A Cleanup Algorithm for Implementing Storage Constraints in Scientific Workflow Executions.
Srinivasan, S.; Juve, G.; Ferreira da Silva, R.; Vahi, K.; and Deelman, E.
In
9th Workshop on Workflows in Support of Large-Scale Science (WORKS), 2014.
Funding Acknowledgements: OCI SI2-SSI program grant #1148515
Paper
doi
link
bibtex
@InProceedings{ srinivasan2014cleanup,
Author = {Sudarshan Srinivasan and Gideon Juve and Ferreira da
Silva, Rafael and Karan Vahi and Ewa Deelman},
Title = {A Cleanup Algorithm for Implementing Storage Constraints
in Scientific Workflow Executions},
BookTitle = {9th Workshop on Workflows in Support of Large-Scale
Science (WORKS)},
Year = {2014},
Note = {Funding Acknowledgements: OCI SI2-SSI program grant
#1148515},
URL = {http://pegasus.isi.edu/publications/2014/2014-works.pdf},
DOI = {10.1109/WORKS.2014.8}
}
A Demonstration of Linked Data Source Discovery and Integration .
Slepicka, J.; Yin, C.; Szekely, P.; and Knoblock, C. A.
In
Proceedings of the ISWC 2014 Posters & Demonstrations Track, 2014. CEUR, 1272
Paper
Link
link
bibtex
7 downloads
@inproceedings{slepicka2014:iswc-demo,
author = {Jason Slepicka and Chengye Yin and Pedro Szekely and Craig A. Knoblock},
title = {A Demonstration of Linked Data Source Discovery and Integration },
booktitle = {Proceedings of the ISWC 2014 Posters \& Demonstrations Track},
editors = {Matthew Horridge and Marco Rospocher and Jacco van Ossenbruggen},
year = {2014},
publisher = "CEUR, 1272",
urlPaper = {http://ceur-ws.org/Vol-1272/paper_129.pdf},
urlLink = "http://ceur-ws.org/Vol-1272/"
}
A Further Look at Potential Impact of Satlets on Design, Production, and Cost of Satellite Systems.
Barnhart, D.; Hill, L.; Fowler, E.; Hunter, R.; Hoag, L.; Sullivan, B.; and Will, P.
In
Small Satellite Conference, August 2014.
link
bibtex
@inproceedings{barnhart2014further,
title={A Further Look at Potential Impact of Satlets on Design, Production, and Cost of Satellite Systems},
author={Barnhart, David and Hill, Lisa and Fowler, Erin and Hunter, Roger and Hoag, Lucy and Sullivan, Brook and Will, Peter},
booktitle={Small Satellite Conference},
month = aug,
year={2014}
}
A Multi-parameter Detection Scheme to Seek Stealthy Hardware Trojan Threats in FPGAs.
Shila, D.; Venugopalan, V.; and Murray, B.
April 2014.
\textbf[Best Presentation Award]
link
bibtex
@conference{Shila2014A-Multi-pa,
author = {Shila, Devu and Venugopalan, Vivek and Murray, Brian},
booktitle = {CyberSecurity For Cyber-Physical Vehicle Systems},
date-added = {2021-01-30 10:24:15 -0500},
date-modified = {2021-01-30 10:24:15 -0500},
institution = {Society of Automotive Engineers (SAE) International conference},
keywords = {security},
month = apr,
note = {\textbf{[Best Presentation Award]}},
organization = {Society of Automotive Engineers (SAE) International conference},
title = {{A Multi-parameter Detection Scheme to Seek Stealthy Hardware Trojan Threats in FPGAs}},
year = {2014}}
A Non-Homogeneous Poisson Process Model of Skin Conductance Responses Integrated with Observed Regulatory Behaviors for Autism Intervention.
Chaspari, T.; Goodwin, M.; Wilder-Smith, O.; Gulsrud, A.; Mucchetti, C.; Kasari, C.; and Narayanan, S.
In
Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP), May 2014.
doi
link
bibtex
@inproceedings{Chaspari2014NonHomogeneous,
author = {Chaspari, Theodora and Goodwin, Matthew and Wilder-Smith, Oliver and Gulsrud, Amanda and Mucchetti, Charlotte and Kasari, Connie and Narayanan, Shrikanth},
bib2html_rescat = {care},
booktitle = {Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2014.6853870},
link = {http://sail.usc.edu/publications/files/Chaspari_ICASSP14.pdf},
location = {Florence, Italy},
month = {May},
title = {A Non-Homogeneous Poisson Process Model of Skin Conductance Responses Integrated with Observed Regulatory Behaviors for Autism Intervention},
year = {2014}
}
A Novel Multi-Institutional Database for Tracking and Reporting Dose-Volume Data and Normal Tissue Effects .
Simpson, D.; Ambite, J.; Kosztyla, R.; Kumaraguruparan, G.; Liu, M.; Moore, K.; Murphy, J.; Wu, J.; and Moiseenko, V.
International Journal of Radiation Oncology *Biology *Physics , 90(1): S849 - S850. 2014.
Proceedings of the American Society for Radiation Oncology 56th Annual Meeting ASTRO's 56th Annual Meeting. doi: 10.1016/j.ijrobp.2014.05.2435
Paper
doi
link
bibtex
@article{simpsom2014,
title = "A Novel Multi-Institutional Database for Tracking and Reporting Dose-Volume Data and Normal Tissue Effects ",
journal = "International Journal of Radiation Oncology *Biology *Physics ",
volume = "90",
number = "1",
pages = "S849 - S850",
year = "2014",
note = "Proceedings of the American Society for Radiation Oncology 56th Annual Meeting ASTRO's 56th Annual Meeting. doi: 10.1016/j.ijrobp.2014.05.2435",
issn = "0360-3016",
doi = "http://dx.doi.org/10.1016/j.ijrobp.2014.05.2435",
url = "http://www.sciencedirect.com/science/article/pii/S0360301614030867",
author = "D.R. Simpson and J.L. Ambite and R. Kosztyla and G. Kumaraguruparan and M. Liu and K.L. Moore and J.D. Murphy and J. Wu and V. Moiseenko"
}
A Parallel Query Engine for Interactive Spatiotemporal Analysis.
Sathe, M.; Knoblock, C. A.; Chiang, Y.; and Harris, A.
In
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014.
Paper
Slides
link
bibtex
14 downloads
@inproceedings{sathe14sigspatial,
author = {Mihir Sathe and Craig A. Knoblock and Yao-Yi Chiang and Aaron Harris},
booktitle = {Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems},
title = {A Parallel Query Engine for Interactive Spatiotemporal Analysis},
urlpaper = {http://usc-isi-i2.github.io/papers/sathe14-sigspatial.pdf},
urlslides = {http://usc-isi-i2.github.io/slides/sathe14-sigspatial-poster.pdf},
year = {2014}
}
A Real-Time MRI Study of Articulatory Setting in Second Language Speech.
Benitez, A.; Ramanarayanan, V.; Goldstein, L.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
doi
link
bibtex
@inproceedings{Benitez2014AReal-TimeMRIStudy,
author = {Benitez, Andres and Ramanarayanan, Vikram and Goldstein, Louis and Narayanan, Shrikanth},
bib2html_rescat = {span},
booktitle = {Proceedings of Interspeech},
doi = {10.1371/journal.pone.0104168},
link = {http://sail.usc.edu/publications/files/benitez_ramanarayanan_as_l2_is2014.pdf},
month = {Sep},
title = {A Real-Time MRI Study of Articulatory Setting in Second Language Speech},
year = {2014}
}
A Scalable Approach to Learn Semantic Models of Structured Sources.
Taheriyan, M.; Knoblock, C. A.; Szekely, P.; and Ambite, J. L.
In
Proceedings of the 8th IEEE International Conference on Semantic Computing (ICSC 2014), 2014.
Paper
Slides
link
bibtex
358 downloads
@inproceedings{taheriyan14:icsc,
author = {Mohsen Taheriyan and Craig A. Knoblock and Pedro Szekely and Jose Luis Ambite},
title = {{A Scalable Approach to Learn Semantic Models of Structured Sources}},
booktitle = {Proceedings of the 8th IEEE International Conference on Semantic Computing (ICSC 2014)},
year = {2014},
urlpaper = {http://usc-isi-i2.github.io/papers/taheriyan14-icsc.pdf},
urlslides = {http://www.slideshare.net/mohsentaheriyan/a-scalable-approach-to-learn-semantic-models-of-structured-sources},
}
A Semantic-Based Approach to Attain Reproducibility of Computational Environments in Scientific Workflows: A Case Study.
Santana-Perez, I.; Ferreira da Silva, R.; Rynge, M.; Deelman, E.; Perez-Hernandez, M. S.; and Corcho, O.
In
1st International Workshop on Reproducibility in Parallel Computing (REPPAR), in conjunction with Euro-Par 2014, 2014.
Funding Acknowledgments: NSF FutureGrid 0910812
Paper
link
bibtex
@InProceedings{ santanaperez2014semantic,
Author = {Idafen Santana-Perez and Ferreira da Silva, Rafael and
Mats Rynge and Ewa Deelman and Maria S. Perez-Hernandez and
Oscar Corcho},
URL = {http://pegasus.isi.edu/publications/2014/2014-reppar.pdf},
Title = {A Semantic-Based Approach to Attain Reproducibility of
Computational Environments in Scientific Workflows: A Case
Study},
BookTitle = {1st International Workshop on Reproducibility in Parallel
Computing (REPPAR), in conjunction with Euro-Par 2014},
Year = {2014},
Note = {Funding Acknowledgments: NSF FutureGrid 0910812}
}
A Supervised Signal-To-Noise Ratio Estimation Of Speech Signals.
Papadopoulos, P.; Tsiartas, A.; Gibson, J.; and Narayanan, S.
