Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Computer Science Faculty Publications

Series

2012

Discipline
Institution
Keyword

Articles 1 - 30 of 36

Full-Text Articles in Physical Sciences and Mathematics

Sense Beauty Via Face, Dressing, And/Or Voice, Tam Nguyen, Si Liu, Bingbing Ni, Jun Tan, Yong Rui, Shuicheng Yan Oct 2012

Sense Beauty Via Face, Dressing, And/Or Voice, Tam Nguyen, Si Liu, Bingbing Ni, Jun Tan, Yong Rui, Shuicheng Yan

Computer Science Faculty Publications

Discovering the secret of beauty has been the pursuit of artists and philosophers for centuries. Nowadays, the computational model for beauty estimation has been actively explored in computer science community, yet with the focus mainly on facial features. In this work, we perform a comprehensive study of female attractiveness conveyed by single/multiple modalities of cues, i.e., face, dressing, and/or voice, and aim to uncover how different modalities individually and collectively affect the human sense of beauty. To this end, we collect the first Multi-Modality Beauty (M2B) dataset in the world for female attractiveness study, which is thoroughly annotated …


Hi, Magic Closet, Tell Me What To Wear!, Si Liu, Tam Nguyen, Jiashi Feng, Meng Wang, Shuicheng Yan Oct 2012

Hi, Magic Closet, Tell Me What To Wear!, Si Liu, Tam Nguyen, Jiashi Feng, Meng Wang, Shuicheng Yan

Computer Science Faculty Publications

In this demo, we present a practical system, "magic closet," for automatic occasion-oriented clothing pairing. Given a user-input occasion, e.g., wedding or shopping, the magic closet intelligently and automatically pairs the user-specified reference clothing (upper body or lower body) with the most suitable one from online shops. Two key criteria are explicitly considered for the magic closet system. One criterion is to dress properly, e.g., compared to suit pants, it is more decent to wear a cocktail dress for a banquet occasion. The other criterion is to dress aesthetically, e.g., a red T-shirt matches better with white pants than with …


3dme: 3d Media Express From Rgb-D Images, Tam Nguyen, Lusong Li, Jun Tan, Shuicheng Yan Oct 2012

3dme: 3d Media Express From Rgb-D Images, Tam Nguyen, Lusong Li, Jun Tan, Shuicheng Yan

Computer Science Faculty Publications

Considering the continuously increasing availability and accessibility of 3D media and the depth camera such as Kinect, we demonstrate an innovative 3D media system called 3DME. The objective of this demo is three-fold.

First, the demo exhibits the creation of 3D images from RGB-D images. Second, 3DME allows a user to insert impressive effects to the produced 3D content. Last but not least, our demo is one of the first attempts toward advertising with 3D content.


Constraint Answer Set Programming, Yuliya Lierler Sep 2012

Constraint Answer Set Programming, Yuliya Lierler

Computer Science Faculty Publications

Constraint answer set programming (CASP) is a novel, promising direction of research whose roots go back to propositional satisfiability (SAT). SAT solvers are efficient tools for solving boolean constraint satisfaction problems that arise in different areas of computer science, including software and hardware verification. Some constraints are more naturally expressed by non-boolean constructs. Satisfiability modulo theories (SMT) extends boolean satisfiability by the integration of non-boolean symbols defined by a background theory in another formalism, such as a constraint processing language. Answer set programming (ASP) extends computational methods of SAT in yet another way, inspired by ideas from knowledge representation, logic …


Online Bottleneck Matching, Barbara Anthony, Christine Chung Aug 2012

Online Bottleneck Matching, Barbara Anthony, Christine Chung

Computer Science Faculty Publications

No abstract provided.


