23A. Although the interaction of UBA2 with Lys48-linked diubiquitin involves the same hydrophobic surface on each ubiquitin unit as that utilized in monoubiquitin:UBA complexes, our results show how the “closed” conformation of Lys48-linked diubiquitin is crucial for high-affinity binding. Moreover, recognition of Lys48-linked diubiquitin involves a unique epitope on UBA, which allows the formation of a sandwich-like diubiqutin:UBA complex. Studies of the UBA-tetraubiquitin interaction suggest that this mode of UBA binding to diubiquitin is relevant for longer chains. %B Molecular Cell %V 18 %P 687 - 698 %8 2005/06/10/ %@ 1097-2765 %G eng %U http://www.sciencedirect.com/science/article/pii/S1097276505013195 %N 6 %R 10.1016/j.molcel.2005.05.013 %0 Report %D 2005 %T Structural metadata and parsing speech %A Harper,M. %A Dorr, Bonnie J %A Hale,J. %A Roark,B. %A Shafran,I. %A Lease,M. %A Liu,Y. %A Snover,M. %A Yung,L. %A Krasnyanskaya,A. %A others %I JHU Language Engineering Workshop %8 2005/// %G eng %0 Report %D 2005 %T Stub Domain DDoS Detection %A Kommareddy,C. %A Levin,D. %A Bhattacharjee, Bobby %A La,R.J. %A Shayman,M. %I Technical Report of the Department of Computer Science, University of Maryland, College Park %8 2005/// %G eng %0 Journal Article %J Software Engineering, IEEE Transactions on %D 2005 %T Studying the fault-detection effectiveness of GUI test cases for rapidly evolving software %A Memon, Atif M. %A Xie,Q. %K daily automated regression tester %K Fault diagnosis %K fault-detection %K formal specification %K formal verification %K Graphical user interfaces %K GUI test cases %K program testing %K quality assurance mechanism %K rapidly evolving software %K smoke regression testing technique %K software development %K software fault tolerance %K Software maintenance %K software prototyping %K Software quality %K test oracles %X Software is increasingly being developed/maintained by multiple, often geographically distributed developers working concurrently. Consequently, rapid-feedback-based quality assurance mechanisms such as daily builds and smoke regression tests, which help to detect and eliminate defects early during software development and maintenance, have become important. This paper addresses a major weakness of current smoke regression testing techniques, i.e., their inability to automatically (re)test graphical user interfaces (GUIs). Several contributions are made to the area of GUI smoke testing. First, the requirements for GUI smoke testing are identified and a GUI smoke test is formally defined as a specialized sequence of events. Second, a GUI smoke regression testing process called daily automated regression tester (DART) that automates GUI smoke testing is presented. Third, the interplay between several characteristics of GUI smoke test suites including their size, fault detection ability, and test oracles is empirically studied. The results show that: 1) the entire smoke testing process is feasible in terms of execution time, storage space, and manual effort, 2) smoke tests cannot cover certain parts of the application code, 3) having comprehensive test oracles may make up for not having long smoke test cases, and 4) using certain oracles can make up for not having large smoke test suites. %B Software Engineering, IEEE Transactions on %V 31 %P 884 - 896 %8 2005/10// %@ 0098-5589 %G eng %N 10 %R 10.1109/TSE.2005.117 %0 Journal Article %J Proc. British Machine Vision Conference %D 2005 %T Synthesis of novel views of moving objects in airborne video %A Yue, Z. %A Chellapa, Rama %X This paper presents a method for synthesizing novel views of movingobjects in airborne video. The object of interest is tracked using an appear- ance based visual tracking method. The on-object point correspondence is then built and used to estimate the homography induced by the ground plane. With known camera focal length, the surface normal to the ground plane and the camera motion between two views are factored out from the homography. In order to assure robustness of surface normal estimation, a rank one con- straint is applied to decompose a matrix which contains the homographies from multiple frame pairs. Given a desired viewing direction, the novel im- age of the object is generated by warping the reference frame using the new homography between the desired viewpoint and the reference frame. Exper- imental results show that the method is robust and errors due to small depth variations of the object is negligible. %B Proc. British Machine Vision Conference %P 290 - 299 %8 2005/// %G eng %0 Conference Paper %B Proc. 119th convention AES %D 2005 %T System for capturing of highorder spatial audio using spherical microphone array and binaural head-tracked playback over headphones with head related transfer function cues %A Duraiswami, Ramani %A Zotkin,Dmitry N %A Li,Z. %A Grassi,E. %A Gumerov, Nail A. %A Davis, Larry S. %B Proc. 119th convention AES %8 2005/// %G eng %0 Conference Paper %D 2005 %T A system for performing content-based searches on a database of mechanical assemblies %A Deshmukh,A. S. %A Gupta,S.K. %A Karnik,M. V. %A Sriram,R.D. %X The increased use of 3D CAD systems by productdevelopment organizations has resulted in large databases of assemblies; this explosion of assembly data will continue in the future. Currently, there are no effective content-based techniques to search these databases. Ability to perform content-based searches on these databases is expected to help the designers in the following two ways. First, it can facilitate reuse of existing assembly designs, and thereby reducing the design time. Second, a lot of useful Design for Manufacturing and Assembly (DFMA) knowledge is embedded in existing assemblies. Therefore a capability to locate existing assemblies and examine them can be used as a learning tool by the designers to learn from the existing assembly designs and hence transfer the best DFMA practices to new designers. This paper describes a system for performing content-based searches on assembly databases. We identify templates for comprehensive search definitions and describe algorithms to perform content-based searches for mechanical assemblies. We also illustrate capabilities of our system through several examples. %C Orlando, Florida USA %8 2005/// %G eng %U http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.160.8372&rep=rep1&type=pdf %0 Conference Paper %B Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video %D 2004 %T Scalable resilient media streaming %A Banerjee,Suman %A Lee,Seungjoon %A Braud,Ryan %A Bhattacharjee, Bobby %A Srinivasan, Aravind %K media streaming %K Multicast %K overlay network %K Resilience %X We present a low-overhead media streaming system, called SRMS (Scalable Resilient Media Streaming) that can be used to scalably deliver streaming data to a large group of receivers. SRMS uses overlay multicast for data distribution. to a large group of users. SRMS leverages a probabilistic loss recovery technique to provide high data delivery guarantees even under large network losses and overlay node failures. The clients in the SRMS system are able to interoperate with existing media streaming servers that use RTP for data transport. One of the interesting features of SRMS is that it can simultaneously support clients with disparate access bandwidths. It enables the necessary bandwidth adaptations using standard Real-time Transport Protocol (RTP) mechanisms, e.g. RTP translators. We have implemented and evaluated the SRMS system in detail on an emulated network as well as on a wide-area testbed with up to 128 clients. Our results show that clients using SRMS achieve high (97%) data delivery ratios with low overheads (<5%) even for a very dynamic network (up to five membership changes per minute). %B Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video %S NOSSDAV '04 %I ACM %C New York, NY, USA %P 4 - 9 %8 2004/// %@ 1-58113-801-6 %G eng %U http://doi.acm.org/10.1145/1005847.1005851 %R 10.1145/1005847.1005851 %0 Journal Article %J Parasitology International %D 2004 %T Schistosoma mansoni genome project: an update %A LoVerde,Philip T. %A Hirai,Hirohisa %A Merrick,Joseph M %A Lee,Norman H %A El‐Sayed, Najib M. %K Chromosome mapping %K Gene discovery %K Genomics %K Schistosoma mansoni %X A schistosome genome project was initiated by the World Health Organization in 1994 with the notion that the best prospects for identifying new targets for drugs, vaccines, and diagnostic development lie in schistosome gene discovery, development of chromosome maps, whole genome sequencing and genome analysis. Schistosoma mansoni has a haploid genome of 270 Mb contained on 8 pairs of chromosomes. It is estimated that the S. mansoni genome contains between 15 000 and 25 000 genes. There are approximately 16 689 ESTs obtained from diverse libraries representing different developmental stages of S. mansoni, deposited in the NCBI EST database. More than half of the deposited sequences correspond to genes of unknown function. Approximately 40-50% of the sequences form unique clusters, suggesting that approximately 20-25% of the total schistosome genes have been discovered. Efforts to develop low resolution chromosome maps are in progress. There is a genome sequencing program underway that will provide 3X sequence coverage of the S. mansoni genome that will result in approximately 95% gene discovery. The genomics era has provided the resources to usher in the era of functional genomics that will involve microarrays to focus on specific metabolic pathways, proteomics to identify relevant proteins and protein-protein interactions to understand critical parasite pathways. Functional genomics is expected to accelerate the development of control and treatment strategies for schistosomiasis. %B Parasitology International %V 53 %P 183 - 192 %8 2004/06// %@ 1383-5769 %G eng %U http://www.sciencedirect.com/science/article/pii/S1383576904000108 %N 2 %R 16/j.parint.2004.01.009 %0 Conference Paper %B Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on %D 2004 %T Searching the web with mobile images for location recognition %A Tom Yeh %A Tollmar,K. %A Darrell,T. %X We describe an approach to recognizing location from mobile devices using image-based Web search. We demonstrate the usefulness of common image search metrics applied on images captured with a camera-equipped mobile device to find matching images on the World Wide Web or other general-purpose databases. Searching the entire Web can be computationally overwhelming, so we devise a hybrid image-and-keyword searching technique. First, image-search is performed over images and links to their source Web pages in a database that indexes only a small fraction of the Web. Then, relevant keywords on these Web pages are automatically identified and submitted to an existing text-based search engine (e.g. Google) that indexes a much larger portion of the Web. Finally, the resulting image set is filtered to retain images close to the original query. It is thus possible to efficiently search hundreds of millions of images that are not only textually related but also visually relevant. We demonstrate our approach on an application allowing users to browse Web pages matching the image of a nearby location. %B Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on %I IEEE %V 2 %P 76 - 81 %8 2004/// %@ 0-7695-2158-4 %G eng %U http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1315147 %R 10.1109/CVPR.2004.1315147 %0 Journal Article %J BMC Evol Biol %D 2004 %T Section-level relationships of North American ıt Agalinis (Orobanchaceae) based on DNA sequence analysis of three chloroplast gene regions %A Neel,M. C %A Cummings, Michael P. %X BACKGROUND: The North American Agalinis are representatives of a taxonomically difficult group that has been subject to extensive taxonomic revision from species level through higher sub-generic designations (e.g., subsections and sections). Previous presentations of relationships have been ambiguous and have not conformed to modern phylogenetic standards (e.g., were not presented as phylogenetic trees). Agalinis contains a large number of putatively rare taxa that have some degree of taxonomic uncertainty. We used DNA sequence data from three chloroplast genes to examine phylogenetic relationships among sections within the genus Agalinis Raf. (=Gerardia), and between Agalinis and closely related genera within Orobanchaceae. RESULTS: Maximum likelihood analysis of sequences data from rbcL, ndhF, and matK gene regions (total aligned length 7323 bp) yielded a phylogenetic tree with high bootstrap values for most branches. Likelihood ratio tests showed that all but a few branch lengths were significantly greater than zero, and an additional likelihood ratio test rejected the molecular clock hypothesis. Comparisons of substitution rates between gene regions based on linear models of pairwise distance estimates between taxa show both ndhF and matK evolve more rapidly than rbcL, although the there is substantial rate heterogeneity within gene regions due in part to rate differences among codon positions. CONCLUSIONS: Phylogenetic analysis supports the monophyly of Agalinis, including species formerly in Tomanthera, and this group is sister to a group formed by the genera Aureolaria, Brachystigma, Dasistoma, and Seymeria. Many of the previously described sections within Agalinis are polyphyletic, although many of the subsections appear to form natural groups. The analysis reveals a single evolutionary event leading to a reduction in chromosome number from n = 14 to n = 13 based on the sister group relationship of section Erectae and section Purpureae subsection Pedunculares. Our results establish the evolutionary distinctiveness of A. tenella from the more widespread and common A. obtusifolia. However, further data are required to clearly resolve the relationship between A. acuta and A. tenella. %B BMC Evol Biol %V 4 %P 15 - 15 %8 2004/06// %G eng %R 10.1186/1471-2148-4-15 %0 Journal Article %J Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks %D 2004 %T Secure routing in ad hoc networks %A Katz, Jonathan %B Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks %8 2004/// %G eng %0 Conference Paper %B Image Processing, 2004. ICIP '04. 2004 International Conference on %D 2004 %T Security evaluation for communication-friendly encryption of multimedia %A Mao,Yinian %A M. Wu %K access %K approximation %K atomic %K attacks; %K bitrate %K coding; %K communication-friendly %K communication; %K control; %K cryptography; %K data %K encryption %K encryption; %K generic %K joint %K method; %K metrics; %K multimedia %K multimedia-specific %K overhead; %K primitives; %K processing/cryptographic %K Security %K security; %K signal %K system; %K Telecommunication %K video %X This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption. Based on three atomic encryption primitives, we present a systematic study on how to strategically integrate different atomic operations to build a video encryption system. We also propose a set of multimedia-specific security metrics to quantify the security against approximation attacks and to complement the existing notion of generic data security. The resulting system can provide superior performance to both generic encryption and its simple adaptation to video in terms of a joint consideration of security, bitrate overhead, and communication friendliness. %B Image Processing, 2004. ICIP '04. 2004 International Conference on %V 1 %P 569 - 572 Vol. 1 - 569 - 572 Vol. 1 %8 2004/10// %G eng %R 10.1109/ICIP.2004.1418818 %0 Journal Article %J Wireless Communications and Mobile Computing %D 2004 %T Security issues in IEEE 802.11 wireless local area networks: a survey %A Mishra,A. %A Petroni Jr,N. L %A Arbaugh, William A. %A Fraser,T. %B Wireless Communications and Mobile Computing %V 4 %P 821 - 833 %8 2004/// %G eng %N 8 %0 Book Section %B Geometric Modeling for Scientific VisualizationGeometric Modeling for Scientific Visualization %D 2004 %T Selective refinement on nested tetrahedral meshes %A De Floriani, Leila %A Lee,M. %B Geometric Modeling for Scientific VisualizationGeometric Modeling for Scientific Visualization %I Birkhäuser %P 329 - 344 %8 2004/// %@ 9783540401162 %G eng %0 Journal Article %J Visualization and Computer Graphics, IEEE Transactions on %D 2004 %T Selective refinement queries for volume visualization of unstructured tetrahedral meshes %A Cignoni,P. %A De Floriani, Leila %A Magillo,P. %A Puppo,E. %A Scopigno,R. %K Automated;Signal Processing %K Computer-Assisted;Imaging %K Computer-Assisted;User-Computer Interface; %K data structure;geometric modeling;interactive visualization;large data sets;multiresolution model;selective refinement queries;unstructured tetrahedral meshes;variable resolution queries;volume data visualization;data visualisation;mesh generation;query p %K Three-Dimensional;Online Systems;Pattern Recognition %X We address the problem of the efficient visualization of large irregular volume data sets by exploiting a multiresolution model based on tetrahedral meshes. Multiresolution models, also called Level-Of-Detail (LOD) models, allow encoding the whole data set at a virtually continuous range of different resolutions. We have identified a set of queries for extracting meshes at variable resolution from a multiresolution model, based on field values, domain location, or opacity of the transfer function. Such queries allow trading off between resolution and speed in visualization. We define a new compact data structure for encoding a multiresolution tetrahedral mesh built through edge collapses to support selective refinement efficiently and show that such a structure has a storage cost from 3 to 5.5 times lower than standard data structures used for tetrahedral meshes. The data structures and variable resolution queries have been implemented together with state-of-the art visualization techniques in a system for the interactive visualization of three-dimensional scalar fields defined on tetrahedral meshes. Experimental results show that selective refinement queries can support interactive visualization of large data sets. %B Visualization and Computer Graphics, IEEE Transactions on %V 10 %P 29 - 45 %8 2004/// %@ 1077-2626 %G eng %N 1 %R 10.1109/TVCG.2004.1260756 %0 Journal Article %J International Journal of Computer Vision %D 2004 %T Self-Calibration from Image Derivatives %A Brodskỳ, T. %A Fermüller, Cornelia %B International Journal of Computer Vision %V 48 %P 91 - 114 %8 2004/// %G eng %N 2 %0 Journal Article %J Proceedings of the 4th International Conference on Language Resources and Evaluation (LREC) Workshop on Building Lexical Resources from Semantically Annotated Corpora %D 2004 %T Semantic annotation and lexico-syntactic paraphrase %A Dorr, Bonnie J %A Green,R. %A Levin,L. %A Rambow,O. %A Farwell,D. %A Habash,N. %A Helmreich,S. %A Hovy,E. %A Miller,K.J. %A Mitamura,T. %A others %X The IAMTC project (Interlingual Annotation of Multilingual Translation Corpora) is developing an interlingual representation frameworkfor annotation of parallel corpora (English paired with Arabic, French, Hindi, Japanese, Korean, and Spanish) with deep-semantic representations. In particular, we are investigating meaning equivalent paraphrases involving conversives and non-literal language use, as well as extended paraphrases involving syntax, lexicon, and grammatical features. The interlingua representation has three levels of depth. Each level is characterized by the types of meaning equivalent paraphrases that receive identical representations at that level. %B Proceedings of the 4th International Conference on Language Resources and Evaluation (LREC) Workshop on Building Lexical Resources from Semantically Annotated Corpora %P 47 - 52 %8 2004/// %G eng %0 Journal Article %J Workshop Programme %D 2004 %T Semantic Annotation for Interlingual Representation of Multilingual Texts %A Mitamura,T. %A Miller,K. %A Dorr, Bonnie J %A Farwell,D. %A Habash,N. %A Helmreich,S. %A Hovy,E. %A Levin,L. %A Rambow,O. %A Reeder,F. %A others %X This paper describes the annotation process being used in a multi-site project to create six sizable bilingual parallel corpora annotated with a consistent interlingua representation. After presenting the background and objectives of the effort, we describe the multilingual corpora and the three stages of interlingual representation being developed. We then focus on the annotation process itself, including an interface environment that supports the annotation task, and the methodology for evaluating the interlingua representation. Finally, we discuss some issues encountered during the annotation tasks. The resulting annotated multilingual corpora will be useful for a wide range of natural language processing research tasks, including machine translation, question answering, text summarization, and information extraction. %B Workshop Programme %P 19 - 19 %8 2004/// %G eng %0 Journal Article %J INFORMS Journal on Computing %D 2004 %T A semidefinite programming approach to side chain positioning with new rounding strategies %A Chazelle,B. %A Kingsford, Carl %A Singh,M. %B INFORMS Journal on Computing %V 16 %P 380 - 392 %8 2004/// %G eng %N 4 %0 Journal Article %J METHODS IN MOLECULAR BIOLOGY-CLIFTON THEN TOTOWA- %D 2004 %T Sequencing Strategies for Parasite Genomes %A Bartholomeu,D. %A El‐Sayed, Najib M. %A Melville,S. E. %B METHODS IN MOLECULAR BIOLOGY-CLIFTON THEN TOTOWA- %V 270 %P 1 - 16 %8 2004/// %G eng %0 Journal Article %J Proc. ACCV %D 2004 %T Sequential kernel density approximation through mode propagation: applications to background modeling %A Han,B. %A Comaniciu, D. %A Davis, Larry S. %X Density-based modeling of visual features is very commonin computer vision, either by using non-parametric techniques or through representing the underlying density function as a weighted sum of Gaussians. A number of real-time tasks such as background modeling or modeling the appearance of a moving target require sequential density estimation, where new data is incorporated in the model as it becomes avail- able. Nevertheless, current methods for updating the den- sity function either lack flexibility, by fixing the number of Gaussians in the mixture, or require large memory amounts, by maintaining a non-parametric representation of the den- sity. This paper presents an efficient method for recursive density approximation that relies on the propagation of the density modes. At each time step, the modes of the density are re-estimated and a Gaussian component is assigned to each mode. The covariance of each component is derived from the Hessian matrix estimated at the mode location. To detect the modes we employ the variable-bandwidth mean shift. While the proposed density representation is mem- ory efficient (which is typical for mixture densities), it in- herits the flexibility of non-parametric methods, by allow- ing the number of modes to adapt in time. We show that the same mode propagation principle applies for subspaces derived from eigen analysis. Extensive experimental back- ground modeling results demonstrate the performance of the method. %B Proc. ACCV %V 2004 %8 2004/// %G eng %0 Conference Paper %B Proceedings of the 12th annual ACM international workshop on Geographic information systems %D 2004 %T A serverless 3D world %A Tanin,Egemen %A Harwood,Aaron %A Samet, Hanan %A Nutanong,Sarana %A Truong,Minh Tri %K distributed hash tables %K peer-to-peer systems %K spatial data %K virtual-worlds %X Online multi-participant virtual-world systems have attracted significant interest from the Internet community but are hindered by their inability to efficiently support interactivity for a large number of participants. Current solutions divide a large virtual-world into a few mutually exclusive zones, with each zone controlled by a different server, and/or limit the number of participants per server or per virtual-world. Peer-to-Peer (P2P) systems are known to provide excellent scalability in a networked environment (one peer is introduced to the system by each participant), however current P2P applications can only provide file sharing and other forms of relatively simple data communications. In this paper, we present a generic 3D virtual-world application that runs on a P2P network with no central administration or server. Two issues are addressed by this paper to enable such a spatial application on a P2P network. First, we demonstrate how to index and query a 3D space on a dynamic distributed network. Second, we show how to build such a complex application from the ground level of a P2P routing algorithm. Our work leads to new directions for the development of online virtual-worlds that we believe can be used for many government, industry, and public domain applications. %B Proceedings of the 12th annual ACM international workshop on Geographic information systems %S GIS '04 %I ACM %C New York, NY, USA %P 157 - 165 %8 2004/// %@ 1-58113-979-9 %G eng %U http://doi.acm.org/10.1145/1032222.1032246 %R 10.1145/1032222.1032246 %0 Journal Article %J Proceedings of the 14th International Workshop on Network and Operating Systems Support for Digital Audio and Video: NOSSDAV 2003: June 16-18, 2004, Cork, Ireland %D 2004 %T SESSION 2: STREAMING %A Banerjee,S. %A Lee,S. %A Braud,R. %A Bhattacharjee, Bobby %A Srinivasan, Aravind %A Chu,Y. %A Zhang,H. %A Sinha,R. %A Papadopoulos,C. %A Boustead,P. %A others %B Proceedings of the 14th International Workshop on Network and Operating Systems Support for Digital Audio and Video: NOSSDAV 2003: June 16-18, 2004, Cork, Ireland %P 3 - 3 %8 2004/// %G eng %0 Conference Paper %B TREC-VID: Text Retrieval and Evaluation Conference %D 2004 %T Shot boundary detection based on Image correlation features in video %A Luo,Ming %A DeMenthon,D. %A David Doermann %X This paper introduced a framework of shot boundary detection used by the LAMPLAB, University of Maryland, College Park. It deals with cuts and dissolves detection. Generally, it is based on image correlation features in the videos. The cut detection is based on the so-called 2max ratio criterion in a sequential image buffer. The dissolve detection is based on the skipping image difference and linearity error in a sequential image buffer. We also eliminated the effect of flashlights in our algorithms. We submitted 5 runs to TRECVID 2004. Their run-ids are “D0, D1, … , D4”. They use the same algorithms with different parameter settings. These runs show a tradeoff curve between precision and recall on the testing data of TRECVID 2004. %B TREC-VID: Text Retrieval and Evaluation Conference %8 2004/// %G eng %0 Book Section %B Advances in ComputersAdvances in Computers %D 2004 %T Shotgun Sequence Assembly %A Pop, Mihai %X Shotgun sequencing is the most widely used technique for determining the DNA sequence of organisms. It involves breaking up the DNA into many small pieces that can be read by automated sequencing machines, then piecing together the original genome using specialized software programs called assemblers. Due to the large amounts of data being generated and to the complex structure of most organisms' genomes, successful assembly programs rely on sophisticated algorithms based on knowledge from such diverse fields as statistics, graph theory, computer science, and computer engineering. Throughout this chapter we will describe the main computational challenges imposed by the shotgun sequencing method, and survey the most widely used assembly algorithms. %B Advances in ComputersAdvances in Computers %I Elsevier %V Volume 60 %P 193 - 248 %8 2004/// %@ 0065-2458 %G eng %U http://www.sciencedirect.com/science/article/pii/S0065245803600069 %0 Journal Article %J Eighteenth Annual Conference on Neural Information Processing Systems, Vancouver %D 2004 %T Similarity measure for nonparametric kernel density based object tracking %A Yang,C. %A Duraiswami, Ramani %A Davis, Larry S. %X An object tracking algorithm using a novel simple symmetric similar-ity function between spatially-smoothed kernel-density estimates of the model and target distributions is proposed and tested. The similarity measure is based on the expectation of the density estimates over the model or target images. The density is estimated using radial-basis ker- nel functions that measure the affinity between points and provide a bet- ter outlier rejection property. The mean-shift algorithm is used to track objects by iteratively maximizing this similarity function. To alleviate the quadratic complexity of the density estimation, we employ Gaussian kernels and the fast Gauss transform to reduce the computations to linear order. This leads to a very efficient and robust nonparametric tracking al- gorithm. The proposed algorithm is tested with several image sequences and shown to achieve robust and reliable real-time tracking. Several se- quences are placed at http://www.cs.umd.edu/users/yangcj/node3.html. %B Eighteenth Annual Conference on Neural Information Processing Systems, Vancouver %8 2004/// %G eng %0 Journal Article %J BMC Bioinformatics %D 2004 %T Simple statistical models predict C-to-U edited sites in plant mitochondrial RNA %A Cummings, Michael P. %A Myers,D. S %X BACKGROUND: RNA editing is the process whereby an RNA sequence is modified from the sequence of the corresponding DNA template. In the mitochondria of land plants, some cytidines are converted to uridines before translation. Despite substantial study, the molecular biological mechanism by which C-to-U RNA editing proceeds remains relatively obscure, although several experimental studies have implicated a role for cis-recognition. A highly non-random distribution of nucleotides is observed in the immediate vicinity of edited sites (within 20 nucleotides 5' and 3'), but no precise consensus motif has been identified. RESULTS: Data for analysis were derived from the the complete mitochondrial genomes of Arabidopsis thaliana, Brassica napus, and Oryza sativa; additionally, a combined data set of observations across all three genomes was generated. We selected datasets based on the 20 nucleotides 5' and the 20 nucleotides 3' of edited sites and an equivalently sized and appropriately constructed null-set of non-edited sites. We used tree-based statistical methods and random forests to generate models of C-to-U RNA editing based on the nucleotides surrounding the edited/non-edited sites and on the estimated folding energies of those regions. Tree-based statistical methods based on primary sequence data surrounding edited/non-edited sites and estimates of free energy of folding yield models with optimistic re-substitution-based estimates of approximately 0.71 accuracy, approximately 0.64 sensitivity, and approximately 0.88 specificity. Random forest analysis yielded better models and more exact performance estimates with approximately 0.74 accuracy, approximately 0.72 sensitivity, and approximately 0.81 specificity for the combined observations. CONCLUSIONS: Simple models do moderately well in predicting which cytidines will be edited to uridines, and provide the first quantitative predictive models for RNA edited sites in plant mitochondria. Our analysis shows that the identity of the nucleotide -1 to the edited C and the estimated free energy of folding for a 41 nt region surrounding the edited C are the most important variables that distinguish most edited from non-edited sites. However, the results suggest that primary sequence data and simple free energy of folding calculations alone are insufficient to make highly accurate predictions. %B BMC Bioinformatics %V 5 %P 132 - 132 %8 2004/09// %G eng %R 10.1186/1471-2105-5-132 %0 Conference Paper %B Image Processing, 2004. ICIP '04. 2004 International Conference on %D 2004 %T Simultaneous background and foreground modeling for tracking in surveillance video %A Shao, J. %A Zhou,S. K %A Chellapa, Rama %K algorithm; %K analysis; %K background-foreground %K displacement %K estimation; %K image %K information; %K INTENSITY %K modeling; %K MOTION %K processes; %K processing; %K resolution; %K sequences; %K signal %K Stochastic %K Surveillance %K surveillance; %K tracking %K tracking; %K video %X We present a stochastic tracking algorithm for surveillance video where targets are dim and at low resolution. The algorithm builds motion models for both background and foreground by integrating motion and intensity information. Some other merits of the algorithm include adaptive selection of feature points for scene description and defining proper cost functions for displacement estimation. The experimental results show tracking robustness and precision in a challenging video sequences. %B Image Processing, 2004. ICIP '04. 2004 International Conference on %V 2 %P 1053 - 1056 Vol.2 - 1053 - 1056 Vol.2 %8 2004/10// %G eng %R 10.1109/ICIP.2004.1419483 %0 Conference Paper %B Software Engineering, 2004. ICSE 2004. Proceedings. 26th International Conference on %D 2004 %T Skoll: distributed continuous quality assurance %A Memon, Atif M. %A Porter, Adam %A Yilmaz,C. %A Nagarajan,A. %A Schmidt,D. %A Natarajan,B. %K 1MLOC+ software package %K ACE+TAO %K around-the-clock QA process %K around-the-world QA process %K distributed continuous QA %K distributed continuous quality assurance %K distributed programming %K program verification %K Quality assurance %K Skoll %K software performance evaluation %K software profiling %K Software quality %K Software testing %X Quality assurance (QA) tasks, such as testing, profiling, and performance evaluation, have historically been done in-house on developer-generated workloads and regression suites. Since this approach is inadequate for many systems, tools and processes are being developed to improve software quality by increasing user participation in the QA process. A limitation of these approaches is that they focus on isolated mechanisms, not on the coordination and control policies and tools needed to make the global QA process efficient, effective, and scalable. To address these issues, we have initiated the Skoll project, which is developing and validating novel software QA processes and tools that leverage the extensive computing resources of worldwide user communities in a distributed, continuous manner to significantly and rapidly improve software quality. This paper provides several contributions to the study of distributed continuous QA. First, it illustrates the structure and functionality of a generic around-the-world, around-the-clock QA process and describes several sophisticated tools that support this process. Second, it describes several QA scenarios built using these tools and process. Finally, it presents a feasibility study applying these scenarios to a 1MLOC+ software package called ACE+TAO. While much work remains to be done, the study suggests that the Skoll process and tools effectively manage and control distributed, continuous QA processes. Using Skoll we rapidly identified problems that had taken the ACE+TAO developers substantially longer to find and several of which had previously not been found. Moreover, automatic analysis of QA task results often provided developers information that quickly led them to the root cause of the problems. %B Software Engineering, 2004. ICSE 2004. Proceedings. 26th International Conference on %P 459 - 468 %8 2004/05// %G eng %R 10.1109/ICSE.2004.1317468 %0 Journal Article %J Behaviour & Information Technology %D 2004 %T SlideBar: Analysis of a linear input device %A Chipman,L.E. %A Bederson, Benjamin B. %A Golbeck,J. %B Behaviour & Information Technology %V 23 %P 1 - 9 %8 2004/// %G eng %N 1 %0 Conference Paper %B INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies %D 2004 %T Slurpie: a cooperative bulk data transfer protocol %A Sherwood,R. %A Braud,R. %A Bhattacharjee, Bobby %K adaptive %K bulk %K client-server %K clients; %K computing; %K cooperative %K data %K data; %K downloading %K network; %K peer-to-peer %K protocol; %K protocols; %K Slurpie %K strategy; %K systems; %K transfer %K transport %X We present Slurpie: a peer-to-peer protocol for bulk data transfer. Slurpie is specifically designed to reduce client download times for large, popular files, and to reduce load on servers that serve these files. Slurpie employs a novel adaptive downloading strategy to increase client performance, and employs a randomized backoff strategy to precisely control load on the server. We describe a full implementation of the Slurpie protocol, and present results from both controlled local-area and wide-area testbeds. Our results show that Slurpie clients improve performance as the size of the network increases, and the server is completely insulated from large flash crowds entering the Slurpie network. %B INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies %V 2 %P 941 - 951 vol.2 - 941 - 951 vol.2 %8 2004/03// %G eng %R 10.1109/INFCOM.2004.1356981 %0 Book Section %B Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use %D 2004 %T Social and psychological influences on computer user frustration %A Bessiere,K. %A Ceaparu,I. %A Lazar,J. %A Robinson,J. %A Shneiderman, Ben %B Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use %P 91 - 103 %8 2004/// %G eng %0 Journal Article %J International Journal of Computer Vision %D 2004 %T SoftPOSIT: Simultaneous pose and correspondence determination %A David,P. %A DeMenthon,D. %A Duraiswami, Ramani %A Samet, Hanan %X The problem of pose estimation arises in many areas of computer vision, including object recognition, object tracking, site inspection and updating, and autonomous navigation when scene models are available. We present a new algorithm, called SoftPOSIT, for determining the pose of a 3D object from a single 2D image when correspondences between object points and image points are not known. The algorithm combines the iterative softassign algorithm (Gold and Rangarajan, 1996; Gold et al., 1998) for computing correspondences and the iterative POSIT algorithm (DeMenthon and Davis, 1995) for computing object pose under a full-perspective camera model. Our algorithm, unlike most previous algorithms for pose determination, does not have to hypothesize small sets of matches and then verify the remaining image points. Instead, all possible matches are treated identically throughout the search for an optimal pose. The performance of the algorithm is extensively evaluated in Monte Carlo simulations on synthetic data under a variety of levels of clutter, occlusion, and image noise. These tests show that the algorithm performs well in a variety of difficult scenarios, and empirical evidence suggests that the algorithm has an asymptotic run-time complexity that is better than previous methods by a factor of the number of image points. The algorithm is being applied to a number of practical autonomous vehicle navigation problems including the registration of 3D architectural models of a city to images, and the docking of small robots onto larger robots. %B International Journal of Computer Vision %V 59 %P 259 - 284 %8 2004/// %G eng %N 3 %R 10.1023/B:VISI.0000025800.10423.1f %0 Journal Article %J Journal of Biological ChemistryJ. Biol. Chem. %D 2004 %T Solution Conformation of Lys63-linked Di-ubiquitin Chain Provides Clues to Functional Diversity of Polyubiquitin Signaling %A Varadan,Ranjani %A Assfalg,Michael %A Haririnia,Aydin %A Raasi,Shahri %A Pickart,Cecile %A Fushman, David %X Diverse cellular events are regulated by post-translational modification of substrate proteins via covalent attachment of one or a chain of ubiquitin molecules. The outcome of (poly)ubiquitination depends upon the specific lysine residues involved in the formation of polyubiquitin chains. Lys48-linked chains act as a universal signal for proteasomal degradation, whereas Lys63-linked chains act as a specific signal in several non-degradative processes. Although it has been anticipated that functional diversity between alternatively linked polyubiquitin chains relies on linkage-dependent differences in chain conformation/topology, direct structural evidence in support of this model has been lacking. Here we use NMR methods to determine the structure of a Lys63-linked di-ubiquitin chain. The structure is characterized by an extended conformation, with no direct contact between the hydrophobic residues Leu8, Ile44, and Val70 on the ubiquitin units. This structure contrasts with the closed conformation observed for Lys48-linked di-ubiquitin wherein these residues form the interdomain interface (Cook, W. J., Jeffrey, L. C., Carson, M., Zhijian, C., and Pickart, C. M. (1992) J. Biol. Chem. 267, 16467-16471; Varadan, R., Walker, O., Pickart, C., and Fushman, D. (2002) J. Mol. Biol. 324, 637-647). Consistent with the open conformation of the Lys63-linked di-ubiquitin, our binding studies show that both ubiquitin domains in this chain can bind a ubiquitin-associated domain from HHR23A independently and in a mode similar to that for mono-ubiquitin. In contrast, Lys48-linked di-ubiquitin binds in a different, higher affinity mode that has yet to be determined. This is the first experimental evidence that alternatively linked polyubiquitin chains adopt distinct conformations. %B Journal of Biological ChemistryJ. Biol. Chem. %V 279 %P 7055 - 7063 %8 2004/02/20/ %@ 0021-9258, 1083-351X %G eng %U http://www.jbc.org/content/279/8/7055 %N 8 %R 10.1074/jbc.M309184200 %0 Journal Article %J Proceedings of Third Workshop on Hot Topics in Networks (HotNets-III) %D 2004 %T Some foundational problems in interdomain routing %A Feamster, Nick %A Balakrishnan,H. %A Rexford,J. %X The substantial complexity of interdomain routing in theInternet comes from the need to support flexible poli- cies while scaling to a large number of Autonomous Systems. Despite impressive progress in characterizing the various ills of the Border Gateway Protocol (BGP), many problems remain unsolved, and the behavior of the routing system is still poorly understood. This paper argues that we must understand interdomain routing in terms of: (1) intrinsic properties and design tradeoffs of policy-based routing, independent of the specific routing protocol and (2) properties that relate to artifacts in to- day’s protocol. We pose open questions for the research community that, if answered, should help us understand why BGP’s many problems are so difficult to fix. Un- derstanding the fundamental properties of interdomain routing will help us decide how to make progress, be it making backward-compatible modifications to BGP or designing a radically different protocol. %B Proceedings of Third Workshop on Hot Topics in Networks (HotNets-III) %8 2004/// %G eng %0 Journal Article %J Proceedings of ICAD %D 2004 %T Sonification of geo-referenced data for auditory information seeking: Design principle and pilot study %A Zhao,H. %A Plaisant, Catherine %A Shneiderman, Ben %A Duraiswami, Ramani %X We present an Auditory Information Seeking Principle (AISP)(gist, navigate, filter, and details-on-demand) modeled after the visual information seeking mantra [1]. We propose that data sonification designs should conform to this principle. We also present some design challenges imposed by human auditory perception characteristics. To improve blind access to geo- referenced statistical data, we developed two preliminary sonifications adhering to the above AISP, an enhanced table and a spatial choropleth map. Our pilot study shows people can recognize geographic data distribution patterns on a real map with 51 geographic regions, in both designs. The study also shows evidence that AISP conforms to people’s information seeking strategies. Future work is discussed, including the improvement of the choropleth map design. %B Proceedings of ICAD %8 2004/// %G eng %0 Journal Article %J Journal of Computer and System Sciences %D 2004 %T Special issue: 35th Annual ACM Symposium on Theory of Computing %A Khanna,Sanjeev %A Srinivasan, Aravind %B Journal of Computer and System Sciences %V 69 %P 305 - 305 %8 2004/11// %@ 0022-0000 %G eng %U http://www.sciencedirect.com/science/article/pii/S0022000004000881 %N 3 %R 10.1016/j.jcss.2004.06.004 %0 Conference Paper %B Intelligent Transportation Systems, 2004. Proceedings. The 7th International IEEE Conference on %D 2004 %T A spherical microphone array system for traffic scene analysis %A Zhiyun Li %A Duraiswami, Ramani %A Grassi,E. %A Davis, Larry S. %K -6 %K 3D %K analysis; %K array %K arrays; %K audio; %K auditory %K beamformer; %K capture; %K dB; %K environment; %K gain; %K microphone %K NOISE %K noise; %K processing; %K real %K robust %K scene %K signal %K spherical %K system; %K traffic %K traffic; %K virtual %K white %K World %X This paper describes a practical spherical microphone array system for traffic auditory scene capture and analysis. Our system uses 60 microphones positioned on the rigid surface of a sphere. We then propose an optimal design of a robust spherical beamformer with minimum white noise gain (WNG) of -6 dB. We test this system in a real-world traffic environment. Some preliminary simulation and experimental results are presented to demonstrate its performance. This system may also find applications in broader areas such as 3D audio, virtual environment, etc. %B Intelligent Transportation Systems, 2004. Proceedings. The 7th International IEEE Conference on %P 338 - 342 %8 2004/10// %G eng %R 10.1109/ITSC.2004.1398921 %0 Journal Article %J CrossTalk %D 2004 %T Spiral acquisition of software-intensive systems of systems %A Boehm,B. %A Brown,A. W %A Basili, Victor R. %A Turner,R. %B CrossTalk %P 4 - 9 %8 2004/// %G eng %0 Conference Paper %D 2004 %T A STEP TOWARDS AUTOMATED DESIGN OF INDEX-PLATE MULTI-SHOT MOLDS %A Li,X. %A Gupta,S.K. %X This paper describes an algorithm for automateddesign of index-plate type of multi-shot molds for manufacturing multi-material objects. This new algorithm is a significant improvement over previous mold design algorithms and it accounts for constraints associated with the index-plate molding process. Our algorithm works in the following manner. First, based on the index-plate process constraints, we determine whether the given multi-material object is moldable by index- plate process by analyzing the geometry of the object. If the object can be molded, then the molding sequence is determined. Finally, the mold pieces. We expect that the algorithm described in this paper will provide the necessary foundations for automating the design of index-plate molds and therefore will help in significantly reducing the mold manufacturing lead-time associated with this type of molds. %C Lausanne, Switzerland %8 2004/04// %G eng %U http://www.glue.umd.edu/~skgupta/Publication/TMCE04_Li.pdf %0 Journal Article %J Tools And Methods Of Competitive Engineering %D 2004 %T A STEP TOWARDS INTEGRATED PRODUCT/PROCESS DEVELOPMENT OF MOLDED MULTI-MATERIAL STRUCTURES %A Gupta,S.K. %A Fowler,G. %X Multi-material molding is emerging as a popularmethod for making multi-material structures. In multi-material molding processes, fabrication and assembly steps are performed concurrently inside the mold. Therefore using existing knowledge on how to design molded products often results in the selection of wrong design alternatives and correcting these mistakes unnecessarily delays the product development process. To overcome this difficulty we need to develop an integrated product/process development methodology for designing molded multi-material structures. This paper presents an overview of different multi-material molding technologies and the role of manufacturing considerations in shape synthesis of molded multi- material structures. %B Tools And Methods Of Competitive Engineering %8 2004/// %G eng %U http://terpconnect.umd.edu/~skgupta/Publication/TMCE04_Gupta.pdf %0 Conference Paper %B Computer Vision and Pattern Recognition, IEEE Computer Society Conference on %D 2004 %T Stereo Correspondence with Slanted Surfaces: Critical Implications of Horizontal Slant %A Ogale, Abhijit S. %A Aloimonos, J. %X We examine the stereo correspondence problem in the presence of slanted scene surfaces. In particular, we highlight a previously overlooked geometric fact: a horizontally slanted surface (i.e. having depth variation in the direction of the separation of the two cameras) will appear horizontally stretched in one image as compared to the other image. Thus, while corresponding two images, N pixels on a scanline in one image may correspond to a different number of pixels M in the other image. This leads to three important modifications to existing stereo algorithms: (a) due to unequal sampling, intensity matching metrics such as the popular Birchfield-Tomasi procedure must be modified, (b) unequal numbers of pixels in the two images must be allowed to correspond to each other, and (c) the uniqueness constraint, which is often used for detecting occlusions, must be changed to a 3D uniqueness constraint. This paper discusses these new constraints and provides a simple scanline based matching algorithm for illustration. We experimentally demonstrate test cases where existing algorithms fail, and how the incorporation of these new constraints provides correct results. Experimental comparisons of the scanline based algorithm with standard data sets are also provided. %B Computer Vision and Pattern Recognition, IEEE Computer Society Conference on %I IEEE Computer Society %C Los Alamitos, CA, USA %V 1 %P 568 - 573 %8 2004/// %G eng %R http://doi.ieeecomputersociety.org/10.1109/CVPR.2004.241 %0 Conference Paper %B Parallel Architectures, Algorithms and Networks, 2004. Proceedings. 