In
Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP), May 2014.
doi
link
bibtex
@inproceedings{Papadopoulos2014SupervisedSNR,
author = {Papadopoulos, Pavlos and Tsiartas, Andreas and Gibson, James and Narayanan, Shrikanth},
bib2html_rescat = {},
booktitle = {Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP)},
doi = {https://doi.org/10.1109/icassp.2014.6855207},
link = {http://sail.usc.edu/publications/files/p8287-papadopoulos.pdf},
location = {Florence, Italy},
month = {May},
title = {A Supervised Signal-To-Noise Ratio Estimation Of Speech Signals},
year = {2014}
}
A Survey of Digital Map Processing Techniques.
Chiang, Y.; Leyk, S.; and Knoblock, C. A.
ACM Computing Surveys, 47(1): 1–44. 2014.
Link
Paper
link
bibtex
30 downloads
@article{chiang14:acmsurveys,
Author = "Yao-Yi Chiang and Stefan Leyk and Craig A. Knoblock",
title = "A Survey of Digital Map Processing Techniques",
Journal = "ACM Computing Surveys",
volume = "47",
number = "1",
Year = "2014",
Pages = "1--44",
urlLink= "http://dl.acm.org/citation.cfm?id=2557423",
urlPaper= "http://usc-isi-i2.github.io/papers/chiang14-acm.pdf",
Keywords = {"Map Extraction","Geospatial Integration"},
}
A Unified Probabilistic Approach for Semantic Clustering of Relational Phrases.
Grycner, A.; Weikum, G.; Pujara, J.; Foulds, J.; and Getoor, L.
In
Fourth Workshop on Automated Knowledge Base Construction, 2014. NIPS
link
bibtex
@InProceedings{grycner:akbc14,
author = "Grycner, Adam and Weikum, Gerhard and Pujara, Jay and Foulds, James and Getoor, Lise",
bib_url = "/pubs/bib/grycner-akbc14.bib",
booktitle = "Fourth Workshop on Automated Knowledge Base Construction",
organization = "NIPS",
pdf_url = "/pubs/2014/grycner-akbc14/grycner-akbc14.pdf",
sec = "ws",
title = "A Unified Probabilistic Approach for Semantic Clustering of Relational Phrases",
year = "2014"
}
A VIRTUAL CLUSTER TEST ENVIRONMENT FOR OPERATING SYSTEM AND RUNTIME DEVELOPMENT.
KOCOLOSKI, B. J; PEDRETTI, K. T; GRANT, R. E; and DEBONIS, D.
CSRI SUMMER PROCEEDINGS 2013,176. 2014.
link
bibtex
@article{kocoloski2014virtual,
title={A VIRTUAL CLUSTER TEST ENVIRONMENT FOR OPERATING SYSTEM AND RUNTIME DEVELOPMENT},
author={KOCOLOSKI, BRIAN J and PEDRETTI, KEVIN T and GRANT, RYAN E and DEBONIS, DAVID},
journal={CSRI SUMMER PROCEEDINGS 2013},
pages={176},
year={2014}
}
A collaborative approach to heading estimation for smartphone-based PDR indoor localisation.
Abadi, M. J.; Luceri, L.; Hassan, M.; Chou, C. T.; and Nicoli, M.
In
2014 International conference on indoor positioning and indoor navigation (IPIN), pages 554–563, 2014. IEEE
link
bibtex
@inproceedings{abadi2014collaborative,
title={A collaborative approach to heading estimation for smartphone-based PDR indoor localisation},
author={Abadi, Marzieh Jalal and Luceri, Luca and Hassan, Mahbub and Chou, Chun Tung and Nicoli, Monica},
booktitle={2014 International conference on indoor positioning and indoor navigation (IPIN)},
pages={554--563},
year={2014},
organization={IEEE}
}
A distributed optimization algorithm for attack-resilient wide-area monitoring of power systems: Theoretical and experimental methods.
Zhang, J.; Jaipuria, P.; Chakrabortty, A.; and Hussain, A.
In
International Conference on Decision and Game Theory for Security, pages 350–359, 2014. Springer, Cham
link
bibtex
@inproceedings{zhang2014distributed,
title={A distributed optimization algorithm for attack-resilient wide-area monitoring of power systems: Theoretical and experimental methods},
author={Zhang, Jianhua and Jaipuria, Prateek and Chakrabortty, Aranya and Hussain, Alefiya},
booktitle={International Conference on Decision and Game Theory for Security},
pages={350--359},
year={2014},
organization={Springer, Cham}
}
A power side-channel-based digital to analog converterfor Xilinx FPGAs.
Hutchings, B. L; Monson, J.; Savory, D.; and Keeley, J.
In
Proceedings of the 2014 ACM/SIGDA international symposium on Field-programmable gate arrays, pages 113–116, February 2014. ACM
Paper
doi
link
bibtex
@InProceedings{Hutchings2014,
author = {Hutchings, Brad L and Monson, Joshua and Savory, Danny and Keeley, Jared},
title = {A power side-channel-based digital to analog converterfor Xilinx FPGAs},
booktitle = {Proceedings of the 2014 ACM/SIGDA international symposium on Field-programmable gate arrays},
year = {2014},
pages = {113--116},
organization = {ACM},
month = feb,
url = {https://doi.org/10.1145/2554688.2554770},
doi = {10.1145/2554688.2554770},
}
A study of invariant properties and variation patterns in the converter/distributor model for emotional speech.
Kim, J.; Erickson, D.; Lee, S.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Kim2014Astudyofinvariant,
author = {Kim, Jangwon and Erickson, Donna and Lee, Sungbok and Narayanan, Shrikanth},
bib2html_rescat = {emotion},
booktitle = {Proceedings of Interspeech},
link = {http://sail.usc.edu/publications/files/manuscript.pdf},
month = {Sep},
title = {A study of invariant properties and variation patterns in the converter/distributor model for emotional speech},
year = {2014}
}
A two-step blocking scheme learner for scalable link discovery.
Kejriwal, M.; and Miranker, D. P.
In Shvaiko, P.; Euzenat, J.; Mao, M.; Jiménez-Ruiz, E.; Li, J.; and Ngonga, A., editor(s),
Proceedings of the 9th International Workshop on Ontology Matching collocated with the 13th International Semantic Web Conference (ISWC 2014), Riva del Garda, Trentino, Italy, October 20, 2014, volume 1317, of
CEUR Workshop Proceedings, pages 49–60, 2014. CEUR-WS.org
Paper
link
bibtex
@inproceedings{DBLP:conf/semweb/KejriwalM14a,
author = {Mayank Kejriwal and
Daniel P. Miranker},
editor = {Pavel Shvaiko and
J{\'{e}}r{\^{o}}me Euzenat and
Ming Mao and
Ernesto Jim{\'{e}}nez{-}Ruiz and
Juanzi Li and
Axel Ngonga},
title = {A two-step blocking scheme learner for scalable link discovery},
booktitle = {Proceedings of the 9th International Workshop on Ontology Matching
collocated with the 13th International Semantic Web Conference {(ISWC}
2014), Riva del Garda, Trentino, Italy, October 20, 2014},
series = {{CEUR} Workshop Proceedings},
volume = {1317},
pages = {49--60},
publisher = {CEUR-WS.org},
year = {2014},
url = {http://ceur-ws.org/Vol-1317/om2014\_Tpaper5.pdf},
timestamp = {Wed, 12 Feb 2020 16:44:51 +0100},
biburl = {https://dblp.org/rec/conf/semweb/KejriwalM14a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Active target detection with mobile agents.
Choudhary, S.; Kumar, N.; Narayanan, S.; and Mitra, U.
In
IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, Florence, Italy, May 4-9, 2014, pages 4185–4189, 2014.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/icassp/ChoudharyKNM14,
author = {Sunav Choudhary and
Naveen Kumar and
Srikanth Narayanan and
Urbashi Mitra},
title = {Active target detection with mobile agents},
booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
{ICASSP} 2014, Florence, Italy, May 4-9, 2014},
pages = {4185--4189},
year = {2014},
crossref = {DBLP:conf/icassp/2014},
url = {https://doi.org/10.1109/ICASSP.2014.6854390},
doi = {10.1109/ICASSP.2014.6854390},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icassp/ChoudharyKNM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Affective language model adaptation via corpus selection.
Malandrakis, N.; Potamianos, A.; J Hsu, K.; N Babeva, K.; C Feng, M.; C Davison, G.; and Narayanan, S.
In
Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP), May 2014.
doi
link
bibtex
@inproceedings{Malandrakis2014AffectiveLangadapt,
author = {Malandrakis, Nikolaos and Potamianos, Alexandros and J Hsu, Kean and N Babeva, Kalina and C Feng, Michelle and C Davison, Gerald and Narayanan, Shrikanth},
bib2html_rescat = {emotion},
booktitle = {Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2014.6854521},
link = {http://sail.usc.edu/publications/files/p4871-malandrakis.pdf},
location = {Florence, Italy},
month = {May},
title = {Affective language model adaptation via corpus selection},
year = {2014}
}
AlexU-Word: A New Dataset for Isolated-Word Closed-Vocabulary Offline Arabic Handwriting Recognition.
Hussein, M. E.; Torki, M.; Elsallamy, A.; and Fayyaz, M.
. 2014.