A Novel Dataset-Similarity-Aware Approach For Evaluating Stability Of Software Metric Selection Techniques, Taghi M. Khoshgoftaar, Huanjing Wang, Randall Wald, Amri Napolitano Aug 2012

A Novel Dataset-Similarity-Aware Approach For Evaluating Stability Of Software Metric Selection Techniques, Taghi M. Khoshgoftaar, Huanjing Wang, Randall Wald, Amri Napolitano

Computer Science Faculty Publications

Software metric (feature) selection is an important preprocessing step before building software defect prediction models. Although much research has been done analyzing the classification performance of feature selection methods, fewer works have focused on their stability (robustness). Stability is important because feature selection methods which reliably produce the same results despite changes to the data are more trustworthy. Of the papers studying stability, most either compare the features chosen from different random subsamples of the dataset or compare each random subsample with the original dataset. These either result in an unknown degree of overlap between the subsamples, or comparing datasets …


Segmented Height Field And Smoothed Particle Hydrodynamics In Erosion Simulation, Christopher S. Stuetzle, Zhongxian Chen, Katrina Perez, Jared Gross, Barbara Cutler, W. Randolph Franklin, Thomas F. Zimmie May 2012

Segmented Height Field And Smoothed Particle Hydrodynamics In Erosion Simulation, Christopher S. Stuetzle, Zhongxian Chen, Katrina Perez, Jared Gross, Barbara Cutler, W. Randolph Franklin, Thomas F. Zimmie

Computer Science Faculty Publications

The New Orleans area levee failures during Hurricane Katrina drew media attention to an important prob-lem in Civil Engineering. The emphasis of our work is on earthen levees, dams, and embankments. A ma-jor cause of failures of such structures is overtopping, which causes erosion to the point of breaching the crest. Our research focuses on simulating the initial small-scale features of erosion – the formation of rills and gullies on the embankment. We wish to study and eventually be able to simulate the way earthen embankments erode, with respect to the formation of these rills and gullies. Validation of computer …


Computer Simulations And Physical Modelling Of Erosion, Christopher S. Stuetzle, Zhongxian Chen, Barbara Cutler, W. Randolph Franklin, Jared Gross, Katrina Perez, Thomas F. Zimmie May 2012

Computer Simulations And Physical Modelling Of Erosion, Christopher S. Stuetzle, Zhongxian Chen, Barbara Cutler, W. Randolph Franklin, Jared Gross, Katrina Perez, Thomas F. Zimmie

Computer Science Faculty Publications

Research is being done to study the details and progress of soil erosion on levees and dams, including the formation and progression of rills and gullies on the slopes, and eventually to final breaching. These detailed observations of erosion differ from the typical predictions of only the maximum erosion or scour depths, for example around submerged bridge piers. Computer simulations and geotechnical centrifuge modelling will, in the future, be validated using these observations. For testing, single layer sand models were utilized, and will be followed by clayey and mixed soils, and increased number of layers. The computer simulations will incorporate …


Representing First-Order Causal Theories By Logic Programs, Paolo Ferrarris, Joohyung Lee, Yuliya Lierler, Vladimir Lifschitz, Fangkai Yang May 2012

Representing First-Order Causal Theories By Logic Programs, Paolo Ferrarris, Joohyung Lee, Yuliya Lierler, Vladimir Lifschitz, Fangkai Yang

Computer Science Faculty Publications

Nonmonotonic causal logic, introduced by McCain and Turner (McCain, N. and Turner, H. 1997. Causal theories of action and change. In Proceedings of National Conference on Artificial Intelligence (AAAI), Stanford, CA, 460–465) became the basis for the semantics of several expressive action languages. McCain's embedding of definite propositional causal theories into logic programming paved the way to the use of answer set solvers for answering queries about actions described in such languages. In this paper we extend this embedding to nondefinite theories and to the first-order causal logic.


Completion Time Scheduling And The Wsrpt Algorithm, Christine Chung, Bo Xiong Apr 2012

Completion Time Scheduling And The Wsrpt Algorithm, Christine Chung, Bo Xiong

Computer Science Faculty Publications

No abstract provided.