7th International Symposium on %D 2004 %T Strategies for exploring large scale data %A JaJa, Joseph F. %K algorithms; %K association; %K asymptotic %K bounds; %K business %K data %K data; %K database %K databases; %K demographic %K discovery; %K Indexing %K indexing; %K information %K knowledge %K large %K linear %K mining; %K multidimensional %K objects; %K optimal %K Parallel %K pattern %K processing; %K query %K querying; %K range %K scale %K scientific %K search %K serial %K series %K series; %K simulation %K space %K structure; %K structures; %K techniques; %K temporal %K TIME %K value %K very %K window; %X We consider the problem of querying large scale multidimensional time series data to discover events of interest, test and validate hypotheses, or to associate temporal patterns with specific events. This type of data currently dominates most other types of available data, and will very likely become even more prevalent in the future given the current trends in collecting time series of business, scientific, demographic, and simulation data. The ability to explore such collections interactively, even at a coarse level, will be critical in discovering the information and knowledge embedded in such collections. We develop indexing techniques and search algorithms to efficiently handle temporal range value querying of multidimensional time series data. Our indexing uses linear space data structures that enable the handling of queries in I/O time that is essentially the same as that of handling a single time slice, assuming the availability of a logarithmic number of processors as a function of the temporal window. A data structure with provably almost optimal asymptotic bounds is also presented for the case when the number of multidimensional objects is relatively small. These techniques improve significantly over standard techniques for either serial or parallel processing, and are evaluated by extensive experimental results that confirm their superior performance. %B Parallel Architectures, Algorithms and Networks, 2004. Proceedings. 7th International Symposium on %P 2 - 2 %8 2004/05// %G eng %R 10.1109/ISPAN.2004.1300447 %0 Conference Paper %B Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms %D 2004 %T Structural and algorithmic aspects of massive social networks %A Eubank,Stephen %A Kumar,V. S. Anil %A Marathe,Madhav V. %A Srinivasan, Aravind %A Wang,Nan %X We study the algorithmic and structural properties of very large, realistic social contact networks. We consider the social network for the city of Portland, Oregon, USA, developed as a part of the TRANSIMS/EpiSims project at the Los Alamos National Laboratory. The most expressive social contact network is a bipartite graph, with two types of nodes: people and locations; edges represent people visiting locations on a typical day. Three types of results are presented. (i) Our empirical results show that many basic characteristics of the dataset are well-modeled by a random graph approach suggested by Fan Chung Graham and Lincoln Lu (the CL-model), with a power-law degree distribution. (ii) We obtain fast approximation algorithms for computing basic structural properties such as clustering coefficients and shortest paths distribution. We also study the dominating set problem for such networks; this problem arose in connection with optimal sensor-placement for disease-detection. We present a fast approximation algorithm for computing near-optimal dominating sets. (iii) Given the close approximations provided by the CL-model to our original dataset and the large data-volume, we investigate fast methods for generating such random graphs. We present methods that can generate such a random network in near-linear time, and show that these variants asymptotically share many key features of the CL-model, and also match the Portland social network.The structural results have been used to study the impact of policy decisions for controlling large-scale epidemics in urban environments. %B Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms %S SODA '04 %I Society for Industrial and Applied Mathematics %C Philadelphia, PA, USA %P 718 - 727 %8 2004/// %@ 0-89871-558-X %G eng %U http://dl.acm.org/citation.cfm?id=982792.982902 %0 Journal Article %J Computer Vision-ECCV 2004 %D 2004 %T Structure from motion of parallel lines %A Baker, P. %A Aloimonos, J. %B Computer Vision-ECCV 2004 %P 229 - 240 %8 2004/// %G eng %0 Journal Article %J International Journal of Computer Vision %D 2004 %T Structure from Motion Using Sequential Monte Carlo Methods %A Qian,Gang %A Chellapa, Rama %X In this paper, the structure from motion (SfM) problem is addressed using sequential Monte Carlo methods. A new SfM algorithm based on random sampling is derived to estimate the posterior distributions of camera motion and scene structure for the perspective projection camera model. Experimental results show that challenging issues in solving the SfM problem, due to erroneous feature tracking, feature occlusion, motion/structure ambiguity, mixed-domain sequences, mismatched features, and independently moving objects, can be well modeled and effectively addressed using the proposed method. %B International Journal of Computer Vision %V 59 %P 5 - 31 %8 2004/// %@ 0920-5691 %G eng %U http://dx.doi.org/10.1023/B:VISI.0000020669.68126.4b %N 1 %0 Journal Article %J Computer Vision-ECCV 2004 %D 2004 %T Structure of applicable surfaces from single views %A Gumerov, Nail A. %A Zandifar,A. %A Duraiswami, Ramani %A Davis, Larry S. %X The deformation of applicable surfaces such as sheets of paper satisfies the differential geometric constraints of isometry (lengths and areas are conserved) and vanishing Gaussian curvature. We show that these constraints lead to a closed set of equations that allow recovery of the full geometric structure from a single image of the surface and knowledge of its undeformed shape. We show that these partial differential equations can be reduced to the Hopf equation that arises in non-linear wave propagation, and deformations of the paper can be interpreted in terms of the characteristics of this equation. A new exact integration of these equations is developed that relates the 3-D structure of the applicable surface to an image. The solution is tested by comparison with particular exact solutions. We present results for both the forward and the inverse 3D structure recovery problem. %B Computer Vision-ECCV 2004 %P 482 - 496 %8 2004/// %G eng %0 Journal Article %J The Journal of the Acoustical Society of America %D 2004 %T A study of the pinna anthropometry and the spectral notch frequencies %A Raykar,Vikas C. %A Duraiswami, Ramani %A Yegnanarayana,B. %X The head‐related transfer function (HRTF) varies significantly between individuals due to the different sizes and shapes of different anatomical parts like the pinnae, head, and torso. Applications in the creation of virtual auditory displays require individual HRTFs for perceptual fidelity. A generic HRTF would not work satisfactorily, since it has been shown that nonindividual HRTFs result in poor elevation perception. While good geometrical models exist for the effects of head, torso, and shoulders, a simple model for the pinna that connects the anthropometry to the features in the HRTF does not exist. One of the prominent cues contributed by the pinna are the sharp spectral notches, which encode the elevation of the sound source. Recently, we proposed a method to extract the frequencies of the pinna spectral notches from the HRTF. In this paper we study the relationship between the extracted notch frequency and pinna anthropometry. Based on these observations new approaches for HRTF customization can be developed. [The support of NSF Award ITR‐0086075 is gratefully acknowledged.] %B The Journal of the Acoustical Society of America %V 116 %P 2625 - 2625 %8 2004/// %G eng %U http://link.aip.org/link/?JAS/116/2625/3 %N 4 %0 Conference Paper %B First International Workshop On Software Engineering for High Performance Computing System Applications %D 2004 %T Studying code development for high performance computing: the HPCS program %A Carver, J. %A Asgari, S. %A Basili, Victor R. %A Hochstein, L. %A Hollingsworth, Jeffrey K %A Shull, F. %A Zelkowitz, Marvin V %B First International Workshop On Software Engineering for High Performance Computing System Applications %P 32 - 32 %8 2004/// %G eng %0 Conference Paper %B NIPS'04 Learning With Structured Outputs Workshop %D 2004 %T Supervised clustering with the dirichlet process %A Daumé, Hal %A Marcu,D. %B NIPS'04 Learning With Structured Outputs Workshop %8 2004/// %G eng %0 Journal Article %J Security Privacy, IEEE %D 2004 %T Susceptibility matrix: a new aid to software auditing %A Jiwnani,K. %A Zelkowitz, Marvin V %K approach; %K auditing; %K data; %K matrix; %K of %K program %K Security %K software %K susceptibility %K taxonomy-based %K testing; %K vulnerabilities; %X Testing for security is lengthy, complex, and costly, so focusing test efforts in areas that have the greatest number of security vulnerabilities is essential. This article describes a taxonomy-based approach that gives an insight into the distribution of vulnerabilities in a system. %B Security Privacy, IEEE %V 2 %P 16 - 21 %8 2004/04//mar %@ 1540-7993 %G eng %N 2 %R 10.1109/MSECP.2004.1281240 %0 Conference Paper %D 2004 %T The sybil attack in sensor networks: analysis & defenses %A Newsome, James %A Elaine Shi %A Song, Dawn %A Perrig, Adrian %K Security %K sensor networks %K sybil attack %X Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. We establish a classification of different types of the Sybil attack, which enables us to better understand the threats posed by each type, and better design countermeasures against each type. We then propose several novel techniques to defend against the Sybil attack, and analyze their effectiveness quantitatively. %S IPSN '04 %I ACM %P 259 - 268 %8 2004 %@ 1-58113-846-6 %G eng %U http://doi.acm.org/10.1145/984622.984660 %0 Report %D 2004 %T Symbolic MT With Statistical NLP Components %A Dorr, Bonnie J %A Habash,Nizar Y %A Monz,Christof %K *MACHINE TRANSLATION %K computational linguistics %K COMPUTER PROGRAMS %K CYBERNETICS %K DIVERGENCE UNRAVELING %K GHMT(GENERATION-HEAVY MACHINE TRANSLATION) %K INFORMATION SCIENCE %K linguistics %K natural language %K RESOURCE PROJECTION %X This reports provides an overview of the findings and software that have evolved from the "Symbolic MT with Statistical NLP Components" project over the last year. We present the major goals that have been achieved and discuss some of the open issues that we intend to address in the near future. This report also contains some details on the usage of some software that has been implemented during the project. %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %8 2004/06// %G eng %U http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA458796 %0 Conference Paper %B Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on %D 2004 %T A system identification approach for video-based face recognition %A Aggarwal,G. %A Chowdhury, A.K.R. %A Chellapa, Rama %K and %K autoregressive %K average %K dynamical %K Face %K gallery %K identification; %K image %K linear %K model; %K moving %K processes; %K processing; %K recognition; %K sequences; %K signal %K system %K system; %K video %K video-based %X The paper poses video-to-video face recognition as a dynamical system identification and classification problem. We model a moving face as a linear dynamical system whose appearance changes with pose. An autoregressive and moving average (ARMA) model is used to represent such a system. The choice of ARMA model is based on its ability to take care of the change in appearance while modeling the dynamics of pose, expression etc. Recognition is performed using the concept of sub space angles to compute distances between probe and gallery video sequences. The results obtained are very promising given the extent of pose, expression and illumination variation in the video data used for experiments. %B Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on %V 4 %P 175 - 178 Vol.4 - 175 - 178 Vol.4 %8 2004/08// %G eng %R 10.1109/ICPR.2004.1333732 %0 Conference Paper %B Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on %D 2004 %T Systematic exploitation of data parallelism in hardware synthesis of DSP applications %A Sen,M. %A Bhattacharyya, Shuvra S. %K area-performance trade-off curve %K automatic Verilog code generation %K circuit optimisation %K data flow graphs %K data parallelism %K dedicated hardware implementation synthesis %K design tool %K Digital signal processing %K DSP applications %K embedded systems %K hardware description languages %K hardware synthesis %K high level synthesis %K high level synthesis algorithm %K IMAGE PROCESSING %K PARALLEL PROCESSING %K power consumption %K Signal processing %K synchronous dataflow graph %K video processing %X We describe an approach that we have explored for low-power synthesis and optimization of image, video, and digital signal processing (DSP) applications. In particular, we consider the systematic exploitation of data parallelism across the operations of an application dataflow graph when synthesizing a dedicated hardware implementation. Data parallelism occurs commonly in DSP applications, and provides flexible opportunities to increase throughput or lower power consumption. Exploiting this parallelism in a dedicated hardware implementation comes at the expense of increased resource requirements, which must be balanced carefully when applying the technique in a design tool. We propose a high level synthesis algorithm to determine the data parallelism factor for each computation, and, based on the area and performance trade-off curve, design an efficient hardware representation of the dataflow graph. For performance estimation, our approach uses a cyclostatic dataflow intermediate representation of the hardware structure under synthesis. We then apply an automatic hardware generation framework to build the actual circuit. %B Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on %V 5 %P V - 229-32 vol.5 - V - 229-32 vol.5 %8 2004/05// %G eng %R 10.1109/ICASSP.2004.1327089 %0 Conference Paper %B Genetic and Evolutionary Computation–GECCO 2004 %D 2004 %T Systematic Integration of Parameterized Local Search Techniques in Evolutionary Algorithms %A Bambha,N. K %A Bhattacharyya, Shuvra S. %A Teich,J. %A Zitzler,E. %B Genetic and Evolutionary Computation–GECCO 2004 %P 383 - 384 %8 2004/// %G eng %0 Journal Article %J Technical Reports from UMIACS %D 2003 %T Safe and flexible memory management in Cyclone %A Hicks, Michael W. %A Morrisett,G. %A Grossman,D. %A Jim,T. %X Cyclone is a type-safe programming language intended for applications requiring control over memory management. Our previous work on Cyclone included support for stack allocation, lexical region allocation, and a garbage-collected heap. We achieved safety (i.e., prevented dangling pointers) through a region-based type-and-effects system. This paper describes some new memory-management mechanisms that we have integrated into Cyclone: dynamic regions, unique pointers, and reference-counted objects. Our experience shows that these new mechanisms are well suited for the timely recovery of objects in situations where it is awkward to use lexical regions. Crucially, programmers can write reusable functions without unnecessarily restricting callers' choices among the variety of memory-management options. To achieve this goal, Cyclone employs a combination of polymorphism and scoped constructs that temporarily let us treat objects as if they were allocated in a lexical region. %B Technical Reports from UMIACS %8 2003/08/01/undef %G eng %0 Conference Paper %B Proceedings of the 2003 Eurographics/ACM SIGGRAPH symposium on Geometry processing %D 2003 %T A scalable data structure for three-dimensional non-manifold objects %A De Floriani, Leila %A Hui,Annie %X In this paper, we address the problem of representing and manipulating non-manifold, mixed-dimensional objects described by three-dimensional simplicial complexes embedded in the 3D Euclidean space. We describe the design and the implementation of a new data structure, that we call the non-manifold indexed data structure with adjacencies (NMIA), which can represent any three-dimensional Euclidean simplicial complex compactly, since it encodes only the vertices and the top simplexes of the complex plus a restricted subset of topological relations among simplexes. The NMIA structure supports efficient traversal algorithms which retrieve topological relations in optimal time, and it scales very well to the manifold case. Here, we sketch traversal algorithms, and we compare the NMIA structure with data structures for manifold and regular 3D simplicial complexes. %B Proceedings of the 2003 Eurographics/ACM SIGGRAPH symposium on Geometry processing %S SGP '03 %I Eurographics Association %C Aire-la-Ville, Switzerland, Switzerland %P 72 - 82 %8 2003/// %@ 1-58113-687-0 %G eng %U http://dl.acm.org/citation.cfm?id=882370.882380 %0 Conference Paper %B Proceedings. IEEE Conference on Advanced Video and Signal Based Surveillance, 2003. %D 2003 %T Scalable image-based multi-camera visual surveillance system %A Lim,Ser-Nam %A Davis, Larry S. %A Elgammal,A. %K ACQUISITION %K algorithm; %K camera; %K constraints; %K feature %K hidden %K image-based %K MATCHING %K maximum %K multi-camera %K occlusion %K pan-tilt-zoom %K PLAN %K prediction; %K processing; %K removal; %K scalable %K scheduling; %K signal %K Surveillance %K surveillance; %K system; %K task %K video %K view; %K visibility %K visual %K weight %X We describe the design of a scalable and wide coverage visual surveillance system. Scalability (the ability to add and remove cameras easily during system operation with minimal overhead and system degradation) is achieved by utilizing only image-based information for camera control. We show that when a pan-tilt-zoom camera pans and tilts, a given image point moves in a circular and a linear trajectory, respectively. We create a scene model using a plan view of the scene. The scene model makes it easy for us to handle occlusion prediction and schedule video acquisition tasks subject to visibility constraints. We describe a maximum weight matching algorithm to assign cameras to tasks that meet the visibility constraints. The system is illustrated both through simulations and real video from a 6-camera configuration. %B Proceedings. IEEE Conference on Advanced Video and Signal Based Surveillance, 2003. %P 205 - 212 %8 2003/07// %G eng %R 10.1109/AVSS.2003.1217923 %0 Journal Article %J Advances in Cryptology-CRYPTO 2003 %D 2003 %T Scalable protocols for authenticated group key exchange %A Katz, Jonathan %A Yung,M. %X We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have been proposed; however, all provably-secure solutions thus far are not scalable and, in particular, require n rounds. Our main contribution is the first scalable protocol for this problem along with a rigorous proof of security in the standard model under the DDH assumption; our protocol uses a constant number of rounds and requires only O(1) modular exponentiations per user (for key derivation). Toward this goal and of independent interest, we first present a scalable compiler that transforms any group key-exchange protocol secure against a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls all communication in the network. This compiler adds only one round and O(1) communication (per user) to the original scheme. We then prove secure — against a passive adversary — a variant of the two-round group key-exchange protocol of Burmester and Desmedt. Applying our compiler to this protocol results in a provably-secure three-round protocol for authenticated group key exchange which also achieves forward secrecy. %B Advances in Cryptology-CRYPTO 2003 %P 110 - 125 %8 2003/// %G eng %R 10.1007/978-3-540-45146-4_7 %0 Journal Article %J Linear Algebra and its Applications %D 2003 %T Scaling symmetric positive definite matrices to prescribed row sums %A O’Leary,Dianne P. %K Diagonal preconditioning %K Homotopy %K Matrix scaling %K Positive definite matrices %X We give a constructive proof of a theorem of Marshall and Olkin that any real symmetric positive definite matrix can be symmetrically scaled by a positive diagonal matrix to have arbitrary positive row sums. We give a slight extension of the result, showing that given a sign pattern, there is a unique diagonal scaling with that sign pattern, and we give upper and lower bounds on the entries of the scaling matrix. %B Linear Algebra and its Applications %V 370 %P 185 - 191 %8 2003/09/01/ %@ 0024-3795 %G eng %U http://www.sciencedirect.com/science/article/pii/S0024379503003872 %R 10.1016/S0024-3795(03)00387-2 %0 Conference Paper %B Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems-Volume 4 %D 2003 %T Scriptroute: A public Internet measurement facility %A Spring, Neil %A Wetherall,D. %A Anderson,T. %B Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems-Volume 4 %P 17 - 17 %8 2003/// %G eng %0 Journal Article %J ACM Trans. Graph. %D 2003 %T A search engine for 3D models %A Funkhouser,Thomas %A Min,Patrick %A Kazhdan,Michael %A Chen,Joyce %A Halderman,Alex %A Dobkin,David %A Jacobs, David W. %K Search engine %K shape matching %K shape representation %K shape retrieval %X As the number of 3D models available on the Web grows, there is an increasing need for a search engine to help people find them. Unfortunately, traditional text-based search techniques are not always effective for 3D data. In this article, we investigate new shape-based search methods. The key challenges are to develop query methods simple enough for novice users and matching algorithms robust enough to work for arbitrary polygonal models. We present a Web-based search engine system that supports queries based on 3D sketches, 2D sketches, 3D models, and/or text keywords. For the shape-based queries, we have developed a new matching algorithm that uses spherical harmonics to compute discriminating similarity measures without requiring repair of model degeneracies or alignment of orientations. It provides 46 to 245% better performance than related shape-matching methods during precision--recall experiments, and it is fast enough to return query results from a repository of 20,000 models in under a second. The net result is a growing interactive index of 3D models available on the Web (i.e., a Google for 3D models). %B ACM Trans. Graph. %V 22 %P 83 - 105 %8 2003/01// %@ 0730-0301 %G eng %U http://doi.acm.org/10.1145/588272.588279 %N 1 %R 10.1145/588272.588279 %0 Journal Article %J Proceedings of the American Society for Information Science and Technology %D 2003 %T Searching large collections of recorded speech: A preliminary study %A Kim,J. %A Oard, Douglas %A Soergel,D. %B Proceedings of the American Society for Information Science and Technology %V 40 %P 330 - 339 %8 2003/// %G eng %N 1 %0 Conference Paper %B AAAI Spring Symposium on Intelligent Multimedia Knowledge Management %D 2003 %T Searching recorded speech based on the temporal extent of topic labels %A Oard, Douglas %A Leuski,A. %X Recorded speech poses unusual challenges for the de- sign of interactive end-user search systems. Automatic speech recognition is sufficiently accurate to support the automated components of interactive search sys- tems in some applications, but finding useful recordings among those nominated by the system can be difficult because listening to audio is time consuming and be- cause recognition errors and speech disfluencies make it difficult to mitigate that effect by skimming automatic transcripts. Support for rapid browsing based on su- pervised learning for automatic classification has shown promise, however, and a segment-then-label framework has emerged as the dominant paradigm for applying that technique to news broadcasts. This paper argues for a more general framework, which we call an activation matrix, that provides a flexible representation for the mapping between labels and time. Three approaches to the generation of activation matrices are briefly de- scribed, with the main focus of the paper then being the use of activation matrices to support search and selec- tion in interactive systems. %B AAAI Spring Symposium on Intelligent Multimedia Knowledge Management %8 2003/// %G eng %0 Conference Paper %B Mobile Data Management %D 2003 %T SEB-tree: An approach to index continuously moving objects %A Song,Z. %A Roussopoulos, Nick %B Mobile Data Management %P 340 - 344 %8 2003/// %G eng %0 Journal Article %J Annals of Mathematics and Artificial Intelligence %D 2003 %T Secure agents %A Bonatti,P. A %A Kraus,S. %A V.S. Subrahmanian %X With the rapid proliferation of software agents, there comes an increased need for agents to ensure that they do not provide data and/or services to unauthorized users. We first develop an abstract definition of what it means for an agent to preserve data/action security. Most often, this requires an agent to have knowledge that is impossible to acquire – hence, we then develop approximate security checks that take into account, the fact that an agent usually has incomplete/approximate beliefs about other agents. We develop two types of security checks – static ones that can be checked prior to deploying the agent, and dynamic ones that are executed at run time. We prove that a number of these problems are undecidable, but under certain conditions, they are decidable and (our definition of) security can be guaranteed. Finally, we propose a language within which the developer of an agent can specify her security needs, and present provably correct algorithms for static/dynamic security verification. %B Annals of Mathematics and Artificial Intelligence %V 37 %P 169 - 235 %8 2003/// %G eng %N 1 %R 10.1023/A:1020233522878 %0 Journal Article %J IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews %D 2003 %T A secure PLAN %A Hicks, Michael W. %A Keromytis,A. D %A Smith,J. M %K active networks %K active-network firewall %K Authentication %K Authorization %K Contracts %K cryptography %K Environmental management %K Extraterrestrial measurements %K functionally restricted packet language %K general-purpose service routines %K Internet %K latency overhead %K namespace-based security %K packet switching %K PLANet %K Planets %K privilege level %K programmable networks %K Safety %K safety risks %K secure PLAN %K security of data %K security risks %K trust management %K two-level architecture %K virtual private network %K Virtual private networks %K Web and internet services %X Active networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This correspondence describes the design and implementation of a security architecture for the active network PLANet. Security is obtained with a two-level architecture that combines a functionally restricted packet language, PLAN, with an environment of general-purpose service routines governed by trust management. In particular, a technique is used which expands or contracts a packet's service environment based on its level of privilege, termed namespace-based security. The design and implementation of an active-network firewall and virtual private network is used as an application of the security architecture. Measurements of the system show that the addition of the firewall imposes an approximately 34% latency overhead and as little as a 6.7% space overhead to incoming packets. %B IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews %V 33 %P 413 - 426 %8 2003/08// %@ 1094-6977 %G eng %N 3 %R 10.1109/TSMCC.2003.817347 %0 Conference Paper %B 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003 %D 2003 %T A secure service discovery protocol for MANET %A Yuan Yuan %A Arbaugh, William A. %K ad hoc networks %K centralized administration %K Computer architecture %K Computer science %K dynamic service discovery infrastructure %K Educational institutions %K MANET %K Manuals %K mobile ad hoc network %K Mobile ad hoc networks %K Mobile computing %K mobile radio %K noninfrastructure network %K Pervasive computing %K Protocols %K routing protocols %K secure service discovery protocol %K Security %K service discovery techniques %K service discovery technologies %K telecommunication computing %K telecommunication services %K XML %X Service discovery technologies are exploited to enable services to advertise their existence in a dynamic way, and can be discovered, configured and used by other devices with minimum manual efforts. It plays an essential role in future network scenarios especially with development of mobile ad hoc network (MANET) and emergence of pervasive computing. Because MANET allows these devices to communicate dynamically without fixed infrastructure and centralized administration, it gives rise to the challenges of the service discovery techniques. In this paper, we present a dynamic service discovery infrastructure that uses XML to describe services and match using the semantic content of service descriptions for MANET. We believe that the architecture we have designed is a necessary component of service discovery in non-infrastructure network by further exploring the secure and performance issues of this infrastructure. %B 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003 %I IEEE %V 1 %P 502- 506 Vol.1 - 502- 506 Vol.1 %8 2003/09/07/10 %@ 0-7803-7822-9 %G eng %R 10.1109/PIMRC.2003.1264322 %0 Book Section %B The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections %D 2003 %T Seeing the World Through Image Libraries %A North,C. %A Shneiderman, Ben %A Plaisant, Catherine %A Kang,H. %A Bederson, Benjamin B. %B The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections %I Morgan Kaufmann Publishers Inc. %P 47 - 47 %8 2003/// %@ 978-1-55860-915-0 %G eng %0 Journal Article %J Nucleic acids research %D 2003 %T The sequence and analysis of Trypanosoma brucei chromosome II %A El‐Sayed, Najib M. %A Ghedin,E. %A Song,J. %A MacLeod,A. %A Bringaud,F. %A Larkin,C. %A Wanless,D. %A Peterson,J. %A Hou,L. %A Taylor,S. %A others %B Nucleic acids research %V 31 %P 4856 - 4856 %8 2003/// %G eng %N 16 %0 Journal Article %J Innovative Concepts for Agent-Based Systems %D 2003 %T Seven days in the life of a robotic agent %A Chong,W. %A O'Donovan-Anderson,M. %A Okamoto,Y. %A Perlis, Don %B Innovative Concepts for Agent-Based Systems %P 243 - 256 %8 2003/// %G eng %0 Journal Article %J DevelopmentDevelopment %D 2003 %T Sex-lethal splicing autoregulation in vivo: interactions between SEX-LETHAL, the U1 snRNP and U2AF underlie male exon skipping %A Nagengast,Alexis A. %A Stitzinger,Shane M. %A Tseng,Chin-Hsiu %A Mount, Stephen M. %A Salz,Helen K. %K Drosophila %K SNF %K Splicing regulation %K SXL %K U1 snRNP %K U2AF %X Alternative splicing of the Sex-lethal pre-mRNA has long served as a model example of a regulated splicing event, yet the mechanism by which the female-specific SEX-LETHAL RNA-binding protein prevents inclusion of the translation-terminating male exon is not understood. Thus far, the only general splicing factor for which there is in vivo evidence for a regulatory role in the pathway leading to male-exon skipping is sans-fille (snf), a protein component of the spliceosomal U1 and U2 snRNPs. Its role, however, has remained enigmatic because of questions about whether SNF acts as part of an intact snRNP or a free protein. We provide evidence that SEX-LETHAL interacts with SANS-FILLE in the context of the U1 snRNP, through the characterization of a point mutation that interferes with both assembly into the U1 snRNP and complex formation with SEX-LETHAL. Moreover, we find that SEX-LETHAL associates with other integral U1 snRNP components, and we provide genetic evidence to support the biological relevance of these physical interactions. Similar genetic and biochemical approaches also link SEX-LETHAL with the heterodimeric splicing factor, U2AF. These studies point specifically to a mechanism by which SEX-LETHAL represses splicing by interacting with these key splicing factors at both ends of the regulated male exon. Moreover, because U2AF and the U1 snRNP are only associated transiently with the pre-mRNA during the course of spliceosome assembly, our studies are difficult to reconcile with the current model that proposes that the SEX-LETHAL blocks splicing at the second catalytic step, and instead argue that the SEX-LETHAL protein acts after splice site recognition, but before catalysis begins. %B DevelopmentDevelopment %V 130 %P 463 - 471 %8 2003/02/01/ %@ 0950-1991, 1477-9129 %G eng %U http://dev.biologists.org/content/130/3/463 %N 3 %R 10.1242/dev.00274 %0 Conference Paper %B Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on %D 2003 %T Shape and motion driven particle filtering for human body tracking %A Yamamoto, T. %A Chellapa, Rama %K 3D %K body %K broadcast %K camera; %K cameras; %K estimation; %K Filtering %K framework; %K human %K image %K MOTION %K motion; %K particle %K processing; %K rotational %K sequence; %K sequences; %K signal %K single %K static %K theory; %K tracking; %K TV %K video %X In this paper, we propose a method to recover 3D human body motion from a video acquired by a single static camera. In order to estimate the complex state distribution of a human body, we adopt the particle filtering framework. We present the human body using several layers of representation and compose the whole body step by step. In this way, more effective particles are generated and ineffective particles are removed as we process each layer. In order to deal with the rotational motion, the frequency of rotation is obtained using a preprocessing operation. In the preprocessing step, the variance of the motion field at each image is computed, and the frequency of rotation is estimated. The estimated frequency is used for the state update in the algorithm. We successfully track the movement of figure skaters in TV broadcast image sequence, and recover the 3D shape and motion of the skater. %B Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on %V 3 %P III - 61-4 vol.3 - III - 61-4 vol.3 %8 2003/07// %G eng %R 10.1109/ICME.2003.1221248 %0 Journal Article %J J. Artif. Intell. Res. (JAIR) %D 2003 %T SHOP2: An HTN planning system %A Nau, Dana S. %A Au,T. C %A Ilghami,O. %A Kuter,U. %A Murdock,J. W. %A Wu,D. %A Yaman,F. %X The SHOP2 planning system received one of the awards for distinguished performance in the 2002 International Planning Competition. This paper describes the features of SHOP2 which enabled it to excel in the competition, especially those aspects of SHOP2 that deal with temporal and metric planning domains. %B J. Artif. Intell. Res. (JAIR) %V 20 %P 379 - 404 %8 2003/// %G eng %U https://www.aaai.org/Papers/JAIR/Vol20/JAIR-2013.pdf %0 Journal Article %J Technical Reports from UMIACS %D 2003 %T A Simple and Optimal Energy Surface Reconstruction Algorithm from Volumetric Data %A Liu,Kexue %A Duraiswami, Ramani %A Davis, Larry S. %K Technical Report %X We describe a new method for building 3D surface meshes from volumetricimages, as are created in Magnetic Resonance Imaging (MRI). The method works by first extracting the contours from the MRI data, and then using modified polygon boolean operations to find difference polygons. The last step is performed by applying a Constrained Delauny Triangulation (CDT) algorithm to build a surface mesh. Since it is based on CDT, the mesh quality is usually very good. Moreover, the resulting triangular surface mesh is the optimal one for surface interpolation. In case of undersampled images, the mesh quality can be improved dramatically by inserting new Steiner points in to the mesh. Thus the mesh can be made suitable for use in scientific computation. Our method has the advantages of combining the generation and optimization of the mesh in one step compared with other methods. These advantages are illustrated. Also UMIACS-TR-2003-11 %B Technical Reports from UMIACS %8 2003/02/05/ %G eng %U http://drum.lib.umd.edu/handle/1903/1256 %0 Conference Paper %B Antennas and Propagation Society International Symposium, 2003. IEEE %D 2003 %T A simplified Newton method for the inverse orthotropic problem %A Seydou,F. %A Seppanen,T. %A Duraiswami, Ramani %K algebra; %K electromagnetic %K inhomogeneous %K inverse %K matrix %K matrix; %K media; %K medium; %K method; %K Newton %K orthotropic %K problem; %K problems; %K scattering; %K wave %X We consider one of the most challenging inverse problems in electromagnetic scattering for inhomogeneous medium. We try to reconstruct the elements of a matrix from scattering data in an orthotropic medium. To solve the inverse problem, we implement a simplified Newton method and present some numerical results. %B Antennas and Propagation Society International Symposium, 2003. IEEE %V 1 %P 535 - 538 vol.1 - 535 - 538 vol.1 %8 2003/06// %G eng %R 10.1109/APS.2003.1217514 %0 Conference Paper %B Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on %D 2003 %T Simultaneous pose and correspondence determination using line features %A David,P. %A DeMenthon,D. %A Duraiswami, Ramani %A Samet, Hanan %K algorithm; %K algorithms; %K annealing; %K clutter; %K cluttered %K Computer %K correspondence %K detection; %K determination; %K deterministic %K environment; %K extraction; %K feature %K feature; %K image %K image; %K imagery; %K images; %K joint %K line %K local %K man-made %K MATCHING %K matching; %K measurement; %K model-to-image %K noise; %K occlusion; %K optimum; %K perspective %K point %K pose %K position %K problem; %K processing; %K real %K realistic %K registration %K simulated %K softassign; %K SoftPOSIT %K stereo %K synthetic %K vision; %X We present a new robust line matching algorithm for solving the model-to-image registration problem. Given a model consisting of 3D lines and a cluttered perspective image of this model, the algorithm simultaneously estimates the pose of the model and the correspondences of model lines to image lines. The algorithm combines softassign for determining correspondences and POSIT for determining pose. Integrating these algorithms into a deterministic annealing procedure allows the correspondence and pose to evolve from initially uncertain values to a joint local optimum. This research extends to line features the SoftPOSIT algorithm proposed recently for point features. Lines detected in images are typically more stable than points and are less likely to be produced by clutter and noise, especially in man-made environments. Experiments on synthetic and real imagery with high levels of clutter, occlusion, and noise demonstrate the robustness of the algorithm. %B Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on %V 2 %P II-424 - II-431 vol.2 - II-424 - II-431 vol.2 %8 2003/06// %G eng %R 10.1109/CVPR.2003.1211499 %0 Conference Paper %B Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on %D 2003 %T Simultaneous tracking and recognition of human faces from video %A Zhou,Shaohua %A Chellapa, Rama %K appearance %K changes; %K density; %K Face %K human %K illumination %K Laplacian %K model; %K optical %K pose %K processing; %K recognition; %K series %K series; %K signal %K TIME %K tracking; %K variations; %K video %K video; %X The paper investigates the interaction between tracking and recognition of human faces from video under a framework proposed earlier (Shaohua Zhou et al., Proc. 5th Int. Conf. on Face and Gesture Recog., 2002; Shaohua Zhou and Chellappa, R., Proc. European Conf. on Computer Vision, 2002), where a time series model is used to resolve the uncertainties in both tracking and recognition. However, our earlier efforts employed only a simple likelihood measurement in the form of a Laplacian density to deal with appearance changes between frames and between the observation and gallery images, yielding poor accuracies in both tracking and recognition when confronted by pose and illumination variations. The interaction between tracking and recognition was not well understood. We address the interdependence between tracking and recognition using a series of experiments and quantify the interacting nature of tracking and recognition. %B Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on %V 3 %P III - 225-8 vol.3 - III - 225-8 vol.3 %8 2003/04// %G eng %R 10.1109/ICASSP.2003.1199148 %0 Report %D 2003 %T Space-Efficient and Fast Algorithms for Multidimensional Dominance Reporting and Range Counting %A Shi,Qingmin %A JaJa, Joseph F. %A Mortensen,Christian %K Technical Report %X We present linear-space sublogarithmic algorithms for handling the {\emthree-dimensional dominance reporting problem} and the {\em two-dimensional range counting problem}. Under the RAM model as described in~[M.~L. Fredman and D.