Paper
link
bibtex
abstract
@article{hussein_alexu-word_2014,
title = {{AlexU}-Word: A New Dataset for Isolated-Word Closed-Vocabulary Offline Arabic Handwriting Recognition},
rights = {All rights reserved},
url = {http://arxiv.org/abs/1411.4670},
shorttitle = {{AlexU}-Word},
abstract = {In this paper, we introduce the first phase of a new dataset for offline Arabic handwriting recognition. The aim is to collect a very large dataset of isolated Arabic words that covers all letters of the alphabet in all possible shapes using a small number of simple words. The end goal is to collect a very large dataset of segmented letter images, which can be used to build and evaluate Arabic handwriting recognition systems that are based on segmented letter recognition. The current version of the dataset contains \$25114\$ samples of \$109\$ unique Arabic words that cover all possible shapes of all alphabet letters. The samples were collected from \$907\$ writers. In its current form, the dataset can be used for the problem of closed-vocabulary word recognition. We evaluated a number of window-based descriptors and classifiers on this task and obtained an accuracy of \$92.16{\textbackslash}\%\$ using a {SIFT}-based descriptor and {ANN}.},
journaltitle = {{arXiv}:1411.4670 [cs]},
author = {Hussein, Mohamed E. and Torki, Marwan and Elsallamy, Ahmed and Fayyaz, Mahmoud},
urldate = {2019-05-01},
date = {2014-11-17},
year = {2014},
eprinttype = {arxiv},
eprint = {1411.4670},
keywords = {Computer Science - Computer Vision and Pattern Recognition, I.5.2, I.7.5},
file = {arXiv\:1411.4670 PDF:C\:\\Users\\Mohamed Hussein\\Zotero\\storage\\2R2AFY2X\\Hussein et al. - 2014 - AlexU-Word A New Dataset for Isolated-Word Closed.pdf:application/pdf;arXiv.org Snapshot:C\:\\Users\\Mohamed Hussein\\Zotero\\storage\\3TRZNMC2\\1411.html:text/html}
}
In this paper, we introduce the first phase of a new dataset for offline Arabic handwriting recognition. The aim is to collect a very large dataset of isolated Arabic words that covers all letters of the alphabet in all possible shapes using a small number of simple words. The end goal is to collect a very large dataset of segmented letter images, which can be used to build and evaluate Arabic handwriting recognition systems that are based on segmented letter recognition. The current version of the dataset contains $25114$ samples of $109$ unique Arabic words that cover all possible shapes of all alphabet letters. The samples were collected from $907$ writers. In its current form, the dataset can be used for the problem of closed-vocabulary word recognition. We evaluated a number of window-based descriptors and classifiers on this task and obtained an accuracy of $92.16{\}%$ using a SIFT-based descriptor and ANN.
Aligning ontologies of linked data.
Parundekar, R.; Knoblock, C. A.; and Ambite, J. L.
In
Linked Data Management: Principles and Techniques. CRC Press, 2014.
Paper
link
bibtex
@InCollection{parundekar2014ldm,
Author = "Rahul Parundekar and Craig A. Knoblock and Jose Luis Ambite",
Title = "Aligning ontologies of linked data",
Editors = " Andreas Harth, Katja Hose, and Ralf Schenkel",
Booktitle = "Linked Data Management: Principles and Techniques",
Publisher = "CRC Press",
Year = "2014",
urlPaper= "http://usc-isi-i2.github.io/papers/parundekar14-ldmgmt.pdf"
}
Amplify Scientific Discovery with Artificial Intelligence.
Gil, Y.; Greaves, M.; Hendler, J.; and Hirsh, H.
Science, 346(6206): 171-172. 2014.
Link
doi
link
bibtex
@article{gil-etal-science14,
title = {Amplify Scientific Discovery with Artificial Intelligence},
author = {Yolanda Gil and Mark Greaves and James Hendler and Haym Hirsh},
journal = {Science},
volume = 346,
number = 6206,
pages = {171-172},
year = {2014},
doi = {10.1126/science.1259439},
ee = {http://dx.doi.org/10.1126/science.1259439}
}
An Asset Management Approach to Continuous Integration of Heterogeneous Biomedical Data.
Schuler, R. E.; Kesselman, C.; and Czajkowski, K.
In Galhardas, H.; and Rahm, E., editor(s),
Data Integration in the Life Sciences, pages 1–15, Cham, 2014. Springer International Publishing
doi
link
bibtex
abstract
@inproceedings{Schuler2014b,
abstract = {Increasingly, advances in biomedical research are the result of combining and analyzing heterogeneous data types from different sources, spanning genomic, proteomic, imaging, and clinical data. Yet despite the proliferation of data-driven methods, tools to support the integration and management of large collections of data for purposes of data driven discovery are scarce, leaving scientists with ad hoc and inefficient processes. The scientific process could benefit significantly from lightweight methods for data integration that allow for exploratory, incrementally refined integration of heterogeneous data. In this paper, we address this problem by introducing a new asset management based approach designed to support continuous integration of biomedical data. We describe the system and our experiences using it in the context of several scientific applications.},
address = {{Cham}},
author = {Schuler, Robert E. and Kesselman, Carl and Czajkowski, Karl},
booktitle = {Data {{Integration}} in the {{Life Sciences}}},
doi = {10.1007/978-3-319-08590-6_1},
editor = {Galhardas, Helena and Rahm, Erhard},
file = {/Users/schuler/Zotero/storage/H8YABUWI/Schuler et al. - 2014 - An Asset Management Approach to Continuous Integra.pdf},
isbn = {978-3-319-08590-6},
pages = {1--15},
publisher = {{Springer International Publishing}},
title = {An {{Asset Management Approach}} to {{Continuous Integration}} of {{Heterogeneous Biomedical Data}}},
year = {2014},
bdsk-url-1 = {https://doi.org/10.1007/978-3-319-08590-6_1}}
Increasingly, advances in biomedical research are the result of combining and analyzing heterogeneous data types from different sources, spanning genomic, proteomic, imaging, and clinical data. Yet despite the proliferation of data-driven methods, tools to support the integration and management of large collections of data for purposes of data driven discovery are scarce, leaving scientists with ad hoc and inefficient processes. The scientific process could benefit significantly from lightweight methods for data integration that allow for exploratory, incrementally refined integration of heterogeneous data. In this paper, we address this problem by introducing a new asset management based approach designed to support continuous integration of biomedical data. We describe the system and our experiences using it in the context of several scientific applications.
An Investigation of Vocal Arousal Dynamics in Child-Psychologist Interactions using Synchrony Measures and a Conversation-based Model.
Bone, D.; Lee, C.; Potamianos, A.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Bone2014AnInvestigationofVocal,
author = {Bone, Daniel and Lee, Chi-Chun and Potamianos, Alexandros and Narayanan, Shrikanth},
bib2html_rescat = {care},
booktitle = {Proceedings of Interspeech},
link = {http://sail.usc.edu/publications/files/VocalArousalInteraction_Interspeech2014_v3_submission.pdf},
month = {Sep},
title = {An Investigation of Vocal Arousal Dynamics in Child-Psychologist Interactions using Synchrony Measures and a Conversation-based Model},
year = {2014}
}
Analysis and Predictive Modeling of Body Language Behavior in Dyadic Interactions from Multimodal Interlocutor Cues.
Yang, Z.; Metallinou, A.; and Narayanan, S. S.
IEEE Transactions on Multimedia, 16(6): 1766-1778. Oct 2014.
doi
link
bibtex
@article{Yang2014AnalysisandPredictiveModeling,
author = {Yang, Zhaojun and Metallinou, Angeliki and Narayanan, Shrikanth S.},
bib2html_rescat = {bsp},
doi = {10.1109/TMM.2014.2328311},
journal = {IEEE Transactions on Multimedia},
link = {http://sail.usc.edu/publications/files/ZhaojunYang-TMM-2014.pdf},
month = {Oct},
number = {6},
pages = {1766-1778},
title = {Analysis and Predictive Modeling of Body Language Behavior in Dyadic Interactions from Multimodal Interlocutor Cues},
volume = {16},
year = {2014}
}
Analysis of Emotional Effect on Speech-Body Gesture Interplay.
Yang, Z.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Yang2014AnalysisofEmotionalEffect,
author = {Yang, Zhaojun and Narayanan, Shrikanth},
bib2html_rescat = {emotion},
booktitle = {Proceedings of Interspeech},
link = {http://sail.usc.edu/publications/files/emotioneffect_gesturespeechinterplay.pdf},
month = {Sep},
title = {Analysis of Emotional Effect on Speech-Body Gesture Interplay},
year = {2014}
}
Announcing the SIGAI Career Network and Conference.
Das, S.; Epstein, S. L.; and Gil, Y.
AI Matters, 1(1). 2014.
Paper
Link
link
bibtex
@article{das-etal-aimatters14,
title = {Announcing the SIGAI Career Network and Conference},
author = {Sanmay Das and Susan L. Epstein and Yolanda Gil},
journal = {AI Matters},
volume = {1},
number = {1},
year = {2014},
url = {http://sigai.acm.org/static/aimatters/aimatters-issue-2014-01.pdf},
ee = {http://dx.doi.org/10.1145/2639475.2649581}
}
Apparatus and method for sharing a generic configuration across a group of network devices.
Sankaran, G. C.
August~5 2014.
US Patent 8,554,883
link
bibtex
@misc{sankaran2014apparatus,
title={Apparatus and method for sharing a generic configuration across a group of network devices},
author={Sankaran, Ganesh Chennimalai},
year={2014},
month=aug # "~5",
note={US Patent 8,554,883}
}
Are articulatory settings mechanically advantageous for speech motor control?.
Ramanarayanan, V.; Lammert, A.; Goldstein, L.; and Narayanan, S. S.
PLoS One, 9(8): e104168. Aug 2014.
doi
link
bibtex
@article{Ramanarayanan2014Arearticulatorysettingsmechanically,
author = {Ramanarayanan, Vikram and Lammert, Adam and Goldstein, Louis and Narayanan, Shrikanth S.},
bib2html_rescat = {span},
doi = {10.1371/journal.pone.0104168},
journal = {PLoS One},
link = {http://sail.usc.edu/publications/files/journal.pone.0104168.PDF},
month = {Aug},
number = {8},
pages = {e104168},
title = {Are articulatory settings mechanically advantageous for speech motor control?},
volume = {9},
year = {2014}
}
Artificial intelligence: no longer just for you and me.
Gil, Y.
AI Matters, 1(1): 4–5. 2014.
Paper
doi
link
bibtex
3 downloads
@article{DBLP:journals/aimatters/Gil14,
author = {Yolanda Gil},
title = {Artificial intelligence: no longer just for you and me},
journal = {{AI} Matters},
volume = {1},
number = {1},
pages = {4--5},
year = {2014},
url = {https://doi.org/10.1145/2639475.2639477},
doi = {10.1145/2639475.2639477},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/aimatters/Gil14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Assessing millennial-scale variability during the Holocene: A perspective from the western tropical Pacific.