Validation Of Erosion Modeling: Physical And Numerical, Mehrad Kamalzare, Christopher S. Stuetzle, Zhongxian Chen, Thomas F. Zimmie, Barbara Cutler, W. Randolph Franklin Mar 2012

Validation Of Erosion Modeling: Physical And Numerical, Mehrad Kamalzare, Christopher S. Stuetzle, Zhongxian Chen, Thomas F. Zimmie, Barbara Cutler, W. Randolph Franklin

Computer Science Faculty Publications

The overall intent of this research is to develop numerical models of erosion of levees, dams and embankments, validated by physical models. The physical models are performed at 1-g and at high g's using a geotechnical centrifuge. The erosion is modeled in detail, from beginning to end, that is from the time the levee is overtopped until the levee is breached. Typical quantities measured as a function of time are the depth, width and volume of rills, number of junction points, are the rills straight or meandering, sediment transport quantities, and finally breach. This data can be obtained from the …


Stochastic Analysis Of Horizontal Ip Scanning, Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov Mar 2012

Stochastic Analysis Of Horizontal Ip Scanning, Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov

Computer Science Faculty Publications

Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers frequently rely on host scanning for reconnaissance leading to penetration, IDS is often tasked with detecting scans and preventing them. However, it is currently unknown how likely an IDS is to detect a given Internet-wide scan pattern and whether there exist sufficiently fast scan techniques that can remain virtually undetectable at large-scale. To address these questions, we propose a simple analytical model for the window-expiration rules of popular IDS tools (i.e., Snort and Bro) and utilize a …


On Superposition Of Heterogeneous Edge Processes In Dynamic Random Graphs, Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov Mar 2012

On Superposition Of Heterogeneous Edge Processes In Dynamic Random Graphs, Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov

Computer Science Faculty Publications

This paper builds a generic modeling framework for analyzing the edge-creation process in dynamic random graphs in which nodes continuously alternate between active and inactive states, which represent churn behavior of modern distributed systems. We prove that despite heterogeneity of node lifetimes, different initial out-degree, non-Poisson arrival/failure dynamics, and complex spatial and temporal dependency among creation of both initial and replacement edges, a superposition of edge-arrival processes to a live node under uniform selection converges to a Poisson process when system size becomes sufficiently large. Due to the convoluted dependency and non-renewal nature of various point processes, this result significantly …


A Joint Replication-Migration-Based Routing In Delay Tolerant Networks, Yunsheng Wang, Jie Wu, Zhen Jiang, Feng Li Jan 2012

A Joint Replication-Migration-Based Routing In Delay Tolerant Networks, Yunsheng Wang, Jie Wu, Zhen Jiang, Feng Li

Computer Science Faculty Publications

No abstract provided.


A Quick And Reliable Routing For Infrastructure Surveillance With Wireless Sensor Networks, Zhen Jiang, Jie Wu, Minyi Guo, Zhenping Zhao, Donghong Wu Jan 2012

A Quick And Reliable Routing For Infrastructure Surveillance With Wireless Sensor Networks, Zhen Jiang, Jie Wu, Minyi Guo, Zhenping Zhao, Donghong Wu

Computer Science Faculty Publications

No abstract provided.


Minimum Latency Broadcasting With Conflict Awareness In Wireless Sensor Networks, Zhen Jiang, Donghong Wu, Minyi Guo, Jie Wu, Robert Kline, Xin Wang Jan 2012

Minimum Latency Broadcasting With Conflict Awareness In Wireless Sensor Networks, Zhen Jiang, Donghong Wu, Minyi Guo, Jie Wu, Robert Kline, Xin Wang

Computer Science Faculty Publications

No abstract provided.