~E. Willard. ``Surpassing the information theoretic bound with fusion trees'', {\em Journal of Computer and System Sciences}, 47:424--436, 1993], our algorithms achieve $O(\log n/\log\log n+f)$ query time for 3-D dominance reporting, where $f$ is the number of points reported, and $O(\log n/\log\log n)$ query time for 2-D range counting case. We extend these results to any constant dimension $d$ achieving $O(n(\log n/\log\log n)^{d-3})$-space and $O((\log n/\log\log )^{d-2}+f)$-query time for the reporting case and $O(n(\log n/\log\log n)^{d-2})$-space and $O((\log n/\log\log n)^{d-1})$ query time for the counting case. (UMIACS-TR-2003-101) %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %V UMIACS-TR-2003-101 %8 2003/11/25/ %G eng %U http://drum.lib.umd.edu/handle/1903/1318 %0 Journal Article %J The International Journal of Robotics Research %D 2003 %T Special Issue on Visual Analysis of Human Movement %A Davis, Larry S. %A Horaud,R. %B The International Journal of Robotics Research %V 22 %P 357 - 357 %8 2003/// %G eng %N 6 %0 Book %D 2003 %T Special section on perceptual organization in computer vision %A Jacobs, David W. %A Lindenbaum,M. %A August,J. %A Zucker,SW %A Ben-Shahar,O. %A Zucker,SW %A Tuytelaars,T. %A Turina,A. %A Van Gool,L. %A Mahamud,S. %I IEEE Computer Society %8 2003/// %G eng %0 Conference Paper %B ICME %D 2003 %T Sports Video Classification Using HMM %A Gilbert,X. %A Li,H. %A David Doermann %B ICME %V 2 %P 345 - 348 %8 2003/// %G eng %0 Conference Paper %B Proceedings of the 2003 conference on Interaction design and children %D 2003 %T Starting an intergenerational technology design team: a case study %A Knudtzon,Kendra %A Druin, Allison %A Kaplan,Nancy %A Summers,Kathryn %A Chisik,Yoram %A Kulkarni,Rahul %A Moulthrop,Stuart %A Weeks,Holly %A Bederson, Benjamin B. %K children %K cooperative inquiry %K design methods %K educational applications %K intergenerational design teams %K participatory design %X This paper presents a case study of the first three months of a new intergenerational design team with children ages 10--13. It discusses the research and design methods used for working with children of this age group, the challenges and opportunities of starting a new team, and the lessons learned. %B Proceedings of the 2003 conference on Interaction design and children %S IDC '03 %I ACM %C Preston, England %P 51 - 58 %8 2003/// %@ 1-58113-732-X %G eng %R 10.1145/953536.953545 %0 Conference Paper %B in International Journal of Computer Vision %D 2003 %T Statistical bias and the accuracy of 3d reconstruction from video %A Chowdhury, A.R. %A Chellapa, Rama %X The present state of the art in determining the error statistics in3D reconstruction from video concentrates on estimating the error covariance. A different source of error which has not received much attention in the computer vision community, but has been noted by psychophysicists, is the fact "that it is hard to explain ... the existence of systematic biases in observers' magnitude estimation of perceived depth" (Todd, 1998). In this paper, we prove that the depth estimate is statistically biased, derive a precise expression for it, and hypothesize that our analysis can be a possible explanation for the experimental observations. Many structure from motion (SfM) algorithms that reconstruct a scene from a video sequence pose the problem in a linear least squares framework Ax = b. It is a well- known fact that the least squares estimate is biased if the system matrix A is noisy. In SfM, the matrix A contains the image coordinates, which are always difficult to obtain precisely; thus it is expected that the structure and motion estimates in such a formulation of the problem would be biased. Though previous authors have analyzed the bias in 3D motion estimation from stereo, to the best of our knowledge, the statistical bias in 3D reconstruction from video has not been studied in the vision community. We show that even with a perfect motion estimate, the depth estimate is statistically biased. Existing results on the minimum achievable variance of the estimator are extended by deriving a generalized Cramer-Rao lower bound. Through simulations, we demonstrate the effects of camera motion parameters on the bias and give numerical examples to highlight the importance of compensating for it. %B in International Journal of Computer Vision %8 2003/// %G eng %0 Journal Article %J Journal of VisionJ Vis %D 2003 %T Statistical Bias Predicts Many Illusions %A Fermüller, Cornelia %X There is a principle underlying visual computations that previously has not been recognized. This principle is about the effects of uncertainty. Many visual computations are estimation processes. Because of noise, and there are many sources of noise in the formation and processing of images, systematic errors occur in the estimation. In statistical terms we say the estimation is biased. To avoid the bias would require accurate estimation of the noise parameters, but this because of the large number of unknown parameters (the geometry and photometry of the changing scene) in general is not possible. Visual computations, which are estimation processes include the low level processes of feature extraction and the middle level processes of visual recovery. We hypothesize that the bias in the estimation of image features, that is points, lines, and image movement, is the main cause for most geometrical illusions as well as illusory motion patterns. Because of bias the location of image features is estimated erroneously and the appearance of patterns is altered. It is shown that many geometrical optical illusion patterns are such that the bias is highly pronounced. We analyzed the bias in visual shape recovery processes and found that it is consistent with what is empirically known about the estimation of shape. It has been observed from computational as well as psychophysical experiments, that for many configurations there is a tendency to underestimate the slant. The bias predicts this underestimation of slant. To demonstrate the power of the model we created illusory displays giving rise to erroneous shape estimation. %B Journal of VisionJ Vis %V 3 %P 636 - 636 %8 2003/10/22/ %@ , 1534-7362 %G eng %U http://www.journalofvision.org/content/3/9/636 %N 9 %R 10.1167/3.9.636 %0 Conference Paper %B Computer Vision and Pattern Recognition Workshop, 2003. CVPRW '03. Conference on %D 2003 %T Statistical Error Propagation in 3D Modeling From Monocular Video %A RoyChowdhury,Amit %A Chellapa, Rama %X A significant portion of recent research in computer vision has focused on issues related to sensitivity and robustness of existing techniques. In this paper, we study the classical structure from motion problem and analyze how the statistics representing the quality of the input video propagates through the reconstruction algorithm and affects the quality of the output reconstruction. Specifically, we show that it is possible to derive analytical expressions of the first and second order statistics (bias and error covariance) of the solution as a function of the statistics of the input. We concentrate on the case of reconstruction from a monocular video, where the small baseline makes any algorithm very susceptible to noise in the motion estimates from the video sequence. We derive an expression relating the error covariance of the reconstruction to the error covariance of the feature tracks in the input video. This is done using the implicit function theorem of real analysis and does not require strong statistical assumptions. Next, we prove that the 3D reconstruction is statistically biased, derive an expression for it and show that it is numerically significant. Combining these two results, we also establish a new bound on the minimum error in the depth reconstruction. We present the numerical significance of these analytical results on real video data. %B Computer Vision and Pattern Recognition Workshop, 2003. CVPRW '03. Conference on %V 8 %P 89 - 89 %8 2003/06// %G eng %R 10.1109/CVPRW.2003.10092 %0 Journal Article %J Journal of the Optical Society of America AThe Journal of the Optical Society of America A %D 2003 %T Statistical physical model for foliage clutter in ultra-wideband synthetic aperture radar images %A Banerjee,Amit %A Chellapa, Rama %K IMAGE PROCESSING %K Remote sensing and sensors %X Analyzing foliage-penetrating (FOPEN) ultra-wideband synthetic aperture radar (SAR) images is a challenging problem owing to the noisy and impulsive nature of foliage clutter. Indeed, many target-detection algorithms for FOPEN SAR data are characterized by high false-alarm rates. In this work, a statistical–physical model for foliage clutter is proposed that explains the presence of outliers in the data and suggests the use of symmetric alpha-stable (SαS) distributions for accurate clutter modeling. Furthermore, with the use of general assumptions of the noise sources and propagation conditions, the proposed model relates the parameters of the SαS model to physical parameters such as the attenuation coefficient and foliage density. %B Journal of the Optical Society of America AThe Journal of the Optical Society of America A %V 20 %P 32 - 39 %8 2003/01/01/ %G eng %U http://josaa.osa.org/abstract.cfm?URI=josaa-20-1-32 %N 1 %R 10.1364/JOSAA.20.000032 %0 Conference Paper %B Proceedings of the 2003 Eurographics/ACM SIGGRAPH symposium on Geometry processing %D 2003 %T Statistical point geometry %A Kalaiah,Aravind %A Varshney, Amitabh %X We propose a scheme for modeling point sample geometry with statistical analysis. In our scheme we depart from the current schemes that deterministically represent the attributes of each point sample. We show how the statistical analysis of a densely sampled point model can be used to improve the geometry bandwidth bottleneck and to do randomized rendering without sacrificing visual realism. We first carry out a hierarchical principal component analysis (PCA) of the model. This stage partitions the model into compact local geometries by exploiting local coherence. Our scheme handles vertex coordinates, normals, and color. The input model is reconstructed and rendered using a probability distribution derived from the PCA analysis. We demonstrate the benefits of this approach in all stages of the graphics pipeline: (1) orders of magnitude improvement in the storage and transmission complexity of point geometry, (2) direct rendering from compressed data, and (3) view-dependent randomized rendering. %B Proceedings of the 2003 Eurographics/ACM SIGGRAPH symposium on Geometry processing %S SGP '03 %I Eurographics Association %C Aire-la-Ville, Switzerland, Switzerland %P 107 - 115 %8 2003/// %@ 1-58113-687-0 %G eng %U http://dl.acm.org/citation.cfm?id=882370.882385 %0 Conference Paper %B Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on %D 2003 %T Statistical shape theory for activity modeling %A Vaswani, N. %A Chowdhury, A.R. %A Chellapa, Rama %K abnormal %K activities %K activity %K analysis; %K behavior; %K classification; %K data; %K image %K mass; %K matching; %K modeling; %K monitoring; %K moving %K normal %K particle; %K pattern %K pattern; %K point %K polygonal %K probability; %K problem; %K processing; %K sequence; %K sequences; %K SHAPE %K shape; %K signal %K statistical %K Surveillance %K surveillance; %K theory; %K video %X Monitoring activities in a certain region from video data is an important surveillance problem. The goal is to learn the pattern of normal activities and detect unusual ones by identifying activities that deviate appreciably from the typical ones. We propose an approach using statistical shape theory based on the shape model of D.G. Kendall et al. (see "Shape and Shape Theory", John Wiley and Sons, 1999). In a low resolution video, each moving object is best represented as a moving point mass or particle. In this case, an activity can be defined by the interactions of all or some of these moving particles over time. We model this configuration of the particles by a polygonal shape formed from the locations of the points in a frame and the activity by the deformation of the polygons in time. These parameters are learned for each typical activity. Given a test video sequence, an activity is classified as abnormal if the probability for the sequence (represented by the mean shape and the dynamics of the deviations), given the model, is below a certain threshold The approach gives very encouraging results in surveillance applications using a single camera and is able to identify various kinds of abnormal behavior. %B Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on %V 3 %P III - 493-6 vol.3 - III - 493-6 vol.3 %8 2003/04// %G eng %R 10.1109/ICASSP.2003.1199519 %0 Journal Article %J Proceedings of Agent Based Simulation %D 2003 %T Statistical validation of spatial patterns in agent-based models %A Rand, William %A Brown,D.G. %A Page,S.E. %A Riolo,R %A Fernandez,L.E. %A Zellner,M %X We present and evaluate an agent-based model(ABM) of land use change at the rural-urban fringe. This paper is part of a project that links the ABM to surveys of residential preferences and historical patterns of development. Validation is an important issue for such models and we discuss the use of distributional phenomena as a method of validation. We then highlight the ability of our ABM to gen- erate two phenomena evident in empirical analysis of urban development patterns: a power law rela- tionship between frequency and cluster size and a negative exponential relationship between density and distance from city center. We discuss these results in the light of validation of ABMs. %B Proceedings of Agent Based Simulation %V 4 %8 2003/// %G eng %0 Conference Paper %D 2003 %T A Step Towards Automated Design of Rotary-Platen Multi-Shot Molds %A Li,Xuejun %A Gupta, Satyandra K. %X This paper describes an improved algorithm for automated design of rotary-platen type of multi-shot molds for manufacturing multi-material objects. The algorithm described in this paper accounts for geometric constraints resulting from the rotary-platen process and it can handle significantly more complex interfaces. Our algorithm works in the following manner. First, we classify the multi-material object into several basic types based on the relationships among different single material components in the object. For every basic type, we find a manufacturing sequence based on the precedence constraints resulting due to accessibility and disassembly requirements. Then, starting from the last mold stage, we generate the mold pieces for every mold stage based on the manufacturing sequence. We expect that the algorithm described in this paper will provide the necessary foundations for automating the design of rotary-platen molds and therefore will help in significantly reducing the mold manufacturing lead-time associated with these types of molds. %I ASME %C Chicago, Illinois, USA %V 2003 %P 343 - 354 %8 2003/// %@ 0-7918-3701-7 %G eng %U http://link.aip.org/link/ASMECP/v2003/i37017a/p343/s1&Agg=doi %R 10.1115/DETC2003/DFM-48168 %0 Journal Article %J International Journal of Computer Vision %D 2003 %T Stochastic Approximation and Rate-Distortion Analysis for Robust Structure and Motion Estimation %A Chowdhury,Amit K. Roy %A Chellapa, Rama %X Recent research on structure and motion recovery has focused on issues related to sensitivity and robustness of existing techniques. One possible reason is that in practical applications, the underlying assumptions made by existing algorithms are often violated. In this paper, we propose a framework for 3D reconstruction from short monocular video sequences taking into account the statistical errors in reconstruction algorithms. Detailed error analysis is especially important for this problem because the motion between pairs of frames is small and slight perturbations in its estimates can lead to large errors in 3D reconstruction. We focus on the following issues: physical sources of errors, their experimental and theoretical analysis, robust estimation techniques and measures for characterizing the quality of the final reconstruction. We derive a precise relationship between the error in the reconstruction and the error in the image correspondences. The error analysis is used to design a robust, recursive multi-frame fusion algorithm using “stochastic approximation” as the framework since it is capable of dealing with incomplete information about errors in observations. Rate-distortion analysis is proposed for evaluating the quality of the final reconstruction as a function of the number of frames and the error in the image correspondences. Finally, to demonstrate the effectiveness of the algorithm, examples of depth reconstruction are shown for different video sequences. %B International Journal of Computer Vision %V 55 %P 27 - 53 %8 2003/// %@ 0920-5691 %G eng %U http://dx.doi.org/10.1023/A:1024488407740 %N 1 %0 Journal Article %J Data Engineering %D 2003 %T Structure discovery using statistical relational learning %A Getoor, Lise %X Statistical relational learning is a newly emerging area of machine learning that combines statisticalmodeling with relational representations. Here we argue that it provides a unified framework for the discovery of structural information that can be exploited by a data management system. The categories of structure that can be discovered include: instance-level dependencies and correlations, for example intra-table column dependencies and inter-table join dependencies; record linkages and duplicates; and schema matching and schema discovery from unstructured and semi-structured data. %B Data Engineering %V 51 %P 10 - 10 %8 2003/// %G eng %0 Journal Article %J Commun. ACM %D 2003 %T Supporting statistical electronic table usage by citizens %A Hert,Carol A. %A Liddy,Elizabeth D. %A Shneiderman, Ben %A Marchionini,Gary %X Over 70 agencies at the federal level are charged with collecting data and producing and disseminating statistics. These statistics are used to inform government policy, shape health care initiatives, provide information on the state of the economy, and others. They also have significant impact on the lives of citizens who use the statistics, for example, to determine job opportunities, changes in social security benefits, and quality of life in particular areas. Our digital government project developed several specific technologies to support the location, manipulation, and understanding of a quintessential format for statistical information---the table. %B Commun. ACM %V 46 %P 52 - 54 %8 2003/01// %@ 0001-0782 %G eng %U http://doi.acm.org/10.1145/602421.602449 %N 1 %R 10.1145/602421.602449 %0 Journal Article %J ACM Transactions on Asian Language Information Processing %D 2003 %T The surprise language exercises %A Oard, Douglas %B ACM Transactions on Asian Language Information Processing %V 2 %P 79 - 84 %8 2003/06/01/ %@ 15300226 %G eng %U http://dl.acm.org/citation.cfm?id=974741 %R 10.1145/974740.974741 %0 Journal Article %J Journal of Computing and Information Science in EngineeringJ. Comput. Inf. Sci. Eng. %D 2003 %T A Survey of Shape Similarity Assessment Algorithms for Product Design and Manufacturing Applications %A Cardone, Antonio %A Gupta, Satyandra K. %A Karnik,Mukul %K CAD %K computational geometry %K production engineering computing %K spatial reasoning %B Journal of Computing and Information Science in EngineeringJ. Comput. Inf. Sci. Eng. %V 3 %P 109 - 118 %8 2003/06/00/ %G eng %U http://link.aip.org/link/?CIS/3/109/1 %N 2 %R 10.1115/1.1577356 %0 Journal Article %J Journal of manufacturing systems %D 2003 %T A system for generating process and material selection advice during embodiment design of mechanical components %A Gupta,S.K. %A Chen,Y. %A Feng,S. %A Sriram,R. %X This paper describes a systematic approach to material and process selection during theembodiment design of mechanical components and a system for generating process and material selection advice. Quite often during the embodiment design stage, design requirements are not precisely defined. Therefore, the system described in this paper accounts for imprecision in design requirements during generation and evaluation of alternative process sequences and material options. To reduce the computational effort, the system uses a depth-first branch-and- bound search algorithm. This aids in exploring promising process sequences and material options that can be used to meet the given set of design requirements. Various process sequences and material options are evaluated by using a commercial cost estimation tool. %B Journal of manufacturing systems %V 22 %P 28 - 45 %8 2003/// %G eng %U ftp://ftp.eng.umd.edu/:/home/glue/s/k/skgupta/backup/pub/Publication/JMS03_Gupta.pdf %N 1 %0 Journal Article %J SIGCOMM Comput. Commun. Rev. %D 2002 %T Scalable application layer multicast %A Banerjee,Suman %A Bhattacharjee, Bobby %A Kommareddy,Christopher %K application layer multicast %K hierarchy %K overlay networks %K peer-to-peer systems %K scalability %X We describe a new scalable application-layer multicast protocol, specifically designed for low-bandwidth, data streaming applications with large receiver sets. Our scheme is based upon a hierarchical clustering of the application-layer multicast peers and can support a number of different data delivery trees with desirable properties.We present extensive simulations of both our protocol and the Narada application-layer multicast protocol over Internet-like topologies. Our results show that for groups of size 32 or more, our protocol has lower link stress (by about 25%), improved or similar end-to-end latencies and similar failure recovery properties. More importantly, it is able to achieve these results by using orders of magnitude lower control traffic.Finally, we present results from our wide-area testbed in which we experimented with 32-100 member groups distributed over 8 different sites. In our experiments, average group members established and maintained low-latency paths and incurred a maximum packet loss rate of less than 1% as members randomly joined and left the multicast group. The average control overhead during our experiments was less than 1 Kbps for groups of size 100. %B SIGCOMM Comput. Commun. Rev. %V 32 %P 205 - 217 %8 2002/08// %@ 0146-4833 %G eng %U http://doi.acm.org/10.1145/964725.633045 %N 4 %R 10.1145/964725.633045 %0 Conference Paper %B Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE %D 2002 %T Scalable peer finding on the Internet %A Banerjee,S. %A Kommareddy,C. %A Bhattacharjee, Bobby %K application %K application-layer; %K Beaconing; %K CONTROL %K finding; %K Internet-like %K Internet; %K measurement %K network %K overhead %K peer %K peer-finding %K peers; %K protocol; %K protocols; %K reduction; %K scalable %K scheme; %K services; %K simulations; %K solution; %K Tiers; %K topologies; %K topology; %X We consider the problem of finding nearby application peers over the Internet. We define a new peer-finding scheme (called Tiers) that scales to large application peer groups. Tiers creates a hierarchy of the peers, which allows an efficient and scalable solution to this problem. The scheme can be implemented entirely in the application-layer and does not require the deployment of either any additional measurement services, or well-known reference landmarks in the network. We present detailed evaluation of Tiers and compare it to one previously proposed scheme called Beaconing. Through analysis and detailed simulations on 10,000 node Internet-like topologies we show that Tiers achieves comparable or better performance with a significant reduction in control overheads for groups of size 32 or more. %B Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE %V 3 %P 2205 - 2209 vol.3 - 2205 - 2209 vol.3 %8 2002/11// %G eng %R 10.1109/GLOCOM.2002.1189023 %0 Journal Article %J Selected Areas in Communications, IEEE Journal on %D 2002 %T Scalable secure group communication over IP multicast %A Banerjee,S. %A Bhattacharjee, Bobby %K access %K algorithm; %K authentication; %K Bandwidth %K communication; %K CONTROL %K costs; %K cryptography; %K dynamics; %K group %K group; %K Internet %K Internet-like %K Internet; %K IP %K logarithmic %K map; %K membership; %K message %K Multicast %K multicast; %K network %K overhead; %K PROCESSING %K protocol %K protocols; %K rekeying %K requirements; %K routers; %K routing; %K scalable %K secure %K security; %K server; %K simulation; %K storage %K Telecommunication %K topologies; %K Topology %K topology; %K transport %K usage; %X We introduce and analyze a scalable rekeying scheme for implementing secure group communications Internet protocol multicast. We show that our scheme incurs constant processing, message, and storage overhead for a rekey operation when a single member joins or leaves the group, and logarithmic overhead for bulk simultaneous changes to the group membership. These bounds hold even when group dynamics are not known a priori. Our rekeying algorithm requires a particular clustering of the members of the secure multicast group. We describe a protocol to achieve such clustering and show that it is feasible to efficiently cluster members over realistic Internet-like topologies. We evaluate the overhead of our own rekeying scheme and also of previously published schemes via simulation over an Internet topology map containing over 280 000 routers. Through analysis and detailed simulations, we show that this rekeying scheme performs better than previous schemes for a single change to group membership. Further, for bulk group changes, our algorithm outperforms all previously known schemes by several orders of magnitude in terms of actual bandwidth usage, processing costs, and storage requirements. %B Selected Areas in Communications, IEEE Journal on %V 20 %P 1511 - 1527 %8 2002/10// %@ 0733-8716 %G eng %N 8 %R 10.1109/JSAC.2002.803986 %0 Conference Paper %B Parallel and Distributed Processing Symposium., Proceedings International, IPDPS 2002, Abstracts and CD-ROM %D 2002 %T Scheduling multiple data visualization query workloads on a shared memory machine %A Andrade,H. %A Kurc, T. %A Sussman, Alan %A Saltz, J. %K Atomic force microscopy %K Biomedical informatics %K Computer science %K Data analysis %K data visualisation %K Data visualization %K datasets %K deductive databases %K digitized microscopy image browsing %K directed graph %K directed graphs %K dynamic query scheduling model %K Educational institutions %K high workloads %K image database %K limited resources %K multiple data visualization query workloads %K multiple query optimization %K performance %K priority queue %K Processor scheduling %K Query processing %K query ranking %K Relational databases %K scheduling %K shared memory machine %K shared memory systems %K Virtual Microscope %K visual databases %X Query scheduling plays an important role when systems are faced with limited resources and high workloads. It becomes even more relevant for servers applying multiple query optimization techniques to batches of queries, in which portions of datasets as well as intermediate results are maintained in memory to speed up query evaluation. We present a dynamic query scheduling model based on a priority queue implementation using a directed graph and a strategy for ranking queries. We examine the relative performance of several ranking strategies on a shared-memory machine using two different versions of an application, called the Virtual Microscope, for browsing digitized microscopy images %B Parallel and Distributed Processing Symposium., Proceedings International, IPDPS 2002, Abstracts and CD-ROM %I IEEE %P 11 - 18 %8 2002/// %@ 0-7695-1573-8 %G eng %R 10.1109/IPDPS.2002.1015482 %0 Conference Paper %B DARPA Active NEtworks Conference and Exposition, 2002. Proceedings %D 2002 %T A secure PLAN (extended version) %A Hicks, Michael W. %A Keromytis,A. D %A Smith,J. M %K active internetwork %K active networks %K active-network firewall %K Authentication %K authorisation %K Authorization %K Cities and towns %K Computer networks %K Computer science %K cryptography %K functionally restricted packet language %K general-purpose service routines %K Information security %K internetworking %K IP networks %K latency overhead %K namespace-based security %K PLAN %K PLANet %K Planets %K programmability %K Safety %K security architecture %K telecommunication security %K trust management %K two-level architecture %K Web and internet services %X Active networks promise greater flexibility than current networks, but threaten safety and security by virtue of their programmability. We describe the design and implementation of a security architecture for the active network PLANet (Hicks et al., 1999). Security is obtained with a two-level architecture that combines a functionally restricted packet language, PLAN (Hicks et al., 1998), with an environment of general-purpose service routines governed by trust management (Blaze et al., 1996). In particular, we employ a technique which expands or contracts a packet's service environment based on its level of privilege, termed namespace-based security. As an application of our security architecture, we present the design and implementation of an active-network firewall. We find that the addition of the firewall imposes an approximately 34% latency overhead and as little as a 6.7% space overhead to incoming packets %B DARPA Active NEtworks Conference and Exposition, 2002. Proceedings %I IEEE %P 224 - 237 %8 2002/// %@ 0-7695-1564-9 %G eng %R 10.1109/DANCE.2002.1003496 %0 Journal Article %J International Symposioum on Software Reliability Engineering %D 2002 %T Security Testing using a Susceptibility Matrix %A Jiwnani,K. %A Zelkowitz, Marvin V %X Software testing is a cost effective method to detect faults insoftware. Similarly, Security testing is intended to assess the trustworthiness of the security mechanisms and is often regarded as a special case of system testing. The emphasis of Security testing is not to establish the functional correctness of the software but to establish some degree of confidence in the security mechanisms. It is the single most common technique for gaining assurance that a system operates within the constraints of a given set of policies and mechanisms. Presently, there is no systematic approach to security testing. Our goal has been to devise a classification scheme to increase testing effort in high-risk areas and help the software community to get feedback to improve continuously. %B International Symposioum on Software Reliability Engineering %V 13 %8 2002/// %G eng %0 Conference Paper %B IAPRConference on Document Analysis System %D 2002 %T Segmentation and Identification of Handwriting in Noisy Documents %A Zheng,Y. %A Li,H. %A David Doermann %X In this paper we present an approach to the problem of segmenting and identifying handwritten annotations in noisy document images. In many types of documents such as correspondence, it is not uncommon for handwritten annotations to be added as part of a note, correction, clarification, or instruction, or a signature to appear as an authentication mark. It is important to be able to segment and identify such handwriting so we can 1) locate, interpret and re-trieve them efficiently in large document databases, and 2) use different algo-rithms for printed/handwritten text recognition and signature verification. Our approach consists of two processes: 1) a segmentation process, which divides the text into regions at an appropriate level (character, word, or zone), and 2) a classification process which identifies the segmented regions as handwritten. To determine the approximate region size where classification can be reliably per-formed, we conducted experiments at the character, word and zone level. We found that the reliable results can be achieved at the word level with a classifi-cation accuracy of 97.3%. The identified handwritten text is further grouped into zones and verified to reduce false alarms. Experiments show our approach is promising and robust. %B IAPRConference on Document Analysis System %P 95 - 105 %8 2002/// %G eng %0 Journal Article %J The lexical basis of sentence processing: formal, computational, and experimental issues %D 2002 %T Semantics in the spin cycle Competence and performance criteria for the creation of lexical entries %A Weinberg, Amy %B The lexical basis of sentence processing: formal, computational, and experimental issues %V 4 %P 85 - 85 %8 2002/// %G eng %U http://books.google.com/books?hl=en&lr=&id=RChlfDBsiXcC&oi=fnd&pg=PA85&dq=Amy+Weinberg&ots=w6TBBAc0kg&sig=gwoLdr3jhCMywPoYLey2JSg3Pa8 %0 Journal Article %J Journal of manufacturing systems %D 2002 %T Sheet metal bending: forming part families for generating shared press-brake setups %A Gupta,S.K. %A Rajagopal,D. %X Sheet metal bending press-brakes can be setup to produce more than one type of part withoutrequiring a setup change. To exploit this flexibility, we need setup planning techniques so that press-brake setups can be shared among many different parts. In this paper, we describe algorithms for partitioning a given set of parts into setup compatible part families that can be produced on the same setup. First, we present a greedy algorithm to form part family using a bottom-up approach that makes use of the mixed integer linear programming formulation for generating shared setups for each part family. Second, we present a mixed integer linear programming formulation to generate a shared setup for a given set of parts if such a setup exists. We expect that by producing many different types of parts on the same setup, we can significantly reduce the number of setup operations, improve machine tool utilization and enable cost-effective small-batch manufacturing. %B Journal of manufacturing systems %V 21 %P 329 - 349 %8 2002/// %G eng %U http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.138.8249&rep=rep1&type=pdf %N 5 %0 Conference Paper %B SC Conference %D 2002 %T SIGMA: A Simulator Infrastructure to Guide Memory Analysis %A DeRose,Luiz %A Ekanadham, K. %A Hollingsworth, Jeffrey K %A Sbaraglia, Simone %X In this paper we present SIGMA (Simulation Infrastructure to Guide Memory Analysis), a new data collection framework and family of cache analysis tools. The SIGMA environment provides detailed cache information by gathering memory reference data using software-based instrumentation. This infrastructure can facilitate quick probing into the factors that influence the performance of an application by highlighting bottleneck scenarios including: excessive cache/TLB misses and inefficient data layouts. The tool can also assist in perturbation analysis to determine performance variations caused by changes to architecture or program. Our validation tests using the SPEC Swim benchmark show that most of the performance metrics obtained with SIGMA are within 1% of the metrics obtained with hardware performance counters, with the advantage that SIGMA provides performance data on a data structure level, as specified by the programmer. %B SC Conference %I IEEE Computer Society %C Los Alamitos, CA, USA %P 1 - 1 %8 2002/// %G eng %R http://doi.ieeecomputersociety.org/10.1109/SC.2002.10055 %0 Journal Article %J Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %D 2002 %T Simple Procedure for Rapid Identification of Vibrio Cholerae from the Aquatic Environment %A Choopun,Nipa %A Louis,Valérie %A Huq,Anwar %A Rita R Colwell %X Biochemical tests commonly used to screen for Vibrio cholerae in environmental samples were evaluated, and we found that a combination of alkaline peptone enrichment followed by streaking on thiosulfate citrate bile salts sucrose agar and testing for arginine dihydrolase activity and esculin hydrolysis was an effective rapid technique to screen for aquatic environmental V. cholerae. This technique provided 100% sensitivity and ≥70% specificity. %B Applied and Environmental MicrobiologyAppl. Environ. Microbiol. %V 68 %P 995 - 998 %8 2002/02/01/ %@ 0099-2240, 1098-5336 %G eng %U http://aem.asm.org/content/68/2/995 %N 2 %R 10.1128/AEM.68.2.995-998.2002 %0 Conference Paper %B Pattern Recognition, 2002. Proceedings. 16th International Conference on %D 2002 %T A Smale-like decomposition for discrete scalar fields %A De Floriani, Leila %A Mesmoudi,M. M. %A Danovaro,E. %K data %K decomposition; %K differentiable %K discrete %K domain; %K field; %K fields; %K functions; %K gradient %K graph-based %K methods; %K multidimensional %K multiresolution %K representation; %K scalar %K Smale-like %K structure %K Topology %K triangulated %K vector %K visualisation; %X In this paper we address the problem of representing the structure of the topology of a d-dimensional scalar field as a basis for constructing a multiresolution representation of the structure of such afield. To this aim, we define a discrete decomposition of a triangulated d-dimensional domain, on whose vertices the values of the field are given. We extend a Smale decomposition, defined by Thom (1949) and Smale (1960) for differentiable functions, to the discrete case, to what we call a Smale-like decomposition. We introduce the notion of discrete gradient vector field, which indicates the growth of the scalar field and matches with our decomposition. We sketch an algorithm for building a Smale-like decomposition and a graph-based representation of this decomposition. We present results for the case of two-dimensional fields. %B Pattern Recognition, 2002. Proceedings. 16th International Conference on %V 1 %P 184 - 187 vol.1 - 184 - 187 vol.1 %8 2002/// %G eng %R 10.1109/ICPR.2002.1044644 %0 Conference Paper %B Fifth IEEE International Conference on Automatic Face and Gesture Recognition, 2002. Proceedings %D 2002 %T Smiling faces are better for face recognition %A Yacoob,Yaser %A Davis, Larry S. %K between-class scatter matrices %K Databases %K discrimination power measure %K dynamic scenarios %K expressive faces %K face recognition %K facial expressions %K performance %K performance differences %K smiling faces %K software performance evaluation %K Training %K visual databases %K within-class scatter matrices %X This paper investigates face recognition during facial expressions. While face expressions have been treated as an adverse factor in standard face recognition approaches, our research suggests that, if a system has a choice in the selection of faces to use in training and recognition, its best performance would be obtained on faces displaying expressions. Naturally, smiling faces are the most prevalent (among expressive faces) for both training and recognition in dynamic scenarios. We employ a measure of discrimination power that is computed from between-class and within-class scatter matrices. Two databases are used to show the performance differences on different sets of faces %B Fifth IEEE International Conference on Automatic Face and Gesture Recognition, 2002. Proceedings %I IEEE %P 52 - 57 %8 2002/05// %@ 0-7695-1602-5 %G eng %R 10.1109/AFGR.2002.1004132 %0 Conference Paper %B Proceedings of the thiry-fourth annual ACM symposium on Theory of computing %D 2002 %T Space-efficient approximate Voronoi diagrams %A Arya,Sunil %A Malamatos,Theocharis %A Mount, Dave %X (MATH) Given a set $S$ of $n$ points in $\IR^d$, a {\em $(t,\epsilon)$-approximate Voronoi diagram (AVD)} is a partition of space into constant complexity cells, where each cell $c$ is associated with $t$ representative points of $S$, such that for any point in $c$, one of the associated representatives approximates the nearest neighbor to within a factor of $(1+\epsilon)$. Like the Voronoi diagram, this structure defines a spatial subdivision. It also has the desirable properties of being easy to construct and providing a simple and practical data structure for answering approximate nearest neighbor queries. The goal is to minimize the number and complexity of the cells in the AVD.(MATH) We assume that the dimension $d$ is fixed. Given a real parameter $\gamma$, where $2 \le \gamma \le 1/\epsilon$, we show that it is possible to construct a $(t,\epsilon)$-AVD consisting of \[O(n \epsilon^{\frac{d-1}{2}} \gamma^{\frac{3(d-1)}{2}} \log \gamma) \] cells for $t = O(1/(\epsilon \gamma)^{(d-1)/2})$. This yields a data structure of $O(n \gamma^{d-1} \log \gamma)$ space (including the space for representatives) that can answer $\epsilon$-NN queries in time $O(\log(n \gamma) + 1/(\epsilon \gamma)^{(d-1)/2})$. (Hidden constants may depend exponentially on $d$, but do not depend on $\epsilon$ or $\gamma$).(MATH) In the case $\gamma = 1/\epsilon$, we show that the additional $\log \gamma$ factor in space can be avoided, and so we have a data structure that answers $\epsilon$-approximate nearest neighbor queries in time $O(\log (n/\epsilon))$ with space $O(n/\epsilon^{d-1})$, improving upon the best known space bounds for this query time. In the case $\gamma = 2$, we have a data structure that can answer approximate nearest neighbor queries in $O(\log n + 1/\epsilon^{(d-1)/2})$ time using optimal $O(n)$ space. This dramatically improves the previous best space bound for this query time by a factor of $O(1/\epsilon^{(d-1)/2})$.