Khider, D.; Jackson, C. S; and Stott, L.
Paleoceanography, 29(3): 143–159. 2014.
Paper
doi
link
bibtex
@article{khider_assessing_2014,
title = {Assessing millennial-scale variability during the {Holocene}: {A} perspective from the western tropical {Pacific}},
volume = {29},
url = {https://github.com/khider/khider.github.io/blob/master/papers/Khider%20et%20al._2014_Paleoceanography.pdf},
doi = {10.1002/2013PA002534},
number = {3},
journal = {Paleoceanography},
author = {Khider, Deborah and Jackson, Charles S and Stott, Lowell},
year = {2014},
pages = {143--159},
}
Automatic intelligibility classification of sentence-level pathological speech.
Kim, J.; Kumar, N.; Tsiartas, A.; and Li, M.
Computer, Speech, and Language. 2014.
doi
link
bibtex
@article{Kim2014Automaticintelligibilityclassificationof,
author = {Kim, Jangwon and Kumar, Naveen and Tsiartas, Andreas and Li, Ming},
bib2html_rescat = {span},
doi = {dx.doi.org/10.1016/j.csl.2014.02.001},
journal = {Computer, Speech, and Language},
link = {http://sail.usc.edu/publications/files/kim-csl-2014-inpress.pdf},
title = {Automatic intelligibility classification of sentence-level pathological speech},
year = {2014}
}
Barista: A Framework for Concurrent Speech Processing by USC-SAIL.
Can, D.; Gibson, J.; Vaz, C.; Georgiou, P.; and Narayanan, S.
In
Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP), pages 3306-3310, May 2014.
doi
link
bibtex
@inproceedings{Can2014Barista,
author = {Can, Dogan and Gibson, James and Vaz, Colin and Georgiou, Panayiotis and Narayanan, Shrikanth},
bib2html_rescat = {emotion},
booktitle = {Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2014.6854212},
link = {http://sail.usc.edu/publications/files/p3330-can.pdf},
location = {Florence, Italy},
month = {May},
pages = {3306-3310},
title = {Barista: A Framework for Concurrent Speech Processing by USC-SAIL},
year = {2014}
}
Building Dynamic Knowledge Graphs.
Pujara, J.; and Getoor, L.
In
Fourth Workshop on Automated Knowledge Base Construction, 2014. NIPS
link
bibtex
@InProceedings{pujara:akbc14,
author = "Pujara, Jay and Getoor, Lise",
bib_url = "/pubs/bib/pujara-akbc14.bib",
booktitle = "Fourth Workshop on Automated Knowledge Base Construction",
organization = "NIPS",
pdf_url = "/pubs/2014/pujara-akbc14/pujara-akbc14.pdf",
sec = "ws",
title = "Building Dynamic Knowledge Graphs",
year = "2014"
}
Cardinal pill testing of system virtual machines.
Shi, H.; Alwabel, A.; and Mirkovic, J.
In
23rd USENIX Security Symposium (USENIX Security 14), pages 271–285, 2014.
link
bibtex
@inproceedings{shi2014cardinal,
title={Cardinal pill testing of system virtual machines},
author={Shi, Hao and Alwabel, Abdulla and Mirkovic, Jelena},
booktitle={23rd USENIX Security Symposium (USENIX Security 14)},
pages={271--285},
year={2014}
}
Challenges for Provenance Analytics Over Geospatial Data.
Garijo, D.; Gil, Y.; and Harth, A.
In Ludäscher, B.; and Plale, B., editor(s),
Provenance and Annotation of Data and Processes - 5th International Provenance and Annotation Workshop, IPAW 2014, Cologne, Germany, June 9-13, 2014. Revised Selected Papers, volume 8628, of
Lecture Notes in Computer Science, pages 261–263, 2014. Springer
Paper
doi
link
bibtex
1 download
@inproceedings{DBLP:conf/ipaw/GarijoGH14,
author = {Daniel Garijo and
Yolanda Gil and
Andreas Harth},
editor = {Bertram Lud{\"{a}}scher and
Beth Plale},
title = {Challenges for Provenance Analytics Over Geospatial Data},
booktitle = {Provenance and Annotation of Data and Processes - 5th International
Provenance and Annotation Workshop, {IPAW} 2014, Cologne, Germany,
June 9-13, 2014. Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {8628},
pages = {261--263},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-16462-5\_28},
doi = {10.1007/978-3-319-16462-5\_28},
timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ipaw/GarijoGH14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Challenges in Modeling Geospatial Provenance.
Garijo, D.; Gil, Y.; and Harth, A.
In
Proceedings of the Fifth International Provenance and Annotation Workshop (IPAW), Cologne, Germany, 2014.
Paper
link
bibtex
6 downloads
@inproceedings{garijo-etal-ipaw14,
author = {Daniel Garijo and Yolanda Gil and Andreas Harth},
title = {Challenges in Modeling Geospatial Provenance},
booktitle = {Proceedings of the Fifth International Provenance and Annotation Workshop (IPAW)},
address = {Cologne, Germany},
year = {2014},
url = {https://knowledgecaptureanddiscovery.github.io/yolanda_gil_website/papers/garijo-etal-ipaw14.pdf }
}
Class Capture-the-Flag Exercises.
Mirkovic, J.; and Peterson, P. A.
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14). 2014.
link
bibtex
@article{mirkovic2014class,
title={Class Capture-the-Flag Exercises},
author={Mirkovic, Jelena and Peterson, Peter AH},
journal={2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)},
year={2014},
publisher={USENIX Association}
}
Classification of Cognitive Load from Speech using an i-vector Framework.
Van Segbroeck, M.; Travadi, R.; Vaz, C.; Kim, J.; Black, M. P.; Potamianos, A.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Van2014ClassificationofCognitiveLoad,
author = {Van Segbroeck, Maarten and Travadi, Ruchir and Vaz, Colin and Kim, Jangwon and Black, Matthew P. and Potamianos, Alexandros and Narayanan, Shrikanth},
booktitle = {Proceedings of Interspeech},
link = {http://sail.usc.edu/publications/files/IS2014_Challenge.pdf},
location = {Singapore [INTERSPEECH 2014 Computational Paralinguistics Challenge AWARD]},
month = {Sep},
title = {Classification of Cognitive Load from Speech using an i-vector Framework},
year = {2014}
}
Classification of clean and noisy bilingual movie audio for speech-to-speech translation corpora design.
Tsiartas, A.; Kumar Ghosh, P.; Georgiou, P.; and Narayanan, S.
In
Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP), May 2014.
doi
link
bibtex
@inproceedings{Tsiartas2014S2Scleannoisybilingual,
author = {Tsiartas, Andreas and Kumar Ghosh, Prasanta and Georgiou, Panayiotis and Narayanan, Shrikanth},
bib2html_rescat = {speechlinks},
booktitle = {Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2014.6853570},
link = {http://sail.usc.edu/publications/files/p121-tsiartas.pdf},
location = {Florence, Italy},
month = {May},
title = {Classification of clean and noisy bilingual movie audio for speech-to-speech translation corpora design},
year = {2014}
}
Co-registration of speech production datasets from electromagnetic articulography and real-time magnetic resonance imaging.
Kim, J.; Lammert, A.; Ghosh, P. K.; and Narayanan, S. S.
J. Acoust. Soc. Am., 135(2): EL115-EL121. Feb 2014.
doi
link
bibtex
@article{Kim2014Co-registrationofspeechproduction,
author = {Kim, Jangwon and Lammert, Adam and Ghosh, Prasanta Kumar and Narayanan, Shrikanth S.},
bib2html_rescat = {span},
doi = {10.1121/1.4862880},
journal = {J. Acoust. Soc. Am.},
link = {http://sail.usc.edu/publications/files/JASMAN-000135-0EL115_1.pdf},
month = {Feb},
number = {2},
pages = {EL115-EL121},
title = {Co-registration of speech production datasets from electromagnetic articulography and real-time magnetic resonance imaging},
volume = {135},
year = {2014}
}
Coherent control of non-Markovian photon-resonator dynamics.
Levi, A. F. J.; Venuti, L. C.; Albash, T.; and Haas, S.
Phys. Rev. A, 90: 022119. Aug 2014.
Paper
doi
link
bibtex
@article{PhysRevA.90.022119,
title = {Coherent control of non-Markovian photon-resonator dynamics},
author = {Levi, A. F. J. and Venuti, L. Campos and Albash, T. and Haas, S.},
journal = {Phys. Rev. A},
volume = {90},
issue = {2},
pages = {022119},
numpages = {9},
year = {2014},
month = {Aug},
publisher = {American Physical Society},
doi = {10.1103/PhysRevA.90.022119},
url = {https://link.aps.org/doi/10.1103/PhysRevA.90.022119}}
Collaborative Software Development Needs in Geosciences.
Gil, Y.; Moon, E.; and Howison, J.
In
Proceedings of the Second Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE2), held in conjunction with the IEEE ACM International Conference on High Performance Computing (SC), New Orleans, LA, 2014.
Paper
link
bibtex
@inproceedings {gil-etal-wssspe14,
title = {Collaborative Software Development Needs in Geosciences},
author = {Yolanda Gil and Eunyoung Moon and James Howison},
year = {2014},
address = {New Orleans, LA},
booktitle = {Proceedings of the Second Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE2), held in conjunction with the IEEE ACM International Conference on High Performance Computing (SC)},
url = {https://knowledgecaptureanddiscovery.github.io/yolanda_gil_website/papers/gil-etal-wssspe14.pdf }
}
Common motifs in scientific workflows: An empirical analysis.
Garijo, D.; Alper, P.; Belhajjame, K.; Corcho, Ó.; Gil, Y.; and Goble, C. A.
Future Gener. Comput. Syst., 36: 338–351. 2014.