Enhance Rule Based Detection For Software Fault Prone Modules, H. Najadat, Izzat M. Alsmadi Jan 2012

Enhance Rule Based Detection For Software Fault Prone Modules, H. Najadat, Izzat M. Alsmadi

Computer Science Faculty Publications

Software quality assurance is necessary to increase the level of confidence in the developed software and reduce the overall cost for developing software projects. The problem addressed in this research is the prediction of fault prone modules using data mining techniques. Predicting fault prone modules allows the software managers to allocate more testing and resources to such modules. This can also imply a good investment in better design in future systems to avoid building error prone modules. Software quality models that are based upon data mining from previous projects can identify fault-prone modules in the current similar development project, once …


Measuring Defect Datasets Sensitivity To Attributes Variation, Izzat M. Alsmadi Jan 2012

Measuring Defect Datasets Sensitivity To Attributes Variation, Izzat M. Alsmadi

Computer Science Faculty Publications

The study of the correlation between software project and product attributes and its modules quality status (faulty or not) is the subject of several research papers in the software testing and maintenance fields. In this paper, a tool is built to change the values of software data sets' attributes and study the impact of this change on the modules' defect status. The goal is to find those specific attributes that highly correlate with the module defect attribute. An algorithm is developed to automatically predict the module defect status based on the values of the module attributes and based on their …


A New Essential Protein Discovery Method Based On The Integration Of Protein-Protein Interaction And Gene Expression Data, Min Li, Hanhui Zhang, Jian-Xin Wang, Yi Pan Jan 2012

A New Essential Protein Discovery Method Based On The Integration Of Protein-Protein Interaction And Gene Expression Data, Min Li, Hanhui Zhang, Jian-Xin Wang, Yi Pan

Computer Science Faculty Publications

The article offers information on a study conducted on the essential protein discovery method, PeC, which is based on the integration of protein-protein interaction and gene expression data. It states that PeC was developed on the basis of the definitions of edge clustering coefficient (ECC) and Pearson's correlation coefficient (PCC). It mentions that a list of essential proteins of Saccharomyces cerevisiae were collected.

Background: Identification of essential proteins is always a challenging task since it requires experimental approaches that are time-consuming and laborious. With the advances in high throughput technologies, a large number of protein-protein interactions are available, which have …


Towards The Identification Of Protein Complexes And Functional Modules By Integrating Ppi Network And Gene Expression Data, Min Li, Xuehong Wu, Jianxin Wang, Yi Pan Jan 2012

Towards The Identification Of Protein Complexes And Functional Modules By Integrating Ppi Network And Gene Expression Data, Min Li, Xuehong Wu, Jianxin Wang, Yi Pan

Computer Science Faculty Publications

Background: Identification of protein complexes and functional modules from protein-protein interaction (PPI) networks is crucial to understanding the principles of cellular organization and predicting protein functions. In the past few years, many computational methods have been proposed. However, most of them considered the PPI networks as static graphs and overlooked the dynamics inherent within these networks. Moreover, few of them can distinguish between protein complexes and functional modules.

Results: In this paper, a new framework is proposed to distinguish between protein complexes and functional modules by integrating gene expression data into protein-protein interaction (PPI) data. A series of time-sequenced subnetworks …


Iteration Method For Predicting Essential Proteins Based On Orthology And Protein-Protein Interaction Networks, Wei Peng, Jianxin Wang, Weiping Wang, Qing Liu, Fang-Xiang Wu, Yi Pan Jan 2012

Iteration Method For Predicting Essential Proteins Based On Orthology And Protein-Protein Interaction Networks, Wei Peng, Jianxin Wang, Weiping Wang, Qing Liu, Fang-Xiang Wu, Yi Pan

Computer Science Faculty Publications

Background: Identification of essential proteins plays a significant role in understanding minimal requirements for the cellular survival and development. Many computational methods have been proposed for predicting essential proteins by using the topological features of protein-protein interaction (PPI) networks. However, most of these methods ignored intrinsic biological meaning of proteins. Moreover, PPI data contains many false positives and false negatives. To overcome these limitations, recently many research groups have started to focus on identification of essential proteins by integrating PPI networks with other biological information. However, none of their methods has widely been acknowledged.