(MATH) We also provide lower bounds on the worst-case number of cells assuming that cells are axis-aligned rectangles of bounded aspect ratio. In the important extreme cases $\gamma \in \{2, 1/\epsilon\}$, our lower bounds match our upper bounds asymptotically. For intermediate values of $\gamma$ we show that our upper bounds are within a factor of $O((1/\epsilon)^{(d-1)/2}\log \gamma)$ of the lower bound. %B Proceedings of the thiry-fourth annual ACM symposium on Theory of computing %S STOC '02 %I ACM %C New York, NY, USA %P 721 - 730 %8 2002/// %@ 1-58113-495-9 %G eng %U http://doi.acm.org/10.1145/509907.510011 %R 10.1145/509907.510011 %0 Conference Paper %B Proc. InfoVis %D 2002 %T SpaceTree: Design evolution of a node link tree browser %A Plaisant, Catherine %A Grosjean,J. %A Bederson, Benjamin B. %B Proc. InfoVis %P 57 - 64 %8 2002/// %G eng %0 Conference Paper %B Information Visualization, 2002. INFOVIS 2002. IEEE Symposium on %D 2002 %T SpaceTree: supporting exploration in large node link tree, design evolution and empirical evaluation %A Plaisant, Catherine %A Grosjean,J. %A Bederson, Benjamin B. %K browser; %K camera %K data %K design %K diagrams; %K dynamic %K evolution; %K experiment; %K exploration; %K filter %K functions; %K graphical %K icons; %K integrated %K interfaces; %K large %K link %K movement; %K node %K novel %K optimized %K rescaling; %K search; %K SpaceTree; %K structures; %K topology; %K tree %K user %K visualisation; %K visualization; %X We present a novel tree browser that builds on the conventional node link tree diagrams. It adds dynamic rescaling of branches of the tree to best fit the available screen space, optimized camera movement, and the use of preview icons summarizing the topology of the branches that cannot be expanded. In addition, it includes integrated search and filter functions. This paper reflects on the evolution of the design and highlights the principles that emerged from it. A controlled experiment showed benefits for navigation to already previously visited nodes and estimation of overall tree topology. %B Information Visualization, 2002. INFOVIS 2002. IEEE Symposium on %P 57 - 64 %8 2002/// %G eng %R 10.1109/INFVIS.2002.1173148 %0 Journal Article %J International Journal of Computer Vision %D 2002 %T Spatio-temporal stereo using multi-resolution subdivision surfaces %A Neumann, J. %A Aloimonos, J. %B International Journal of Computer Vision %V 47 %P 181 - 193 %8 2002/// %G eng %N 1 %0 Journal Article %J The VLDB Journal %D 2002 %T Speeding up construction of PMR quadtree-based spatial indexes %A Hjaltason,Gisli R. %A Samet, Hanan %K Bulk-loading %K I/O %K spatial indexing %X Spatial indexes, such as those based on the quadtree, are important in spatial databases for efficient execution of queries involving spatial constraints, especially when the queries involve spatial joins. In this paper we present a number of techniques for speeding up the construction of quadtree-based spatial indexes, specifically the PMR quadtree, which can index arbitrary spatial data. We assume a quadtree implementation using the “linear quadtree”, a disk-resident representation that stores objects contained in the leaf nodes of the quadtree in a linear index (e.g., a B-tree) ordered based on a space-filling curve. We present two complementary techniques: an improved insertion algorithm and a bulk-loading method. The bulk-loading method can be extended to handle bulk-insertions into an existing PMR quadtree. We make some analytical observations about the I/O cost and CPU cost of our PMR quadtree bulk-loading algorithm, and conduct an extensive empirical study of the techniques presented in the paper. Our techniques are found to yield significant speedup compared to traditional quadtree building methods, even when the size of a main memory buffer is very small compared to the size of the resulting quadtrees. %B The VLDB Journal %V 11 %P 109 - 137 %8 2002/10// %@ 1066-8888 %G eng %U http://dx.doi.org/10.1007/s00778-002-0067-8 %N 2 %R 10.1007/s00778-002-0067-8 %0 Conference Paper %B In Proceedings of the International Workshop on Multimedia Information Systems (MIS 2002) %D 2002 %T The START multimedia information system: Current technology and future directions %A Katz,B. %A Jimmy Lin %A Felshin,S. %X To address the problem of information overload intoday’s world, we have developed Start, a natural language question answering system that provides users with high-precision multimedia information ac- cess through the use of natural language annota- tions. To address the difficulty of accessing large amounts of heterogeneous data, we have developed Omnibase, which assists Start by integrating struc- tured and semistructured Web databases into a sin- gle, uniformly structured “virtual database.” Our ultimate goal is to develop a computer system that acts like a “smart reference librarian,” and we be- lieve we have laid a firm foundation for achieving our goal. This paper describes our current implemented system and discusses future research directions. %B In Proceedings of the International Workshop on Multimedia Information Systems (MIS 2002) %8 2002/// %G eng %0 Journal Article %J IEEE Visualization Tutorial %D 2002 %T State of the art in data representation for visualization %A Chen,B. %A Kaufman,A. %A Mueller,K. %A Varshney, Amitabh %B IEEE Visualization Tutorial %8 2002/// %G eng %0 Conference Paper %D 2002 %T A Step Towards Automated Design of Multi-Piece Sacrificial Molds %A Dhaliwal,Savinder %A Gupta, Satyandra K. %A Huang,Jun %A Kumar,Malay %X This paper describes a feature-based approach for design of multi-piece sacrificial molds. Our mold design algorithm consists of the following three steps. First, the desired gross mold shape is formed based on the feature-based description of the part geometry. Second, if the desired gross mold shape is not machinable as a single piece, the gross mold shape is decomposed into simpler geometric components to make sure that each component is manufacturable using 3-axis CNC machining. The decomposition is performed to ensure that each component is accessible to end-milling tools, and decomposed components can be assembled together to form the gross mold shape. Finally, assembly features are added to mold components to facilitate assembly of mold components and eliminate unnecessary degree of freedoms from the final mold assembly. We expect that our decomposition algorithm will provide a step towards the necessary foundations for automating the design of multi-piece mold and therefore will help in significantly reducing the mold design and manufacturing lead-time. %I ASME %C Montreal, Quebec, Canada %V 3 %P 337 - 347 %8 2002/// %@ 0-7918-3623-1 %G eng %U http://link.aip.org/link/ASMECP/v2002/i36231/p337/s1&Agg=doi %R 10.1115/DETC2002/DFM-34188 %0 Journal Article %J Public Key Cryptography—PKC 2003 %D 2002 %T Strong key-insulated signature schemes %A Dodis,Y. %A Katz, Jonathan %A Xu,S. %A Yung,M. %X Signature computation is frequently performed on insecure devices—e.g., mobile phones — operating in an environment where the private (signing)k ey is likely to be exposed. Strong key-insulated signature schemes are one way to mitigate the damage done when this occurs. In the key-insulated model [6], the secret key stored on an insecure device is refreshed at discrete time periods via interaction with a physically-secure device which stores a “master key”. All signing is still done by the insecure device, and the public key remains fixed throughout the lifetime of the protocol. In a strong (t,N)-key-insulated scheme, an adversary who compromises the insecure device and obtains secret keys for up to t periods is unable to forge signatures for any of the remaining N-t periods. Furthermore, the physically-secure device (or an adversary who compromises only this device)is unable to forge signatures for any time period.We present here constructions of strong key-insulated signature schemes based on a variety of assumptions. First, we demonstrate a generic construction of a strong (N— 1,N)-key-insulated signature scheme using any standard signature scheme. We then give a construction of a strong (t,N)-signature scheme whose security may be based on the discrete logarithm assumption in the random oracle model. This construction offers faster signing and verification than the generic construction, at the expense of O(t)k ey update time and key length. Finally, we construct strong (N —1,N)-key-insulated schemes based on any “trapdoor signature scheme” (a notion we introduce here); our resulting construction in fact serves as an identity-based signature scheme as well. This leads to very efficient solutions based on, e.g., the RSA assumption in the random oracle model. Work done in part while at DIMACS. %B Public Key Cryptography—PKC 2003 %P 130 - 144 %8 2002/// %G eng %R 10.1007/3-540-36288-6_10 %0 Journal Article %J Journal of Molecular Biology %D 2002 %T Structural Properties of Polyubiquitin Chains in Solution %A Varadan,Ranjani %A Walker,Olivier %A Pickart,Cecile %A Fushman, David %K chemical shift mapping %K domain orientation measurements %K polyubiquitin chains %K spin relaxation %K ubiquitin %X Because polyubiquitin chain structure modulates Ub-mediated signaling, knowledge of the physiological conformations of chain signals should provide insights into specific recognition. Here, we characterized the solution conformations of K48-linked Ub2 and Ub4 using a combination of NMR techniques, including chemical shift mapping of the interdomain interface, domain orientation measurements on the basis of 15N relaxation and residual dipolar couplings, and the solvent accessibility studies. Our data indicate a switch in the conformation of Ub2, from open to closed, with increasing pH. The closed conformation features a well-defined interface that is related to, but distinguishable from, that observed in the Ub2 crystal structure. This interface is dynamic in solution, such that important hydrophobic residues (L8, I44, V70) that are sequestered at the interface in the closed conformation may be accessible for direct interactions with recognition factors. Our results suggest that the distal two units of Ub4, which is the minimum signal for efficient proteasomal degradation, may adopt the closed Ub2 conformation. %B Journal of Molecular Biology %V 324 %P 637 - 647 %8 2002/12/06/ %@ 0022-2836 %G eng %U http://www.sciencedirect.com/science/article/pii/S0022283602011981 %N 4 %R 10.1016/S0022-2836(02)01198-1 %0 Journal Article %J Lecture Notes in Computer Science %D 2002 %T Structure from Motion/Stereoscopic Vision/Surface Geometry/Shape-Bayesian Self-Calibration of a Moving Camera %A Qian, G. %A Chellapa, Rama %B Lecture Notes in Computer Science %V 2351 %P 277 - 293 %8 2002/// %G eng %0 Conference Paper %B Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries %D 2002 %T Supporting access to large digital oral history archives %A Gustman,Samuel %A Soergel,Dagobert %A Oard, Douglas %A Byrne,William %A Picheny,Michael %A Ramabhadran,Bhuvana %A Greenberg,Douglas %K cataloging %K oral history %K research agenda %X This paper describes our experience with the creation, indexing, and provision of access to a very large archive of videotaped oral histories - 116,000 hours of digitized interviews in 32 languages from 52,000 survivors, liberators, rescuers, and witnesses of the Nazi Holocaust. It goes on to identify a set of critical research issues that must be addressed if we are to provide full and detailed access to collections of this size: issues in user requirement studies, automatic speech recognition, automatic classification, segmentation, summarization, retrieval, and user interfaces. The paper ends by inviting others to discuss use of these materials in their own research. %B Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries %S JCDL '02 %I ACM %C New York, NY, USA %P 18 - 27 %8 2002/// %@ 1-58113-513-0 %G eng %U http://doi.acm.org/10.1145/544220.544224 %R 10.1145/544220.544224 %0 Journal Article %J Encyclopedia of Cognitive Science %D 2002 %T Symbol systems %A Anderson,M. L %A Perlis, Don %B Encyclopedia of Cognitive Science %8 2002/// %G eng %0 Patent %D 2002 %T System and method for entering text in a virtual environment %A Evans,Francine %A Skiena,Steven %A Varshney, Amitabh %E The Research Foundation of the State University of New York %X A system and method for entering text in a virtual environment by sensory gloves. The user enters a key that represents one or more letters by simulating a press of a keyboard in the gloves. The user calibrates the gloves by entering text, during which time the system establishes threshold values that represent simulated presses for each finger. After the initial calibration of the sensory gloves, the user enters text with simulated finger presses. The system distinguishes which movements are intended as simulated finger presses by examining the relative motions of fingers and maintaining dynamic thresholds. Errors are alleviated by providing feedback to the user, such as beeps and a visual display of the fingers and the current text. Because keys may represent more than one character, the system determines the intended text by probabilistic analysis and the Viterbi algorithm. %V : 09/364,433 %8 2002/06/18/ %G eng %U http://www.google.com/patents?id=w0QJAAAAEBAJ %N 6407679 %0 Book Section %B Types in Compilation %D 2001 %T Safe and Flexible Dynamic Linking of Native Code %A Hicks, Michael W. %A Weirich,Stephanie %A Crary,Karl %E Harper,Robert %X We present the design and implementation of the first complete framework for flexible and safe dynamic linking of native code. Our approach extends Typed Assembly Language with a primitive for loading and typechecking code, which is flexible enough to support a variety of linking strategies, but simple enough that it does not significantly expand the trusted computing base. Using this primitive, along with the ability to compute with types, we show that we can program many existing dynamic linking approaches. As a concrete demonstration, we have used our framework to implement dynamic linking for a type-safe dialect of C, closely modeled after the standard linking facility for Unix C programs. Aside from the unavoidable cost of verification, our implementation performs comparably with the standard, untyped approach. %B Types in Compilation %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 2071 %P 147 - 176 %8 2001/// %@ 978-3-540-42196-2 %G eng %U http://dx.doi.org/10.1007/3-540-45332-6_6 %0 Journal Article %J Proceedings of the AMIA SymposiumProc AMIA Symp %D 2001 %T Secure Health Information Sharing System: SHARE %A M. Wu %A Mui,Lik %A Mohtashemi,Mojdeh %A Szolovits,Peter %B Proceedings of the AMIA SymposiumProc AMIA Symp %P 1060 - 1060 %8 2001/// %@ 1531-605X %G eng %0 Journal Article %J ACM SIGMOD Record %D 2001 %T Selectivity estimation using probabilistic models %A Getoor, Lise %A Taskar,Benjamin %A Koller,Daphne %X Estimating the result size of complex queries that involve selection on multiple attributes and the join of several relations is a difficult but fundamental task in database query processing. It arises in cost-based query optimization, query profiling, and approximate query answering. In this paper, we show how probabilistic graphical models can be effectively used for this task as an accurate and compact approximation of the joint frequency distribution of multiple attributes across multiple relations. Probabilistic Relational Models (PRMs) are a recent development that extends graphical statistical models such as Bayesian Networks to relational domains. They represent the statistical dependencies between attributes within a table, and between attributes across foreign-key joins. We provide an efficient algorithm for constructing a PRM front a database, and show how a PRM can be used to compute selectivity estimates for a broad class of queries. One of the major contributions of this work is a unified framework for the estimation of queries involving both select and foreign-key join operations. Furthermore, our approach is not limited to answering a small set of predetermined queries; a single model can be used to effectively estimate the sizes of a wide collection of potential queries across multiple tables. We present results for our approach on several real-world databases. For both single-table multi-attribute queries and a general class of select-join queries, our approach produces more accurate estimates than standard approaches to selectivity estimation, using comparable space and time. %B ACM SIGMOD Record %V 30 %P 461 - 472 %8 2001/05// %@ 0163-5808 %G eng %U http://doi.acm.org/10.1145/376284.375727 %N 2 %R 10.1145/376284.375727 %0 Journal Article %J Data Warehousing and Knowledge Discovery %D 2001 %T Shared index scans for data warehouses %A Kotidis1⋆,Y. %A Sismanis,Y. %A Roussopoulos, Nick %B Data Warehousing and Knowledge Discovery %P 307 - 316 %8 2001/// %G eng %0 Conference Paper %B Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms %D 2001 %T A simple entropy-based algorithm for planar point location %A Arya,Sunil %A Malamatos,Theocharis %A Mount, Dave %X Given a planar polygonal subdivision S, point location involves preprocessing this subdivision into a data structure so that given any query point q, the cell of the subdivision containing q can be determined efficiently. Suppose that for each cell z in the subdivision, the probability pz that a query point lies within this cell is also given. The goal is to design the data structure to minimize the average search time. It has long been known that the entropy H of the probability distribution is the dominant term in the lower bound on the average-case search time. This problem has been considered before, but existing data structures are all quite complicated. In this paper, we show that a very simple modification of a well-known randomized incremental algorithm can be applied to produce a data structure of expected linear size that can answer point location queries in &Ogr;(H) average time. We also present empirical evidence for the practical efficiency of this approach. %B Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms %S SODA '01 %I Society for Industrial and Applied Mathematics %C Philadelphia, PA, USA %P 262 - 268 %8 2001/// %@ 0-89871-490-7 %G eng %U http://dl.acm.org/citation.cfm?id=365411.365457 %0 Journal Article %J Tools and Algorithms for the Construction and Analysis of Systems %D 2001 %T Simulation revisited %A Tan,L. %A Cleaveland, Rance %B Tools and Algorithms for the Construction and Analysis of Systems %P 480 - 495 %8 2001/// %G eng %0 Journal Article %J Computer %D 2001 %T Software Defect Reduction Top 10 List %A Boehm,Barry %A Basili, Victor R. %X Software's complexity and accelerated development schedules make avoiding defects difficult. These 10 techniques can help reduce the flaws in your code. %B Computer %V 34 %P 135 - 137 %8 2001/01// %@ 0018-9162 %G eng %U http://dx.doi.org/10.1109/2.962984 %N 1 %R 10.1109/2.962984 %0 Journal Article %J Advances in Computers %D 2001 %T Source Selection and Ranking in the WebSemantics Architecture Using Quality of Data Metadata-1 Introduction %A Mihaila,G. A %A Raschid, Louiqa %A Vidal,M. E %B Advances in Computers %V 55 %P 89 - 90 %8 2001/// %G eng %0 Report %D 2001 %T Spanish Language Processing at University of Maryland: Building Infrastructure for Multilingual Applications %A Cabezas,C. %A Dorr, Bonnie J %A Resnik, Philip %X We describe here our construction of lexical resources, tool creation, building of an alignedparallel corpus, and an approach to automatic treebank creation that we have been de- veloping using Spanish data, based on projection of English syntactic dependency infor- mation across a parallel corpus. %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %8 2001/// %G eng %0 Conference Paper %B Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2001. CVPR 2001 %D 2001 %T A spherical eye from multiple cameras (makes better models of the world) %A Baker, P. %A Fermüller, Cornelia %A Aloimonos, J. %A Pless, R. %K 3D motion estimation %K Calibration %K camera network %K CAMERAS %K Computer vision %K egomotion recovery %K geometric configuration %K geometric constraint %K image gradients %K image sampling %K imaging system %K Laboratories %K Layout %K Motion estimation %K multiple cameras %K Pixel %K Robot vision systems %K SHAPE %K shape models %K Space technology %K spherical eye %K system calibration %K video %K video cameras %K video signal processing %K visual sphere sampling %X The paper describes an imaging system that has been designed specifically for the purpose of recovering egomotion and structure from video. The system consists of six cameras in a network arranged so that they sample different parts of the visual sphere. This geometric configuration has provable advantages compared to small field of view cameras for the estimation of the system's own motion and consequently the estimation of shape models from the individual cameras. The reason is that inherent ambiguities of confusion between translation and rotation disappear. We provide algorithms for the calibration of the system and 3D motion estimation. The calibration is based on a new geometric constraint that relates the images of lines parallel in space to the rotation between the cameras. The 3D motion estimation uses a constraint relating structure directly to image gradients. %B Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2001. CVPR 2001 %I IEEE %V 1 %P I-576- I-583 vol.1 - I-576- I-583 vol.1 %8 2001/// %@ 0-7695-1272-0 %G eng %R 10.1109/CVPR.2001.990525 %0 Conference Paper %B Proceedings of the Second Annual International Symposium on Music Information Retrieval ISMIR 2001 %D 2001 %T Statistical Analysis in Music Information Retrieval %A Rand, William %A Birmingham,William P. %X We introduce a statistical model of music that allows for the retrieval of music based upon an audio input. This model uses frequency counts of state transitions to index pieces of music. Several methods of comparing these index values to choose an appropriate match are examined. We describe how this model can serve as the basis for a query-by-humming system. The model is also shown to be robust to several kinds of errors. %B Proceedings of the Second Annual International Symposium on Music Information Retrieval ISMIR 2001 %V 25--26 %P 25 - 26 %8 2001/// %G eng %0 Book Section %B Foundations of Image UnderstandingFoundations of Image Understanding %D 2001 %T Statistics Explains Geometrical Optical Illusions %A Fermüller, Cornelia %A Aloimonos, J. %E Davis, Larry S. %X Azriel Rosenfeld has been our mentor for the last decade. In everyday conversation he stressed the importance of intuition, the unreasonable effectiveness of mathematics in understanding the world, and the power of simplicity inherent in deep ideas. Because we mostly worked on 3D vision, he often argued that 2D vision has been, is, and will continue to be a large source of problems. Strangely enough, we arrived at this study, which is our first on 2D vision, through problems we encountered in our work in 3D motion and shape. Azriel Rosenfeld was also one of the first to apply statistics [ 27 , 28 ] to image analysis and understanding, and he always reminded us of the uncertainties involved in visual computations. This paper shows that statistics cannot be ignored, not even in the interpretation of two simple straight intersecting lines. It demonstrates that uncertainty in the visual data causes problems for the early visual processes. Because of noise, the estimation of features, such as lines, intersections of lines, and local image motion, is biased. The inevitability of this bias provides an explanation for many well-known geometrical optical illusions. %B Foundations of Image UnderstandingFoundations of Image Understanding %S The Kluwer International Series in Engineering and Computer Science %I Springer US %V 628 %P 409 - 445 %8 2001/// %@ 978-1-4615-1529-6 %G eng %U http://dx.doi.org/10.1007/978-1-4615-1529-6_14 %0 Journal Article %J Computer Vision and Image Understanding %D 2001 %T The Statistics of Optical Flow %A Fermüller, Cornelia %A Shulman,David %A Aloimonos, J. %X When processing image sequences some representation of image motion must be derived as a first stage. The most often used representation is the optical flow field, which is a set of velocity measurements of image patterns. It is well known that it is very difficult to estimate accurate optical flow at locations in an image which correspond to scene discontinuities. What is less well known, however, is that even at the locations corresponding to smooth scene surfaces, the optical flow field often cannot be estimated accurately.Noise in the data causes many optical flow estimation techniques to give biased flow estimates. Very often there is consistent bias: the estimate tends to be an underestimate in length and to be in a direction closer to the majority of the gradients in the patch. This paper studies all three major categories of flow estimation methods—gradient-based, energy-based, and correlation methods, and it analyzes different ways of compounding one-dimensional motion estimates (image gradients, spatiotemporal frequency triplets, local correlation estimates) into two-dimensional velocity estimates, including linear and nonlinear methods. Correcting for the bias would require knowledge of the noise parameters. In many situations, however, these are difficult to estimate accurately, as they change with the dynamic imagery in unpredictable and complex ways. Thus, the bias really is a problem inherent to optical flow estimation. We argue that the bias is also integral to the human visual system. It is the cause of the illusory perception of motion in the Ouchi pattern and also explains various psychophysical studies of the perception of moving plaids. %B Computer Vision and Image Understanding %V 82 %P 1 - 32 %8 2001/04// %@ 1077-3142 %G eng %U http://www.sciencedirect.com/science/article/pii/S1077314200909007 %N 1 %R 10.1006/cviu.2000.0900 %0 Conference Paper %B Proceedings of the Second International Workshop on Evaluating Word Sense Disambiguation Systems (SENSEVAL-2) %D 2001 %T Supervised sense tagging using support vector machines %A Cabezas,C. %A Resnik, Philip %A Stevens,J. %B Proceedings of the Second International Workshop on Evaluating Word Sense Disambiguation Systems (SENSEVAL-2) %P 59 - 62 %8 2001/// %G eng %0 Journal Article %J Human-Centered Computing, Online Communities, and Virtual Environments %D 2001 %T Supporting creativity with advanced information-abundant user interfaces %A Shneiderman, Ben %B Human-Centered Computing, Online Communities, and Virtual Environments %P 469 - 480 %8 2001/// %G eng %0 Report %D 2000 %T Safe and Flexible Dynamic Linking of Native Code %A Crary,Karl %A Hicks, Michael W. %A Weirich,Stephanie %X We present the design and implementation of a framework for flexible and safe dynamic linking of native code. Our approach extends Typed Assembly Language with a primitive for loading and typechecking code, which is flexible enough to support a variety of linking strategies, but simple enough that it does not significantly expand the trusted computing base. Using this primitive, along with the ability to compute with types, we show that we can program many existing dynamic linking approaches. As a concrete demonstration, we have used our framework to implement dynamic linking for a type-safe dialect of C, closely modeled after the standard linking facility for Unix C programs. Aside from the unavoidable cost of verification, our implementation performs comparably with the standard, untyped approach. %B Technical Reports (CIS) %8 2000/01/01/ %G eng %U http://repository.upenn.edu/cis_reports/137 %0 Book Section %B Active NetworksActive Networks %D 2000 %T Scalable Resource Control in Active Networks %A Anagnostakis,Kostas %A Hicks, Michael W. %A Ioannidis,Sotiris %A Keromytis,Angelos %A Smith,Jonathan %E Yasuda,Hiroshi %X The increased complexity of the service model relative to store-and-forward routers has made resource management one of the paramount concerns in active networking research and engineering. In this paper,we address two major challenges in scaling resource management-to-many-node active networks. The first is the use of market mechanisms and trading amongst nodes and programs with varying degrees of competition and cooperation to provide a scalable approach to managing active network resources. The second is the use of a trust-management architecture to ensure that the participants in the resource management marketplace have a policy-driven “rule of law” in which marketplace decisions can be made and relied upon. We have used lottery scheduling and the Keynote trust-management system for our implementation, for which we provide some initial performance indications. %B Active NetworksActive Networks %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 1942 %P 343 - 357 %8 2000/// %@ 978-3-540-41179-6 %G eng %U http://dx.doi.org/10.1007/3-540-40057-5_25 %0 Journal Article %J IEEE Communications Magazine %D 2000 %T Secure quality of service handling: SQoSH %A Alexander,D. S %A Arbaugh, William A. %A Keromytis,A. D %A Muir,S. %A Smith,J. M %K Acceleration %K Access control %K active networks %K ALIEN active loader %K Clocks %K Computer network management %K cryptographic credentials %K cryptography %K customized networking services %K Data security %K Data structures %K denial-of-service attacks %K interfaces %K Kernel %K loaded modules %K network resources %K network traffic %K open signaling %K packet switching %K Piglet lightweight device kernel %K programmable network element %K programmable network infrastructures %K Programming profession %K Proposals %K quality of service %K remote invocation %K resource control %K restricted control of quality of service %K SANE %K scheduling %K scheduling discipline %K secure active network environment architecture %K secure quality of service handling %K security infrastructure %K security risks %K SQoSH %K SwitchWare architecture %K telecommunication security %K tuning knobs %K virtual clock %X Proposals for programmable network infrastructures, such as active networks and open signaling, provide programmers with access to network resources and data structures. The motivation for providing these interfaces is accelerated introduction of new services, but exposure of the interfaces introduces many new security risks. We describe some of the security issues raised by active networks. We then describe our secure active network environment (SANE) architecture. SANE was designed as a security infrastructure for active networks, and was implemented in the SwitchWare architecture. SANE restricts the actions that loaded modules can perform by restricting the resources that can be named; this is further extended to remote invocation by means of cryptographic credentials. SANE can be extended to support restricted control of quality of service in a programmable network element. The Piglet lightweight device kernel provides a “virtual clock” type of scheduling discipline for network traffic, and exports several tuning knobs with which the clock can be adjusted. The ALIEN active loader provides safe access to these knobs to modules that operate on the network element. Thus, the proposed SQoSH architecture is able to provide safe, secure access to network resources, while allowing these resources to be managed by end users needing customized networking services. A desirable consequence of SQoSH's integration of access control and resource control is that a large class of denial-of-service attacks, unaddressed solely with access control and cryptographic protocols, can now be prevented %B IEEE Communications Magazine %V 38 %P 106 - 112 %8 2000/04// %@ 0163-6804 %G eng %N 4 %R 10.1109/35.833566 %0 Report %D 2000 %T Selecting Flat End Mills for 2-1/2D Milling Operations %A Yao,Zhiyang %A Gupta, Satyandra K. %A Nau, Dana S. %K algorithms %K computer aided manufacturing CAM %K cutter selection %K Manufacturing %K Next-Generation Product Realization Systems %X The size of milling cutter significantly affects the machining time. Therefore, in order to perform milling operations efficiently, we need to select a set of milling cutters with optimal sizes. It is difficult for human process planners to select the optimal or near optimal set of milling cutters due to complex geometric interactions among tools size, part shapes, and tool trajectories.

In this paper, we give a geometric algorithm to find the optimal cutters for 2-1/2D milling operations. We define the 2-1/2D milling operations as covering the target region without intersecting with the obstruction region. This definition allows us to handle the open edge problem. Based on this definition, we introduced the offsetting and inverse-offsetting algorithm to find the coverable area for a given cutter. Following that, we represent the cutter selection problem as shortest path problem and discuss the lower and upper bond of cutter sizes that are feasible for given parts. The Dijkstra's algorithm is used to solve the problem and thus a set of cutters is selected in order to achieve the optimum machining cost.

We believe the selection of optimum cutter combination can not only save manufacturing time but also help automatic process planning. %I Institute for Systems Research, University of Maryland, College Park %V ISR; TR 2000-41 %8 2000/// %G eng %U http://drum.lib.umd.edu//handle/1903/6138 %0 Journal Article %J FST TCS 2000: Foundations of Software Technology and Theoretical Computer Science %D 2000 %T A semantic theory for heterogeneous system design %A Cleaveland, Rance %A L\üttgen,G. %B FST TCS 2000: Foundations of Software Technology and Theoretical Computer Science %P 312 - 324 %8 2000/// %G eng %0 Conference Paper %B CHI '00 extended abstracts on Human factors in computing systems %D 2000 %T Simulation based learning environments and the use of learning histories %A Rose,A. %A Salter,R. %A Keswani,S. %A Kositsyna,N. %A Plaisant, Catherine %A Rubloff,G. %A Shneiderman, Ben %K education %K engineering %K History %K learning %K simulation %X We have developed an application framework for constructing simulation-based learning environments using dynamic simulations and visualizations to represent realistic time-dependent behavior. The development environment is described and many examples are given. In particular we will focus on the learning historian which provides users and learners with a manipulatable recording of their actions which facilitates the exchange of annotated history records among peers and mentors. %B CHI '00 extended abstracts on Human factors in computing systems %S CHI EA '00 %I ACM %C New York, NY, USA %P 2 - 3 %8 2000/// %@ 1-58113-248-4 %G eng %U http://doi.acm.org/10.1145/633292.633294 %R 10.1145/633292.633294 %0 Report %D 2000 %T A SIMULATION ENVIRONMENT FOR EVOLVING MULTIAGENT COMMUNICATION %A Reggia, James A. %A Schultz,Reiner %A Uriagereka,Juan %A Wilkinson,Jerry %K Technical Report %X A simulation environment has been created to support study of emergentcommunication. Multiple agents exist in a two-dimensional world where they must find food and avoid predators. While non-communicating agents may survive, the world is configured so that survival and fitness can be enhanced through the use of inter-agent communication. The goal with this version of the simulator is to determine conditions under which simple communication (signaling) emerges and persists during an evolutionary process. (Also cross-referenced as UMIACS-TR-2000-64) %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %V UMIACS-TR-2000-64 %8 2000/09/15/ %G eng %U http://drum.lib.umd.edu//handle/1903/1101 %0 Conference Paper %B 2000 IEEE International Conference on Multimedia and Expo, 2000. ICME 2000 %D 2000 %T Smart videoconferencing %A Zotkin,Dmitry N %A Duraiswami, Ramani %A Philomin,V. %A Davis, Larry S. %K acoustical processing %K Automatic control %K CAMERAS %K computerised control %K control software %K Control systems %K Intelligent sensors %K Layout %K Microphones %K multi-camera multi-microphone set-up %K multimedia systems %K Protocols %K prototype implementation %K Prototypes %K sensor fusion %K smart videoconferencing %K Switches %K Teleconferencing %K unattended videoconferencing %K video processing %X The combination of acoustical and video processing to achieve a smart audio and video feed from a set of N microphones and M cameras is a task that might conventionally be accomplished by camera persons and control room staff. However, in the context of videoconferencing, this process needs to be performed by control software. We discuss the use of a multi-camera multi-microphone set-up for unattended videoconferencing, and present details of a prototype implementation being developed %B 2000 IEEE International Conference on Multimedia and Expo, 2000. ICME 2000 %I IEEE %V 3 %P 1597-1600 vol.3 - 1597-1600 vol.3 %8 2000/// %@ 0-7803-6536-4 %G eng %R 10.1109/ICME.2000.871075 %0 Conference Paper %B Proceedings of the working conference on Advanced visual interfaces %D 2000 %T Snap-together visualization: a user interface for coordinating visualizations via relational schemata %A North,Chris %A Shneiderman, Ben %K Coordination %K Information Visualization %K multiple views %K relational database %K tight coupling %K user interface %K user study %X Multiple coordinated visualizations enable users to rapidly explore complex information. However, users often need unforeseen combinations of coordinated visualizations that are appropriate for their data. Snap-Together Visualization enables data users to rapidly and dynamically mix and match visualizations and coordinations to construct custom exploration interfaces without programming. Snap's conceptual model is based on the relational database model. Users load relations into visualizations then coordinate them based on the relational joins between them. Users can create different types of coordinations such as: brushing, drill down, overview and detail view, and synchronized scrolling. Visualization developers can make their independent visualizations snap-able with a simple API.Evaluation of Snap revealed benefits, cognitive issues, and usability concerns. Data savvy users were very capable and thrilled to rapidly construct powerful coordinated visualizations. A snapped overview and detail-view coordination improved user performance by 30-80%, depending on task. %B Proceedings of the working conference on Advanced visual interfaces %S AVI '00 %I ACM %C New York, NY, USA %P 128 - 135 %8 2000/// %@ 1-58113-252-2 %G eng %U http://doi.acm.org/10.1145/345513.345282 %R 10.1145/345513.345282 %0 Journal Article %J International Journal of Human-Computer Studies %D 2000 %T Snap-together visualization: can users construct and operate coordinated visualizations? %A North,Chris %A Shneiderman, Ben %X Multiple coordinated visualizations enable users to rapidly explore complex information. However, users often need unforeseen combinations of coordinated visualizations. Snap-together visualization (Snap) enables users to rapidly and dynamically construct coordinated–visualization interfaces, customized for their data, without programming. Users U001load data into desired visualizations, then construct coordinations between them for brushing and linking, overview and detail view, drill down, etc. Snap formalizes a conceptual model of visualization coordination based on the relational data model. Visualization developers can easily Snap-enable their independent visualizations using a simple API.Empirical evaluation reveals benefits, cognitive issues and usability concerns with coordination concepts and Snap. Two user studies explore coordination construction and operation. Data-savvy users successfully, enthusiastically and rapidly constructed powerful coordinated–visualization interfaces of their own. Operating an overview-and-detail coordination reliably improved user performance by 30–80% over detail-only and uncoordinated interfaces for most tasks. %B International Journal of Human-Computer Studies %V 53 %P 715 - 739 %8 2000/11// %@ 1071-5819 %G eng %U http://www.sciencedirect.com/science/article/pii/S107158190090418X %N 5 %R 10.1006/ijhc.2000.0418 %0 Journal Article %J Int'l Journal of Human-Computer Studies special issue on Empirical Studies of Information Visualization %D 2000 %T Snap-together visualization: Evaluating coordination usage and construction %A North,C. %A Shneiderman, Ben %X Multiple coordinated visualizations enable users to rapidly explore complex information. However, users often need unforeseen combinations of coordinated visualizations. Snap-Together Visualization is a conceptual model, based on the relational model, and system to enable users to quickly coordinate otherwise-independent visualization tools. Users construct customized browsing environments with coordinations for selecting, navigating, and loading data, without programming.Evaluation revealed benefits, cognitive issues, and usability concerns with coordination concepts and the Snap system. Two user studies explore the value of coordination usage and the learnability of coordination construction. The overview and detail-view coordination improved user performance by 30-80%, depending on task. Data savvy users were very capable and thrilled to rapidly construct powerful coordinated visualizations. %B Int'l Journal of Human-Computer Studies special issue on Empirical Studies of Information Visualization %V 53 %P 715 - 739 %8 2000/// %G eng %0 Conference Paper %B Parallel and Distributed Processing Symposium, International %D 2000 %T Speed vs. Accuracy in Simulation for I/O-Intensive Applications %A Eom, Hyeonsang %A Hollingsworth, Jeffrey K %K discrete-event simulation %K i/o-intensive applications %K parallel or distributed applications %K performance prediction %K simulation %X This paper presents a family of simulators that have been developed for data-intensive applications, and a methodology to select the most efficient one based on a user-supplied requirement for accuracy. The methodology consists of a series of tests that select an appropriate simulation based on the attributes of the application. In addition, each simulator provides two estimates of application execution time: one for the minimum expected time and the other for the maximum. We present the results of applying the strategy to existing applications and show that we can accurately simulate applications tens to hundreds of times faster than application execution time. %B Parallel and Distributed Processing Symposium, International %I IEEE Computer Society %C Los Alamitos, CA, USA %P 315 - 315 %8 2000/// %G eng %R http://doi.ieeecomputersociety.org/10.1109/IPDPS.2000.846001 %0 Conference Paper %B 15th International Conference on Pattern Recognition, 2000. Proceedings %D 2000 %T The statistics of optical flow: implications for the process of correspondence in vision %A Fermüller, Cornelia %A Aloimonos, J. %K Bias %K Computer vision %K correlation %K correlation methods %K energy-based method %K flow estimation %K Frequency estimation %K gradient method %K gradient methods %K Image analysis %K Image motion analysis %K Image sequences %K least squares %K least squares approximations %K Motion estimation %K Nonlinear optics %K Optical feedback %K optical flow %K Optical harmonic generation %K Optical noise %K Statistics %K Visual perception %X This paper studies the three major categories of flow estimation methods: gradient-based, energy-based, and correlation methods; it analyzes different ways of compounding 1D motion estimates (image gradients, spatio-temporal frequency triplets, local correlation estimates) into 2D velocity estimates, including linear and nonlinear methods. Correcting for the bias would require knowledge of the noise parameters. In many situations, however, these are difficult to estimate accurately, as they change with the dynamic imagery in unpredictable and complex ways. Thus, the bias really is a problem inherent to optical flow estimation. We argue that the bias is also integral to the human visual system. It is the cause of the illusory perception of motion in the Ouchi pattern and also explains various psychophysical studies of the perception of moving plaids. Finally, the implication of the analysis is that flow or correspondence can be estimated very accurately only when feedback is utilized %B 15th International Conference on Pattern Recognition, 2000. Proceedings %I IEEE %V 1 %P 119-126 vol.1 - 119-126 vol.1 %8 2000/// %@ 0-7695-0750-6 %G eng %R 10.1109/ICPR.2000.905288 %0 Conference Paper %B Proceedings of the fourth international ACM conference on Assistive technologies %D 2000 %T A storytelling robot for pediatric rehabilitation %A Plaisant, Catherine %A Druin, Allison %A Lathan,Corinna %A Dakhane,Kapil %A Edwards,Kris %A Vice,Jack Maxwell %A Montemayor,Jaime %K children %K design process %K rehabilitation %K robot %K therapeutic play %K user interface %B Proceedings of the fourth international ACM conference on Assistive technologies %S Assets '00 %I ACM %C New York, NY, USA %P 50 - 55 %8 2000/// %@ 1-58113-313-8 %G eng %U http://doi.acm.org/10.1145/354324.354338 %R 10.1145/354324.354338 %0 Journal Article %J International Journal of Computer Vision %D 2000 %T Structure from motion: Beyond the epipolar constraint %A Brodskỳ, T. %A Fermüller, Cornelia %A Aloimonos, J. %B International Journal of Computer Vision %V 37 %P 231 - 258 %8 2000/// %G eng %N 3 %0 Conference Paper %B Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval %D 2000 %T Structured translation for cross-language information retrieval %A Sperer,Ruth %A Oard, Douglas %X The paper introduces a query translation model that reflects the structure of the cross-language information retrieval task. The model is based on a structured bilingual dictionary in which the translations of each term are clustered into groups with distinct meanings. Query translation is modeled as a two-stage process, with the system first determining the intended meaning of a query term and then selecting translations appropriate to that meaning that might appear in the document collection. An implementation of structured translation based on automatic dictionary clustering is described and evaluated by using Chinese queries to retrieve English documents. Structured translation achieved an average precision that was statistically indistinguishable from Pirkola's technique for very short queries, but Pirkola's technique outperformed structured translation on long queries. The paper concludes with some observations on future work to improve retrieval effectiveness and on other potential uses of structured translation in interactive cross-language retrieval applications. %B Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval %S SIGIR '00 %I ACM %C New York, NY, USA %P 120 - 127 %8 2000/// %@ 1-58113-226-3 %G eng %U http://doi.acm.org/10.1145/345508.345562 %R 10.1145/345508.345562 %0 Journal Article %J Theoretical and Computational Fluid Dynamics %D 2000 %T Subgrid-scale models for compressible large-eddy simulations %A Martin, M.P %A Piomelli,U. %A Candler,G. V %B Theoretical and Computational Fluid Dynamics %V 13 %P 361 - 376 %8 2000/// %G eng %N 5 %0 Conference Paper %B Pattern Recognition, 2000. Proceedings. 15th International Conference on %D 2000 %T Superresolution-based enhancement of text in digital video %A Huiping Li %A David Doermann %K accuracy;superresolution-based %K antialiasing;blurring;clutter;digital %K based %K character %K convex %K Enhancement %K enhancement;image %K information;text %K method;readability;subpixel %K onto %K recognition; %K resolution;image %K resolution;projection %K scheme;temporal %K sequences;optical %K sets %K string;video %K text %K text;geometry;image %K text;low %K video;graphic %X We present a superresolution-based text enhancement scheme to improve optical character recognition (OCR) and readability of text in digital video. The quality of video text is degraded by factors such as low resolution, antialiasing, clutter and blurring. We use the fact that the same text string often exists in consecutive frames to explore the temporal information and enhance the text image. For graphic text, we register text blocks to subpixel accuracy and fuse them to a new block with high resolution and a cleaner background. We use a projection onto convex sets based method to deblur scene text to improve readability. Experimental results show our scheme can improve OCR for graphic text and readability for scene text significantly %B Pattern Recognition, 2000. Proceedings. 