Paper
doi
link
bibtex
3 downloads
@article{DBLP:journals/fgcs/GarijoABCGG14,
author = {Daniel Garijo and
Pinar Alper and
Khalid Belhajjame and
{\'{O}}scar Corcho and
Yolanda Gil and
Carole A. Goble},
title = {Common motifs in scientific workflows: An empirical analysis},
journal = {Future Gener. Comput. Syst.},
volume = {36},
pages = {338--351},
year = {2014},
url = {https://doi.org/10.1016/j.future.2013.09.018},
doi = {10.1016/J.FUTURE.2013.09.018},
timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/fgcs/GarijoABCGG14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Comparing Time-Frequency Representations for Directional Derivative Features.
Gibson, J.; Van Segbroeck, M.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Gibson2014ComparingTime-FrequencyRepresentationsfor,
author = {Gibson, James and Van Segbroeck, Maarten and Narayanan, Shrikanth},
booktitle = {Proceedings of Interspeech},
link = {http://sail.usc.edu/publications/files/gibson2014comparing.pdf},
month = {Sep},
title = {Comparing Time-Frequency Representations for Directional Derivative Features},
year = {2014}
}
Concept of a miniature atomic sensor.
Hamilton, P.; Jaffe, M.; Brown, J. M; Estey, B.; Müller, H; Compton, R.; and Nelson, K.
In
2014 International Symposium on Inertial Sensors and Systems (ISISS), pages 1–4, 2014. IEEE
link
bibtex
@inproceedings{hamilton2014concept,
title={Concept of a miniature atomic sensor},
author={Hamilton, Paul and Jaffe, Matt and Brown, Justin M and Estey, Brian and M{\"u}ller, H and Compton, Robert and Nelson, Karl},
booktitle={2014 International Symposium on Inertial Sensors and Systems (ISISS)},
pages={1--4},
year={2014},
organization={IEEE}
}
Content-Oriented Mobile Edge Technology System Integration Framework and Field Evaluation.
Cao, Z.; French, M.; Krishnan, R.; Ng, J.; Talmage, D.; and Zhang, Q.
In
2014 IEEE Military Communications Conference, pages 1405-1410, Oct 2014.
doi
link
bibtex
@INPROCEEDINGS{6956953,
author={Z. {Cao} and M. {French} and R. {Krishnan} and J. {Ng} and D. {Talmage} and Q. {Zhang}},
booktitle={2014 IEEE Military Communications Conference},
title={Content-Oriented Mobile Edge Technology System Integration Framework and Field Evaluation},
year={2014},
volume={},
number={},
pages={1405-1410},
keywords={Internet;military communication;mobile radio;content-oriented mobile edge technology system integration framework;field evaluation;Internet evolution;on-time situational awareness;soldier;tactical edge;network connectivity;COMET system framework;mobile edge network;innovative system element;content-oriented socket;cosocket;enhanced broadcast abstraction layer;EBAL;large-scale outdoor field experiment;three-squad heterogeneous network;rifleman tactical radio;WiFi link;COMET integrated content-oriented networking;Internet;Reliability;Smart phones;Servers;Mobile communication;IEEE 802.11 Standards;Sockets},
doi={10.1109/MILCOM.2014.233},
ISSN={2155-7578},
month={Oct},}
Cost Optimization of Execution of Multi-level Deadline-Constrained Scientific Workflows on Clouds.
Malawski, M.; Figiela, K.; Bubak, M.; Deelman, E.; and Nabrzyski, J.
Parallel Processing and Applied Mathematics,251-260. 2014.
Funding Acknowledgments: OCI SI2-SSI program grant #1148515
Paper
doi
link
bibtex
@Article{ malawski2014optimization,
Author = {Maciej Malawski and Kamil Figiela and Marian Bubak and Ewa
Deelman and Jarek Nabrzyski},
URL = {http://dx.doi.org/10.1007/978-3-642-55224-3_24},
DOI = {10.1007/978-3-642-55224-3_24},
Title = {Cost Optimization of Execution of Multi-level
Deadline-Constrained Scientific Workflows on Clouds},
Journal = {Parallel Processing and Applied Mathematics},
Pages = {251-260},
Publisher = {Springer Berlin Heidelberg},
Year = {2014},
Note = {Funding Acknowledgments: OCI SI2-SSI program grant
#1148515}
}
Creating a Sustainable Assembly Architecture for Next-Gen Space: The Phoenix Effect.
Barnhart, D.; Will, P.; Sullivan, B.; Hunter, R.; and Hill, L.
In
National Space Symposium Paper, 2014.
link
bibtex
@inproceedings{barnhart2014creating,
title={Creating a Sustainable Assembly Architecture for Next-Gen Space: The Phoenix Effect},
author={Barnhart, David and Will, Peter and Sullivan, Brook and Hunter, Rroger and Hill, Lisa},
booktitle={National Space Symposium Paper},
year={2014}
}
Critter: Content-Rich Traffic Trace Repository.
Sharma, V.; Bartlett, G.; and Mirkovic, J.
In
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, pages 13–20, 2014. ACM
link
bibtex
@inproceedings{sharma2014critter,
title={Critter: Content-Rich Traffic Trace Repository},
author={Sharma, Vinod and Bartlett, Genevieve and Mirkovic, Jelena},
booktitle={Proceedings of the 2014 ACM Workshop on Information Sharing \& Collaborative Security},
pages={13--20},
year={2014},
organization={ACM}
}
Data model of the strategic action planning and scheduling problem in a disaster response team.
Nourjou, R.; Szekely, P.; Hatayama, M.; Ghafory-Ashtiany, M.; and Smith, S. F
Journal of Disaster Research, 9(3): 381–399. 2014.
link
bibtex
@article{nourjou2014data,
title={Data model of the strategic action planning and scheduling problem in a disaster response team},
author={Nourjou, Reza and Szekely, Pedro and Hatayama, Michinori and Ghafory-Ashtiany, Mohsen and Smith, Stephen F},
journal={Journal of Disaster Research},
volume={9},
number={3},
pages={381--399},
year={2014}
}
Design of a gis-based assistant software agent for the incident commander to coordinate emergency response operations.
Nourjou, R.; Hatayama, M.; Smith, S. F; Sadeghi, A.; and Szekely, P.
arXiv preprint arXiv:1401.0282. 2014.
link
bibtex
@article{nourjou2014design,
title={Design of a gis-based assistant software agent for the incident commander to coordinate emergency response operations},
author={Nourjou, Reza and Hatayama, Michinori and Smith, Stephen F and Sadeghi, Atabak and Szekely, Pedro},
journal={arXiv preprint arXiv:1401.0282},
year={2014}
}
Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGA.
Shila, D.; and Venugopalan, V.
In
IEEE International Conference on Communications (ICC), pages 719-724, June 2014.
link
bibtex
@inproceedings{Shila2014Design-imp2,
author = {Shila, Devu and Venugopalan, Vivek},
booktitle = {IEEE International Conference on Communications (ICC)},
date-added = {2020-01-15 12:02:05 -0500},
date-modified = {2020-01-15 12:02:05 -0500},
keywords = {Encryption;Field programmable gate arrays;Hardware;Power demand;Timing;Trojan horses;Design;Hardware Trojans;Resiliency;Security},
month = jun,
pages = {719-724},
title = {{Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGA}},
year = {2014},
Bdsk-File-1 = {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},
Bdsk-Url-1 = {http://dx.doi.org/10.1109/ICC.2014.6883404}}
Developmental acoustic study of American English diphthongs.
Lee, S.; Potamianos, A.; and Narayanan, S. S.
J. Acoust. Soc. Am., 136(4): 1880-1894. Oct 2014.
doi
link
bibtex
@article{Lee2014Developmentalacousticstudyof,
author = {Lee, Sungbok and Potamianos, Alexandros and Narayanan, Shrikanth S.},
bib2html_rescat = {span},
doi = {dx.doi.org/10.1121/1.4894799},
journal = {J. Acoust. Soc. Am.},
link = {http://sail.usc.edu/publications/files/14894799.pdf},
month = {Oct},
number = {4},
pages = {1880-1894},
title = {Developmental acoustic study of American English diphthongs},
volume = {136},
year = {2014}
}
Digital asset management for heterogeneous biomedical data in an era of data-intensive science.
Schuler, R. E.; Kesselman, C.; and Czajkowski, K.
In
2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pages 588–592, Belfast, United Kingdom, November 2014. IEEE
Paper
doi
link
bibtex
@inproceedings{schuler_digital_2014,
address = {Belfast, United Kingdom},
title = {Digital asset management for heterogeneous biomedical data in an era of data-intensive science},
isbn = {978-1-4799-5669-2},
url = {http://ieeexplore.ieee.org/document/6999226/},
doi = {10.1109/BIBM.2014.6999226},
urldate = {2022-01-15},
booktitle = {2014 {IEEE} {International} {Conference} on {Bioinformatics} and {Biomedicine} ({BIBM})},
publisher = {IEEE},
author = {Schuler, Robert E. and Kesselman, Carl and Czajkowski, Karl},
month = nov,
year = {2014},
pages = {588--592},
}
Discovering structure in high-dimensional data through correlation explanation.
Ver Steeg, G.; and Galstyan, A.
Advances in Neural Information Processing Systems, 27. 2014.
link
bibtex
@article{ver2014discovering,
title={Discovering structure in high-dimensional data through correlation explanation},
author={Ver Steeg, Greg and Galstyan, Aram},
journal={Advances in Neural Information Processing Systems},
volume={27},
year={2014}
}
Dynamic Runtime Optimizations for Systems of Heterogeneous Architectures.
Tran, G. P.; Kang, D.; and Crago, S. P.
2014.
doi
link
bibtex
@conference {TranHPEC2014,
title = {Dynamic Runtime Optimizations for Systems of Heterogeneous Architectures},
booktitle = {Eighteenth Annual IEEE High Performance Extreme Computing Conference},
year = {2014},
publisher = {IEEE},
organization = {IEEE},
author = {Tran, Geoffrey P. and Kang, Dong-In and Crago, Stephen P.},
pages={1-6},
doi={10.1109/HPEC.2014.7040970}
}
Dynamic assignment of geospatial-temporal macro tasks to agents under human strategic decisions for centralized scheduling in multi-agent systems.
Nourjou, R.; Smith, S. F; Hatayama, M.; Okada, N.; and Szekely, P.