Results: By considering the facts that …


Trip: A Method For Novel Transcript Reconstruction From Paired-End Rna-Seq Reads, Serghei Mangul, Adrian Caciula, Dumitru Brinza, Ion I. Măndoiu, Alexander Zelikovskiy Jan 2012

Trip: A Method For Novel Transcript Reconstruction From Paired-End Rna-Seq Reads, Serghei Mangul, Adrian Caciula, Dumitru Brinza, Ion I. Măndoiu, Alexander Zelikovskiy

Computer Science Faculty Publications

Preliminary experimental results on synthetic datasets generated with various sequencing parameters and distribution assumptions show that TRIP has increased transcriptome reconstruction accuracy compared to previous methods that ignore fragment length distribution information.


Guest Editors' Introduction, Jianer Chen, Ion Măndoiu, Raj Sunderraman, Jianxin Wang, Alexander Zelikovskiy Jan 2012

Guest Editors' Introduction, Jianer Chen, Ion Măndoiu, Raj Sunderraman, Jianxin Wang, Alexander Zelikovskiy

Computer Science Faculty Publications

This Supplement includes a selection of papers presented at the 7th International Symposium on Bioinformatics Research and Application (ISBRA), which was held on May 27-29, 2011 at Central South University in Changsha, China. The technical program of the symposium included 36 extended abstracts presented orally and published in volume 6674 of Springer Verlag’s Lecture Notes in Bioinformatics series. Additionally, the program included 38 short abstracts presented either orally or as posters. Authors of both extended and short abstracts presented at the symposium were invited to submit full versions of their work to this Supplement. Following a rigorous review process, 19 …


Efficient Error Correction For Next-Generation Sequencing Of Viral Amplicons, Pavel Skums, Zoya Dimitrova, David S. Campo, Gilberto Vaughan, Livia Rossi, Joseph C. Forbi, Jonny Yokosawa, Alexander Zelikovskiy, Yury Khudyakov Jan 2012

Efficient Error Correction For Next-Generation Sequencing Of Viral Amplicons, Pavel Skums, Zoya Dimitrova, David S. Campo, Gilberto Vaughan, Livia Rossi, Joseph C. Forbi, Jonny Yokosawa, Alexander Zelikovskiy, Yury Khudyakov

Computer Science Faculty Publications

Background: Next-generation sequencing allows the analysis of an unprecedented number of viral sequence variants from infected patients, presenting a novel opportunity for understanding virus evolution, drug resistance and immune escape. However, sequencing in bulk is error prone. Thus, the generated data require error identification and correction. Most error-correction methods to date are not optimized for amplicon analysis and assume that the error rate is randomly distributed. Recent quality assessment of amplicon sequences obtained using 454-sequencing showed that the error rate is strongly linked to the presence and size of homopolymers, position in the sequence and length of the amplicon. All …


Some Explicit Solutions For A Class Of One-Phase Stefan Problems, Olawanle P. Layeni, Jesse V. Johnson Jan 2012

Some Explicit Solutions For A Class Of One-Phase Stefan Problems, Olawanle P. Layeni, Jesse V. Johnson

Computer Science Faculty Publications

Salva and Tarzia, [N.N. Salva, D.A. Tarzia, J. Math. Anal. Appl. 379 (2011) 240 - 244], gave explicit solutions of a similarity type for a class of free boundary problem for a semi-infinite material. In this paper, through an elementary approach and less stringent assumption on data, we obtain more general results than those given by their central result, and thereby construct explicit solutions for a wider class of Stefan problems with a type of variable heat flux boundary conditions. Further, explicit solutions of certain forced one-phase Stefan problems are given.