15th International Conference on %V 1 %P 847 -850 vol.1 - 847 -850 vol.1 %8 2000/// %G eng %R 10.1109/ICPR.2000.905546 %0 Conference Paper %B Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000 %D 2000 %T Supporting creativity with powerful composition tools for artifacts and performances %A Shneiderman, Ben %K artifacts %K Artificial intelligence %K composition tools %K Computer science %K Context modeling %K creativity %K creativity support %K Educational institutions %K Information retrieval %K Laboratories %K Manufacturing %K music composition %K performances %K Software design %K software libraries %K software tools %K US Department of Transportation %X Modern software such as word processors, slide preparation/presentation tools, or music composition packages are designed to produce artifacts or performances. Now, some designers are expanding their goals to include creativity support into their software. This essay builds on the genex framework for creativity, which has four phases and eight activities. It focuses on the composition activity by considering tools to support initiation, revision, and evaluation. Some existing tools provide partial support that suggests ways in which to develop more ambitious low, middle, and high level tools. The goal is to enable more people to be more creative more of the time. %B Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000 %I IEEE %8 2000/01/04/7 %@ 0-7695-0493-0 %G eng %R 10.1109/HICSS.2000.926896 %0 Journal Article %J Journal of Computational and Applied Mathematics %D 2000 %T Symbiosis between Linear Algebra and Optimization %A O'Leary, Dianne P. %X The efficiency and effectiveness of most optimization algorithms hinges on the numerical linearalgebra algorithms that they utilize. Effective linearalgebra is crucial to their success, and because of this, optimization applications have motivated fundamental advances in numerical linearalgebra. This essay will highlight contributions of numerical linearalgebra to optimization, as well as some optimization problems encountered within linearalgebra that contribute to a symbiotic relationship. %B Journal of Computational and Applied Mathematics %V 123 %P 447 - 465 %8 2000/// %G eng %0 Conference Paper %B Signal Processing Systems, 2000. SiPS 2000. 2000 IEEE Workshop on %D 2000 %T Systematic consolidation of input and output buffers in synchronous dataflow specifications %A Murthy,P. K %A Bhattacharyya, Shuvra S. %B Signal Processing Systems, 2000. SiPS 2000. 2000 IEEE Workshop on %P 673 - 682 %8 2000/// %G eng %0 Conference Paper %B Computer Vision and Pattern Recognition, IEEE Computer Society Conference on %D 1999 %T Shape from Video %A Brodsky, Tomas %A Fermüller, Cornelia %A Aloimonos, J. %K epipolar minimization %K model extraction %K Motion analysis %K vision and graphics %X This paper presents a novel technique for recovering the shape of a static scene from a video sequence due to a rigidly moving camera. The solution procedure consists of two stages. In the first stage, the rigid motion of the camera at each instant in time is recovered. This provides the transformation between successive viewing positions. The solution is achieved through new constraints which relate 3D motion and shape directly to the image derivatives. These constraints allow the combination of the processes of 3D motion estimation and segmentation by exploiting the geometry and statistics inherent in the data. In the second stage the scene surfaces are reconstructed through an optimization procedure which utilizes data from all the frames of a short video sequence. A number of experimental results demonstrate the potential of the approach. %B Computer Vision and Pattern Recognition, IEEE Computer Society Conference on %I IEEE Computer Society %C Los Alamitos, CA, USA %V 2 %P 2146 - 2146 %8 1999/// %G eng %R http://doi.ieeecomputersociety.org/10.1109/CVPR.1999.784622 %0 Journal Article %J TRANSACTIONS-AMERICAN SOCIETY OF MECHANICAL ENGINEERS JOURNAL OF MANUFACTURING SCIENCE AND ENGINEERING %D 1999 %T Sheet metal bending: generating shared setups %A Gupta,S.K. %A Bourne,D. A. %X Contemporary process planners for sheet metal bending solve the process planning problemfor individual parts. Quite often, many different parts can be produced on shared setups. However, plans generated by current process planning systems fail to exploit this commonality between setups and try to generate optimal setups for individual parts. In this paper, we present an algorithm for multi-part setup planning for sheet metal bending. This algorithm takes a set of parts and operation sequences for these parts, and tries to find a shared setup plan that can work for every part in the set. Setup changes constitute a major portion of the production time in batch production environments. Therefore, multi-part setup planning techniques can be used to significantly cut down the total number of setups and increase the overall through-put. %B TRANSACTIONS-AMERICAN SOCIETY OF MECHANICAL ENGINEERS JOURNAL OF MANUFACTURING SCIENCE AND ENGINEERING %V 121 %P 689 - 694 %8 1999/// %G eng %U http://terpconnect.umd.edu/~skgupta/Publication/JMSE99_Gupta_draft.pdf %0 Journal Article %J Journal of manufacturing systems %D 1999 %T Sheet metal bending operation planning: using virtual node generation to improve search efficiency %A Gupta,S.K. %X A large number of manufacturing operation planning problems can be formulatedas state-space search problems. In case of sheet-metal bending operation planning, processing a search node involves extensive geometric reasoning. Such computation- intensive node-processing limits the number of search nodes that can be expanded in a reasonable amount of time, making it difficult to solve real-life operation planning problems. In this paper, we describe a scheme to speed up operation planning by virtual gen- eration of state-space nodes. In this scheme, we eliminate unnecessary computation at the time of node generation by extracting the required information from already generated nodes. Although generation of two different search nodes rarely involves identical computation steps, there is considerable overlap in node generation steps. We have divided the node generation step into a number of computation subproblems. When we need to generate a new node, we first try to see if any of the node gener- ation subproblems have been solved for any of the already generated nodes. If any subproblem has already been solved for some other node, then we use the solution of that subproblem to save computation time. In such cases, we do not perform node generation computation steps, and therefore we call such node generation virtual. The scheme presented in this paper increases the node generation capability and allows us to consider many more search nodes. The ability to consider more search nodes helps us in solving more complex problems and finding better operation plans. %B Journal of manufacturing systems %V 18 %P 127 - 139 %8 1999/// %G eng %U ftp://ftp.eng.umd.edu/:/home/glue/s/k/skgupta/pub/Publication/JMS99_Gupta_draft.pdf %N 2 %0 Journal Article %J Journal of Parallel and Distributed Computing %D 1999 %T Simple: A Methodology for Programming High Performance Algorithms on Clusters of Symmetric Multiprocessors (SMPs) %A Bader,David A. %A JaJa, Joseph F. %K cluster computing %K communication primitives %K experimental parallel algorithms %K message passing (MPI) %K Parallel algorithms %K parallel performance %K shared memory %K symmetric multiprocessors (SMP) %X We describe a methodology for developing high performance programs running on clusters of SMP nodes. The SMP cluster programming methodology is based on a small prototype kernel (Simple) of collective communication primitives that make efficient use of the hybrid shared and message-passing environment. We illustrate the power of our methodology by presenting experimental results for sorting integers, two-dimensional fast Fourier transforms (FFT), and constraint-satisfied searching. Our testbed is a cluster of DEC AlphaServer 2100 4/275 nodes interconnected by an ATM switch. %B Journal of Parallel and Distributed Computing %V 58 %P 92 - 108 %8 1999/07// %@ 0743-7315 %G eng %U http://www.sciencedirect.com/science/article/pii/S0743731599915411 %N 1 %R 10.1006/jpdc.1999.1541 %0 Conference Paper %B Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit %D 1999 %T Single display groupware: a model for co-present collaboration %A Stewart,J. %A Bederson, Benjamin B. %A Druin, Allison %B Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit %P 286 - 293 %8 1999/// %G eng %0 Journal Article %J Languages and Compilers for Parallel Computing %D 1999 %T SIPR: A new framework for generating efficient code for sparse matrix computations %A Pugh, William %A Shpeisman,T. %B Languages and Compilers for Parallel Computing %P 213 - 229 %8 1999/// %G eng %0 Conference Paper %B Visualization '99. Proceedings %D 1999 %T Skip Strips: maintaining triangle strips for view-dependent rendering %A El-Sana,J. %A Azanli,E. %A Varshney, Amitabh %K (computer %K Acceleration %K acceleration;graphics %K applications;path %K applications;skip-list-like %K changes;view-dependent %K compression;rendering %K connectivity;triangle %K data %K datasets;graphics %K datasets;static %K environments;data %K equipment;data %K graphic %K Graphics %K graphics);spatial %K hardware;hardware-supported %K hierarchy %K manner;static %K mechanism;immediate-mode %K mesh %K meshes;triangle %K nodes;view-dependent %K rendering;view-dependent %K simplification;visualization;computer %K Skip %K Strips;complex %K strips;vertex %K structure;dynamic %K structures; %K techniques;retained-mode %K triangle %K visualisation;rendering %X View-dependent simplification has emerged as a powerful tool for graphics acceleration in visualization of complex environments. However, view-dependent simplification techniques have not been able to take full advantage of the underlying graphics hardware. Specifically, triangle strips are a widely used hardware-supported mechanism to compactly represent and efficiently render static triangle meshes. However, in a view-dependent framework, the triangle mesh connectivity changes at every frame, making it difficult to use triangle strips. We present a novel data structure, Skip Strip, that efficiently maintains triangle strips during such view-dependent changes. A Skip Strip stores the vertex hierarchy nodes in a skip-list-like manner with path compression. We anticipate that Skip Strips will provide a road map to combine rendering acceleration techniques for static datasets, typical of retained-mode graphics applications, with those for dynamic datasets found in immediate-mode applications. %B Visualization '99. Proceedings %P 131 - 518 %8 1999/10// %G eng %R 10.1109/VISUAL.1999.809877 %0 Journal Article %J Technical Reports from UMIACS %D 1999 %T Snap-Together Visualization: Coordinating Multiple Views to Explore Information %A North,Chris %A Shneiderman, Ben %K Technical Report %X Information visualizations with multiple coordinated views enable users torapidly explore complex data and discover relationships. However, it is usually difficult for users to find or create the coordinated visualizations they need. Snap-Together Visualization allows users to coordinate multiple views that are customized to their needs. Users query their relational database and load results into desired visualizations. Then they specify coordinations between visualizations for selecting, navigating, or re-querying. Developers can make independent visualization tools 'snap-able' by including a few hooks. Also cross-referenced as UMIACS-TR-99-28 %B Technical Reports from UMIACS %8 1999/06/08/ %G eng %U http://drum.lib.umd.edu/handle/1903/1010 %0 Journal Article %J Cell %D 1999 %T Solution Structure of the Proapoptotic Molecule BID: A Structural Basis for Apoptotic Agonists and Antagonists %A McDonnell,James M %A Fushman, David %A Milliman,Curt L. %A Korsmeyer,Stanley J. %A Cowburn,David %X Members of the BCL2 family of proteins are key regulators of programmed cell death, acting either as apoptotic agonists or antagonists. Here we describe the solution structure of BID, presenting the structure of a proapoptotic BCL2 family member. An analysis of sequence/structure of BCL2 family members allows us to define a structural superfamily, which has implications for general mechanisms for regulating proapoptotic activity. It appears two criteria must be met for proapoptotic function within the BCL2 family: targeting of molecules to intracellular membranes, and exposure of the BH3 death domain. BID’s activity is regulated by a Caspase 8–mediated cleavage event, exposing the BH3 domain and significantly changing the surface charge and hydrophobicity, resulting in a change of cellular localization. %B Cell %V 96 %P 625 - 634 %8 1999/03/05/ %@ 0092-8674 %G eng %U http://www.sciencedirect.com/science/article/pii/S0092867400805735 %N 5 %R 10.1016/S0092-8674(00)80573-5 %0 Conference Paper %B Proceedings of SPIE - Conference on Storage and Retrieval for Image and Video Databases VII %D 1999 %T Special effect edit detection using VideoTrails: a comparison with existing techniques %A Kobla,V. %A DeMenthon,D. %A David Doermann %X Video Segmentation plays an integral role in many multimedia applications such as digital libraries, content management systems, and various other video browsing, indexing, and retrieval systems. Many algorithms for segmentation of video have appeared in the past few years, Most of these algorithms perform well on cuts, but yield poor performance on gradual transitions or special effect edits. A complete video segmentation system must achieve good performance on special effect edit detection also. In this paper, we discuss the performance of our VideoTrails based algorithms with other existing special effect edit detection algorithms in literature. Results from experiments testing for the ability to detect edits from TV programs ranging from commercials to news magazine programs, and also diverse special effect edits introduced by us have been shown. %B Proceedings of SPIE - Conference on Storage and Retrieval for Image and Video Databases VII %P 302 - 313 %8 1999/// %G eng %0 Journal Article %J Electronic Notes in Theoretical Computer Science %D 1999 %T Specifying the PLAN Network Programming Langauge %A Kakkar,Pankaj %A Hicks, Michael W. %A Moore,Jon %A Gunter,Carl A. %X We discuss how the specification of the PLAN programming language supports the design objectives of the language. The specification aims to provide a mathematically precise operational semantics that can serve as a standard for implementing interpreters and portable programs. The semantics should also support proofs of key properties of PLAN that would hold of all conformant implementations. This paper discusses two such properties. (1) Type checking is required, but interpreters are given significant flexibility about when types are checked; the specification must support a clear description of the possible behaviors of a network of conformant implementations. (2) It is essential to have guarantees about how PLAN programs use global resources, but the specification must be flexible about extensions in the network service layer. We illustrate on of kind of issue that will arise in using to specification to prove properties of the network based on the choice of services. %B Electronic Notes in Theoretical Computer Science %V 26 %P 87 - 104 %8 1999/// %@ 1571-0661 %G eng %U http://www.sciencedirect.com/science/article/pii/S1571066105802853 %R 10.1016/S1571-0661(05)80285-3 %0 Conference Paper %B CONCUR'99: concurrency theory: 10th International Conference, Eindhoven, the Netherlands, August 24-27, 1999: proceedings %D 1999 %T Statecharts via process algebra %A Liittgen,G. %A Cleaveland, Rance %B CONCUR'99: concurrency theory: 10th International Conference, Eindhoven, the Netherlands, August 24-27, 1999: proceedings %P 399 - 399 %8 1999/// %G eng %0 Conference Paper %B Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on. %D 1999 %T Statistical biases in optic flow %A Fermüller, Cornelia %A Pless, R. %A Aloimonos, J. %K Distributed computing %K Frequency domain analysis %K HUMANS %K image derivatives %K Image motion analysis %K Image sequences %K Least squares methods %K Motion estimation %K Optical computing %K Optical distortion %K optical flow %K Optical noise %K Ouchi illusion %K perception of motion %K Psychology %K Spatiotemporal phenomena %K statistical analysis %K systematic bias %K total least squares %X The computation of optical flow from image derivatives is biased in regions of non uniform gradient distributions. A least-squares or total least squares approach to computing optic flow from image derivatives even in regions of consistent flow can lead to a systematic bias dependent upon the direction of the optic flow, the distribution of the gradient directions, and the distribution of the image noise. The bias a consistent underestimation of length and a directional error. Similar results hold for various methods of computing optical flow in the spatiotemporal frequency domain. The predicted bias in the optical flow is consistent with psychophysical evidence of human judgment of the velocity of moving plaids, and provides an explanation of the Ouchi illusion. Correction of the bias requires accurate estimates of the noise distribution; the failure of the human visual system to make these corrections illustrates both the difficulty of the task and the feasibility of using this distorted optic flow or undistorted normal flow in tasks requiring higher lever processing %B Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on. %I IEEE %V 1 %P 566 Vol. 1 - 566 Vol. 1 %8 1999/// %@ 0-7695-0149-4 %G eng %R 10.1109/CVPR.1999.786994 %0 Journal Article %J University of California, Berkeley %D 1999 %T A Study of the Structure of the Web %A Deshpande, Amol %A Huang,R. %A Raman,V. %A Riggs,T. %A Song,D. %A Subramanian,L. %X The World Wide Web is a huge, growing repository of information on a wide range of topics. It is alsobecoming important, commercially and sociologically, as a place of human interaction within different communities. In this paper we present an experimental study of the structure of the Web. We analyze link topologies of various communities, and patterns of mirroring of content, on 1997 and 1999 snapshots of the Web. Our results give insight into patterns of interaction within communities and how they evolve, as well as patterns of data replication. We also describe the techniques we have developed for performing complex processing on this large data set, and our experiences in doing so. We present new algorithms for finding partial and complete mirrors in URL hierarchies; these are also of independent interest for search and redirection. In order to study and visualize link topologies of different communities, we have developed techniques to compact these large link graphs without much information loss. %B University of California, Berkeley %8 1999/// %G eng %0 Journal Article %J Physics of Fluids %D 1999 %T Subgrid-scale model for the temperature fluctuations in reacting hypersonic turbulent flows %A Martin, M.P %A Candler,G. V %B Physics of Fluids %V 11 %P 2765 - 2765 %8 1999/// %G eng %0 Journal Article %J Information Processing & Management %D 1999 %T Support for interactive document selection in cross-language information retrieval %A Oard, Douglas %A Resnik, Philip %X As digital libraries grow to global scale, the provision of interactive access to content in many languages will become increasingly important. In systems that support query-based searching, the presence of multilingual content will affect both the search technology itself and the user interface components that support query formulation, document selection and query refinement. This article describes the interactions among these components and presents a practical way of evaluating the adequacy of the selection interface. A categorization-based model for the user's selection process is presented and an experimental methodology suitable for obtaining process centered results in this context is developed. The methodology is applied to assess the adequacy of a selection interface in which multiple candidate translations for a term can be simultaneously presented. The results indicate that the modeled selection process is somewhat less effective when users are presented with multi-translation glosses from Japanese to English rather than materials generated originally in English, but that users with access to the gloss translations substantially outperform a Naive Bayes classification algorithm. %B Information Processing & Management %V 35 %P 363 - 379 %8 1999/05// %@ 0306-4573 %G eng %U http://www.sciencedirect.com/science/article/pii/S0306457398000661 %N 3 %R 10.1016/S0306-4573(98)00066-1 %0 Book Section %B Advances in Computers %D 1999 %T A Survey of Current Paradigms in Machine Translation %A Dorr, Bonnie J %A Jordan,Pamela W. %A Benoit,John W. %E Zelkowitz, Marvin V %X This paper is a survey of the current machine translation research in the US, Europe and Japan. A short history of machine translation is presented first, followed by an overview of the current research work. Representative examples of a wide range of different approaches adopted by machine translation researchers are presented. These are described in detail along with a discussion of the practicalities of scaling up these approaches for operational environments. In support of this discussion, issues in, and techniques for, evaluating machine translation systems are addressed. %B Advances in Computers %I Elsevier %V Volume 49 %P 1 - 68 %8 1999/// %@ 0065-2458 %G eng %U http://www.sciencedirect.com/science/article/pii/S006524580860282X %0 Journal Article %J AI Magazine %D 1999 %T A Survey of Research in Distributed, Continual Planning %A desJardins, Marie %A Durfee,Edmund H %A Ortiz,Jr. %A Wolverton,Michael J %B AI Magazine %V 20 %P 13 - 13 %8 1999/12/15/ %@ 0738-4602 %G eng %U https://www.aaai.org/ojs/index.php/aimagazine/article/viewArticle/1475 %N 4 %R 10.1609/aimag.v20i4.1475 %0 Journal Article %J American Mathematical Society, Series in Discrete Mathematics and Theoretical Computer Science %D 1999 %T A survey of the role of multicommodity flow and randomization in network design and routing %A Srinivasan, Aravind %B American Mathematical Society, Series in Discrete Mathematics and Theoretical Computer Science %V 43 %P 271 - 302 %8 1999/// %G eng %0 Journal Article %J The Journal of VLSI Signal Processing %D 1999 %T Synthesis of embedded software from synchronous dataflow specifications %A Bhattacharyya, Shuvra S. %A Murthy,P. K %A Lee,E. A %B The Journal of VLSI Signal Processing %V 21 %P 151 - 166 %8 1999/// %G eng %N 2 %0 Journal Article %J IEEE Communications Magazine %D 1998 %T Safety and security of programmable network infrastructures %A Alexander,S. %A Arbaugh, William A. %A Keromytis,A. D %A Smith,J. M %K Access control %K error protection %K IP networks %K Multicast protocols %K network architecture %K network operating systems %K network service model %K operating system %K Power system dynamics %K Power system modeling %K Power system reliability %K programmable languages %K programmable network infrastructures %K programming languages %K Proposals %K Protection %K reliability properties %K Safety %K Secure Active Network Environment %K Security %K security of data %K service creation %K service providers %K Switches %K telecommunication computing %K telecommunication network reliability %K Web and internet services %X Safety and security are two reliability properties of a system. A “safe” system provides protection against errors of trusted users, while a “secure” system protects against errors introduced by untrusted users. There is considerable overlap between mechanisms to support each property. Requirements for rapid service creation have stimulated the development of programmable network infrastructures, where end users or service providers can customize the properties of a network infrastructure while it continues to operate. A central concern of potential users of such systems is their reliability and, most specifically, their safety and security. In this article we explain the impact the network service model and architecture have on safety and security, and provide a model with which policies can be translated into restrictions of a general system. We illustrate these ideas with the Secure Active Network Environment (SANE) architecture, which provides a means of controlling access to the functions provided by any programmable infrastructure %B IEEE Communications Magazine %V 36 %P 84 - 92 %8 1998/10// %@ 0163-6804 %G eng %N 10 %R 10.1109/35.722141 %0 Journal Article %J Scientific Visualization: Interactions, Features, Metaphors %D 1998 %T Salient Frame Detection for Molecular Dynamics Simulations %A Kim,Y. %A Patro,R. %A Ip,C. Y %A O’Leary,D. P %A Anishkin,A. %A Sukharev,S. %A Varshney, Amitabh %X Saliency-based analysis can be applied to time-varying 3D datasetsfor the purpose of summarization, abstraction, and motion analysis. As the sizes of time-varying datasets continue to grow, it becomes more and more difficult to comprehend vast amounts of data and information in a short period of time. Au- tomatically generated thumbnail images and previewing of time-varying datasets can help viewers explore and understand the datasets significantly faster as well as provide new insights. In this paper, we introduce a novel method for detect- ing salient frames for molecular dynamics simulations. Our method effectively detects crucial transitions in simulated mechanosensitive ion channel (MscS), in agreement with experimental data. %B Scientific Visualization: Interactions, Features, Metaphors %V 2 %P 160 - 175 %8 1998/// %G eng %0 Report %D 1998 %T Scalable Data Parallel Algorithms for Texture Synthesis and Compression using Gibbs Random Fields %A Bader,David A. %A JaJa, Joseph F. %A Chellapa, Rama %K Technical Report %X This paper introduces scalable data parallel algorithms for image processing. Focusing on Gibbs and Markov Random Field model representation for textures, we present parallel algorithms for texture synthesis, compression, and maximum likelihood parameter estimation, currently implemented on Thinking Machines CM-2 and CM-5. Use of fine-grained, data parallel processing techniques yields real-time algorithms for texture synthesis and compression that are substantially faster than the previously known sequential implementations. Although current implementations are on Connection Machines, the methodology presented here enables machine independent scalable algorithms for a number of problems in image processing and analysis. (Also cross-referenced as UMIACS-TR-93-80.) %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %V UMIACS-TR-93-80 %8 1998/10/15/ %G eng %U http://drum.lib.umd.edu/handle/1903/596 %0 Journal Article %J Technical Reports from UMIACS, UMIACS-TR-97-44 %D 1998 %T Scheduling Aperiodic and Sporadic Tasks in Hard Real-Time Systems %A Choi,Seonho %A Agrawala, Ashok K. %K Technical Report %X The stringent timing constraints as well as the functional correctnessare essential requirements of hard real-time systems. In such systems, scheduling plays a very important role in satisfying these constraints. The priority based scheduling schemes have been used commonly due to the simplicity of the scheduling algorithm. However, in the presence of task interdependencies and complex timing constraints, such scheduling schemes may not be appropriate due to the lack of an efficient mechanism to schedule them and to carry out the schedulability analysis. In contrast, the time based scheduling scheme may be used to schedule a set of tasks with greater degree of schedulability achieved at a cost of higher complexity of off-line scheduling. One of the drawbacks of currently available scheduling schemes, however, is known to be their inflexibility in dynamic environments where dynamic processes exist, such as aperiodic and sporadic processes. We develop and analyze scheduling schemes which efficiently provide the flexibility required in real-time systems for scheduling processes arriving dynamically. This enables static hard periodic processes and dynamic processes(aperiodic or sporadic) to be jointly scheduled. (Also cross-referenced as UMIACS-TR-97-44) %B Technical Reports from UMIACS, UMIACS-TR-97-44 %8 1998/10/15/ %G eng %U http://drum.lib.umd.edu/handle/1903/900 %0 Journal Article %J IEEE Network %D 1998 %T A secure active network environment architecture: realization in SwitchWare %A Alexander,D. S %A Arbaugh, William A. %A Keromytis,A. D %A Smith,J. M %K access protocols %K AEGIS secure bootstrap architecture %K architecture %K Authentication %K Collaboration %K Communication switching %K dynamic integrity checks %K extended LAN %K Functional programming %K implementation %K integrity %K Intelligent networks %K IP networks %K Local area networks %K network infrastructure %K network infrastructures %K network operating systems %K network-level solutions %K node %K node-to-node authentication %K packet switching %K Proposals %K ramming system %K SANE %K secure active network environment architecture %K security of data %K Switches %K SwitchWare %K trusted state %K Web and internet services %X An active network is a network infrastructure which is programmable on a per-user or even per-packet basis. Increasing the flexibility of such network infrastructures invites new security risks. Coping with these security risks represents the most fundamental contribution of active network research. The security concerns can be divided into those which affect the network as a whole and those which affect individual elements. It is clear that the element problems must be solved first, since the integrity of network-level solutions will be based on trust in the network elements. In this article we describe the architecture and implementation of a secure active network environment (SANE), which we believe provides a basis for implementing secure network-level solutions. We guarantee that a node begins operation in a trusted state with the AEGIS secure bootstrap architecture. We guarantee that the system remains in a trusted state by applying dynamic integrity checks in the network element's runtime system, using a novel naming system, and applying node-to-node authentication when needed. The construction of an extended LAN is discussed %B IEEE Network %V 12 %P 37 - 45 %8 1998/06//May %@ 0890-8044 %G eng %N 3 %R 10.1109/65.690960 %0 Journal Article %J Computer %D 1998 %T Security for virtual private intranets %A Arbaugh, William A. %A Davin,J. R %A Farber,D. J %A Smith,J. M %K businesses %K Clouds %K Companies %K core operating system components %K cryptography %K Data security %K employee homes %K encryption %K functional roles %K hard drive %K Home computing %K home working %K integrity checking %K Internet %K Local area networks %K multiple personalities %K network authentication %K network environment %K operating system modifications %K Operating systems %K Roads %K secure identity based lending %K security management %K security of data %K shared applications %K SIBL %K single hardware platform %K smart cards %K symmetric algorithm %K system partition %K telecommuting %K Teleworking %K trust relationship %K trustworthy system %K virtual private intranets %X As telecommuting grows, businesses must consider security when extending their network environment to employees' homes. Researchers at the University of Pennsylvania have addressed the problem with smart cards, operating system modifications, and network authentication. We note the distinction between trust and integrity: trust is determined through the verification of components and the dependencies among them, while integrity demonstrates that components haven't been modified. Thus integrity checking in a trustworthy system is about preserving an established trust or trust relationship. Our solution to the challenge of isolating functional roles that may share a single hardware platform is called secure identity based lending (SIBL). SIBL provides multiple personalities by partitioning the hard drive into n+1 partitions, where n is the number of supported personalities. All personalities use the system partition for core operating system components and shared applications. Each of the personalities is also associated with one of the remaining partitions, which are encrypted using a symmetric algorithm %B Computer %V 31 %P 48 - 55 %8 1998/09// %@ 0018-9162 %G eng %N 9 %R 10.1109/2.708450 %0 Conference Paper %B Sixth International Conference on Computer Vision, 1998 %D 1998 %T Self-calibration from image derivatives %A Brodsky, T. %A Fermüller, Cornelia %A Aloimonos, J. %K 3D-rotation %K active vision %K Calibration %K CAMERAS %K discrete motion %K Encoding %K Equations %K image derivatives %K image formation %K image measurements %K Image motion analysis %K image motion fields %K Image reconstruction %K Image sequences %K large video databases %K Layout %K Levenberg-Marquardt parameter estimation %K linear pinhole-camera model %K Motion estimation %K Motion measurement %K Optical computing %K parameter estimation %K projective transformation %K rigidly moving camera %K self-calibration %K smoothness constraints %K unknown calibration parameters %X This study investigates the problem of estimating the calibration parameters from image motion fields induced by a rigidly moving camera with unknown calibration parameters, where the image formation is modeled with a linear pinhole-camera model. The equations obtained show the flow to be clearly separated into a component due to the translation and the calibration parameters and a component due to the rotation and the calibration parameters. A set of parameters encoding the latter component are linearly related to the flow, and from these parameters the calibration can be determined. However, as for discrete motion, in the general case it is not possible, to decouple image measurements from two frames only into their translational and rotational component. Geometrically, the ambiguity takes the form of a part of the rotational component being parallel to the translational component, and thus the scene can be reconstructed only up to a projective transformation. In general, for a full calibration at least four successive image frames are necessary with the 3D-rotation changing between the measurements. The geometric analysis gives rise to a direct self-calibration method that avoids computation of optical flow or point correspondences and uses only normal flow measurements. In this technique the direction of translation is estimated employing in a novel way smoothness constraints. Then the calibration parameters are estimated from the rotational components of several flow fields using Levenberg-Marquardt parameter estimation, iterative in the calibration parameters only. The technique proposed does not require calibration objects in the scene or special camera motions and it also avoids the computation of exact correspondence. This makes it suitable for the calibration of active vision systems which have to acquire knowledge about their intrinsic parameters while they perform other tasks, or as a tool for analyzing image sequences in large video databases %B Sixth International Conference on Computer Vision, 1998 %I IEEE %P 83 - 89 %8 1998/01/04/7 %@ 81-7319-221-9 %G eng %R 10.1109/ICCV.1998.710704 %0 Journal Article %J Artificial Life %D 1998 %T Self-replicating structures: evolution, emergence, and computation %A Reggia, James A. %A Lohn,J. D %A Chou,H. H. %B Artificial Life %V 4 %P 283 - 302 %8 1998/// %G eng %N 3 %0 Journal Article %J Handbook of logic in artificial intelligence and logic programming %D 1998 %T Semantics for Disjunctive and Normal Disjunctive Logic Programs %A Lobo,J. %A Minker, Jack %A Rajasekar,A. %B Handbook of logic in artificial intelligence and logic programming %V 5 %P 325 - 325 %8 1998/// %G eng %0 Journal Article %J ACM Trans. Inf. Syst. %D 1998 %T A semidiscrete matrix decomposition for latent semantic indexing information retrieval %A Kolda,Tamara G. %A O'Leary, Dianne P. %K data mining %K latent semantic indexing %K semidiscrete decomposition %K singular-value decomposition %K text retrieval %X The vast amount of textual information available today is useless unless it can be effectively and efficiently searched. The goal in information retrieval is to find documents that are relevant to a given user query. We can represent and document collection by a matrix whose (i, j) entry is nonzero only if the ith term appears in the jth document; thus each document corresponds to a columm vector. The query is also represented as a column vector whose ith term is nonzero only if the ith term appears in the query. We score each document for relevancy by taking its inner product with the query. The highest-scoring documents are considered the most relevant. Unfortunately, this method does not necessarily retrieve all relevant documents because it is based on literal term matching. Latent semantic indexing (LSI) replaces the document matrix with an approximation generated by the truncated singular-value decomposition (SVD). This method has been shown to overcome many difficulties associated with literal term matching. In this article we propose replacing the SVD with the semidiscrete decomposition (SDD). We will describe the SDD approximation, show how to compute it, and compare the SDD-based LSI method to the SVD-based LSI methods. We will show that SDD-based LSI does as well as SVD-based LSI in terms of document retrieval while requiring only one-twentieth the storage and one-half the time to compute each query. We will also show how to update the SDD approximation when documents are added or deleted from the document collection. %B ACM Trans. Inf. Syst. %V 16 %P 322 - 346 %8 1998/10// %@ 1046-8188 %G eng %U http://doi.acm.org/10.1145/291128.291131 %N 4 %R 10.1145/291128.291131 %0 Journal Article %J Proceedings of the DARPA Image Understanding Workshop %D 1998 %T Shape from video: Beyond the epipolar constraint %A Brodsky, T. %A Fermüller, Cornelia %A Aloimonos, J. %B Proceedings of the DARPA Image Understanding Workshop %8 1998/// %G eng %0 Book Section %B Computer Vision — ECCV'98Computer Vision — ECCV'98 %D 1998 %T Simultaneous estimation of viewing geometry and structure %A Brodský,Tomáš %A Fermüller, Cornelia %A Aloimonos, J. %E Burkhardt,Hans %E Neumann,Bernd %X Up to now, structure from motion algorithms proceeded in two well defined steps, where the first and most important step is recovering the rigid transformation between two views, and the subsequent step is using this transformation to compute the structure of the scene in view. This paper introduces a novel approach to structure from motion in which both aforementioned steps are accomplished in a synergistic manner. Existing approaches to 3D motion estimation are mostly based on the use of optic flow which however poses a problem at the locations of depth discontinuities. If we knew where depth discontinuities were, we could (using a multitude of approaches based on smoothness constraints) estimate accurately flow values for image patches corresponding to smooth scene patches; but to know the discontinuities requires solving the structure from motion problem first. In the past this dilemma has been addressed by improving the estimation of flow through sophisticated optimization techniques, whose performance often depends on the scene in view. In this paper we follow a different approach. The main idea is based on the interaction between 3D motion and shape which allows us to estimate the 3D motion while at the same time segmenting the scene. If we use a wrong 3D motion estimate to compute depth, then we obtain a distorted version of the depth function. The distortion, however, is such that the worse the motion estimate, the more likely we are to obtain depth estimates that are locally unsmooth, i.e., they vary more than the correct ones. Since local variability of depth is due either to the existence of a discontinuity or to a wrong 3D motion estimate, being able to differentiate between these two cases provides the correct motion, which yields the “smoothest” estimated depth as well as the image location of scene discontinuities. Although no optic flow values are computed, we show that our algorithm is very much related to minimizing the epipolar constraint and we present a number of experimental results with real image sequences indicating the robustness of the method. %B Computer Vision — ECCV'98Computer Vision — ECCV'98 %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 1406 %P 342 - 358 %8 1998/// %@ 978-3-540-64569-6 %G eng %U http://dx.doi.org/10.1007/BFb0055677 %0 Journal Article %J Journal of Molecular Biology %D 1998 %T Solution structure and dynamics of the bioactive retroviral M domain from rous sarcoma virus %A McDonnell,James M %A Fushman, David %A Cahill,Sean M. %A Zhou,Wenjun %A Wolven,Amy %A Wilson,Carol B %A Nelle,Timothy D %A Resh,Marilyn D %A Wills,John %A Cowburn,David %K heteronuclear NMR spectroscopy %K protein dynamics %K RSV matrix protein %K sequence homology %K three-dimensional structure %X A biologically active construct of the retroviral M domain from the avian Rous sarcoma virus is defined and its solution structure described. This M domain is fully active in budding and infectivity without myristylation. In spite of a sequence homology level that suggests no relationship among M domains and the family of matrix proteins in mammalian retroviruses, the conserved structural elements of a central core allow an M domain sequence motif to be described for all retroviruses. The surface of the M domain has a highly clustered positive patch comprised of sequentially distant residues. An analysis of the backbone dynamics, incorporating rotational anisotropy, is used to estimate the thermodynamics of proposed domain oligomerization. %B Journal of Molecular Biology %V 279 %P 921 - 928 %8 1998/06/19/ %@ 0022-2836 %G eng %U http://www.sciencedirect.com/science/article/pii/S0022283698917880 %N 4 %R 10.1006/jmbi.1998.1788 %0 Journal Article %J Journal of Biological ChemistryJ. Biol. Chem. %D 1998 %T The Solution Structure and Dynamics of the Pleckstrin Homology Domain of G Protein-coupled Receptor Kinase 2 (β-Adrenergic Receptor Kinase 1) A BINDING PARTNER OF Gβγ SUBUNITS %A Fushman, David %A Najmabadi-Haske,Taraneh %A Cahill,Sean %A Zheng,Jie %A LeVine,Harry %A Cowburn,David %X The solution structure of an extended pleckstrin homology (PH) domain from the β-adrenergic receptor kinase is obtained by high resolution NMR. The structure establishes that the β-adrenergic receptor kinase extended PH domain has the same fold and topology as other PH domains, and there are several unique features, most notably an extended C-terminal α-helix that behaves as a molten helix, and a surface charge polarity that is extensively modified by positive residues in the extended α-helix and the C terminus. These observations complement biochemical evidence that the C-terminal portion of this PH domain participates in protein-protein interactions with Gβγ subunits. This suggests that the C-terminal segment of the PH domain may function to mediate protein-protein interactions with the targets of PH domains. %B Journal of Biological ChemistryJ. Biol. Chem. %V 273 %P 2835 - 2843 %8 1998/01/30/ %@ 0021-9258, 1083-351X %G eng %U http://www.jbc.org/content/273/5/2835 %N 5 %R 10.1074/jbc.273.5.2835 %0 Journal Article %J Communications of the ACM %D 1998 %T Sorting out searching: a user-interface framework for text searches %A Shneiderman, Ben %A Byrd,Donald %A Croft,W. Bruce %B Communications of the ACM %V 41 %P 95 - 98 %8 1998/04// %@ 0001-0782 %G eng %U http://doi.acm.org/10.1145/273035.273069 %N 4 %R 10.1145/273035.273069 %0 Journal Article %J Journal of Systems and Software %D 1998 %T Specification-based Testing of Reactive Software: A Case Study in Technology Transfer %A Jategaonkar Jagadeesan,L. %A Porter, Adam %A Puchol,C. %A Ramming,J. C %A Votta,L. G. %B Journal of Systems and Software %V 40 %P 249 - 262 %8 1998/// %G eng %N 3 %0 Journal Article %J Journal of Cerebral Blood Flow & Metabolism %D 1998 %T Spreading depression in focal ischemia: A computational study %A Revett,K. %A Ruppin,E. %A Goodall,S. %A Reggia, James A. %B Journal of Cerebral Blood Flow & Metabolism %V 18 %P 998 - 1007 %8 1998/// %G eng %N 9 %0 Report %D 1998 %T SRRIT--A FORTRAN Subroutine to Calculate the Dominant Invariant Subspace of a Nonsymmetric Matrix %A Bai,Z. %A Stewart, G.W. %K Technical Report %X SRRIT is a FORTRAN program to calculate an approximateorthonormal basis for a dominant invariant subspace of a real matrix $A$ by the method of simultaneous iteration \cite{stewart76a}. Specifically, given an integer $m$, {\sl SRRIT} attempts to compute a matrix $Q$ with $m$ orthonormal columns and real quasi-triangular matrix $T$ of order $m$ such that the equation \[ AQ = QT \] is satisfied up to a tolerance specified by the user. The eigenvalues of $T$ are approximations to the $m$ largest eigenvalues of $A$, and the columns of $Q$ span the invariant subspace corresponding to those eigenvalues. {\sl SRRIT} references $A$ only through a user provided subroutine to form the product $AQ$; hence it is suitable for large sparse problems. (Also cross-referenced as UMIACS-TR-92-61) %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %V UMIACS-TR-92-61 %8 1998/10/15/ %G eng %U http://drum.lib.umd.edu/handle/1903/572 %0 Report %D 1998 %T Stabbing Orthogonal Objects in 3-Space %A Mount, Dave %A Pu,Fan-Tao %K Technical Report %X We consider a problem that arises in the design of data structuresfor answering {\em visibility range queries}, that is, given a $3$-dimensional scene defined by a set of polygonal patches, we wish to preprocess the scene to answer queries involving the set of patches of the scene that are visible from a given range of points over a given range of