International Journal of Machine Learning and Computing (IJMLC), 4(1): 39–46. 2014.
link
bibtex
@article{nourjou2014dynamic,
title={Dynamic assignment of geospatial-temporal macro tasks to agents under human strategic decisions for centralized scheduling in multi-agent systems},
author={Nourjou, Reza and Smith, Stephen F and Hatayama, Michinori and Okada, Norio and Szekely, Pedro},
journal={International Journal of Machine Learning and Computing (IJMLC)},
volume={4},
number={1},
pages={39--46},
year={2014}
}
EarthCube EC3 2014 Field Trip Report.
Gil, Y.
2014.
Report of the EarthCube Research Coodination Network on ' Earth-Centered Communication for Cyberinfrastructure: Challenges of field data collection, management, and integration '
Paper
link
bibtex
@misc{ gil-geosoft-14,
title = {EarthCube EC3 2014 Field Trip Report},
author = {Yolanda Gil},
note = {Report of the EarthCube Research Coodination Network on \textquotesingle Earth-Centered Communication for Cyberinfrastructure: Challenges of field data collection, management, and integration \textquotesingle },
year = {2014},
url = {EarthCube-EC3-TripReport-2014/}
}
EarthCube: Past, Present, and Future.
Gil, Y.; Chan, M.; Gomez, B.; and (Eds), B. C.
2014.
EarthCube Project Report EC-2014-3
Paper
link
bibtex
@misc{ gil-etal-ec14,
title = {EarthCube: Past, Present, and Future},
author = {Yolanda Gil and Marjorie Chan and Basil Gomez and Bruce Caron (Eds)},
note = {EarthCube Project Report EC-2014-3},
year = {2014},
url = {http://www.earthcube.org/document/earthcube-past-present-and-future}
}
Enabling collaborative research for security and resiliency of energy cyber physical systems.
Hussain, A.; Faber, T.; Braden, R.; Benzel, T.; Yardley, T.; Jones, J.; Nicol, D. M; Sanders, W. H; Edgar, T. W; Carroll, T. E; and others
In
2014 IEEE International Conference on Distributed Computing in Sensor Systems, pages 358–360, 2014. IEEE
link
bibtex
@inproceedings{hussain2014enabling,
title={Enabling collaborative research for security and resiliency of energy cyber physical systems},
author={Hussain, Alefiya and Faber, Ted and Braden, Robert and Benzel, Terry and Yardley, Tim and Jones, Jeremy and Nicol, David M and Sanders, William H and Edgar, Thomas W and Carroll, Thomas E and others},
booktitle={2014 IEEE International Conference on Distributed Computing in Sensor Systems},
pages={358--360},
year={2014},
organization={IEEE}
}
Enabling the 2nd Generation in Space: Building blocks for large scale space endeavors.
Barnhart, D.; Garretson, P.; and Will, P.
Journal of British Interplanetary Society, 67. 2014.
link
bibtex
@article{barnhart2014enabling,
title={Enabling the 2nd Generation in Space: Building blocks for large scale space endeavors},
author={Barnhart, David and Garretson, Peter and Will, Peter},
journal={Journal of British Interplanetary Society},
volume={67},
year={2014}
}
Energy-Constrained Minimum Variance Response Filter for Robust Vowel Spectral Estimation.
Vaz, C.; Tsiartas, A.; and Narayanan, S.
In
Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP), May 2014.
doi
link
bibtex
@inproceedings{Vaz2014EnergyConstrainedMVR,
author = {Vaz, Colin and Tsiartas, Andreas and Narayanan, Shrikanth},
booktitle = {Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2014.6854811},
link = {http://sail.usc.edu/publications/files/p6316-vaz.pdf},
location = {Florence, Italy},
month = {May},
title = {Energy-Constrained Minimum Variance Response Filter for Robust Vowel Spectral Estimation},
year = {2014}
}
Enhancing Audio Source Separability Using Spectro-Temporal Regularization with NMF.
Vaz, C.; B Dimitriadis, D.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Vaz2014EnhancingAudioSourceSeparability,
author = {Vaz, Colin and B Dimitriadis, Dimitrios and Narayanan, Shrikanth},
bib2html_rescat = {},
booktitle = {Proceedings of Interspeech},
doi = {},
link = {http://sail.usc.edu/publications/files/vaz-enhancing_source_separation.pdf},
month = {Sep},
title = {Enhancing Audio Source Separability Using Spectro-Temporal Regularization with NMF},
year = {2014}
}
Entanglement in a quantum annealing processor.
Lanting, T.; Przybysz, A. J; Smirnov, A Y.; Spedalieri, F. M; Amin, M. H; Berkley, A. J; Harris, R.; Altomare, F.; Boixo, S.; Bunyk, P.; and others
Physical Review X, 4(2): 021041. 2014.
link
bibtex
@article{lanting2014entanglement,
title={Entanglement in a quantum annealing processor},
author={Lanting, Trevor and Przybysz, Anthony J and Smirnov, A Yu and Spedalieri, Federico M and Amin, Mohammad H and Berkley, Andrew J and Harris, Richard and Altomare, Fabio and Boixo, Sergio and Bunyk, Paul and others},
journal={Physical Review X},
volume={4},
number={2},
pages={021041},
year={2014},
publisher={APS}
}
Error-corrected quantum annealing with hundreds of qubits.
Pudenz, K. L; Albash, T.; and Lidar, D. A
Nat. Commun., 5: 3243. 02 2014.
Paper
doi
link
bibtex
@article{PAL:13,
Author = {Pudenz, Kristen L and Albash, Tameem and Lidar, Daniel A},
Date = {2014/02/06/online},
Date-Added = {2014-02-11 21:50:48 +0000},
Date-Modified = {2015-03-29 00:45:07 +0000},
Day = {06},
Doi = {10.1038/ncomms4243},
Journal = {Nat. Commun.},
M3 = {Article},
Month = {02},
Pages = {3243},
Publisher = {Nature Publishing Group, a division of Macmillan Publishers Limited. All Rights Reserved.},
Title = {Error-corrected quantum annealing with hundreds of qubits},
Ty = {JOUR},
Url = {dx.doi.org/10.1038/ncomms4243},
Volume = {5},
Year = {2014}}
Estimation of the movement trajectories of non-crucial articulators based on the detection of crucial moments and physiological constraints.
Kim, J.; Lee, S.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Kim2014Estimationofthemovement,
author = {Kim, Jangwon and Lee, Sungbok and Narayanan, Shrikanth},
bib2html_rescat = {span},
booktitle = {Proceedings of Interspeech},
link = {http://sail.usc.edu/publications/files/kim_interspeech_2014.pdf},
month = {Sep},
title = {Estimation of the movement trajectories of non-crucial articulators based on the detection of crucial moments and physiological constraints},
year = {2014}
}
Evaluating Latency and Throughput Bound Acceleration of FPGAs and GPUs for Adaptive Optics Algorithms.
Venugopalan, V.
In
IEEE High Performance Extreme Computing Conference (HPEC), pages 1-6, September 2014.
link
bibtex
abstract
@inproceedings{Venugopalan2014Evaluating,
abstract = {General purpose extremely large aperture optical/infrared telescopes are instrumental in vastly advancing the astrophysical knowledge on a variety of subjects such as star formation, super-massive black holes, solar magnetic atmosphere, exoplanets and protoplanetary systems. The computational requirements for data processing and real-time control are not feasible using conventional computer and cluster architectures. This paper investigates the latency and throughput bound hardware acceleration of wavefront reconstruction and real-time control algorithms using GPUs and FPGAs. Two different correlation methods are studied and targeted on the hardware accelerators for optimal performance. The GPU-based implementations exhibit lower latency due to its superior floating point capability and supporting libraries. The FPGA-based implementation is slower and requires more fine-tuning to yield more throughput than the GPU implementation.},
author = {Venugopalan, Vivek},
booktitle = {IEEE High Performance Extreme Computing Conference (HPEC)},
date-added = {2020-01-15 12:02:05 -0500},
date-modified = {2020-01-15 12:02:05 -0500},
keywords = {adaptive optics;field programmable gate arrays;graphics processing units;optical computing;FPGA;GPU;adaptive optics algorithm;astrophysical knowledge;data processing;extremely large aperture optical telescopes;field programmable gate array;floating point capability;graphics processing unit;infrared telescopes;latency bound hardware acceleration;realtime control algorithm;throughput bound hardware acceleration;wavefront reconstruction;Actuators;Correlation;Field programmable gate arrays;Graphics processing units;Image reconstruction;Mathematical model;Real-time systems;Adaptive optics systems;field programmable gate arrays;graphics processing units;parallel processing;real-time systems;wavefront correction},
month = sep,
pages = {1-6},
title = {{Evaluating Latency and Throughput Bound Acceleration of FPGAs and GPUs for Adaptive Optics Algorithms}},
year = {2014},
Bdsk-File-1 = {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},
Bdsk-Url-1 = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7040964},
Bdsk-Url-2 = {http://dx.doi.org/10.1109/HPEC.2014.7040964}}
General purpose extremely large aperture optical/infrared telescopes are instrumental in vastly advancing the astrophysical knowledge on a variety of subjects such as star formation, super-massive black holes, solar magnetic atmosphere, exoplanets and protoplanetary systems. The computational requirements for data processing and real-time control are not feasible using conventional computer and cluster architectures. This paper investigates the latency and throughput bound hardware acceleration of wavefront reconstruction and real-time control algorithms using GPUs and FPGAs. Two different correlation methods are studied and targeted on the hardware accelerators for optimal performance. The GPU-based implementations exhibit lower latency due to its superior floating point capability and supporting libraries. The FPGA-based implementation is slower and requires more fine-tuning to yield more throughput than the GPU implementation.
Extending provenance information in CBRAIN to address reproducibility issues across computing platforms.
Glatard, T.; Lewis, L. B; Ferreira da Silva, R.; Rousseau, M.; Lepage, C.; Rioux, P.; Mahani, N.; Deelman, E.; and Evans, A. C
In
NeuroInformatics 2014, 2014.