Generalized Insertion Region Guides For Delaunay Mesh Refinement, Andrey Chernikov, Nikos Chrisochoides Jan 2012

Generalized Insertion Region Guides For Delaunay Mesh Refinement, Andrey Chernikov, Nikos Chrisochoides

Computer Science Faculty Publications

Mesh generation by Delaunay refinement is a widely used technique for constructing guaranteed quality triangular and tetrahedral meshes. The quality guarantees are usually provided in terms of the bounds on circumradius-to-shortest-edge ratio and on the grading of the resulting mesh. Traditionally circumcenters of skinny elements and middle points of boundary faces and edges are used for the positions of inserted points. However, recently variations of the traditional algorithms are being proposed that are designed to achieve certain optimization objectives by inserting new points in neighborhoods of the center points. In this paper we propose a general approach to the selection …


On A Versatile Stochastic Growth Model, Samiur Arif, Ismail Khalil, Stephan Olariu Jan 2012

On A Versatile Stochastic Growth Model, Samiur Arif, Ismail Khalil, Stephan Olariu

Computer Science Faculty Publications

Growth phenomena are ubiquitous and pervasive not only in biology and the medical sciences, but also in economics, marketing and the computer and social sciences. We introduce a three-parameter version of the classic pure-birth process growth model when suitably instantiated, can be used to model growth phenomena in many seemingly unrelated application domains. We point out that the model is computationally attractive since it admits of conceptually simple, closed form solutions for the time-dependent probabilities.


The Design, Implementation, And Evaluation Of A Pointing Device For A Wearable Computer, Andres Calvo, Gregory Burnett, Victor Finomore, Saverio Perugini Jan 2012

The Design, Implementation, And Evaluation Of A Pointing Device For A Wearable Computer, Andres Calvo, Gregory Burnett, Victor Finomore, Saverio Perugini

Computer Science Faculty Publications

U.S. Air Force special tactics operators at times use small wearable computers (SWCs) for mission objectives. The primary pointing device of a SWC is either a touchpad or trackpoint, embedded into the chassis of the SWC. In situations where the user cannot directly interact with these pointing devices, the utility of the SWC is decreased. We developed a pointing device called the G3 that can be used for SWCs used by operators. The device utilizes gyroscopic sensors attached to the user’s index finger to move the computer cursor according to the angular velocity of his finger. We showed that, as …


Demographic Prediction Of Mobile User From Phone Usage, Shahram Mohrehkesh, Shuiwang Ji, Tamer Nadeem, Michele C. Weigle Jan 2012

Demographic Prediction Of Mobile User From Phone Usage, Shahram Mohrehkesh, Shuiwang Ji, Tamer Nadeem, Michele C. Weigle

Computer Science Faculty Publications

In this paper, we describe how we use the mobile phone usage of users to predict their demographic attributes. Using call log, visited GSM cells information, visited Bluetooth devices, visited Wireless LAN devices, accelerometer data, and so on, we predict the gender, age, marital status, job and number of people in household of users. The accuracy of developed classifiers for these classification problems ranges from 45-87% depending upon the particular classification problem.


Learning Sparse Representations For Fruit Fly Gene Expression Pattern Image Annotation And Retreival, Lei Yuan, Alexander Woodard, Shuiwang Ji, Yuan Jiang, Zhi-Hua Zhou, Sudhir Kumar, Jieping Ye Jan 2012

Learning Sparse Representations For Fruit Fly Gene Expression Pattern Image Annotation And Retreival, Lei Yuan, Alexander Woodard, Shuiwang Ji, Yuan Jiang, Zhi-Hua Zhou, Sudhir Kumar, Jieping Ye

Computer Science Faculty Publications

Background: Fruit fly embryogenesis is one of the best understood animal development systems, and the spatiotemporal gene expression dynamics in this process are captured by digital images. Analysis of these high-throughput images will provide novel insights into the functions, interactions, and networks of animal genes governing development. To facilitate comparative analysis, web-based interfaces have been developed to conduct image retrieval based on body part keywords and images. Currently, the keyword annotation of spatiotemporal gene expression patterns is conducted manually. However, this manual practice does not scale with the continuously expanding collection of images. In addition, existing image retrieval systems based …