viewing directions. These data structures recursively subdivide space into cells until some criterion is satisfied. One of the important problems that arise in the construction of such data structures is that of determining whether a cell represents a nonempty region of space, and more generally computing the size of a cell. In this paper we introduce a measure of the {\em size} of the subset of lines in 3-space that stab a given set of $n$ polygonal patches, based on the maximum angle and distance between any two lines in the set. Although the best known algorithm for computing this size measure runs in $O(n^2)$ time, we show that if the polygonal patches are orthogonal rectangles, then this measure can be approximated to within a constant factor in $O(n)$ time. (Also cross-referenced as UMIACS-TR-96-71) %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %V UMIACS-TR-96-71 %8 1998/10/15/ %G eng %U http://drum.lib.umd.edu//handle/1903/850 %0 Conference Paper %B Proceedings of the 1st international symposium on Memory management %D 1998 %T A study of large object spaces %A Hicks, Michael W. %A Hornof,Luke %A Moore,Jonathan T. %A Nettles,Scott M. %X This paper examines the design space for copying garbage collectors (GCs) in which "large objects" are managed in a separate, non-copy-collected space. We focus on two main issues:1. how to set the policy for classifying objects as "large"2. how to manage the large object spaceWe explore these issues experimentally using the Oscar GC testbed. In particular, we vary the threshold size of large objects and also whether the objects may contain pointers. Furthermore, we compare the performance of treadmill collection to that of mark-and-sweep collection for managing the large object space.We find that for some heaps there is a minimum cutoff size below which adding objects to the large object space does not result in a performance improvement, while for others no such cutoff exists. In general, including pointer-containing objects in the large object space seems beneficial. Finally, the exact method used to collect the large object space does not significantly influence overall performance. %B Proceedings of the 1st international symposium on Memory management %S ISMM '98 %I ACM %C New York, NY, USA %P 138 - 145 %8 1998/// %@ 1-58113-114-3 %G eng %U http://doi.acm.org/10.1145/286860.286875 %R 10.1145/286860.286875 %0 Report %D 1998 %T On Sublinear Convergence %A Stewart, G.W. %K Technical Report %X This note develops a theory of sublinearly convergingsequences, including a categorization of the rates of convergence and a method for determining the rate from an iteration function. (Also cross-referenced as UMIACS-TR-95-92) %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %V UMIACS-TR-95-92 %8 1998/10/15/ %G eng %U http://drum.lib.umd.edu/handle/1903/760 %0 Report %D 1998 %T A Survey of Current Paradigms in Machine Translation %A Dorr, Bonnie J %A Jordan,P.W. %A Benoit,J.W. %X This is paper is a survey of the current machine translation research in the US, Eu-rope, and Japan. A short history of machine translation is presented first, followed by an overview of the current research work. Representative examples of a wide range of different approaches adopted by machine translation researchers are presented. These are described in detail along with a discussion of the practicalities of scaling up these approaches for operational environments. In support of this discussion, issues in, and techniques for, evaluating machine translation systems are discussed. %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %8 1998/// %G eng %0 Report %D 1998 %T A Survey of Multilingual Text Retrieval %A Oard, Douglas %A Dorr, Bonnie J %K Technical Report %X This report reviews the present state of the artin selection of texts in one language based on queries in another, a problem we refer to as ``multilingual'' text retrieval. Present applications of multilingual text retrieval systems are limited by the cost and complexity of developing and using the multilingual thesauri on which they are based and by the level of user training that is required to achieve satisfactory search effectiveness. A general model for multilingual text retrieval is used to review the development of the field and to describe modern production and experimental systems. The report concludes with some observations on the present state of the art and an extensive bibliography of the technical literature on multilingual text retrieval. The research reported herein was supported, in part, by Army Research Office contract DAAL03-91-C-0034 through Battelle Corporation, NSF NYI IRI-9357731, Alfred P. Sloan Research Fellow Award BR3336, and a General Research Board Semester Award. (Also cross-referenced as UMIACS-TR-96-19) %I Instititue for Advanced Computer Studies, Univ of Maryland, College Park %8 1998/10/15/ %G eng %U http://drum.lib.umd.edu/handle/1903/807 %0 Journal Article %J IEEE Network %D 1998 %T The SwitchWare active network architecture %A Alexander,D. S %A Arbaugh, William A. %A Hicks, Michael W. %A Kakkar,P. %A Keromytis,A. D %A Moore,J. T %A Gunter,C. A %A Nettles,S. M %A Smith,J. M %K active extensions %K active packets %K Authentication %K Computer languages %K Computer networks %K cryptography %K cryptography-based authentication %K high-integrity base %K integrity checking %K IP networks %K LAN interconnection %K mobile programs %K network operating systems %K packet switching %K programmable network infrastructure %K programming languages %K Protocols %K Safety %K safety requirements %K scalability %K secure active router infrastructure %K Security %K security requirements %K services %K strong type checking %K Switches %K SwitchWare active network architecture %K telecommunication network routing %K Tin %K usability %K verification techniques %X Active networks must balance the flexibility of a programmable network infrastructure against the safety and security requirements inherent in sharing that infrastructure. Furthermore, this balance must be achieved while maintaining the usability of the network. The SwitchWare active network architecture is a novel approach to achieving this balance using three layers: active packets, which contain mobile programs that replace traditional packets; active extensions, which provide services on the network elements and can be dynamically loaded; and a secure active router infrastructure, which forms a high-integrity base on which the security of the other layers depends. In addition to integrity checking and cryptography-based authentication, security in our architecture depends heavily on verification techniques from programming languages, such as strong type checking %B IEEE Network %V 12 %P 29 - 36 %8 1998/06//May %@ 0890-8044 %G eng %N 3 %R 10.1109/65.690959 %0 Journal Article %J The ML Workshop, International Conference on Functional Programming (ICFP) %D 1998 %T The switchware active network implementation %A Alexander,D. S %A Hicks, Michael W. %A Kakkar,P. %A Keromytis,A. D %A Shaw,M. %A Moore,J. T %A Gunter,C. A %A Jim,T. %A Nettles,S. M %A Smith,J. M %B The ML Workshop, International Conference on Functional Programming (ICFP) %8 1998/// %G eng %0 Journal Article %J Mol Biol Evol %D 1997 %T Satellite DNA repeat sequence variation is low in three species of burying beetles in the genus ıt Nicrophorus (Coleoptera: Silphidae) %A King,L. M %A Cummings, Michael P. %X Three satellite DNA families were identified in three species of burying beetles, Nicrophorus orbicollis, N. marginatus, and N. americanus. Southern hybridization and nucleotide sequence analysis of individual randomly cloned repeats shows that these satellite DNA families are highly abundant in the genome, are composed of unique repeats, and are species-specific. The repeats do not have identifiable core elements or substructures that are similar in all three families, and most interspecific sequence similarity is confined to homopolymeric runs of A and T. Satellite DNA from N. marginatus and N. americanus show single-base-pair indels among repeats, but single-nucleotide substitutions characterize most of the repeat variability. Although the repeat units are of similar lengths (342, 350, and 354 bp) and A + T composition (65%, 71%, and 71%, respectively), the average nucleotide divergence among sequenced repeats is very low (0.18%, 1.22%, and 0.71%, respectively). Transition/transversion ratios from the consensus sequence are 0.20, 0.69, and 0.70, respectively. %B Mol Biol Evol %V 14 %P 1088 - 1095 %8 1997/11// %G eng %N 11 %0 Report %D 1997 %T Scheduling and load-balancing via randomization %A Srinivasan, Aravind %I DSpace at School of Computing, NUS %V TR11/97 %8 1997/11/01/undef %G eng %0 Conference Paper %B Proceedings of the Eighth SIAM Conference on Parallel Processing for Scientific Computing. SIAM %D 1997 %T Scheduling in a high performance remote-sensing data server %A Chang,C. %A Sussman, Alan %A Saltz, J. %B Proceedings of the Eighth SIAM Conference on Parallel Processing for Scientific Computing. SIAM %8 1997/// %G eng %0 Conference Paper %B , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings %D 1997 %T A secure and reliable bootstrap architecture %A Arbaugh, William A. %A Farber,D. J %A Smith,J. M %K active networks %K AEGIS architecture %K bootstrap architecture %K Computer architecture %K computer bootstrapping %K data integrity %K Distributed computing %K Hardware %K hardware validity %K initialization %K integrity chain %K integrity check failures %K Internet %K Internet commerce %K IP networks %K Laboratories %K lower-layer integrity %K Microprogramming %K Operating systems %K recovery process %K reliability %K robust systems %K Robustness %K Security %K security of data %K software reliability %K system integrity guarantees %K system recovery %K transitions %K Virtual machining %X In a computer system, the integrity of lower layers is typically treated as axiomatic by higher layers. Under the presumption that the hardware comprising the machine (the lowest layer) is valid, the integrity of a layer can be guaranteed if and only if: (1) the integrity of the lower layers is checked and (2) transitions to higher layers occur only after integrity checks on them are complete. The resulting integrity “chain” inductively guarantees system integrity. When these conditions are not met, as they typically are not in the bootstrapping (initialization) of a computer system, no integrity guarantees can be made, yet these guarantees are increasingly important to diverse applications such as Internet commerce, security systems and “active networks”. In this paper, we describe the AEGIS architecture for initializing a computer system. It validates integrity at each layer transition in the bootstrap process. AEGIS also includes a recovery process for integrity check failures, and we show how this results in robust systems %B , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings %I IEEE %P 65 - 71 %8 1997/05/04/7 %@ 0-8186-7828-3 %G eng %R 10.1109/SECPRI.1997.601317 %0 Conference Paper %B Proceedings of the ACL SIGLEX Workshop on Tagging Text with Lexical Semantics: Why, What, and How %D 1997 %T Selectional preference and sense disambiguation %A Resnik, Philip %B Proceedings of the ACL SIGLEX Workshop on Tagging Text with Lexical Semantics: Why, What, and How %P 52 - 57 %8 1997/// %G eng %0 Conference Paper %B Data Engineering, 1997. Proceedings. 13th International Conference on %D 1997 %T Semantic query optimization for object databases %A Grant,J. %A Gryz,J. %A Minker, Jack %A Raschid, Louiqa %K application;object %K constraints;keys;method %K constructors;DATALOG;data %K databases;object-oriented %K databases;query %K Datalog %K Evaluation %K integrity;data %K languages;query %K Logic %K object %K optimization;structure %K plans;residue %K processing;software %K query %K query;access %K query;integrity %K relations;equivalent %K representation;ODL %K schema;ODMG-93 %K standard;OQL %K standards; %K structures;object-oriented %K Support %K technique;semantic %X Presents a technique for semantic query optimization (SQO) for object databases. We use the ODMG-93 (Object Data Management Group) standard ODL (Object Database Language) and OQL (Object Query Language) languages. The ODL object schema and the OQL object query are translated into a DATALOG representation. Semantic knowledge about the object model and the particular application is expressed as integrity constraints. This is an extension of the ODMG-93 standard. SQO is performed in the DATALOG representation, and an equivalent logic query and (subsequently) an equivalent OQL object query are obtained. SQO is based on the residue technique of Chakravarthy et al. (1990). We show that our technique generalizes previous research on SQO for object databases. It can be applied to queries with structure constructors and method application. It utilizes integrity constraints about keys, methods and knowledge of access support relations, to produce equivalent queries, which may have more efficient evaluation plans %B Data Engineering, 1997. Proceedings. 13th International Conference on %P 444 - 453 %8 1997/04// %G eng %R 10.1109/ICDE.1997.581983 %0 Conference Paper %B Data Engineering, 1997. Proceedings. 13th International Conference on %D 1997 %T Semantic query optimization for object databases %A Grant,J. %A Gryz,J. %A Minker, Jack %A Raschid, Louiqa %B Data Engineering, 1997. Proceedings. 13th International Conference on %P 444 - 453 %8 1997/// %G eng %0 Conference Paper %B Proceedings of the fifth conference on Applied natural language processing %D 1997 %T Semi-automatic acquisition of domain-specific translation lexicons %A Resnik, Philip %A Melamed,I.D. %B Proceedings of the fifth conference on Applied natural language processing %P 340 - 347 %8 1997/// %G eng %0 Journal Article %J PLAN documentation, September %D 1997 %T A Service Layer Routing Protocol for PLAN %A Moore,J. T %A Hicks, Michael W. %B PLAN documentation, September %8 1997/// %G eng %0 Report %D 1997 %T Serving Users in Many Languages: Cross-Language Information Retrievalfor Digital Libraries %A Oard, Douglas %I Corporation for National Research Initiatives %8 1997/// %G eng %0 Journal Article %J JOURNAL OF APPLIED NONCLASSICAL LOGICS %D 1997 %T Sources of, and exploiting, inconsistency: preliminary report %A Perlis, Don %B JOURNAL OF APPLIED NONCLASSICAL LOGICS %V 7 %P 13 - 24 %8 1997/// %G eng %0 Conference Paper %B IN PROCEEDINGS OF THE MT SUMMIT WORKSHOP ON INTERLINGUAS IN MT %D 1997 %T Spanish EuroWordNet and LCS-Based Interlingual MT %A Dorr, Bonnie J %A Marti,M. Antonia %A Castellon,Irene %X We present a machine translation framework in which the interlingua -- Lexical Conceptual Structure (LCS) -- is coupled with a definitional component that includes bilingual (EuroWordNet) links between words in the source and target languages. While the links between individual words are language-specific, the LCS is designed to be a language-independent, compositional representation. We take the view that the two types of information -- shallower, transfer-like knowledge as well as deeper, compositional knowledge -- can be reconciled in interlingual machine translation, the former for overcoming the intractability of LCS-based lexical selection, and the latter for relating the underlying semantics of two words cross-linguistically. We describe the acquisition process for these two information types and present results of hand-verification of the acquired lexicon. Finally, we demonstrate the utility of the two information types in interlingual MT. %B IN PROCEEDINGS OF THE MT SUMMIT WORKSHOP ON INTERLINGUAS IN MT %8 1997/// %G eng %0 Conference Paper %B Software Engineering, International Conference on %D 1997 %T Specification-based Testing of Reactive Software: Tools and Experiments %A Jagadeesan,Lalita Jategaonkar %A Porter, Adam %A Puchol,Carlos %A Ramming,J. Christopher %A Votta,Lawrence G. %K empirical studies %K reactive systems %K specification-based testing %K temporal logic %X Testing commercial software is expensive and time consuming. Automated testing methods promise to save a great deal of time and money throughout the software industry. One approach that is well-suited for the reactive systems found in telephone switching systems is specification-based testing.We have built a set of tools to automatically test softmare applications for violations of safety properties expressed in temporal logic. Our testing system automatically constructs finite state machine oracles corresponding to safety properties, builds test harnesses, and integrates them with the application. The test harness then generates inputs automatically to test the application.We describe a study examining the feasibility of this approach for testing industrial applications. To conduct this study we formally modeled an Automatic Protection Switching system (APS), which is an application common to many telephony systems. We then asked a number of computer science graduate students to develop several versions of the APS and use our tools to test them. We found that the tools are very effective, save significant amounts of human effort (at the expense of machine resources), and are easy to use. We also discuss improvements that are needed before we can use the tools with professional developers building commercial products. %B Software Engineering, International Conference on %I IEEE Computer Society %C Los Alamitos, CA, USA %P 525 - 525 %8 1997/// %G eng %R http://doi.ieeecomputersociety.org/10.1109/ICSE.1997.610373 %0 Journal Article %J User Modeling and User-Adapted Interaction %D 1997 %T The state of the art in text filtering %A Oard, Douglas %B User Modeling and User-Adapted Interaction %V 7 %P 141 - 178 %8 1997/// %G eng %N 3 %0 Journal Article %J Neural Computation %D 1997 %T Stochastic completion fields: A neural model of illusory contour shape and salience %A Williams,L. R %A Jacobs, David W. %X Describes an algorithm- and representation-level theory of illusory contour shape and salience. Unlike previous theories, the model is derived from a single assumption: that the prior probability distribution of boundary completion shape can be modeled by a random walk. The model does not use numerical relaxation or other explicit minimization, but instead relies on the fact that the probability that a particle following a random walk will pass through a given position, and orientation on a path joining 2 boundary fragments can be computed directly as the product of 2 vector-field convolutions. It is shown that for the random walk defined, the maximum likelihood paths are curves of least energy, that is, on average, random walks follow paths commonly assumed to model the shape of illusory contours. A computer model is demonstrated on numerous illusory contour stimuli from the literature. (PsycINFO Database Record (c) 2012 APA, all rights reserved) %B Neural Computation %V 9 %P 837 - 858 %8 1997/// %G eng %N 4 %0 Journal Article %J Molecular and Biochemical Parasitology %D 1997 %T A survey of the Trypanosoma brucei rhodesiense genome using shotgun sequencing %A El‐Sayed, Najib M. %A Donelson,John E. %K Expressed sequence tag %K Genome survey sequence %K Trypanosoma brucei rhodesiense %X A comparison of the efficiency of sequencing random genomic DNA fragments versus random cDNAs for the discovery of new genes in African trypanosomes was undertaken. Trypanosome DNA was sheared to a 1.5-2.5 kb size distribution, cloned into a plasmid and the sequences at both ends of 183 cloned fragments determined. Sequences of both kinetoplast and nuclear DNA were identified. New coding regions were discovered for a variety of proteins, including cell division proteins, an RNA-binding protein and a homologue of the Leishmania surface protease GP63. In some cases, each end of a fragment was found to contain a different gene, demonstrating the proximity of those genes and suggesting that the density of genes in the African trypanosome genome is quite high. Repetitive sequence elements found included telomeric hexamer repeats, 76 bp repeats associated with VSG gene expression sites, 177 bp satellite repeats in minichromosomes and the Ingi transposon-like elements. In contrast to cDNA sequencing, no ribosomal protein genes were detected. For the sake of comparison, the sequences of 190 expressed sequence tags (ESTs) were also determined, and a similar number of new trypanosomal homologues were found including homologues of another putative surface protein and a human leucine-rich repeat-containing protein. We conclude from this analysis and our previous work that sequencing random DNA fragments in African trypanosomes is as efficient for gene discovery as is sequencing random cDNA clones. %B Molecular and Biochemical Parasitology %V 84 %P 167 - 178 %8 1997/02// %@ 0166-6851 %G eng %U http://www.sciencedirect.com/science/article/pii/S0166685196027922 %N 2 %R 16/S0166-6851(96)02792-2 %0 Report %D 1997 %T Symbolic Compression and Processing of Document Images %A Kia,Omid %A David Doermann %A Rosenfeld,Azriel %A Chellapa, Rama %X In this paper we describe a compression and representation scheme which exploits the component-level redundancy found within a document image. The approach identifies patterns which appear repeatedly, represents similar patterns with a single prototype, stores the location of pattern instances and codes the residuals between the prototypes and the pattern instances. Using a novel encoding scheme, we provide a representation which facilitates scalable lossy compression and progressive transmission, and supports document image analysis in the compressed domain. We motivate the approach, provide details of the encoding procedures, report compression results and describe a class of document image understanding tasks which operate on the compressed representation. %I University of Maryland, College Park %V LAMP-TR-004,CFAR-TR-849,CS-TR-3734 %8 1997/01// %G eng %0 Conference Paper %B Computer Aided Verification %D 1997 %T Symbolic model checking of infinite state systems using Presburger arithmetic %A Bultan,T. %A Gerber,R. %A Pugh, William %B Computer Aided Verification %P 400 - 411 %8 1997/// %G eng %0 Conference Paper %B ICDCS %D 1996 %T Scaling heterogeneous databases and the design of DISCO %A Tomasic,A. %A Raschid, Louiqa %A Valduriez,P. %B ICDCS %P 449 - 449 %8 1996/// %G eng %0 Journal Article %J Cognition %D 1996 %T Selectional constraints: an information-theoretic model and its computational realization %A Resnik, Philip %X A new, information-theoretic model of selectional constraints is proposed. The strategy adopted here is a minimalist one: how far can one get making as few assumptions as possible? In keeping with that strategy, the proposed model consists of only two components: first, a fairly generic taxonomic representation of concepts, and, second, a probabilistic formalization of selectional constraints defined in terms of that taxonomy, computed on the basis of simple, observable frequencies of co-occurrence between predicates and their arguments. Unlike traditional selection restrictions, the information-theoretic approach avoids empirical problems associated with definitional theories of word meaning, accommodates the observation that semantic anomaly often appears to be a matter of degree, and provides an account of how selectional constraints can be learned. A computational implementation of the model “learns” selectional constraints from collections of naturally occurring text; the predictions of the implemented model are evaluated against judgments elicited from adult subjects, and used to explore the way that arguments are syntactically realized for a class of English verbs. The paper concludes with a discussion of the role of selectional constraints in the acquisition of verb meaning. %B Cognition %V 61 %P 127 - 159 %8 1996/// %@ 0010-0277 %G eng %U http://www.sciencedirect.com/science/article/pii/S0010027796007226 %N 1-2 %R 10.1016/S0010-0277(96)00722-6 %0 Journal Article %J Foundations of Intelligent Systems %D 1996 %T Semantic query optimization for bottom-up evaluation %A Godfrey,P. %A Gryz,J. %A Minker, Jack %X Semantic query optimization uses semantic knowledge in databases (represented in the form of integrity constraints) to rewrite queries and logic programs to achieve efficient query evaluation. Much work has been done to develop various techniques for optimization. Most of it, however, is applicable to top-down query evaluation strategies. Moreover, little attention has been paid to the cost of the optimization. We address the issue of semantic query optimization for bottom-up query evaluation strategies with an emphasis on overall efficiency. We focus on a single optimization technique, join elimination. We discuss factors that influence the cost of semantic optimization, and present two different abstract algorithms for optimization. The first pre-processes a query statically before it is evaluated; the second combines query evaluation with semantic optimization using heuristics to achieve the largest possible savings. %B Foundations of Intelligent Systems %P 561 - 571 %8 1996/// %G eng %R 10.1007/3-540-61286-6_180 %0 Journal Article %J ACM Computing Surveys (CSUR) %D 1996 %T Semantic theories and system design %A Cleaveland, Rance %B ACM Computing Surveys (CSUR) %V 28 %P 41 - 41 %8 1996/// %G eng %N 4es %0 Thesis %D 1996 %T Semantics of knowledge-based systems with multiple forms of negation %A Ruiz,C. %A Minker, Jack %I University of Maryland at College Park %8 1996/// %G eng %0 Journal Article %J International Journal of Communication Systems %D 1996 %T SEROS – A SELF-ROUTING OPTICAL ATM SWITCH %A Guizani,Mohsen %A Memon, Atif M. %K 2 × 2 ATM switch %K fault-tolerant %K MINs %K photonic switching network %K reliability %K self-routing %X A fault-tolerant high-performance SElf-Routing 2 × 2 Optical ATM Switch (SEROS) is proposed. The switch is designed using all-optical components which allows the exploitation of spatial parallelism. SEROS can be used with any multistage interconnection network such as Omega, Banyan, Shuffle or Benes. For the purpose of this study, SEROS has been incorporated into a generic self-routing multistage interconnection network that uses 2 × 2 switches and is not fault tolerant. Reliability analysis is carried out and the results are compared with two major fault-tolerant networks. They show that without redundant switches, better network survivability is achieved. All the switches in the network are 2 × 2, making it easier to mass produce. %B International Journal of Communication Systems %V 9 %P 115 - 125 %8 1996/// %@ 1099-1131 %G eng %U http://onlinelibrary.wiley.com/doi/10.1002/(SICI)1099-1131(199603)9:2<115::AID-DAC301>3.0.CO;2-B/abstract %N 2 %R 10.1002/(SICI)1099-1131(199603)9:2<115::AID-DAC301>3.0.CO;2-B %0 Conference Paper %B Proceedings of the 23rd annual conference on Computer graphics and interactive techniques %D 1996 %T Simplification envelopes %A Cohen,Jonathan %A Varshney, Amitabh %A Manocha,Dinesh %A Turk,Greg %A Weber,Hans %A Agarwal,Pankaj %A Brooks,Frederick %A Wright,William %K geometric modeling %K hierarchical approximation %K levels-of-detail generation %K model simplification %K offsets %K shape approximation %B Proceedings of the 23rd annual conference on Computer graphics and interactive techniques %S SIGGRAPH '96 %I ACM %C New York, NY, USA %P 119 - 128 %8 1996/// %@ 0-89791-746-4 %G eng %U http://doi.acm.org/10.1145/237170.237220 %R 10.1145/237170.237220 %0 Journal Article %J Solid-State Electronics %D 1996 %T Simulation of the logic switching characteristics of hot-carrier-degraded ultra-thin SOI CMOS inverters %A Tai,Gwo-Chung %A Korman,Can E. %A Mayergoyz, Issak D %X The switching characteristics of ultra-thin SOI CMOS inverters with hot-carrier-induced degradations are examined by using device simulations. The simulator employs a robust fixed-point iteration method to avoid conventional matrix solutions. Potential-dependent interface traps and oxide trapped charges are used to model the degradations. The effects of front and back channel degradations in an nMOS device of a CMOS inverter are investigated in steady-state and transient regimes. The nonlinear variation of interface charges cannot be simulated by using a single nMOS device alone since the transition of the inverter is also determined by the pMOS transistor. It is found that the stagnant holes generated by impact ionization have a much greater effect on the rate of the pull-down transient than that of interface charges. %B Solid-State Electronics %V 39 %P 1669 - 1674 %8 1996/11// %@ 0038-1101 %G eng %U http://www.sciencedirect.com/science/article/pii/0038110196000731 %N 11 %R 10.1016/0038-1101(96)00073-1 %0 Conference Paper %B Proceedings of the symposium on Computers and the quality of life %D 1996 %T Social impact statements: engaging public participation in information technology design %A Shneiderman, Ben %A Rose,Anne %B Proceedings of the symposium on Computers and the quality of life %S CQL '96 %I ACM %C New York, NY, USA %P 90 - 96 %8 1996/// %@ 0-89791-827-4 %G eng %U http://doi.acm.org/10.1145/238339.238378 %R 10.1145/238339.238378 %0 Journal Article %J Engineering Management, IEEE Transactions on %D 1996 %T Software engineering technology infusion within NASA %A Zelkowitz, Marvin V %K and %K computing;aerospace %K development %K development;aerospace %K disciplines;government;industry;software %K engineering %K industry;research %K infusion;technology %K management;software %K management;technology %K MODELS %K NASA;engineering %K technologies;technology %K transfer %K transfer; %X Abstract technology transfer is of crucial concern to both government and industry today. In this paper, several software engineering technologies used within NASA are studied, and the mechanisms, schedules, and efforts at transferring these technologies are investigated. The goals of this study are: (1) to understand the difference between technology transfer (the adoption of a new method by large segments of an industry) as an industrywide phenomenon and the adoption of a new technology by an individual organization (called technology infusion); and (2) to see if software engineering technology transfer differs from other engineering disciplines. While there is great interest today in developing technology transfer models for industry, it is the technology infusion process that actually causes changes in the current state of the practice %B Engineering Management, IEEE Transactions on %V 43 %P 250 - 261 %8 1996/08// %@ 0018-9391 %G eng %N 3 %R 10.1109/17.511836 %0 Book %D 1996 %T Software synthesis from dataflow graphs %A Bhattacharyya, Shuvra S. %A Murthy,P. K %A Lee,E. A %I Springer %8 1996/// %G eng %0 Journal Article %J Theoretical Computer Science %D 1996 %T Sorting strings and constructing digital search trees in parallel %A JaJa, Joseph F. %A Ryu,Kwan Woo %A Vishkin, Uzi %X We describe two simple optimal-work parallel algorithms for sorting a list L= (X1, X2, …, Xm) of m strings over an arbitrary alphabet Σ, where ∑i = 1m¦Xi¦ = n and two elements of Σ can be compared in unit time using a single processor. The first algorithm is a deterministic algorithm that runs in O(log2m/log log m) time and the second is a randomized algorithm that runs in O(logm) time. Both algorithms use O(m log m + n) operations. Compared to the best-known parallel algorithms for sorting strings, our algorithms offer the following improvements. 1.1. The total number of operations used by our algorithms is optimal while all previous parallel algorithms use a nonoptimal number of operations. 2. 2. We make no assumption about the alphabet while the previous algorithms assume that the alphabet is restricted to {1, 2, …, no(1)}. 3. 3. The computation model assumed by our algorithms is the Common CRCW PRAM unlike the known algorithms that assume the Arbitrary CRCW PRAM. 4. 4. Our algorithms use O(m log m + n) space, while the previous parallel algorithms use O(n1 + ε) space, where ε is a positive constant. We also present optimal-work parallel algorithms to construct a digital search tree for a given set of strings and to search for a string in a sorted list of strings. We use our parallel sorting algorithms to solve the problem of determining a minimal starting point of a circular string with respect to lexicographic ordering. Our solution improves upon the previous best-known result to solve this problem. %B Theoretical Computer Science %V 154 %P 225 - 245 %8 1996/02/05/ %@ 0304-3975 %G eng %U http://www.sciencedirect.com/science/article/pii/0304397594002630 %N 2 %R 10.1016/0304-3975(94)00263-0 %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 1996 %T The space requirements of indexing under perspective projections %A Jacobs, David W. %K 2D %K complexity;feature %K complexity;table %K extraction;image %K hashing;indexing %K image %K images;3D %K lookup; %K lookup;computational %K matching;geometric %K matching;indexing;object %K model %K points;feature %K process;invariants;object %K processing;table %K projections;space %K recognition;perspective %K recognition;stereo %X Object recognition systems can be made more efficient through the use of table lookup to match features. The cost of this indexing process depends on the space required to represent groups of model features in such a lookup table. We determine the space required to perform indexing of arbitrary sets of 3D model points for lookup from a single 2D image formed under perspective projection. We show that in this case, one must use a 3D surface to represent model groups, and we provide an analytic description of such a surface. This is in contrast to the cases of scaled-orthographic or affine projection, in which only a 2D surface is required to represent a group of model features. This demonstrates a fundamental way in which the recognition of objects under perspective projection is more complex than is recognition under other projection models %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %V 18 %P 330 - 333 %8 1996/03// %@ 0162-8828 %G eng %N 3 %R 10.1109/34.485561 %0 Conference Paper %B Pattern Recognition, 1996., Proceedings of the 13th International Conference on %D 1996 %T Space/time trade-offs for associative memory %A GROVE,A. J %A Jacobs, David W. %K access %K matching;set %K memory;associative %K nets;pattern %K processing;content-addressable %K query;memory %K recall;membership %K scheme;associative %K space;set %K storage;neural %K theory; %K theory;storage %K time;associative %X In any storage scheme, there is some trade-off between the space used (size of memory) and access time. However, the nature of this trade-off seems to depend on more than just what is being stored-it also depends the types of queries we consider. We justify this claim by considering a particular memory model and contrast recognition (membership queries) with associative recall. We show that the latter task can require exponentially larger memories even when identical information is stored %B Pattern Recognition, 1996., Proceedings of the 13th International Conference on %V 4 %P 296 -302 vol.4 - 296 -302 vol.4 %8 1996/08// %G eng %R 10.1109/ICPR.1996.547434 %0 Book Section %B Computer Vision — ECCV '96Computer Vision — ECCV '96 %D 1996 %T Spatiotemporal representations for visual navigation %A LoongFah Cheong %A Fermüller, Cornelia %A Aloimonos, J. %E Buxton,Bernard %E Cipolla,Roberto %X The study of visual navigation problems requires the integration of visual processes with motor control. Most essential in approaching this integration is the study of appropriate spatio-temporal representations which the system computes from the imagery and which serve as interfaces to all motor activities. Since representations resulting from exact quantitative reconstruction have turned out to be very hard to obtain, we argue here for the necessity of representations which can be computed easily, reliably and in real time and which recover only the information about the 3D world which is really needed in order to solve the navigational problems at hand. In this paper we introduce a number of such representations capturing aspects of 3D motion and scene structure which are used for the solution of navigational problems implemented in visual servo systems. In particular, the following three problems are addressed: (a) to change the robot's direction of motion towards a fixed direction, (b) to pursue a moving target while keeping a certain distance from the target, and (c) to follow a wall-like perimeter. The importance of the introduced representations lies in the following: – They can be extracted using minimal visual information, in particular the sign of flow measurements or the the first order spatiotemporal derivatives of the image intensity function. In that sense they are direct representations needing no intermediate level of computation such as correspondence. – They are global in the sense that they represent how three-dimensional information is globally encoded in them. Thus, they are robust representations since local errors do not affect them. – Usually, from sequences of images, three-dimensional quantities such as motion and shape are computed and used as input to control processes. The representations discussed here are given directly as input to the control procedures, thus resulting in a real time solution. %B Computer Vision — ECCV '96Computer Vision — ECCV '96 %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 1064 %P 671 - 684 %8 1996/// %@ 978-3-540-61122-6 %G eng %U http://dx.doi.org/10.1007/BFb0015577 %0 Book Section %B Dependable Computing — EDCC-2 %D 1996 %T On stratified sampling for high coverage estimations %A Powell,David %A Michel Cukier %A Arlat,Jean %E Hlawiczka,Andrzej %E Silva,João %E Simoncini,Luca %K Computer science %X This paper addresses the problem of estimating the coverage of a fault tolerance mechanism through statistical processing of observations collected in faultinjection experiments. In an earlier paper, several techniques for sampling the fault/activity input space of a fault tolerance mechanism were presented. Various estimators based on simple sampling in the whole space and stratified sampling in a partitioned space were studied; confidence limits were derived based on a normal approximation. In this paper, the validity of this approximation is analyzed, especially for high coverage systems. The theory of confidence regions is then introduced to estimate the coverage without approximation when, for practical reasons, stratification is used. Three statistics are considered for defining confidence regions. It is shown that one of these statistics — a vectorial statistic — is often more conservative than the other two. However, only the vectorial statistic is computationally tractable. The results obtained are compared with those based on approximation by means of three hypothetical example systems. %B Dependable Computing — EDCC-2 %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 1150 %P 35 - 54 %8 1996/// %@ 978-3-540-61772-3 %G eng %U http://www.springerlink.com/content/7t2w2u472601h730/abstract/ %0 Conference Paper %B ACM SIGGRAPH 96 Visual Proceedings: The art and interdisciplinary programs of SIGGRAPH '96 %D 1996 %T Stripe: a software tool for efficient triangle strips %A Evans,Francine %A Skiena,Steven %A Varshney, Amitabh %B ACM SIGGRAPH 96 Visual Proceedings: The art and interdisciplinary programs of SIGGRAPH '96 %S SIGGRAPH '96 %I ACM %C New York, NY, USA %P 153– - 153– %8 1996/// %@ 0-89791-784-7 %G eng %U http://doi.acm.org/10.1145/253607.253894 %R 10.1145/253607.253894 %0 Journal Article %J Discrete Applied Mathematics %D 1996 %T On strongly connected digraphs with bounded cycle length %A Khuller, Samir %A Raghavachari,Balaji %A Young,Neal %X Given a directed graph G = (V, E), a natural problem is to choose a minimum number of the edges in E such that, for any two vertices u and v, if there is a path from u to v in E, then there is a path from u to v among the chosen edges. We show that in graphs having no directed cycle with more than three edges, this problem is equivalent to Maximum Bipartite Matching. This leads to a small improvement in the performance guarantee of the previous best approximation algorithm for the general problem. %B Discrete Applied Mathematics %V 69 %P 281 - 289 %8 1996/08/27/ %@ 0166-218X %G eng %U http://www.sciencedirect.com/science/article/pii/0166218X9500105Z %N 3 %R 10.1016/0166-218X(95)00105-Z %0 Conference Paper %B Pattern Recognition, 1996., Proceedings of the 13th International Conference on %D 1996 %T Structural compression for document analysis %A Kia,O. E %A David Doermann %K analysis;document %K bitmap;error %K coding;image %K compression %K compression;document %K compression;symbol %K decomposition;data %K image %K manipulation; %K processing;image %K ratios;document %K recognition;probability;symbol %K representations;structural %K representations;symbolic %K retrieval;document %K storage;error %K text %X In this paper we describe a structural compression technique to be used for document text image storage and retrieval. The primary objective is to provide an efficient representation, storage, transmission and display. A secondary objective is to provide an encoding which allows access to specified regions within the image and facilitates traditional document processing operations without requiring complete decoding. We describe an algorithm which symbolically decomposes a document image and structurally orders the error bitmap based on a probabilistic model. The resultant symbol and error representations lend themselves to reasonably high compression ratios and are structured so as to allow operations directly on the compressed image. The compression scheme is implemented and compared to traditional compression methods %B Pattern Recognition, 1996., Proceedings of the 13th International Conference on %V 3 %P 664 -668 vol.3 - 664 -668 vol.3 %8 1996/08// %G eng %R 10.1109/ICPR.1996.547029 %0 Conference Paper %B ICIP %D 1996 %T Structure Preserving Document Image Compression and Transmission %A Kia,O. %A David Doermann %B ICIP %P 193 - 196 %8 1996/// %G eng %0 Journal Article %J Exploratory vision: the active eye %D 1996 %T The synthesis of vision and action %A Fermüller, Cornelia %A Aloimonos, J. %B Exploratory vision: the active eye %P 205 - 205 %8 1996/// %G eng %0 Journal Article %J Mol Biol Evol %D 1995 %T Sampling properties of DNA sequence data in phylogenetic analysis %A Cummings, Michael P. %A Otto,S. P %A Wakeley,J. %X We inferred phylogenetic trees from individual genes and random samples of nucleotides from the mitochondrial genomes of 10 vertebrates and compared the results to those obtained by analyzing the whole genomes. Individual genes are poor samples in that they infrequently lead to the whole-genome tree. A large number of nucleotide sites is needed to exactly determine the whole-genome tree. A relatively small number of sites, however, often results in a tree close to the whole-genome tree. We found that blocks of contiguous sites were less likely to lead to the whole-genome tree than samples composed of sites drawn individually from throughout the genome. Samples of contiguous sites are not representative of the entire genome, a condition that violates a basic assumption of the bootstrap method as it is applied in phylogenetic studies. %B Mol Biol Evol %V 12 %P 814 - 822 %8 1995/09// %G eng %N 5 %0 Journal Article %J Image Processing, IEEE Transactions on %D 1995 %T Scalable data parallel algorithms for texture synthesis using Gibbs random fields %A Bader, D.A. %A JaJa, Joseph F. %A Chellapa, Rama %K algorithms;maximum %K algorithms;parallel %K algorithms;scalable %K algorithms;texture %K analysis;image %K CM-2;Thinking %K CM-5;fine-grained %K compression;image %K compression;texture %K Connection %K data %K estimation;model %K estimation;parallel %K field;Thinking %K fields;Markov %K likelihood %K machine %K Machines;Gibbs %K machines;random %K Parallel %K parameter %K processes; %K processes;data %K processing;image %K processing;machine-independent %K random %K representation;real-time %K scalable %K synthesis;Markov %K texture;maximum %X This article introduces scalable data parallel algorithms for image processing. Focusing on Gibbs and Markov random field model representation for textures, we present parallel algorithms for texture synthesis, compression, and maximum likelihood parameter estimation, currently implemented on Thinking Machines CM-2 and CM-5. The use of fine-grained, data parallel processing techniques yields real-time algorithms for texture synthesis and compression that are substantially faster than the previously known sequential implementations. Although current implementations are on Connection Machines, the methodology presented enables machine-independent scalable algorithms for a number of problems in image processing and analysis %B Image Processing, IEEE Transactions on %V 4 %P 1456 - 1460 %8 1995/10// %@ 1057-7149 %G eng %N 10 %R 10.1109/83.465111 %0 Journal Article %J INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE %D 1995 %T Scope and abstraction: Two criteria for localized planning %A Lansky,A. L %A