Paper
link
bibtex
@InProceedings{ glatard2014provenance,
Author = {Tristan Glatard and Lindsay B Lewis and Ferreira da Silva,
Rafael and Marc-Etienne Rousseau and Claude Lepage and
Pierre Rioux and Najmeh Mahani and Ewa Deelman and Alan C
Evans},
URL = {http://pegasus.isi.edu/publications/2014/2014-neuroinformatics.pdf},
Title = {Extending provenance information in CBRAIN to address
reproducibility issues across computing platforms},
BookTitle = {NeuroInformatics 2014},
Year = {2014}
}
FileMap: Map-Reduce Program Execution on Loosely-Coupled Distributed Systems.
Fisk, M. E.; and Hash, C. L.
In
Proceedings of the 4thInternational Workshop on Cloud Data and Platforms, pages to appear, Amsterdam, the Netherlands, April 2014. ACM
doi
link
bibtex
abstract
@InProceedings{Fisk14a,
author = "Michael E. Fisk and Curtis L. Hash",
title = "FileMap: Map-Reduce Program Execution on Loosely-Coupled Distributed Systems",
booktitle = "Proceedings of the " # "4th" # " International Workshop on Cloud Data and Platforms",
year = 2014,
sortdate = "2014-04-01",
pages = "to appear",
month = apr,
address = "Amsterdam, the Netherlands",
publisher = "ACM",
doi = "http://dx.doi.org/10.1145/2592784.2592790",
jlocation = "johnh: pafile",
keywords = "map/reduce, file map, lanl, retro-future",
myorganization = "LANL",
codeurl = "http://mfisk.github.io/filemap",
project = "ant, retrofuture",
abstract = "
In this paper we present FileMap, an open-source,1 alternative map-reduce-based computing system that we have
developed and utilized over the last 5 years. This system features several significant design decisions and performance
aspects that are not found in prevalent map-reduce systems such as Hadoop [16]. The prevailing design goal is
to have a system for scheduling and orchestrating parallel
and distributed data processing, but that does not interpose
itself between data and the serial programs that process data.
FileMap manages the organization of input and output files
and the scheduling of program execution, but does not process files itself and is agnostic to the format in which data is
stored and/or indexed. We layer on top of existing, ubiquitous file systems, security models, and network access software in order to minimize the complexity of FileMap and
maximize the ability of its users to benefit from specialized
compute platforms, file systems, and software.
We measure the performance of FileMap in several instantiations including a heterogeneous “cloud” conglomeration of computers and storage distributed across multiple owning organizations with no cross-organization trust
or synchronization. This “cloud” model intentionally supports distributed sensor systems in which nodes collect their
own data and participate in analysis of data by moving
map/reduce processing upstream to where the data is collected.
Our on SMP systems, clusters built for Hadoop, and
this distributed cloud, show that FileMap outperforms more
prevalent computing systems and models by factors between
2x (compared to Hadoop) and 14x (cloud vs. centralized).
FileMap provides a single programming model that allows processing to seamlessly scale from a single laptop to
data-intensive compute clusters to distributed sensing and
analysis clouds.
This paper introduces our fundamental design decisions
in Section 1 and specifics of the implementation in Section
2. Section 3 describes the use of embedded databases within
our system. Section 4 presents a performance benchmark
measured across a variety of computing environments.
"
}
In this paper we present FileMap, an open-source,1 alternative map-reduce-based computing system that we have developed and utilized over the last 5 years. This system features several significant design decisions and performance aspects that are not found in prevalent map-reduce systems such as Hadoop [16]. The prevailing design goal is to have a system for scheduling and orchestrating parallel and distributed data processing, but that does not interpose itself between data and the serial programs that process data. FileMap manages the organization of input and output files and the scheduling of program execution, but does not process files itself and is agnostic to the format in which data is stored and/or indexed. We layer on top of existing, ubiquitous file systems, security models, and network access software in order to minimize the complexity of FileMap and maximize the ability of its users to benefit from specialized compute platforms, file systems, and software. We measure the performance of FileMap in several instantiations including a heterogeneous “cloud” conglomeration of computers and storage distributed across multiple owning organizations with no cross-organization trust or synchronization. This “cloud” model intentionally supports distributed sensor systems in which nodes collect their own data and participate in analysis of data by moving map/reduce processing upstream to where the data is collected. Our on SMP systems, clusters built for Hadoop, and this distributed cloud, show that FileMap outperforms more prevalent computing systems and models by factors between 2x (compared to Hadoop) and 14x (cloud vs. centralized). FileMap provides a single programming model that allows processing to seamlessly scale from a single laptop to data-intensive compute clusters to distributed sensing and analysis clouds. This paper introduces our fundamental design decisions in Section 1 and specifics of the implementation in Section 2. Section 3 describes the use of embedded databases within our system. Section 4 presents a performance benchmark measured across a variety of computing environments.
FragFlow Automated Fragment Detection in Scientific Workflows.
Garijo, D.; Corcho, Ó.; Gil, Y.; Gutman, B. A.; Dinov, I. D.; Thompson, P. M.; and Toga, A. W.
In
10th IEEE International Conference on e-Science, eScience 2014, Sao Paulo, Brazil, October 20-24, 2014, pages 281–289, 2014. IEEE Computer Society
Paper
doi
link
bibtex
22 downloads
@inproceedings{DBLP:conf/eScience/GarijoCGGDTT14,
author = {Daniel Garijo and
{\'{O}}scar Corcho and
Yolanda Gil and
Boris A. Gutman and
Ivo D. Dinov and
Paul M. Thompson and
Arthur W. Toga},
title = {FragFlow Automated Fragment Detection in Scientific Workflows},
booktitle = {10th {IEEE} International Conference on e-Science, eScience 2014,
Sao Paulo, Brazil, October 20-24, 2014},
pages = {281--289},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/eScience.2014.32},
doi = {10.1109/ESCIENCE.2014.32},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/eScience/GarijoCGGDTT14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
From Map Images to Geographic Names.
Chiang, Y.; Moghaddam, S.; Gupta, S.; Fernandes, R.; and Knoblock, C. A.
In
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014.
Paper
link
bibtex
17 downloads
@inproceedings{chiang14sigspatial-strabo,
author = {Yao-Yi Chiang and Sima Moghaddam and Sanjauli Gupta and Renuka Fernandes and Craig A. Knoblock},
booktitle = {Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems},
urlpaper = {http://usc-isi-i2.github.io/papers/chiang14-sigspatial-arcstrabo.pdf},
title = {From Map Images to Geographic Names},
year = {2014}
}
Fusion of Diverse denoising systems for Robust Automatic Speech Recognition.
Kumar, N.; Van Segbroeck, M.; Audhkhasi, K.; Drotar, P.; and Narayanan, S.
In
Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP), May 2014.
doi
link
bibtex
@inproceedings{Kumar2014DiverseDenoising,
author = {Kumar, Naveen and Van Segbroeck, Maarten and Audhkhasi, Kartik and Drotar, Peter and Narayanan, Shrikanth},
booktitle = {Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2014.6854666},
link = {http://sail.usc.edu/publications/files/p5594-kumar.pdf},
location = {Florence, Italy},
month = {May},
title = {Fusion of Diverse denoising systems for Robust Automatic Speech Recognition},
year = {2014}
}
Geospatial Data Integration with Linked Data and Provenance Tracking.
Harth, A.; and Gil, Y.
2014.
W3C/OGC Workshop on Linking Geospatial Data
Paper
link
bibtex
8 downloads
@misc{harth-gil-lgd14,
author = {Andreas Harth and Yolanda Gil},
title = {Geospatial Data Integration with Linked Data and Provenance Tracking},
note = {W3C/OGC Workshop on Linking Geospatial Data},
address = {London, UK},
year = {2014},
url = {https://knowledgecaptureanddiscovery.github.io/yolanda_gil_website/papers/harth-gil-lgd14.pdf }
}
HPMMAP: Lightweight memory management for commodity operating systems.
Kocoloski, B.; and Lange, J.
In
2014 IEEE 28th International Parallel and Distributed Processing Symposium, pages 649–658, 2014. IEEE
link
bibtex
@inproceedings{kocoloski2014hpmmap,
title={HPMMAP: Lightweight memory management for commodity operating systems},
author={Kocoloski, Brian and Lange, John},
booktitle={2014 IEEE 28th International Parallel and Distributed Processing Symposium},
pages={649--658},
year={2014},
organization={IEEE}
}
HUBzero and Pegasus: integrating scientific workflows into science gateways.
McLennan, M.; Clark, S.; Deelman, E.; Rynge, M.; Vahi, K.; McKenna, F.; Kearney, D.; and Song, C.
Concurrency and Computation: Practice and Experience. 2014.
Funding Acknowledgements: OCI SI2-SSI program grant #1148515, OCI SDCI program grant #0722019
Paper
doi
link
bibtex
@Article{ mclennan2014hubzero,
Author = {Michael McLennan and Steven Clark and Ewa Deelman and Mats
Rynge and Karan Vahi and Frank McKenna and Derrick Kearney
and Carol Song},
URL = {http://dx.doi.org/10.1002/cpe.3257},
DOI = {10.1002/cpe.3257},
Title = {HUBzero and Pegasus: integrating scientific workflows into
science gateways},
Journal = {Concurrency and Computation: Practice and Experience},
Year = {2014},
Note = {Funding Acknowledgements: OCI SI2-SSI program grant
#1148515, OCI SDCI program grant #0722019}
}
Hearing the shape of the Ising model with a programmable superconducting-flux annealer.
Vinci, W.; Markström, K.; Boixo, S.; Roy, A.; Spedalieri, F. M; Warburton, P. A; and Severini, S.
Scientific reports, 4(1): 1–7. 2014.
link
bibtex
@article{vinci2014hearing,
title={Hearing the shape of the Ising model with a programmable superconducting-flux annealer},
author={Vinci, Walter and Markstr{\"o}m, Klas and Boixo, Sergio and Roy, Aidan and Spedalieri, Federico M and Warburton, Paul A and Severini, Simone},
journal={Scientific reports},
volume={4},
number={1},
pages={1--7},
year={2014},
publisher={Nature Publishing Group}
}
High Level Hardware/Software Embedded System Design with Redsharc.