Getoor, Lise %X Localization is a general-purpose representational technique for partitioning a problem intosubproblems. A localized problem-solver searches several smaller search spaces, one for each subproblem. Unlike most methods of partitioning, however, localization allows for subprob- lems that overlap i.e. multiple search spaces may be involved in constructing shared pieces of the overall plan. In this paper we focus on two criteria for forming localizations: scope and abstraction. We describe a method for automatically generating such localizations and provide empirical results that contrast their use in an o ce-building construction domain. %B INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE %V 14 %P 1612 - 1619 %8 1995/// %G eng %0 Journal Article %J ACM Comput. Surv. %D 1995 %T Seeing and understanding: representing the visual world %A Aloimonos, J. %A Fermüller, Cornelia %A Rosenfeld, A. %B ACM Comput. Surv. %V 27 %P 307 - 309 %8 1995/09// %@ 0360-0300 %G eng %U http://doi.acm.org/10.1145/212094.212101 %N 3 %R 10.1145/212094.212101 %0 Conference Paper %B In Proceedings of IJCAI-95 %D 1995 %T Selecting Tense, Aspect, and Connecting Words In Language Generation %A Dorr, Bonnie J %A Gaasterland,Terry %X Generating language that reflects the temporal organization of represented knowledge requires a language generation model that integrates contemporary theories of tense and aspect, temporal representations, and methods to plan text. This paper presents a model that produces complex sentences that reflect temporal relations present in underlying temporal concepts. The main result of this work is the successful application of constrained linguistic theories of tense and aspect to a generator which produces meaningful event combinations and selects appropriate connecting words that relate them. 1 Introduction Reasoning about temporal knowledge and formulating answers to questions that involve time necessitate the presentation of temporal information to users. One approach is to incorporate the temporal information directly into natural language paraphrases of the represented knowledge. This requires a method to plan language that contains not only tense selections, but aspect selections... %B In Proceedings of IJCAI-95 %P 1299 - 1305 %8 1995/// %G eng %0 Journal Article %J Software, IEEE %D 1995 %T SEL's software process improvement program %A Basili, Victor R. %A Zelkowitz, Marvin V %A McGarry,F. %A Page,J. %A Waligora,S. %A Pajerski,R. %K baseline;detailed %K engineering %K engineering; %K evolving %K improvement %K Laboratory;continually %K measurements;experiment %K plans;production %K process %K program;software %K projects;training;software %K SEL %K software %X We select candidates for process change on the basis of quantified Software Engineering Laboratory (SEL) experiences and clearly defined goals for the software. After we select the changes, we provide training and formulate experiment plans. We then apply the new process to one or more production projects and take detailed measurements. We assess process success by comparing these measures with the continually evolving baseline. Based upon the results of the analysis, we adopt, discard, or revise the process %B Software, IEEE %V 12 %P 83 - 87 %8 1995/11// %@ 0740-7459 %G eng %N 6 %R 10.1109/52.469763 %0 Journal Article %J Information and Computation %D 1995 %T A simple randomized sieve algorithm for the closest-pair problem %A Khuller, Samir %A Matias,Y. %X We present a linear time randomized sieve algorithm for the closest-pair problem. Thealgorithm as well as its analysis are simple. The algorithm is extended to obtain a randomized linear time approximation algorithm for the closest bichromatic pair problem. %B Information and Computation %V 118 %P 34 - 37 %8 1995/// %G eng %N 1 %0 Journal Article %J Numerical Linear Algebra with Applications %D 1995 %T On the solution of block Hessenberg systems %A Stewart, G.W. %K block Hessenberg matrix %K Block Toeplitz matrix %K linear system %K queue %X This paper describes a divide-and-conquer strategy for solving block Hessenberg systems. For dense matrices the method is as efficient as Gaussian elimination; however, because it works almost entirely with the original blocks, it is much more efficient for sparse matrices or matrices whose blocks can be generated on the fly. For Toeplitz matrices, the algorithm can be combined with the fast Fourier transform. %B Numerical Linear Algebra with Applications %V 2 %P 287 - 296 %8 1995/05/01/ %@ 1099-1506 %G eng %U http://onlinelibrary.wiley.com/doi/10.1002/nla.1680020309/abstract %N 3 %R 10.1002/nla.1680020309 %0 Conference Paper %B Proceedings of the SIGCHI conference on Human factors in computing systems %D 1995 %T Space-scale diagrams: understanding multiscale interfaces %A Furnas,G.W. %A Bederson, Benjamin B. %B Proceedings of the SIGCHI conference on Human factors in computing systems %P 234 - 241 %8 1995/// %G eng %0 Conference Paper %B , 36th Annual Symposium on Foundations of Computer Science, 1995. Proceedings %D 1995 %T Splitters and near-optimal derandomization %A Naor,M. %A Schulman,L. J %A Srinivasan, Aravind %K Boosting %K Circuit testing %K computational complexity %K computational linguistics %K Computer science %K Contracts %K derandomization %K deterministic constructions %K Educational institutions %K Engineering profession %K exhaustive testing %K fairly general method %K fixed-subgraph finding algorithms %K hardness of approximation %K Information systems %K k-restrictions %K learning %K local-coloring protocol %K MATHEMATICS %K near-optimal constructions %K near-optimal derandomization %K Parallel algorithms %K probabilistic bound %K probability %K Protocols %K randomised algorithms %K Set cover %K splitters %X We present a fairly general method for finding deterministic constructions obeying what we call k-restrictions; this yields structures of size not much larger than the probabilistic bound. The structures constructed by our method include (n,k)-universal sets (a collection of binary vectors of length n such that for any subset of size k of the indices, all 2k configurations appear) and families of perfect hash functions. The near-optimal constructions of these objects imply the very efficient derandomization of algorithms in learning, of fixed-subgraph finding algorithms, and of near optimal ΣIIΣ threshold formulae. In addition, they derandomize the reduction showing the hardness of approximation of set cover. They also yield deterministic constructions for a local-coloring protocol, and for exhaustive testing of circuits %B , 36th Annual Symposium on Foundations of Computer Science, 1995. Proceedings %I IEEE %P 182 - 191 %8 1995/10/23/25 %@ 0-8186-7183-1 %G eng %R 10.1109/SFCS.1995.492475 %0 Journal Article %J Signal Processing, IEEE Transactions on %D 1995 %T On the stability of sequential updates and downdates %A Stewart, G.W. %K algorithm;Cholesky %K algorithm;downdating %K algorithm;error %K algorithm;URV %K algorithms;hyperbolic %K analysis;matrix %K analysis;sequential %K Chambers' %K condition;rounding %K decomposition;backward %K decomposition;numerical %K decomposition;plane %K decompositions;LINPACK %K decompositions;updating %K downdates;sequential %K error %K errors;sequences; %K orthogonal %K rotations;relational %K stability %K stability;roundoff %K stable %K transformations;matrix %K updates;stability;two-sided %X The updating and downdating of Cholesky decompositions has important applications in a number of areas. There is essentially one standard updating algorithm, based on plane rotations, which is backward stable. Three downdating algorithms have been treated in the literature: the LINPACK algorithm, the method of hyperbolic transformations, and Chambers' (1971) algorithm. Although none of these algorithms is backward stable, the first and third satisfy a relational stability condition. It is shown that relational stability extends to a sequence of updates and downdates. In consequence, other things being equal, if the final decomposition in the sequence is well conditioned, it will be accurately computed, even though intermediate decompositions may be almost completely inaccurate. These results are also applied to the two-sided orthogonal decompositions, such as the URV decomposition %B Signal Processing, IEEE Transactions on %V 43 %P 2642 - 2648 %8 1995/11// %@ 1053-587X %G eng %N 11 %R 10.1109/78.482114 %0 Journal Article %J Proc. IFIP 2.6 Visual Databases Systems %D 1995 %T Starfield information visualization with interactive smooth zooming %A Jog,N. %A Shneiderman, Ben %X This paper discusses the design and implementation of interactive smooth zooming of a starfield display (which is a visualization of a multi-attribute database) and introduces the zoom bar, a new widget for zooming and panning. Whereas traditional zoom techniques are based on zooming towards or away from a focal point, this paper introduces a novel approach based on zooming towards or away from a fixed line.Starfield displays plot items from a database as small selectable glyphs using two of the ordinal attributes of the data as the variables along the display axes. One way of filtering this visual information is by changing the range of displayed values on either of the display axes. If this is done incrementally and smoothly, the starfield display appears to zoom in and out, and users can track the motion of the glyphs without getting disoriented by sudden, large changes in context. %B Proc. IFIP 2.6 Visual Databases Systems %P 3 - 14 %8 1995/// %G eng %0 Book Section %B Visual database systems, IIIVisual database systems, III %D 1995 %T Starfield visualization with interactive smooth zooming %A Jogt,NK %A Shneiderman, Ben %X This paper discusses the design and implementation of interactive smooth zooming of a starfield display (which is a visualization of a multi-attribute database) and introduces the zoom bar, a new widget for zooming and panning. Whereas traditional zoom techniques are based on zooming towards or away from a focal point, this paper introduces a novel approach based on zooming towards or away from a fixed line.Starfield displays plot items from a database as small selectable glyphs using two of the ordinal attributes of the data as the variables along the display axes. One way of filtering this visual information is by changing the range of displayed values on either of the display axes. If this is done incrementally and smoothly, the starfield display appears to zoom in and out, and users can track the motion of the glyphs without getting disoriented by sudden, large changes in context. %B Visual database systems, IIIVisual database systems, III %V 3 %P 1 - 1 %8 1995/// %G eng %0 Conference Paper %B Computer Vision, 1995. Proceedings., Fifth International Conference on %D 1995 %T Stochastic completion fields: a neural model of illusory contour shape and salience %A Williams,L. R %A Jacobs, David W. %K boundary %K completion %K computational %K Computer %K contour %K contours; %K convolutions; %K cortex; %K curves %K detection; %K distribution; %K edge %K energy; %K estimation; %K fields; %K fragments; %K geometry; %K illusory %K image %K lattice; %K least %K likelihood %K mammalian %K maximum %K model; %K nets; %K neural %K of %K paths; %K plane; %K probability %K probability; %K random %K recognition; %K shape; %K stimuli; %K Stochastic %K vector-field %K visual %K walk; %X We describe an algorithm and representation level theory of illusory contour shape and salience. Unlike previous theories, our model is derived from a single assumption-namely, that the prior probability distribution of boundary completion shape can be modeled by a random walk in a lattice whose points are positions and orientations in the image plane (i.e. the space which one can reasonably assume is represented by neurons of the mammalian visual cortex). Our model does not employ numerical relaxation or other explicit minimization, but instead relies on the fact that the probability that a particle following a random walk will pass through a given position and orientation on a path joining two boundary fragments can be computed directly as the product of two vector-field convolutions. We show that for the random walk we define, the maximum likelihood paths are curves of least energy, that is, on average, random walks follow paths commonly assumed to model the shape of illusory contours. A computer model is demonstrated on numerous illusory contour stimuli from the literature %B Computer Vision, 1995. Proceedings., Fifth International Conference on %P 408 - 415 %8 1995/06// %G eng %R 10.1109/ICCV.1995.466910 %0 Journal Article %J Computers & Security %D 1995 %T Striving for correctness %A Abrams,Marshall D. %A Zelkowitz, Marvin V %K Assurance %K belief %K correctness %K Formal Methods %K MATHEMATICAL MODELS %K metrics %K Process models %K Risk management %K Security testing %K Silver bullets %K simulation %K Trustworthiness %X In developing information technology, you want assurance that systems are secure and reliable, but you cannot have assurance or security without correctness. We discuss methods used to achieve correctness, focusing on weaknesses and approaches that management might take to increase belief in correctness. Formal methods, simulation, testing, and process modeling are addressed in detail. Structured programming, life-cycle modeling like the spiral model, use of CASE tools, use of formal methods, object-oriented design, reuse of existing code are also mentioned. Reliance on these methods involves some element of belief since no validated metrics on the effectiveness of these methods exist. Suggestions for using these methods as the basis for managerial decisions conclude the paper. %B Computers & Security %V 14 %P 719 - 738 %8 1995/// %@ 0167-4048 %G eng %U http://www.sciencedirect.com/science/article/pii/0167404895000224 %N 8 %R 10.1016/0167-4048(95)00022-4 %0 Journal Article %J ACM Computing Surveys %D 1995 %T Survival of the fittest: the evolution of multimedia user interfaces %A Preece,Jenny %A Shneiderman, Ben %B ACM Computing Surveys %V 27 %P 557 - 559 %8 1995/12// %@ 0360-0300 %G eng %U http://doi.acm.org/10.1145/234782.234789 %N 4 %R 10.1145/234782.234789 %0 Book Section %B SVD and Signal Processing III: Algorithms, Architectures, and ApplicationsSVD and Signal Processing III: Algorithms, Architectures, and Applications %D 1995 %T The SVD in Image Restoration %A O'Leary, Dianne P. %E Moonen,Marc %E DeMoor,Bart %B SVD and Signal Processing III: Algorithms, Architectures, and ApplicationsSVD and Signal Processing III: Algorithms, Architectures, and Applications %I Elsevier %C New York %P 315 - 322 %8 1995/// %G eng %0 Journal Article %J Magnetics, IEEE Transactions on %D 1995 %T Switching as an exit problem %A Korman,C.E. %A Mayergoyz, Issak D %K aftereffect;magnetic %K aftereffect;stochastic %K analysis; %K distribution;viscosity %K force;fluctuations;magnetic %K hysteresis;magnetic %K inputs;switching %K models;coercive %K models;exit %K Preisach %K problem;expected %K switching;numerical %K times %K type %K value;magnetization;model %X Previously, it has been shown that Preisach type models driven by stochastic inputs can be employed to model aftereffect. In this model, the machinery of the ldquo;exit problem rdquo; is instrumental in computing the time evolutions of the expected value and the distributions of switching times. Here, for the first time, we present numerical simulation results of the aforementioned viscosity models and demonstrate that these models can be employed to compute switching times and time evolutions of the expected value of magnetization %B Magnetics, IEEE Transactions on %V 31 %P 3545 - 3547 %8 1995/11// %@ 0018-9464 %G eng %N 6 %R 10.1109/20.489564 %0 Journal Article %J Symmetry: Culture and Science %D 1995 %T Symmetries of natural and artificial neural networks %A Reggia, James A. %B Symmetry: Culture and Science %V 6 %P 446 - 449 %8 1995/// %G eng %0 Journal Article %J Computer-Aided Design %D 1995 %T Systematic approach to analysing the manufacturability of machined parts %A Gupta, Satyandra K. %A Nau, Dana S. %K computer-aided manufacturability analysis %K design for manufacturability %K feature-based models %X The ability to quickly introduce new quality products is a decisive factor in capturing market share. Because of pressing demands to reduce leadtimes, analysing the manufacturability of the proposed design has become an important step in the design stage. The paper presents an approach to analysing the manufacturability of machined parts.Evaluating the manufacturability of a proposed design involves determining whether or not it is manufacturable with a given set of manufacturing operations, and, if it is, finding the associated manufacturing efficiency. Since there can be several different ways to manufacture a proposed design, this requires that different ways to manufacture it be considered, in order to determine which one best meets the design and manufacturing objectives. The first step in the approach is to identify all the machining operations which can potentially be used to create the given design. Using these operations, different operation plans are generated for machining the part. Each time a new operation plan is generated, the user examines whether it can produce the desired shape and tolerances, and calculates its manufacturability rating. If no operation plan can be found that is capable of producing the design, then the given design is considered unmachinable; otherwise, the manufacturability rating for the design is the rating of the best operation plan. The authors expect that, by providing feedback about possible problems with the design, the work described in the paper will help in speeding up the evaluation of new product designs so that it can be decided how or whether to manufacture them. Such a capability will be useful in responding quickly to changing demands and opportunities in the marketplace. %B Computer-Aided Design %V 27 %P 323 - 342 %8 1995/05// %@ 0010-4485 %G eng %U http://www.sciencedirect.com/science/article/pii/001044859596797P %N 5 %R 10.1016/0010-4485(95)96797-P %0 Conference Paper %B Motion of Non-Rigid and Articulated Objects, 1994., Proceedings of the 1994 IEEE Workshop on %D 1994 %T Segmenting independently moving, noisy points %A Jacobs, David W. %A Chennubhotla,C. %K 3D %K common %K consistent %K estimation; %K features; %K image %K independently %K linear %K MOTION %K motion; %K moving %K noisy %K point %K points; %K programming; %K real %K segmentation; %K sequence; %K sequences; %K video %X There has been much work on using point features tracked through a video sequence to determine structure and motion. In many situations, to use this work, we must first isolate subsets of points that share a common motion. This is hard because we must distinguish between independent motions and apparent deviations from a single motion due to noise. We propose several methods of searching for point-sets with consistent 3D motions. We analyze the potential sensitivity of each method for detecting independent motions, and experiment with each method on a real image sequence %B Motion of Non-Rigid and Articulated Objects, 1994., Proceedings of the 1994 IEEE Workshop on %P 96 - 103 %8 1994/11// %G eng %R 10.1109/MNRAO.1994.346249 %0 Journal Article %J Journal of Automated Reasoning %D 1994 %T A Semantics for a class of non-deterministic and causal production system programs %A Raschid, Louiqa %A Lobo,J. %B Journal of Automated Reasoning %V 12 %P 305 - 349 %8 1994/// %G eng %N 3 %0 Conference Paper %B International Conference on Application Specific Array Processors, 1994. Proceedings %D 1994 %T A SIMD solution to the sequence comparison problem on the MGAP %A Borah,M. %A Bajwa,R. S %A Hannenhalli, Sridhar %A Irwin,M. J %K AT-optimal algorithm %K Biological information theory %K biology computing %K biosequence comparison problem %K computational complexity %K Computer science %K Costs %K database size %K Databases %K DNA computing %K dynamic programming %K dynamic programming algorithms %K fine-grained massively parallel processor array %K Genetics %K Heuristic algorithms %K maximally similar sequence %K MGAP parallel computer %K Micro-Grain Array Processor %K Military computing %K molecular biology %K molecular biophysics %K Nearest neighbor searches %K nearest-neighbor connections %K Parallel algorithms %K pipeline processing %K pipelined SIMD solution %K sequence alignment problem %K sequences %X Molecular biologists frequently compare an unknown biosequence with a set of other known biosequences to find the sequence which is maximally similar, with the hope that what is true of one sequence, either physically or functionally, could be true of its analogue. Even though efficient dynamic programming algorithms exist for the problem, when the size of the database is large, the time required is quite long, even for moderate length sequences. In this paper, we present an efficient pipelined SIMD solution to the sequence alignment problem on the Micro-Grain Array Processor (MGAP), a fine-grained massively parallel array of processors with nearest-neighbor connections. The algorithm compares K sequences of length O(M) with the actual sequence of length N, in O(M+N+K) time with O(MN) processors, which is AT-optimal. The implementation on the MGAP computes at the rate of about 0.1 million comparisons per second for sequences of length 128 %B International Conference on Application Specific Array Processors, 1994. Proceedings %I IEEE %P 336 - 345 %8 1994/08/22/24 %@ 0-8186-6517-3 %G eng %R 10.1109/ASAP.1994.331791 %0 Journal Article %J Parallel Processing: CONPAR 94—VAPP VI %D 1994 %T Simplifying polynomial constraints over integers to make dependence analysis more precise %A Maslov,V. %A Pugh, William %B Parallel Processing: CONPAR 94—VAPP VI %P 737 - 748 %8 1994/// %G eng %0 Journal Article %J Solid-State Electronics %D 1994 %T Simulation of the transient characteristics of partially- and fully-depleted SOI MOSFETs %A Tai,Gwo-Chung %A Korman,Can E. %A Mayergoyz, Issak D %X We present a numerical technique which employs a local-in-time initial guess for the transient simulation of SOI MOSFETs. Specifically, the goal of this work is to compute the transient drain current which exhibits overshoot. A critical factor in such computations is the choice of the initial guess at each time point after the gate ramp. Our numerical simulations have shown that the use of the previous time point solution as an initial guess in the Gummel iterations fails to predict the decay in the drain current from its maximum overshoot value. This difficulty is circumvented when the steady-state solution is used as a local-in-time initial guess. We use the diagonally implicit Runge-Kutta method for the time domain discretization. A fixed-point iteration technique is employed for the space domain iterations. To demonstrate the usefulness of the local-in-time method, numerical results of the transient drain current for various device parameters, such as the silicon film doping, silicon film thickness and back-gate bias are presented. %B Solid-State Electronics %V 37 %P 1387 - 1394 %8 1994/07// %@ 0038-1101 %G eng %U http://www.sciencedirect.com/science/article/pii/003811019490197X %N 7 %R 10.1016/0038-1101(94)90197-X %0 Journal Article %J Journal of Parallel and Distributed computing %D 1994 %T A simulation-based study on the concurrent execution of rules in a database environment %A Raschid, Louiqa %A Sellis,T. %A Delis,A. %B Journal of Parallel and Distributed computing %V 20 %P 20 - 42 %8 1994/// %G eng %N 1 %0 Journal Article %J Mol Biol Evol %D 1994 %T Slipped-strand mispairing in a plastid gene: ıt rpoC2 in grasses (Poaceae) %A Cummings, Michael P. %A King,L. M %A Kellogg,E. A %X An exception to the generally conservative nature of plastid gene evolution is the gene coding for the beta" subunit of RNA polymerase, rpoC2. Previous work by others has shown that maize and rice have an insertion in the coding region of rpoC2, relative to spinach and tobacco. To assess the distribution of this extra coding sequence, we surveyed a broad phylogenetic sample comprising 55 species from 17 angiosperm families by using Southern hybridization. The extra coding sequence is restricted to the grasses (Poaceae). DNA sequence analysis of 11 species from all five subfamilies within the grass family demonstrates that the extra sequence in the coding region of rpoC2 is a repetitive array that exhibits more than a twofold increase in nucleotide substitution, as well as a large number of insertion/deletion events, relative to the adjacent flanking sequences. The structure of the array suggests that slipped-strand mispairing causes the repeated motifs and adds to the mechanisms through which the coding sequence of plastid genes are known to evolve. Phylogenetic analyses based on the sequence data from grass species support several relationships previously suggested by morphological work, but they are ambiguous about broad relationships within the family. %B Mol Biol Evol %V 11 %P 1 - 8 %8 1994/01// %G eng %N 1 %0 Report %D 1994 %T Software Process Improvement in the NASA Software Engineering Laboratory. %A McGarry,Frank %A Pajerski,Rose %A Page,Gerald %A Waligora,Sharon %A Basili, Victor R. %K *AWARDS %K *SOFTWARE ENGINEERING %K *SYSTEMS ANALYSIS %K *WORK MEASUREMENT %K ADMINISTRATION AND MANAGEMENT %K COMPUTER PROGRAMMING AND SOFTWARE %K COMPUTER PROGRAMS %K COMPUTERS %K data acquisition %K ENVIRONMENTS %K EXPERIMENTAL DATA %K GROUND SUPPORT. %K measurement %K Organizations %K PE63756E %K Production %K SOFTWARE PROCESS IMPROVEMENT %K SPI(SOFTWARE PROCESS IMPROVEMENT) %K SPN-19950120014 %X The Software Engineering Laboratory (SEL) was established in 1976 for the purpose of studying and measuring software processes with the intent of identifying improvements that could be applied to the production of ground support software within the Flight Dynamics Division (FDD) at the National Aeronautics and Space Administration (NASA)/Goddard Space Flight Center (GSFC). The SEL has three member organizations: NASA/GSFC, the University of Maryland, and Computer Sciences Corporation (CSC). The concept of process improvement within the SEL focuses on the continual understanding of both process and product as well as goal-driven experimentation and analysis of process change within a production environment. %I CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INSTITUTE %8 1994/12// %G eng %U http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA289912 %0 Book Section %B Dependable Computing — EDCC-1 %D 1994 %T Software reliability analysis of three successive generations of a Switching System %A Kaâniche,M. %A Kanoun,K. %A Michel Cukier %A Martini,M. %E Echtle,Klaus %E Hammer,Dieter %E Powell,David %K Computer science %X Most current approaches to software reliability evaluation are based on data collected on a single generation of products. However, many applications are developed through improvements of the existing software: to the families of products are added various generations as the need for new functionalities arises. Experimental studies dealing with the analysis of data collected on families of products are seldom reported. In this paper, we analyze the data (failure and correction reports) collected on the software of three successive generations of the Brazilian Switching System — TROPICO-R, during validation and operation. A comparative analysis of the three products is done and the main results are outlined. Emphasis is placed on the evolution of the software and the corresponding failures and corrected faults. The analysis addresses: i) the modifications introduced on system components, ii) the distribution of failures and corrected faults in the components and the functions fulfilled by the system, and iii) the evolution of the failure intensity functions. %B Dependable Computing — EDCC-1 %S Lecture Notes in Computer Science %I Springer Berlin / Heidelberg %V 852 %P 471 - 490 %8 1994/// %@ 978-3-540-58426-1 %G eng %U http://www.springerlink.com/content/f71g30v177521471/abstract/ %0 Book %D 1994 %T Software Specification: A Comparison of Formal Methods %A Gannon,John D. %A Purtilo,James %A Zelkowitz, Marvin V %K Computer software %K Computer software/ Specifications %K Computers / General %K Computers / Programming / General %K Formal methods (Computer science) %K software engineering %K specifications %I Intellect Books %8 1994/// %@ 9781567500332 %G eng %0 Book Section %B Recent Advances in Iterative MethodsRecent Advances in Iterative Methods %D 1994 %T Some Themes in Gene H.Golub's Work on Iterative Methods %A O'Leary, Dianne P. %E Golub, Gene H. %E Greenbaum,Anne %E Luskin,Mitchell %B Recent Advances in Iterative MethodsRecent Advances in Iterative Methods %I Springer-Verlag IMA Volumes in Mathematics and Its Applications %C New York %V 60 %P 1 - 11 %8 1994/// %G eng %0 Journal Article %J International Journal of Computer Vision %D 1994 %T Space variant image processing %A Wallace,R.S. %A Ong,P.W. %A Bederson, Benjamin B. %A Schwartz,E.L. %B International Journal of Computer Vision %V 13 %P 71 - 90 %8 1994/// %G eng %N 1 %0 Journal Article %J Journal of Parallel and Distributed Computing %D 1994 %T Special issue on data parallel algorithms and programming %A JaJa, Joseph F. %A Wang,Pearl Y. %B Journal of Parallel and Distributed Computing %V 21 %P 1 - 3 %8 1994/04// %@ 0743-7315 %G eng %U http://dx.doi.org/10.1006/jpdc.1994.1037 %N 1 %R 10.1006/jpdc.1994.1037 %0 Journal Article %J ACM Transactions on Computer-Human Interaction %D 1994 %T Split menus: effectively using selection frequency to organize menus %A Sears,Andrew %A Shneiderman, Ben %K Human-computer interaction %K menus %K selection frequency %K split menus %K user interface %X When some items in a menu are selected more frequently than others, as is often the case, designers or individual users may be able to speed performance and improve preference ratings by placing several high-frequency items at the top of the menu. Design guidelines for split menus were developed and applied. Split menus were implemented and tested in two in situ usability studies and a controlled experiment. In the usability studies performance times were reduced by 17 to 58% depending on the site and menus. In the controlled experiment split menus were significantly faster than alphabetic menus and yielded significantly higher subjective preferences. A possible resolution to the continuing debate among cognitive theorists about predicting menu selection times is offered. We conjecture and offer evidence that, at least when selecting items from pull-down menus, a logarithmic model applies to familiar (high-frequency) items, and a linear model to unfamiliar (low-frequency) items. %B ACM Transactions on Computer-Human Interaction %V 1 %P 27 - 51 %8 1994/03// %@ 1073-0516 %G eng %U http://doi.acm.org/10.1145/174630.174632 %N 1 %R 10.1145/174630.174632 %0 Journal Article %J ACM Transactions on Programming Languages and SystemsACM Trans. Program. Lang. Syst. %D 1994 %T Static analysis of upper and lower bounds on dependences and parallelism %A Pugh, William %A Wonnacott,David %B ACM Transactions on Programming Languages and SystemsACM Trans. Program. Lang. Syst. %V 16 %P 1248 - 1278 %8 1994/07// %@ 01640925 %G eng %U http://dl.acm.org/citation.cfm?id=183525 %N 4 %R 10.1145/183432.183525 %0 Journal Article %J International Journal of Computer Vision %D 1994 %T A study of affine matching with bounded sensor error %A Grimson,W. E.L %A Huttenlocher,D. P %A Jacobs, David W. %X Affine transformations of the plane have been used in a number of model-based recognition systems. Because the underlying mathematics are based on exact data, in practice various heuristics are used to adapt the methods to real data where there is positional uncertainty. This paper provides a precise analysis of affine point matching under uncertainty. We obtain an expression for the range of affine-invariant values that are consistent with a given set of four points, where each image point lies in an isin-disc of uncertainty. This range is shown to depend on the actualx-y-positions of the data points. In other words, given uncertainty in the data there are no representations that are invariant with respect to the Cartesian coordinate system of the data. This is problematic for methods, such as geometric hashing, that are based on affine-invariant representations. We also analyze the effect that uncertainty has on the probability that recognition methods using affine transformations will find false positive matches. We find that there is a significant probability of false positives with even moderate levels of sensor error, suggesting the importance of good verification techniques and good grouping techniques. %B International Journal of Computer Vision %V 13 %P 7 - 32 %8 1994/// %G eng %N 1 %R 10.1007/BF01420793 %0 Journal Article %J GeneticsGenetics %D 1994 %T Suppressor U1 snRNAs in Drosophila. %A Lo,P. C. %A Roy,D. %A Mount, Stephen M. %X Although the role of U1 small nuclear RNAs (snRNAs) in 5' splice site recognition is well established, suppressor U1 snRNAs active in intact multicellular animals have been lacking. Here we describe suppression of a 5' splice site mutation in the Drosophila melanogaster white gene (w(DR18)) by compensatory changes in U1 snRNA. Mutation of positions -1 and +6 of the 5' splice site of the second intron (ACG|GTGACT to ACC|GTGAGC) results in the accumulation of RNA retaining this 74-nucleotide intron in both transfected cells and transgenic flies. U1-3G, a suppressor U1 snRNA which restores basepairing at position +6 of the mutant intron, increases the ratio of spliced to unspliced w(DR18) RNA up to fivefold in transfected Schneider cells and increases eye pigmentation in w(DR18) flies. U1-9G, which targets position -1, suppresses w(DR18) in transfected cells less well. U1-3G,9G has the same effect as U1-3G although it accumulates to lower levels. Suppression of w(DR18) has revealed that the U1b embryonic variant (G134 to U) is active in Schneider cells and pupal eye discs. However, the combination of 9G with 134U leads to reduced accumulation of both U1b-9G and U1b-3G,9G, possibly because nucleotides 9 and 134 both participate in a potential long-range intramolecular base-pairing interaction. High levels of functional U1-3G suppressor reduce both viability and fertility in transformed flies. These results show that, despite the difficulties inherent in stably altering splice site selection in multicellular organisms, it is possible to obtain suppressor U1 snRNAs in flies. %B GeneticsGenetics %V 138 %P 365 - 378 %8 1994/10/01/ %@ 0016-6731, 1943-2631 %G eng %U http://www.genetics.org/content/138/2/365 %N 2 %0 Conference Paper %B Proceedings of the twenty-sixth annual ACM symposium on Theory of computing %D 1994 %T Symmetry breaking for suffix tree construction %A Sahinalp,S. C %A Vishkin, Uzi %B Proceedings of the twenty-sixth annual ACM symposium on Theory of computing %P 300 - 309 %8 1994/// %G eng %0 Journal Article %J IEEE Transactions on Pattern Analysis and Machine Intelligence %D 1994 %T A syntactic approach to scale-space-based corner description %A Fermüller, Cornelia %A Kropatsch,W. %K Computer vision %K corner detection %K curvature extrema %K edge detection %K IMAGE PROCESSING %K image resolution %K Image segmentation %K Laboratories %K Large-scale systems %K PARALLEL PROCESSING %K pattern recognition %K planar curves %K resolution %K Sampling methods %K sampling problems %K scale space based corner description %K SHAPE %K Smoothing methods %K syntactic approach %X Planar curves are described by information about corners integrated over various levels of resolution. The detection of corners takes place on a digital representation. To compensate for ambiguities arising from sampling problems due to the discreteness, results about the local behavior of curvature extrema in continuous scale-space are employed %B IEEE Transactions on Pattern Analysis and Machine Intelligence %V 16 %P 748 - 751 %8 1994/07// %@ 0162-8828 %G eng %N 7 %R 10.1109/34.297957 %0 Book Section %B Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction %D 1993 %T Scheduling home control devices: a case study of the transition from the research project to a product %A Plaisant, Catherine %A Shneiderman, Ben %A Battagtia,J. %B Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction %I Intellect Books %P 205 - 205 %8 1993/// %@ 9781567500783 %G eng %0 Journal Article %J The Journal of VLSI Signal Processing %D 1993 %T Scheduling synchronous dataflow graphs for efficient looping %A Bhattacharyya, Shuvra S. %A Lee,E. A %B The Journal of VLSI Signal Processing %V 6 %P 271 - 288 %8 1993/// %G eng %N 3 %0 Conference Paper %B Proceedings of the workshop on Human Language Technology %D 1993 %T Semantic classes and syntactic ambiguity %A Resnik, Philip %B Proceedings of the workshop on Human Language Technology %P 278 - 283 %8 1993/// %G eng %0 Journal Article %J Science %D 1993 %T Simple systems that exhibit template-directed replication %A Reggia, James A. %A Armentrout,S. L %A Chou,H. H. %A Peng,Y. %B Science %V 259 %P 1282 - 1287 %8 1993/// %G eng %0 Conference Paper %B Proc. Common Sense %D 1993 %T Situated reasoning within tight deadlines and realistic space and computation bounds %A Nirkhe,M. %A Kraus,S. %A Perlis, Don %B Proc. Common Sense %V 93 %8 1993/// %G eng %0 Conference Paper %B Proceedings of the 6th international conference on Industrial and engineering applications of artificial intelligence and expert systems %D 1993 %T SOCAP: lessons learned in automating military operations planning %A Desimone,R. %A Wilkins,D. E. %A Bienkowski,M. %A desJardins, Marie %B Proceedings of the 6th international conference on Industrial and engineering applications of artificial intelligence and expert systems %S IEA/AIE'93 %I Gordon & Breach Science Publishers %P 384 - 393 %8 1993/// %@ 2-88124-604-4 %G eng %U http://dl.acm.org/citation.cfm?id=1114022.1114082 %0 Book %D 1993 %T Sparks of innovation in human-computer interaction %A Shneiderman, Ben %K Computers / Interactive & Multimedia %K Computers / Social Aspects / Human-Computer Interaction %K Human-computer interaction %X These key papers from the 10th anniversary of the Human-Computer Interaction Laboratory (HCIL) at the University of Maryland, exemplify different research methodologies, and show the maturation of human-computer interaction research. The first section introduces how HCIL does what they do, including some of their failures and background stories that are not appropriate for journal papers. This book is a tribute to the faculty, staff, visitors, and students who have shared in a decade of work. %I Intellect Books %8 1993/// %@ 9781567500783 %G eng %0 Journal Article %J Molecular and Cellular BiologyMol. Cell. Biol. %D 1993 %T Species-specific signals for the splicing of a short Drosophila intron in vitro. %A Guo,M. %A Lo,P. C. %A Mount, Stephen M. %X The effects of branchpoint sequence, the pyrimidine stretch, and intron size on the splicing efficiency of the Drosophila white gene second intron were examined in nuclear extracts from Drosophila and human cells. This 74-nucleotide intron is typical of many Drosophila introns in that it lacks a significant pyrimidine stretch and is below the minimum size required for splicing in human nuclear extracts. Alteration of sequences of adjacent to the 3' splice site to create a pyrimidine stretch was necessary for splicing in human, but not Drosophila, extracts. Increasing the size of this intron with insertions between the 5' splice site and the branchpoint greatly reduced the efficiency of splicing of introns longer than 79 nucleotides in Drosophila extracts but had an opposite effect in human extracts, in which introns longer than 78 nucleotides were spliced with much greater efficiency. The white-apricot copia insertion is immediately adjacent to the branchpoint normally used in the splicing of this intron, and a copia long terminal repeat insertion prevents splicing in Drosophila, but not human, extracts. However, a consensus branchpoint does not restore the splicing of introns containing the copia long terminal repeat, and alteration of the wild-type branchpoint sequence alone does not eliminate splicing. These results demonstrate species specificity of splicing signals, particularly pyrimidine stretch and size requirements, and raise the possibility that variant mechanisms not found in mammals may operate in the splicing of small introns in Drosophila and possibly other species. %B Molecular and Cellular BiologyMol. Cell. Biol. %V 13 %P 1104 - 1118 %8 1993/02/01/ %@ 0270-7306, 1098-5549 %G eng %U http://mcb.asm.org/content/13/2/1104 %N 2 %R 10.1128/MCB.13.2.1104 %0 Journal Article %J International Journal of Man-Machine Studies %D 1993 %T Speech versus mouse commands for word processing: an empirical evaluation %A Karl,Lewis R. %A Pettey,Michael %A Shneiderman, Ben %X Despite advances in speech technology, human factors research since the late 1970s has provided only weak evidence that automatic speech recognition devices are superior to conventional input devices such as keyboards and mice. However, recent studies indicate that there may be advantages to providing an additional input channel based on speech input to supplement the more common input modes. Recently the authors conducted an experiment to demonstrate the advantages of using speech-activated commands over mouse-activated commands for word processing applications when, in both cases, the keyboard is used for text entry and the mouse for direct manipulation. Sixteen experimental subjects, all professionals and all but one novice users of speech input, performed four simple word processing tasks using both input groups in this counterbalanced experiment. Performance times for all tasks were significantly faster when using speech to activate commands as opposed to using the mouse. On average, the reduction in task time due to using speech was 18·7%. The error rates due to subject mistakes were roughly the same for both input groups, and recognition errors, averaged over all the tasks, occurred for 6·3% of the speech-activated commands. Subjects made significantly more memorization errors when using speech as compared with the mouse for command activation. Overall, the subjects reacted positively to using speech input and preferred it over the mouse for command activation; however, they also voiced concerns about recognition accuracy, the interference of background noise, inadequate feedback and slow response time. The authors believe that the results of the experiment provide evidence for the utility of speech input for command activation in application programs. %B International Journal of Man-Machine Studies %V 39 %P 667 - 687 %8 1993/10// %@ 0020-7373 %G eng %U http://www.sciencedirect.com/science/article/pii/S0020737383710783 %N 4 %R 10.1006/imms.1993.1078 %0 Conference Paper %B Proceedings of the Workshop on Very Large Corpora: Academic and Industrial Perspectives %D 1993 %T Structural ambiguity and conceptual relations %A Resnik, Philip %A Hearst,M. %B Proceedings of the Workshop on Very Large Corpora: Academic and Industrial Perspectives %P 58 - 64 %8 1993/// %G eng %0 Journal Article %J Sparks of innovation in human-computer interaction %D 1993 %T A study of file manipulation by novices using commands vs, direct manipulation %A Margono,S. %A Shneiderman, Ben %B Sparks of innovation in human-computer interaction %P 39 - 39 %8 1993/// %G eng %0 Report %D 1993 %T A Systematic Approach for Analyzing the Manufacturability of Machined Parts %A Gupta, Satyandra K. %A Nau, Dana S. %K Automation %K computer aided manufacturing %K Feature extraction %K manufacturability %K Systems Integration %X The ability to quickly introduce new quality products is a decisive factor in capturing market share. Because of pressing demands to reduce lead time, analyzing the manufacturability of the proposed design has become an important step in the design stage. This paper presents an approach for analyzing the manufacturability of machined parts.

Evaluating the manufacturability of a proposed design involves determining whether or not it is manufacturable with a given set of manufacturing operations - and if so, then finding the associated manufacturing efficiency. Since there can be several different ways to manufacture a proposed design, this requires us to consider different ways to manufacture it, in order to determine which one best meets the design and manufacturing objectives.

The first step in our approach is to identify all machining operations which can potentially be used to create the given design. Using these operations, we generate different operation plans for machining the part. Each time we generate a new operation plan, we examine whether it can produce the desired shape and tolerances, and calculate its manufacturability rating. If no operation plan can be found that is capable of producing the design, then the given design is considered unmachinable; otherwise, the manufacturability rating for the design is the rating of the best operation plan.

We anticipate that by providing feedback about possible problems with the design, this work will help in speeding up the evaluation of new product designs in order to decide how or whether to manufacture them. Such a capability will be useful in responding quickly to changing demands and opportunities in the marketplace. %I Institute for Systems Research, University of Maryland, College Park %V ISR; TR 1993-76 %8 1993/// %G eng %U http://drum.lib.umd.edu//handle/1903/5420 %0 Journal Article %J The Journal of VLSI Signal Processing %D 1993 %T Systolic architectures for finite-state vector quantization %A Kolagotla,R. K. %A Yu,S. S. %A JaJa, Joseph F. %X We present a new systolic architecture for implementing Finite State Vector Quantization in real-time for both speech and image data. This architecture is modular and has a very simple control flow. Only one processor is needed for speech compression. A linear array of processors is used for image compression; the number of processors needed is independent of the size of the image. We also present a simple architecture for converting line-scanned image data into the format required by this systolic architecture. Image data is processed at a rate of 1 pixel per clock cycle. An implementation at 31.5 MHz can quantize 1024×1024 pixel images at 30 frames/sec in real-time. We describe a VLSI implementation of these processors. %B The Journal of VLSI Signal Processing %V 5 %P 249 - 259 %8 1993/// %G eng %N 2 %R 10.1007/BF01581299 %0 Journal Article %J International Journal of Man-Machine Studies %D 1992 %T Scheduling home control devices: design issues and usability evaluation of four touchscreen interfaces %A Plaisant, Catherine %A Shneiderman, Ben %X This article describes four different user interfaces supporting scheduling two-state (ON/OFF) devices over time periods ranging from minutes to days. The touchscreen-based user interfaces including a digital 12-h clock, 24-h linear and 24-h dial prototypes are described and compared on a feature by feature basis. A formative usability test with 14 subjects, feedback from more than 30 reviewers, and the flexibility to add functions favour the 24-h linear version. %B International Journal of Man-Machine Studies %V 36 %P 375 - 393 %8 1992/03// %@ 0020-7373 %G eng %U http://www.sciencedirect.com/science/article/pii/002073739290040R %N 3 %R 10.1016/0020-7373(92)90040-R %0 Conference Paper %B Workshop on Deductive Databases, JICSLP %D 1992 %T Semantics for Rule-based Programs that Express Non-determinism, Causality and Exception Handling Behavior %A Raschid, Louiqa %B Workshop on Deductive Databases, JICSLP %P 163 - 174 %8 1992/// %G eng %0 Report %D 1992 %T Simple systems exhibiting self-directed replication: annex of transition functions and software documentation %A Reggia, James A. %A Chou,Hui-Hsien %A Armentrout,Steven L. %A Peng,Yun %I University of Maryland at College Park %C College Park, MD, USA %8 1992/// %G eng %0 Conference Paper %B Proceedings of the Twenty-Third Annual Modeling and Simulation Conference %D 1992 %T Simulating Pressure Variations in Handwriting %A David Doermann %A Varma,V. %B Proceedings of the Twenty-Third Annual Modeling and Simulation Conference %C Pittsburgh, PA %P 2141 - 2148 %8 1992/// %G eng %0 Report %D 1992 %T Six Generations of Building Walkthrough: Final Technical Report to the National Science Foundation %A Brooks,Frederick P. %A Airey,John %A Alspaugh,John %A Bell,Andrew %A Brown,Randolph %A Hill,Curtis %A Nimscheck,Uwe %A Rheingans,Penny %A Rohlf,John %A Smith,Dana %A Turner,Douglass %A Varshney, Amitabh %A Wang,Yulan %A Weber,Hans %A Yuan,Xialin %I University of North Carolina at Chapel Hill %C Chapel Hill, NC, USA %8 1992/// %G eng %0 Journal Article %J ACM SIGCHI Bulletin %D 1992 %T Socially responsible computing I: a call to action following the LA riots %A Shneiderman, Ben %B ACM SIGCHI Bulletin %V 24 %P 14 - 15 %8 1992/// %G eng %N 3 %0 Journal Article %J ACM SIGCHI Bulletin %D 1992 %T Socially responsible computing II: first steps on the path to positive contributions %A Shneiderman, Ben %X Now that we are past the initial emotional responses to the LA riots, maybe we can use these tragic events as a stimulus for innovative and constructive efforts. Computing professionals have been active in social causes on an individual basis and in some large projects, but with the growing maturity of our industry we can promote larger initiatives and accept greater responsibility. %B ACM SIGCHI Bulletin %V 24 %P 16 - 17 %8 1992/07// %@ 0736-6906 %G eng %U http://doi.acm.org/10.1145/134421.134432 %N 3 %R 10.1145/134421.134432 %0 Journal Article %J Computer Science Technical Report Series; Vol. CS-TR-2991 %D 1992 %T Software approaches to segmentation analysis %A D'Autrechy,C. L %A Reggia, James A. %A Berndt,R. S %B Computer Science Technical Report Series; Vol. CS-TR-2991 %P 24 - 24 %8 1992/// %G eng %0 Conference Paper %B Computer Vision and Pattern Recognition, 1992. Proceedings CVPR '92., 1992 IEEE Computer Society Conference on %D 1992 %T Space efficient 3-D model indexing %A Jacobs, David W. %K 3-D %K error;table %K features;sensing %K indexing;3-D %K lookup; %K lookup;image %K model %K point %K processing;table %X It is shown that the set of 2-D images produced by a group of 3-D point features of a rigid model can be optimally represented with two lines in two high-dimensional spaces. This result is used to match images and model groups by table lookup. The table is efficiently built and accessed through analytic methods that account for the effect of sensing error. In real images, it reduces the set of potential matches by a factor of several thousand. This representation of a model's images is used to analyze two other approaches to recognition. It is determined when invariants exist in several domains, and it is shown that there is an infinite set of qualitatively similar nonaccidental properties %B Computer Vision and Pattern Recognition, 1992. Proceedings CVPR '92., 1992 IEEE Computer Society Conference on %P 439 - 444 %8 1992/06// %G eng %R 10.1109/CVPR.1992.223153 %0 Journal Article %J Nucleic Acids ResearchNucl. Acids Res. %D 1992 %T Splicing signals in Drosophila: intron size, information content, and consensus sequences %A Mount, Stephen M. %A Burks,Christian %A Herts,Gerald %A Stormo,Gary D. %A White,Owen %A Fields,Chris %X A database of 209 Drosophila Introns was extracted from Genbank (release number 64.0) and examined by a number of methods in order to characterize features that might serve as signals for messenger RNA splicing. A tight distribution of sizes was observed: while the smallest introns in the database are 51 nucleotides, more than half are less than 80 nucleotides in length, and most of these have lengths in the range of 59 – 67 nucleotides. Drosophila splice sites found in large and small introns differ in only minor ways from each other and from those found in vertebrate Introns. However, larger introns have greater pyrimidlne-richness in the region between 11 and 21 nucleotides upstream of 3′ splice sites. The Drosophila branchpoint consensus matrix resembles C T A A T (in which branch formation occurs at the underlined A), and differs from the corresponding mammalian signal in the absence of G at the position immediately preceding the branchpoint. The distribution of occurrences of this sequence suggests a minimum distance between 5′ splice shies and branchpoints of about 38 nucleotides, and a minimum distance between 3′ splice sites and branchpoints of 15 nucleotides. The methods we have used detect no information in exon sequences other than in the few nucleotides immediately adjacent to the splice sites. However, Drosophila resembles many other species in that there is a discontinuity in A + T content between exons and introns, which are A + T rich. %B Nucleic Acids ResearchNucl. Acids Res. %V 20 %P 4255 - 4262 %8 1992/08/25/ %@ 0305-1048, 1362-4962 %G eng %U http://nar.oxfordjournals.org/content/20/16/4255 %N 16 %R 10.1093/nar/20.16.4255 %0 Journal Article %J Computer %D 1992 %T Standards-are software engineering process standards really necessary? %A Zelkowitz, Marvin V %A Buckley,F.J. %K conformance %K engineering %K engineering;standards; %K process %K standards;software %K statements;product %K testing;policy %X The need for software engineering process standards-as opposed to product standards-is discussed from two different viewpoints. M.V. Zelkowitz states that process standards are generally written as policy statements on how to conduct certain processes. As such, they give the framework of the underlying model, but not enough guidance to specify details. They are fuzzy and hard to implement, and they make conformance testing extremely difficult. F.J. Buckley responds to several significant issues raised in Zelkowitz's arguments %B Computer %V 25 %P 82 - 84 %8 1992/11// %@ 0018-9162 %G eng %N 11 %R 10.1109/2.166422 %0 Journal Article %J ACM Transactions on Information Systems %D 1992 %T Structural analysis of hypertexts: identifying hierarchies and useful metrics %A Botafogo,Rodrigo A. %A Rivlin,Ehud %A Shneiderman, Ben %K graph theory %K hierarchies %K hypertext %K metrics %K structural analysis %X Hypertext users often suffer from the “lost in hyperspace” problem: disorientation from too many jumps while traversing a complex network. One solution to this problem is improved authoring to create more comprehensible structures. This paper proposes several authoring tools, based on hypertext structure analysis.In many hypertext systems authors are encouraged to create hierarchical structures, but when writing, the hierarchy is lost because of the inclusion of cross-reference links. The first part of this paper looks at ways of recovering lost hierarchies and finding new ones, offering authors different views of the same hypertext. The second part helps authors by identifying properties of the hypertext document. Multiple metrics are developed including compactness and stratum. Compactness indicates the intrinsic connectedness of the hypertext, and stratum reveals to what degree the hypertext is organized so that some nodes must be read before others. Several existing hypertexts are used to illustrate the benefits of each technique. The collection of techniques provides a multifaceted view of the hypertext, which should allow authors to reduce undesired structural complexity and create documents that readers can traverse more easily. %B ACM Transactions on Information Systems %V 10 %P 142 - 180 %8 1992/04// %@ 1046-8188 %G eng %U http://doi.acm.org/10.1145/146802.146826 %N 2 %R 10.1145/146802.146826 %0 Journal Article %J Computer Vision—ECCV'92 %D 1992 %T A study of affine matching with bounded sensor error %A Grimson,W. %A Huttenlocher,D. %A Jacobs, David W. %X Affine transformations of the plane have been used by modelbased recognition systems to approximate the effects of perspective projection. Because the underlying mathematics are based on exact data, in practice various heuristics are used to adapt the methods to real data where there is positional uncertainty. This paper provides a precise analysis of affine point matching under uncertainty. We obtain an expression for the range of affine-invariant values consistent with a given set of four points, where each data point lies in an exist-disc. This range is shown to depend on the actual x- y-positions of the data points. Thus given uncertainty in the data, the representation is no longer invariant with respect to the Cartesian coordinate system. This is problematic for methods, such as geometric hashing, that depend on the invariant properties of the representation. We also analyze the effect that uncertainty has on the probability that recognition methods using affine transformations will find false positive matches. We find that such methods will produce false positives with even moderate levels of sensor error. %B Computer Vision—ECCV'92 %P 291 - 306 %8 1992/// %G eng %R 10.1007/3-540-55426-2_34 %0 Conference Paper %B Proceedings of the SIGCHI conference on Human factors in computing systems: Reaching through technology %D 1991 %T Scheduling on-off home control devices %A Plaisant, Catherine %A Shneiderman, Ben %B Proceedings of the SIGCHI conference on Human factors in computing systems: Reaching through technology %S CHI '91 %I ACM %C New York, NY, USA %P 459 - 460 %8 1991/// %@ 0-89791-383-3 %G eng %U http://doi.acm.org/10.1145/108844.109002 %R 10.1145/108844.109002 %0 Conference Paper %B ACM Transactions on Database Systems %D 1991 %T Semantics for update rule programs and implementation in a relational database management system %A Raschid, Louiqa %A Lobo,J. %B ACM Transactions on Database Systems %8 1991/// %G eng %0 Report %D 1991 %T Solving divergences in machine translation %A Dorr, Bonnie J %I University of Maryland at College Park %C College Park, MD, USA %8 1991/// %G eng %0 Journal Article %J Pattern Analysis and Machine Intelligence, IEEE Transactions on %D 1991 %T Space and time bounds on indexing 3D models from 2D images %A Clemens,D. T %A Jacobs, David W. %K 2D %K bounds;time %K bounds;visual %K extraction;grouping %K features;model %K features;model-based %K images;3D %K indexing;feature %K model %K operation;image %K pattern %K picture %K processing; %K recognition %K recognition;computerised %K recognition;space %K systems;computerised %X Model-based visual recognition systems often match groups of image features to groups of model features to form initial hypotheses, which are then verified. In order to accelerate recognition considerably, the model groups can be arranged in an index space (hashed) offline such that feasible matches are found by indexing into this space. For the case of 2D images and 3D models consisting of point features, bounds on the space required for indexing and on the speedup that such indexing can achieve are demonstrated. It is proved that, even in the absence of image error, each model must be represented by a 2D surface in the index space. This places an unexpected lower bound on the space required to implement indexing and proves that no quantity is invariant for all projections of a model into the image. Theoretical bounds on the speedup achieved by indexing in the presence of image error are also determined, and an implementation of indexing for measuring this speedup empirically is presented. It is found that indexing can produce only a minimal speedup on its own. However, when accompanied by a grouping operation, indexing can provide significant speedups that grow exponentially with the number of features in the groups %B Pattern Analysis and Machine Intelligence, IEEE Transactions on %V 13 %P 1007 - 1017 %8 1991/10// %@ 0162-8828 %G eng %N 10 %R 10.1109/34.99235 %0 Journal Article %J International Journal of Intelligent Systems %D 1991 %T Stop the world—I want to think %A Perlis, Don %A Elgot-Drapkin,J. J %A Miller,M. %B International Journal of Intelligent Systems %V 6 %P 443 - 456 %8 1991/// %G eng %N 4 %0 Journal Article %J Automata, Languages and Programming %D 1991 %T Structural parallel algorithmics %A Vishkin, Uzi %B Automata, Languages and Programming %P 363 - 380 %8 1991/// %G eng %0 Journal Article %J Genetics %D 1991 %T A superfamily of ıt Arabidopsis thaliana retrotransposons %A Konieczny,A %A Voytas,D. F %A Cummings, Michael P. %A Ausubel,F. M %X We describe a superfamily of Arabidopsis thaliana retrotransposable elements that consists of at least ten related families designated Ta1-Ta10. The Ta1 family has been described previously. Two genomic clones representing the Ta2 and Ta3 elements were isolated from an A. thaliana (race Landsberg erecta) lambda library using sequences derived from the reverse transcriptase region of Ta1 as hybridization probes. Nucleotide sequence analysis showed that the Ta1, Ta2 and Ta3 families share greater than 75% amino acid identity in pairwise comparisons of their reverse transcriptase and RNase H genes. In addition to Ta1, Ta2 and Ta3, we identified seven other related retrotransposon families in Landsberg erecta, Ta4-Ta10, using degenerate primers and the polymerase chain reaction to amplify a highly conserved region of retrotransposon-encoded reverse transcriptase. One to two copies of elements Ta2-Ta10 are present in the genomes of the A. thaliana races Landsberg erecta and Columbia indicating that the superfamily comprises at least 0.1% of the A. thaliana genome. The nucleotide sequences of the reverse transcriptase regions of the ten element families place them in the category of copia-like retrotransposons and phylogenetic analysis of the amino acid sequences suggests that horizontal transfer may have played a role in their evolution. %B Genetics %V 127 %P 801 - 809 %8 1991/04// %G eng %N 4 %0 Journal Article %J Nucleic Acids ResearchNucleic Acids Res %D 1990 %T Sequence of a cDNA from the Drosophila melanogaster white gene. %A Pepling,M %A Mount, Stephen M. %B Nucleic Acids ResearchNucleic Acids Res %V 18 %P 1633 - 1633 %8 1990/03/25/ %@ 0305-1048 %G eng %U http://www.ncbi.nlm.nih.gov/pmc/articles/PMC330539/ %N 6 %0 Journal Article %J Communications of the ACMCommun. ACM %D 1990 %T Skip lists: a probabilistic alternative to balanced trees %A Pugh, William %B Communications of the ACMCommun. ACM %V 33 %P 668 - 676 %8 1990/06// %@ 00010782 %G eng %U http://dl.acm.org/citation.cfm?id=78977, %N 6 %R 10.1145/78973.78977 %0 Conference Paper %B Proceedings of the 28th annual meeting on Association for Computational Linguistics %D 1990 %T Solving thematic divergences in machine translation %A Dorr, Bonnie J %X Though most translation systems have some mechanism for translating certain types of divergent predicate-argument structures, they do not provide a general procedure that takes advantage of the relationship between lexical-semantic structure and syntactic structure. A divergent predicate-argument structure is one in which the predicate (e.g., the main verb) or its arguments (e.g., the subject and object) do not have the same syntactic ordering properties for both the source and target language. To account for such ordering differences, a machine translator must consider language-specific syntactic idiosyncrasies that distinguish a target language from a source language, while making use of lexical-semantic uniformities that tie the two languages together. This paper describes the mechanisms used by the UNITRAN machine translation system for mapping an underlying lexical-conceptual structure to a syntactic structure (and vice versa), and it shows how these mechanisms coupled with a set of general linking routines solve the problem of thematic divergence in machine translation. %B Proceedings of the 28th annual meeting on Association for Computational Linguistics %S ACL '90 %I Association for Computational Linguistics %C Stroudsburg, PA, USA %P 127 - 134 %8 1990/// %G eng %U http://dx.doi.org/10.3115/981823.981840 %R 10.3115/981823.981840 %0 Journal Article %J Molecular and Cellular BiologyMol. Cell. Biol. %D 1990 %T Structure and expression of the Drosophila melanogaster gene for the U1 small nuclear ribonucleoprotein particle 70K protein. %A Mancebo,R. %A Lo,P. C. %A Mount, Stephen M. %X A genomic clone encoding the Drosophila U1 small nuclear ribonucleoprotein particle 70K protein was isolated by hybridization with a human U1 small nuclear ribonucleoprotein particle 70K protein cDNA. Southern blot and in situ hybridizations showed that this U1 70K gene is unique in the Drosophila genome, residing at cytological position 27D1,2. Polyadenylated transcripts of 1.9 and 3.1 kilobases were observed. While the 1.9-kilobase mRNA is always more abundant, the ratio of these two transcripts is developmentally regulated. Analysis of cDNA and genomic sequences indicated that these two RNAs encode an identical protein with a predicted molecular weight of 52,879. Comparison of the U1 70K proteins predicted from Drosophila, human, and Xenopus cDNAs revealed 68% amino acid identity in the most amino-terminal 214 amino acids, which include a sequence motif common to many proteins which bind RNA. The carboxy-terminal half is less well conserved but is highly charged and contains distinctive arginine-rich regions in all three species. These arginine-rich regions contain stretches of arginine-serine dipeptides like those found in transformer, transformer-2, and suppressor-of-white-apricot proteins, all of which have been identified as regulators of mRNA splicing in Drosophila melanogaster. %B Molecular and Cellular BiologyMol. Cell. Biol. %V 10 %P 2492 - 2502 %8 1990/06/01/ %@ 0270-7306, 1098-5549 %G eng %U http://mcb.asm.org/content/10/6/2492 %N 6 %R 10.1128/MCB.10.6.2492 %0 Journal Article %J Genetics %D 1990 %T The structure, distribution and evolution of the ıt Ta1 retrotransposable element family of ıt Arabidopsis thaliana %A Voytas,D. F %A Konieczny,A %A Cummings, Michael P. %A Ausubel,F. M %X The Ta1 elements are a low copy number, copia-like retrotransposable element family of Arabidopsis thaliana. Six Ta1 insertions comprise all of the Ta1 element copies found in three geographically diverse A. thaliana races. These six elements occupy three distinct target sites: Ta1-1 is located on chromosome 5 and is common to all three races (Col-0, Kas-1 and La-0). Ta1-2 is present in two races on chromosome 4 (Kas-1 and La-0), and Ta1-3, also located on chromosome 4, is present only in one race (La-0). The six Ta1 insertions share greater than 96% nucleotide identity, yet are likely to be incapable of further transposition due to deletions or nucleotide changes that alter either the coding capacity of the elements or conserved protein domains required for retrotransposition. Nucleotide sequence comparisons of these elements and the distribution of Ta1 among 12 additional A. thaliana geographical races suggest that Ta1-1 predated the global dispersal of A. thaliana. As the species spread throughout the world, two additional transposition events occurred which gave rise first to Ta1-2 and finally to Ta1-3. %B Genetics %V 126 %P 713 - 721 %8 1990/11// %G eng %N 3 %0 Journal Article %J International Journal of Computer VisionInt J Comput Vision %D 1990 %T Structure from motion using line correspondences %A Spetsakis, Minas E. %A Aloimonos, J. %B International Journal of Computer VisionInt J Comput Vision %V 4 %P 171 - 183 %8 1990/06// %@ 0920-5691 %G eng %U http://www.springerlink.com/content/r4h10053528335k2/ %N 3 %R 10.1007/BF00054994 %0 Conference Paper %B Neural Networks, 1990., 1990 IJCNN International Joint Conference on %D 1990 %T Supervised and reinforced competitive learning %A Sutton III,G. G. %A Reggia, James A. %A Maisog,J. M %B Neural Networks, 1990., 1990 IJCNN International Joint Conference on %P 563 - 567 %8 1990/// %G eng %0 Journal Article %J Computers, IEEE Transactions on %D 1990 %T Systolic architectures for the computation of the discrete Hartley and the discrete cosine transforms based on prime factor decomposition %A Chakrabarti,C. %A JaJa, Joseph F. %K architectures; %K architectures;two-dimensional %K arithmetic;discrete %K arrays;fast %K binary %K cosine %K decomposition;systolic %K design;prime %K factor %K Fourier %K Hartley;discrete %K systolic %K transforms;hardware %K transforms;parallel %X Two-dimensional systolic array implementations for computing the discrete Hartley transform (DHT) and the discrete cosine transform (DCT) when the transform size N is decomposable into mutually prime factors are proposed. The existing two-dimensional formulations for DHT and DCT are modified, and the corresponding algorithms are mapped into two-dimensional systolic arrays. The resulting architecture is fully pipelined with no control units. The hardware design is based on bit serial left to right MSB (most significant bit) to LSB (least significant bit) binary arithmetic %B Computers, IEEE Transactions on %V 39 %P 1359 - 1368 %8 1990/11// %@ 0018-9340 %G eng %N 11 %R 10.1109/12.61045 %0 Conference Paper %B Proceedings of the IFIP WG6 %D 1989 %T A semantics based verification tool for finite state systems %A Cleaveland, Rance %A Parrow,J. %A Steffen,B. %B Proceedings of the IFIP WG6 %V 1 %P 287 - 302 %8 1989/// %G eng %0 Journal Article %J Educational Media International %D 1989 %T Social and Individual Impact %A Shneiderman, Ben %B Educational Media International %V 26 %P 101 - 106 %8 1989/// %@ 0952-3987 %G eng %U http://www.tandfonline.com/doi/abs/10.1080/0952398890260208 %N 2 %R 10.1080/0952398890260208 %0 Conference Paper %B , Conference on Software Maintenance, 1989., Proceedings %D 1989 %T Software metric classification trees help guide the maintenance of large-scale systems %A Selby,R. W %A Porter, Adam %K automated method %K automatic programming %K classification %K Classification tree analysis %K classification trees %K Computer errors %K empirically-based models %K error-prone software objects %K Fault diagnosis %K feasibility study %K high development effort %K Large-scale systems %K multivalued functions %K NASA %K NASA projects %K recursive algorithm %K Software algorithms %K software engineering %K Software maintenance %K Software measurement %K software metrics %K software modules %K Software systems %K trees (mathematics) %X The 80:20 rule states that approximately 20% of a software system is responsible for 80% of its errors. The authors propose an automated method for generating empirically-based models of error-prone software objects. These models are intended to help localize the troublesome 20%. The method uses a recursive algorithm to automatically generate classification trees whose nodes are multivalued functions based on software metrics. The purpose of the classification trees is to identify components that are likely to be error prone or costly, so that developers can focus their resources accordingly. A feasibility study was conducted using 16 NASA projects. On average, the classification trees correctly identified 79.3% of the software modules that had high development effort or faults %B , Conference on Software Maintenance, 1989., Proceedings %I IEEE %P 116 - 123 %8 1989/10/16/19 %@ 0-8186-1965-1 %G eng %R 10.1109/ICSM.1989.65202 %0 Journal Article %J Journal of Computational and Applied Mathematics %D 1989 %T Some aspects of parallel implementation of the finite-element method on message passing architectures %A Babuska, I. %A Elman, Howard %K Finite-element methods %K hp-version %K nested dissection %K parallel computations %K preconditioned conjugate gradient %X We discuss some aspects of implementing the finite-element method on parallel computers with local memory and message passing. In particular, we compare the costs of using high-order and low-order elements and of direct and iterative solvers for solving the linear systems that occur. Our model of parallel computation is a two-dimensional grid of processors chosen to be similar in shape to the underlying grid. Our main conclusions are that use of high-order methods is an effective way to achieve high accuracy for some problems, on both serial and parallel computers, and that such methods provide a natural way to achieve efficiency in parallel implementations. In addition, we show that sparse direct solvers generalize naturally to methods based on high-order elements, and that direct solvers are adequate for two-dimensional problems, especially for multiple load vectors. %B Journal of Computational and Applied Mathematics %V 27 %P 157 - 187 %8 1989/09// %@ 0377-0427 %G eng %U http://www.sciencedirect.com/science/article/pii/0377042789903658 %N 1-2 %R 16/0377-0427(89)90365-8 %0 Report %D 1989 %T Some Brief Essays on Mind %A Perlis, Don %K *ARTIFICIAL INTELLIGENCE %K CYBERNETICS %K HUMANS %K Music %K Robots %X The author tries to explain his view of artificial intelligence, and more broadly how it fits into science as a whole. In doing so, he will not hesitate to indulge in sheer speculation when it seems to fit the topic. He will begin with a negative thought (one that he does not agree with). Consider the statement that, while robots and AI (artificial intelligence) may make great strides in the future, still they never will be able to produce music with the sensitivity of certain humans with great musical talent. (kr) %I ROCHESTER UNIV NY DEPT OF COMPUTER SCIENCE %8 1989/07// %G eng %U http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA213887 %0 Journal Article %J SIAM Review %D 1989 %T Some History of the Conjugate Gradient and Lanczos Algorithms: 1948–1976 %A Golub, Gene H. %A O'Leary, Dianne P. %K Conjugate gradient algorithm %K Lanczos algorithm %K variable metric algorithms %X This paper gives some of the history of the conjugate gradient and Lanczos algorithms and an annotated bibliography for the period 1948-1976 %B SIAM Review %V 31 %P 50 - 102 %8 1989/// %G eng %U http://link.aip.org/link/?SIR/31/50/1 %N 1 %R 10.1137/1031003 %0 Journal Article %J Hypermedia %D 1989 %T A spectrum of automatic hypertext constructions %A Furuta,R. %A Plaisant, Catherine %A Shneiderman, Ben %X We describe our experiences with four separate conversions from paper documents into hypertext and discuss the lessons we have learned. The paper document's organization affects the ease with which it can be converted and the appropriateness of the resu lting hypertext. The form of the paper document's machine-readable `markup' description affects the ability to transform the structure automatically. Designing the link structures that tie together the parts of the hypertext takes special care in automa ting, as badly-designed and incorrectly-formed links destroy the integrity of the hypertext. Overall, each of the conversions followed the same basic methodology, providing the handle for the development of `power tools' that can be applied to simplify s ubsequent conversions. %B Hypermedia %V 1 %P 179 - 195 %8 1989/// %G eng %N 2 %0 Book Section %B Issues in software engineering educationIssues in software engineering education %D 1989 %T A support tool for teaching computer programming %A Zelkowitz, Marvin V %A Kowalchack,B. %A Itkin,D. %A Herman,L. %E Fairley,Richard %E Freeman,Peter %B Issues in software engineering educationIssues in software engineering education %I Springer-Verlag New York, Inc. %C New York, NY, USA %P 139 - 167 %8 1989/// %@ 0-387-96840-7 %G eng %U http://dl.acm.org/citation.cfm?id=73064.73074 %0 Journal Article %J Information Processing & Management %D 1988 %T Selection devices for user of an electronic encyclopedia: An empirical comparison of four possibilities %A Ostroff,Daniel %A Shneiderman, Ben %X This study measured the speed, error rates, and subjective evaluation of arrow-jump keys, a jump-mouse, number keys, and a touch screen in an interactive encyclopedia. A summary of previous studies comparing selection devices and strategies is presented to provide the background for this study. We found the touch screen to be the fastest in time, the least accurate but the overall favorite of the participants. The results are discussed and improvements are suggested accordingly. %B Information Processing & Management %V 24 %P 665 - 680 %8 1988/// %@ 0306-4573 %G eng %U http://www.sciencedirect.com/science/article/pii/0306457388900040 %N 6 %R 10.1016/0306-4573(88)90004-0 %0 Journal Article %J Proceedings of the IEEE %D 1988 %T Self-processing networks and their biomedical implications %A Reggia, James A. %A Sutton III,G. G. %B Proceedings of the IEEE %V 76 %P 680 - 692 %8 1988/// %G eng %N 6 %0 Journal Article %J International journal of computer vision %D 1988 %T Shape from patterns: Regularization %A Aloimonos, J. %A Swain, M. %B International journal of computer vision %V 2 %P 171 - 187 %8 1988/// %G eng %N 2 %0 Journal Article %J Biological Cybernetics %D 1988 %T Shape from texture %A Aloimonos, J. %B Biological Cybernetics %V 58 %P 345 - 360 %8 1988/// %G eng %N 5 %0 Journal Article %J Computer Vision, Graphics, and Image Processing %D 1988 %T Some algorithms for approximating convolutions %A O'Leary, Dianne P. %X This paper presents some algorithms for approximating two-dimensional convolution operators of size n × n, n odd, by a product, or sum of products, of 3 × 3 convolutions. Inaccuracies resulting from the approximation as well as from fixed point computation are discussed and examples are given. %B Computer Vision, Graphics, and Image Processing %V 41 %P 333 - 345 %8 1988/03// %@ 0734-189X %G eng %U http://www.sciencedirect.com/science/article/pii/0734189X88901077 %N 3 %R 10.1016/0734-189X(88)90107-7 %0 Book %D 1987 %T Selected reprints in software %A Zelkowitz, Marvin V %I IEEE Computer Society %8 1987/// %G eng %0 Journal Article %J Nature %D 1987 %T Sequence similarity %A Mount, Stephen M. %B Nature %V 325 %P 487 - 487 %8 1987/02/05/ %G eng %U http://www.nature.com/nature/journal/v325/n6104/abs/325487c0.html %N 6104 %R 10.1038/325487c0 %0 Journal Article %J IEEE Workshop on Computer Architecture for PAMI %D 1987 %T Shared memory algorithms and the medial axis transform %A Chandran,S. %A Mount, Dave %B IEEE Workshop on Computer Architecture for PAMI %P 44 - 50 %8 1987/// %G eng %0 Journal Article %J Journal of the Optical Society of America A %D 1987 %T Spatiotemporal blur paths for image flow estimation (A) %A Spetsakis, M. E %A Aloimonos, J. %B Journal of the Optical Society of America A %V 4 %P 35 - 35 %8 1987/// %G eng %0 Journal Article %J Discrete & Computational Geometry %D 1987 %T Storing the subdivision of a polyhedral surface %A Mount, Dave %X A common structure arising in computational geometry is the subdivision of a plane defined by the faces of a straight-line planar graph. We consider a natural generalization of this structure on a polyhedral surface. The regions of the subdivision are bounded by geodesics on the surface of the polyhedron. A method is given for representing such a subdivision that is efficient both with respect to space and the time required to answer a number of different queries involving the subdivision. For example, given a pointx on the surface of the polyhedron, the region of the subdivision containingx can be determined in logarithmic time. Ifn denotes the number of edges in the polyhedron,m denotes the number of geodesics in the subdivision, andK denotes the number of intersections between edges and geodesics, then the space required by the data structure isO((n +m) log(n +m)), and the structure can be built inO(K + (n +m) log(n +m)) time. Combined with existing algorithms for computing Voronoi diagrams on the surface of polyhedra, this structure provides an efficient solution to the nearest-neighbor query problem on polyhedral surfaces. %B Discrete & Computational Geometry %V 2 %P 153 - 174 %8 1987/// %G eng %N 1 %R 10.1007/BF02187877 %0 Book %D 1987 %T Structure from Motion from Line Correspondencies: New Results %A Science, University of Maryland at College Park. Dept. of Computer %A Spetsakis, M. E %A Aloimonos, J. %A Research, University of Maryland at College Park. Center for Automation %8 1987/// %G eng %0 Journal Article %J Department of Computer Science and Human-Computer Interaction Laboratory Working Paper %D 1987 %T Subjective user evaluation of CF PASCAL programming tools %A Chin,JP %A Norman,K. L %A Shneiderman, Ben %X This study investigated subjective evaluations of two programming environments: 1) SUPPORT, an interactive programming environment with a syntax directed editor on a personal computer and 2) a batch run environment on a large mainframe computer. Participants were students in a 15 week introductory computer science course. In Part 1, one group of 128 first used SUPPORT, while another group of 85 programmed on a mainframe environment. After 6 weeks they were given an evaluative questionnaire and then switched programming environments. In Part 2, 68 used SUPPORT and 60 used the mainframe. At the twelfth week of the course, they were given two questionnaires, one evaluating the environment they had used in the last 6 weeks and one comparing both enviro nments. A measure of programming performance (exam and programming project grades) was also collected. SUPPORT was predicted to reduce the burden of remembering syntactic details resulting in better performance and higher subjective evaluations. Unexpectedly, the SUPPORT users did not earn statistically significantly higher grades. Furthermore, participants expressed a preference for the mainframe over SUPPORT. Specific items on the questionnaires were used to diagnose the strengths and weaknesses of each environment. Designers of syntax directed editors should focus on reducing the syntactic burden not only in programming , but also in the user interface of these tools. %B Department of Computer Science and Human-Computer Interaction Laboratory Working Paper %8 1987/// %G eng %0 Journal Article %J Computers, IEEE Transactions on %D 1987 %T Systolic Arrays for Matrix Transpose and Other Reorderings %A O'Leary, Dianne P. %X In this correspondence, a systolic array is described for computing the transpose of an n × n matrix in time 3n - 1 using n2 switching processors and n2 bit buffers. A one-dimensional implementation is also described. Arrays are also given to take a matrix in by rows and put it out by diagonals, and vice versa. %B Computers, IEEE Transactions on %V C-36 %P 117 - 122 %8 1987/01// %@ 0018-9340 %G eng %N 1 %R 10.1109/TC.1987.5009457 %0 Conference Paper %B Proc 5th National Conference on AI %D 1986 %T Self-reference, knowledge, belief, and modality %A Perlis, Don %B Proc 5th National Conference on AI %P 416 - 420 %8 1986/// %G eng %0 Journal Article %J ACM SIGCHI Bulletin - Special issue: CHI '86 Conference Proceedings %D 1986 %T Seven plus or minus two central issues in human-computer interaction %A Shneiderman, Ben %X This paper offers seven issues and specific challenges for researchers and developers of human-computer interaction. These issues are: interaction styles, input techniques, output organization, response time, error handling, individual differences, explanatory and predictive theories. %B ACM SIGCHI Bulletin - Special issue: CHI '86 Conference Proceedings %V 17 %P 343 - 349 %8 1986/04// %@ 0736-6906 %G eng %U http://doi.acm.org/10.1145/22339.22394 %N 4 %R 10.1145/22339.22394 %0 Conference Paper %B CVPR86 %D 1986 %T Shape and 3-d motion from contour without point to point correspondences: General principles %A Aloimonos, J. %A Basu, A. %B CVPR86 %P 518 - 527 %8 1986/// %G eng %0 Journal Article %J IEEE Transactions on Computers %D 1986 %T A Special-Function Unit for Sorting and Sort-Based Database Operations %A Raschid, Louiqa %A Fei,T. %A Lam,H. %A Su,S. Y.W %K Application software %K Computer applications %K Database machines %K Hardware %K hardware sorter %K Microelectronics %K Software algorithms %K Software design %K Software systems %K sort-based algorithms for database operations %K sorting %K special-function processor %K Technology management %X Achieving efficiency in database management functions is a fundamental problem underlying many computer applications. Efficiency is difficult to achieve using the traditional general-purpose von Neumann processors. Recent advances in microelectronic technologies have prompted many new research activities in the design, implementation, and application of database machines which are tailored for processing database management functions. To build an efficient system, the software algorithms designed for this type of system need to be tailored to take advantage of the hardware characteristics of these machines. Furthermore, special hardware units should be used, if they are cost- effective, to execute or to assist the execution of these software algorithms. %B IEEE Transactions on Computers %V C-35 %P 1071 - 1077 %8 1986/12// %@ 0018-9340 %G eng %N 12 %R 10.1109/TC.1986.1676715 %0 Journal Article %J Mathematics of Computation %D 1986 %T A Stability Analysis of Incomplete LU Factorizations %A Elman, Howard %X The combination of iterative methods with preconditionings based on incomplete LU factorizations constitutes an effective class of methods for solving the sparse linear systems arising from the discretization of elliptic partial differential equations. In this paper, we show that there are some settings in which the incomplete LU preconditioners are not effective, and we demonstrate that their poor performance is due to numerical instability. Our analysis consists of an analytic and numerical study of a sample two-dimensional non-self-adjoint elliptic problem discretized by several finite-difference schemes. %B Mathematics of Computation %V 47 %P 191 - 217 %8 1986/07/01/ %@ 0025-5718 %G eng %U http://www.jstor.org/stable/2008089 %N 175 %R 10.2307/2008089 %0 Conference Paper %B Proceedings of the European Conf. on Artificial Intelligence %D 1986 %T Step-logics: An alternative approach to limited reasoning %A Drapkin,J. %A Perlis, Don %B Proceedings of the European Conf. on Artificial Intelligence %P 160 - 163 %8 1986/// %G eng %0 Journal Article %J International Journal of Parallel Programming %D 1985 %T Schema manipulation in self-describing and self-documenting data models %A Roussopoulos, Nick %A Mark,L. %B International Journal of Parallel Programming %V 14 %P 1 - 28 %8 1985/// %G eng %N 1 %0 Journal Article %J IEEE Transactions on Software Engineering %D 1985 %T SEES—A Software testing Environment Support System %A Roussopoulos, Nick %A Yeh,R. T %K Computer architecture %K Database systems %K Error correction %K Program processors %K Programming profession %K Relational databases %K Software testing %K software tools %K Workstations %K Writing %X SEES is a database system to support program testing. The program database is automatically created during the compilation of the program by a compiler built using the YACC compiler-compiler. %B IEEE Transactions on Software Engineering %V SE-11 %P 355 - 366 %8 1985/04// %@ 0098-5589 %G eng %N 4 %R 10.1109/TSE.1985.232225 %0 Journal Article %J Languages for automation %D 1985 %T SELF-DESCRIBING AND SELF-DOCUMENTING DATABASE SYSTEMS %A Roussopoulos, Nick %A Mark,L. %B Languages for automation %P 275 - 275 %8 1985/// %G eng %0 Journal Article %J Discrete applied mathematics %D 1985 %T Solving NP-hard problems in [] almost trees': Vertex cover %A Coppersmith,D. %A Vishkin, Uzi %B Discrete applied mathematics %V 10 %P 27 - 45 %8 1985/// %G eng %N 1 %0 Journal Article %J Proceedings of the Human Factors and Ergonomics Society Annual MeetingProceedings of the Human Factors and Ergonomics Society Annual Meeting %D 1985 %T The Structure of Information in Online and Paper Technical Manuals %A Weldon,Linda J. %A Koved,Larry %A Shneiderman, Ben %X An experiment was conducted to compare online computer manuals to paper manuals. For each type of manual there were two different database structures – a linear (sequential) structure and a tree structure. The results showed that people using the paper manuals were faster at performing a switch setting task based on information in the manual than were people using the online manuals. No significant differences were found in speed of performance between the linear and tree structures. Nor were there any differences in the number of correct switch settings for the different types of manuals. The subjective evaluation data revealed that the online manuals were rated as better and judged to be more organized than the paper manuals. %B Proceedings of the Human Factors and Ergonomics Society Annual MeetingProceedings of the Human Factors and Ergonomics Society Annual Meeting %V 29 %P 1110 - 1113 %8 1985/10/01/ %@ 1071-1813, %G eng %U http://pro.sagepub.com/content/29/12/1110 %N 12 %R 10.1177/154193128502901207 %0 Conference Paper %B Proceedings of the 17th annual symposium on Simulation %D 1984 %T Simulation of phonemic errors using artificial intelligence symbol processing techniques %A Reggia, James A. %A Ahuja,S. B %B Proceedings of the 17th annual symposium on Simulation %P 49 - 64 %8 1984/// %G eng %0 Journal Article %J Journal of Medical Systems %D 1984 %T SLIPS %A Morris,M. S %A Reggia, James A. %A Ahuja,S. B %A Hart,J. %A Watson,V. %B Journal of Medical Systems %V 8 %P 197 - 204 %8 1984/// %G eng %N 3 %0 Journal Article %J Computer %D 1984 %T Software Engineering Practices in the US and Japan %A Zelkowitz, Marvin V %A Yeh,R. T %A Hamlet,R.G. %A Gannon,J. D %A Basili, Victor R. %B Computer %V 17 %P 57 - 66 %8 1984/06// %@ 0018-9162 %G eng %N 6 %R 10.1109/MC.1984.1659162 %0 Journal Article %J Journal of the ACM (JACM) %D 1984 %T Solving NP-hard problems on graphs that are almost trees and an application to facility location problems %A Gurevich,Y. %A Stockmeyer,L. %A Vishkin, Uzi %B Journal of the ACM (JACM) %V 31 %P 459 - 473 %8 1984/// %G eng %N 3 %0 Journal Article %J International Journal on Man-Machine studies %D 1983 %T S., Wang. PY, Diagnostic Expert Systems Based on a Set Covering Model %A Reggia, James A. %A Nau, Dana S. %B International Journal on Man-Machine studies %V 19 %P 437–46O - 437–46O %8 1983/// %G eng %0 Conference Paper %B IEEE Workshop On Languages for Automation, IEEE Computer Society Press %D 1983 %T A self-describing meta-schema for the RM/T data model %A Roussopoulos, Nick %A Mark,L. %B IEEE Workshop On Languages for Automation, IEEE Computer Society Press %8 1983/// %G eng %0 Journal Article %J Cold Spring Harbor Symposia on Quantitative BiologyCold Spring Harb Symp Quant Biol %D 1983 %T Small Ribonucleoproteins from Eukaryotes: Structures and Roles in RNA Biogenesis %A Steitz,J. A. %A Wolin,S. L. %A Rinke,J. %A Pettersson,I. %A Mount, Stephen M. %A Lerner,E. A. %A Hinterberger,M. %A Gottlieb,E. %X Detailed reviews describing work presented at the annual Cold Spring Harbor Symposia on Quantitative Biology %B Cold Spring Harbor Symposia on Quantitative BiologyCold Spring Harb Symp Quant Biol %V 47 %P 893 - 900 %8 1983/01/01/ %@ 0091-7451, 1943-4456 %G eng %U http://symposium.cshlp.org/content/47/893 %R 10.1101/SQB.1983.047.01.103 %0 Journal Article %J Foundations of Empirical Software Engineering: The Legacy of Victor R. Basili %D 1983 %T The Software Industry: A State of the Art Survey %A Zelkowitz, Marvin V %A Yeh,R. %A Hamlet,R.G. %A Gannon,J. D %A Basili, Victor R. %B Foundations of Empirical Software Engineering: The Legacy of Victor R. Basili %V 1 %P 383 - 383 %8 1983/// %G eng %0 Journal Article %J Cell %D 1983 %T Splicing of messenger RNA precursors is inhibited by antisera to small nuclear ribonucleoprotein %A Padgett,Richard A. %A Mount, Stephen M. %A Steitz,Joan A. %A Sharp,Phillip A. %B Cell %V 35 %P 101 - 107 %8 1983/11// %@ 00928674 %G eng %U http://ukpmc.ac.uk/abstract/MED/6194895 %N 1 %R 10.1016/0092-8674(83)90212-X %0 Conference Paper %D 1983 %T Syntactic constraints and efficient parsability %A Berwick,Robert C. %A Weinberg, Amy %X A central goal of linguistic theory is to explain why natural languages are the way they are. It has often been supposed that computational considerations ought to play a role in this characterization, but rigorous arguments along these lines have been difficult to come by. In this paper we show how a key "axiom" of certain theories of grammar, Subjacency, can be explained by appealing to general restrictions on on-line parsing plus natural constraints on the rule-writing vocabulary of grammars. The explanation avoids the problems with Marcus' [1980] attempt to account for the same constraint. The argument is robust with respect to machine implementation, and thus avoids the problems that often arise when making detailed claims about parsing efficiency. It has the added virtue of unifying in the functional domain of parsing certain grammatically disparate phenomena, as well as making a strong claim about the way in which the grammar is actually embedded into an on-line sentence processor. %S ACL '83 %I Association for Computational Linguistics %C Stroudsburg, PA, USA %P 119 - 122 %8 1983/// %G eng %U http://dx.doi.org/10.3115/981311.981335 %R 10.3115/981311.981335 %0 Journal Article %J Princess Takamatsu symposiaInt. Symp. Princess Takamatsu Cancer Res. Fund %D 1982 %T Structure and function of small ribonucleoproteins from eukaryotic cells %A Steitz,J. A. %A Berg,C %A Gottlieb,E. %A Hardin,J A %A Hashimoto,C %A Hendrick,J P %A Hinterberger,M. %A Krikeles,M %A Lerner,M R %A Mount, Stephen M. %K Antigen-Antibody Complex %K Autoantibodies %K HUMANS %K Lupus Erythematosus, Systemic %K Nucleoproteins %K Ribonucleoproteins %K RNA Polymerase III %K Transcription, Genetic %X Autoantibodies from patients with systemic lupus erythematosus and other related diseases have been used to identify and study small RNA-protein complexes from mammalian cells. Properties of three previously described and several new classes of small ribonucleoproteins (RNPs) are reviewed. The sequence of Drosophila U1 RNA reveals that the region proposed to pair with 5' splice junctions is conserved, while that proposed to interact with 3' junctions diverges; this forces some revision of the model for U1 small nuclear (sn)RNP participation in hnRNA splicing. Further characterization of the Ro and La small RNPs has shown that the Ro small cytoplasmic (sc)RNPs are a subclass of La RNPs. Both tRNA and 5S rRNA precursors are at least transiently associated with the La protein. This raises the possibility that the La protein may be an RNA polymerase III transcription factor. %B Princess Takamatsu symposiaInt. Symp. Princess Takamatsu Cancer Res. Fund %V 12 %P 101 - 107 %8 1982/// %G eng %U http://www.ncbi.nlm.nih.gov/pubmed/7166547 %0 Book %D 1982 %T System message design: Guidelines and experimental results %A Shneiderman, Ben %I Ablex Publishing Company: Norwood, NJ %8 1982/// %G eng %0 Journal Article %J Gathering Information for Problem Formulation %D 1982 %T SYSTEM MESSAGE GUIDELINES: POSITIVE TONE, CONSTRUCTIVE, SPECIFIC, AND USER CENTERED %A Shneiderman, Ben %B Gathering Information for Problem Formulation %8 1982/// %G eng %0 Journal Article %J Nucleic Acids ResearchNucl. Acids Res. %D 1981 %T Sequence of U1 RNA from Drosophila melanogaster: implications for U1 secondary structure and possible involvement in splicing %A Mount, Stephen M. %A Steitz,Joan A. %X U1 RNA from cultured Drosophila melanogaster cells (Kc) was identified by its ability to be recognized, as an RNP, by anti-(U1)RNP antibodies from human lupus patients. Its sequence was deduced largely from direct analysis of the RNA molecule and then confirmed by DNA sequence determinations on a genomic clone isolated by hybridization to Drosophila U1 RNA. The Drosophila U1 RNA sequence exhibits 72% agreement with human U1 RNA. Nucleotides 3-11, which are complementary to the entire consensus sequence for donor (5′) splice junctions in hnRNA, and to part of the acceptor (3′) consensus, are exactly conserved. However, nucleotides 14-21, postulated to interact only with acceptor junctions, differ. Comparison of the Drosophila U1 sequence with vertebrate U1 sequences allows a particular secondary structure model to be preferred over others. These results are consistent with the hypothesis that U1 snRNPs are involved in splicing, but suggest specific modifications of the model detailing molecular interactions between U1 RNA and hnRNA during the splicing reaction. %B Nucleic Acids ResearchNucl. Acids Res. %V 9 %P 6351 - 6368 %8 1981/12/11/ %@ 0305-1048, 1362-4962 %G eng %U http://nar.oxfordjournals.org/content/9/23/6351 %N 23 %R 10.1093/nar/9.23.6351 %0 Book %D 1980 %T Selected reprints in software: selected reprints from Computer %A Zelkowitz, Marvin V %I Computer Society Press %8 1980/// %G eng %0 Book %D 1980 %T Software psychology: Human factors in computer and information systems (Winthrop computer systems series) %A Shneiderman, Ben %I Winthrop Publishers %8 1980/// %@ 0876268165 %G eng %0 Conference Paper %B Proceedings of the 1st International Conference on the Entity-Relationship Approach to Systems Analysis and Design %D 1980 %T Systematic Derivation of Software Requirements %A Yeh,R. Y %A Roussopoulos, Nick %A Chang,P. %B Proceedings of the 1st International Conference on the Entity-Relationship Approach to Systems Analysis and Design %P 403 - 404 %8 1980/// %G eng %0 Journal Article %J ACM Computing Surveys (CSUR) %D 1979 %T Surveyor's Forum: A Question of Transition %A Zelkowitz, Marvin V %B ACM Computing Surveys (CSUR) %V 11 %P 411 - 412 %8 1979/12// %@ 0360-0300 %G eng %U http://doi.acm.org/10.1145/356789.356799 %N 4 %R 10.1145/356789.356799 %0 Journal Article %J International Journal of Parallel Programming %D 1979 %T Syntactic/semantic interactions in programmer behavior: A model and experimental results %A Shneiderman, Ben %A Mayer,Richard %X This paper presents a cognitive framework for describing behaviors involved in program composition, comprehension, debugging, modification, and the acquisition of new programming concepts, skills, and knowledge. An information processing model is presented which includes a long-term store of semantic and syntactic knowledge, and a working memory in which problem solutions are constructed. New experimental evidence is presented to support the model of syntactic/semantic interaction. %B International Journal of Parallel Programming %V 8 %P 219 - 238 %8 1979/// %@ 0885-7458 %G eng %U http://dx.doi.org/10.1007/BF00977789 %N 3 %0 Conference Paper %B Proceedings of the fifteenth annual SIGCPR conference %D 1977 %T The software engineering laboratory: Objectives %A Basili, Victor R. %A Zelkowitz, Marvin V %X A great deal of time and money has been and will continue to be spent in developing software. Much effort has gone into the generation of various software development methodologies that are meant to improve both the process and the product ([MYER, 75], [BAKE, 74], [WOLV, 72]). Unfortunately, it has not always been clear what the underlying principles involved in the software development process are and what effect the methodologies have; it is not always clear what constitutes a better product. Thus progress in finding techniques that produce better, cheaper software depends on developing new deeper understandings of good software and the software development process through studying the underlying principles involved in software and the development process. At the same time we must continue to produce software. A better understanding of the factors that affect the development of software and their interrelationships is required in order to gain better insights into the underlying principles. The Software Engineering Laboratory has been established, in August 1976, at NASA Goddard Space Flight Center in cooperation with the University of Maryland to promote such understanding. The next section gives an overview of the research objectives and experiments being performed at the Laboratory. Section III contains the current list of factors that affect the software development process or product and are to be studied or neutralized. The data collection and data management activities are discussed in Section IV. The last section contains information on the current status and future plans for the Laboratory. %B Proceedings of the fifteenth annual SIGCPR conference %S SIGCPR '77 %I ACM %C New York, NY, USA %P 256 - 269 %8 1977/// %G eng %U http://doi.acm.org/10.1145/800100.803251 %R 10.1145/800100.803251 %0 Journal Article %J Communications of the ACM %D 1974 %T Structured data structures %A Shneiderman, Ben %A Scheuermann,Peter %K data base management system %K Data structures %K structured programming %X Programming systems which permit arbitrary linked list structures enable the user to create complicated structures without sufficient protection. Deletions can result in unreachable data elements, and there is no guarantee that additions will be performed properly. To remedy this situation, this paper proposes a Data Structure Description and Manipulation Language which provides for the creation of a restricted class of data structures but ensures the correctness of the program. This is accomplished by an explicit structure declaration facility, a restriction on the permissible operations, and execution-time checks. %B Communications of the ACM %V 17 %P 566 - 574 %8 1974/10// %@ 0001-0782 %G eng %U http://doi.acm.org/10.1145/355620.361170 %N 10 %R 10.1145/355620.361170