Skalicky, S.; Schmidt, A. G.; and French, M.
In
International Workshop on FPGAs for Software Programmers, 2014.
link
bibtex
@inproceedings{skalicky2014a,
author = {Sam Skalicky and Andrew G. Schmidt and French, M.},
booktitle = {International Workshop on FPGAs for Software Programmers},
title = {High Level Hardware/Software Embedded System Design with Redsharc},
year = {2014}}
How Linked Open Data Can Help in Locating Stolen or Looted Cultural Property.
Fink, E. E.; Szekely, P.; and Knoblock, C. A.
In Ioannides, M.; Magnenat-Thalmann, N.; Fink, E.; Zarnic, R.; Yen, A.; and Quak, E., editor(s),
Digital Heritage: Progress in Cultural Heritage: Documentation, Preservation, and Protection, LNCS 8740, pages 228–237. Springer International Publishing, 2014.
Paper
link
bibtex
@incollection{fink2014linked,
Author = {Fink, Eleanor E. and Szekely, Pedro and Knoblock, Craig A.},
Booktitle = {Digital Heritage: Progress in Cultural Heritage: Documentation, Preservation, and Protection, LNCS 8740},
Editor = {Marinos Ioannides and Nadia Magnenat-Thalmann and Eleanor Fink and Roko Zarnic and Alex-Yianing Yen and Ewald Quak},
Pages = {228--237},
Publisher = {Springer International Publishing},
Title = {How Linked Open Data Can Help in Locating Stolen or Looted Cultural Property},
Year = {2014},
urlPaper= "http://usc-isi-i2.github.io/papers/fink14-euromed.pdf"
}
Hull detection based on largest empty sector angle with application to analysis of realtime MR images.
Kumar, N.; and Narayanan, S. S.
In
IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, Florence, Italy, May 4-9, 2014, pages 6617–6621, 2014.
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/icassp/0004N14,
author = {Naveen Kumar and
Shrikanth S. Narayanan},
title = {Hull detection based on largest empty sector angle with application
to analysis of realtime {MR} images},
booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
{ICASSP} 2014, Florence, Italy, May 4-9, 2014},
pages = {6617--6621},
year = {2014},
crossref = {DBLP:conf/icassp/2014},
url = {https://doi.org/10.1109/ICASSP.2014.6854880},
doi = {10.1109/ICASSP.2014.6854880},
timestamp = {Fri, 19 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icassp/0004N14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Improving Speech Recognition for Children using Acoustic Adaptation and Pronunciation Modeling.
Gurunath Shivakumar, P.; Potamianos, A.; Lee, S.; and Narayanan, S.
In
Proceedings of Workshop on Child, Computer and Interaction (WOCCI 2014), Sep 2014.
link
bibtex
@inproceedings{Gurunath2014ImprovingSpeechRecognitionfor,
author = {Gurunath Shivakumar, Prashanth and Potamianos, Alexandros and Lee, Sungbok and Narayanan, Shrikanth},
bib2html_rescat = {},
booktitle = {Proceedings of Workshop on Child, Computer and Interaction (WOCCI 2014)},
link = {http://sail.usc.edu/publications/files/shivakumaretal_improving.pdf},
location = {Singapore},
month = {Sep},
title = {Improving Speech Recognition for Children using Acoustic Adaptation and Pronunciation Modeling},
year = {2014}
}
Incentives for Online Communities.
DeAngelis, D.; and Barber, K S.
International Journal of Computer and Information Technology, 03(06): 1229–1240. 2014.
Paper
link
bibtex
@article{DeAngelis2014,
author = {DeAngelis, David and Barber, K Suzanne},
file = {:home/dave/Documents/References/DeAngelis, Barber - 2014 - Incentives for Online Communities.pdf:pdf},
journal = {International Journal of Computer and Information Technology},
keywords = {-incentives,expert participation,online communities},
number = {06},
pages = {1229--1240},
title = {Incentives for Online Communities},
url = {https://pdfs.semanticscholar.org/8105/f8a93b910ffce001853ee896e4be80ea3075.pdf},
volume = {03},
year = {2014}
}
Inherent Limitations of Hybrid Transactional Memory.
Alistarh, D.; Kopinsky, J.; Kuznetsov, P.; Ravi, S.; and Shavit, N.
6th Workshop on the Theory of Transactional Memory, Paris, France. 2014.
link
bibtex
@article{WTTM3,
author = {Dan Alistarh and Justin Kopinsky and Petr Kuznetsov and Srivatsan Ravi and Nir Shavit},
title = {Inherent Limitations of Hybrid Transactional Memory},
journal = {6th Workshop on the Theory of Transactional Memory, Paris, France},
year = {2014}
}
Integration and Automation of Data Preparation and Data Mining.
Narayanan, S.; Jaiswal, A.; Chiang, Y.; Geng, Y.; Knoblock, C. A.; and Szekely, P.
In
Proceedings of the First Workshop on Data Integration and Application at the 2014 IEEE International Conference on Data Mining, 2014.
Paper
Slides
link
bibtex
1 download
@inproceedings{narayanan14,
author = {Shrikanth Narayanan and Ayush Jaiswal and Yao-Yi Chiang and Yanhui Geng and Craig A. Knoblock and Pedro Szekely},
booktitle = {Proceedings of the First Workshop on Data Integration and Application at the 2014 IEEE International Conference on Data Mining},
title = {Integration and Automation of Data Preparation and Data Mining},
urlpaper = {http://usc-isi-i2.github.io/papers/narayanan14-icdm.pdf},
urlslides = {http://usc-isi-i2.github.io/papers/narayanan14-icdm-slides.pdf},
year = {2014}
}
Intelligent Workflow Systems and Provenance-Aware Software.
Gil, Y.
In
Proceedings of the Seventh International Congress on Environmental Modeling and Software, San Diego, CA, 2014.
Paper
Link
link
bibtex
57 downloads
@inproceedings{gil-iemss14,
author = {Yolanda Gil},
title = {Intelligent Workflow Systems and Provenance-Aware Software},
booktitle = {Proceedings of the Seventh International Congress on Environmental Modeling and Software},
address = {San Diego, CA},
year = {2014},
url = {https://knowledgecaptureanddiscovery.github.io/yolanda_gil_website/papers/gil-iemss14.pdf },
ee = {http://www.iemss.org/sites/iemss2014/papers/iemss2014_submission_384.pdf}
}
Intelligent algorithm for assignment of agents to human strategy in centralized multi-agent coordination.
Nourjou, R.; Smith, S. F; Hatayama, M.; and Szekely, P.
Journal of Software, 9(10): 2586–2597. 2014.
link
bibtex
@article{nourjou2014intelligent,
title={Intelligent algorithm for assignment of agents to human strategy in centralized multi-agent coordination},
author={Nourjou, Reza and Smith, Stephen F and Hatayama, Michinori and Szekely, Pedro},
journal={Journal of Software},
volume={9},
number={10},
pages={2586--2597},
year={2014}
}
Internet Populations (Good and Bad): Measurement, Estimation, and Correlation.
Heidemann, J.
Presentation at ICERM Workshop on Cybersecurity, October 2014.
Paper
link
bibtex
abstract
@Misc{Heidemann14e,
author = "John Heidemann",
title = "Internet Populations (Good and Bad): Measurement, Estimation, and Correlation",
howpublished = "Presentation at ICERM Workshop on Cybersecurity",
address = "Providence, Rhode Island",
month = oct,
year = 2014,
sortdate = "2014-10-22",
project = "ant, lacrend, retrofuture",
jsubject = "network_topology",
jlocation = "johnh: pafile",
keywords = "internet census, outages, diurnal, math",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann14e.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann14e.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
abstract = "
Our research studies the Internet's public face. Since 2006 we have
been taking censuses of the Internet address space (pinging all IPv4
addresses) every 3 months. Since 2012 we have studied network outages
and events like Hurricane Sandy, using probes of much of the Internet
every 11 minutes. Most recently we have evaluated the diurnal
Internet, finding countries where most people turn off their computers
at night. Finally, we have looked at network reputation, identifying
how spam generation correlates with network location, and others have
studies multiple measurements of ``network reputation''. \newline \indent
A common theme across this work is one must estimate characteristics
of the edge of the Internet in spite of noisy measurements and a
underlying changes. One also need to compare and correlate these
imperfect measurements with other factors (from GDP to
telecommunications policies). \newline \indent
How do these applications relate to the mathematics of census taking
and measurement, estimation, and correlation? Are there tools we
should be using that we aren't? Do the properties of the Internet
suggest new approaches (for example where rapid full enumeration is
possible)? Does correlation and estimates of network ``badness'' help
us improve cybersecurity by treating different parts of the network
differently?
",
}
Our research studies the Internet's public face. Since 2006 we have been taking censuses of the Internet address space (pinging all IPv4 addresses) every 3 months. Since 2012 we have studied network outages and events like Hurricane Sandy, using probes of much of the Internet every 11 minutes. Most recently we have evaluated the diurnal Internet, finding countries where most people turn off their computers at night. Finally, we have looked at network reputation, identifying how spam generation correlates with network location, and others have studies multiple measurements of ``network reputation''. \newline ∈dent A common theme across this work is one must estimate characteristics of the edge of the Internet in spite of noisy measurements and a underlying changes. One also need to compare and correlate these imperfect measurements with other factors (from GDP to telecommunications policies). \newline ∈dent How do these applications relate to the mathematics of census taking and measurement, estimation, and correlation? Are there tools we should be using that we aren't? Do the properties of the Internet suggest new approaches (for example where rapid full enumeration is possible)? Does correlation and estimates of network ``badness'' help us improve cybersecurity by treating different parts of the network differently?
Intoxicated Speech Detection: A Fusion Framework with Speaker-Normalized Hierarchical Functionals and GMM Supervectors.
Bone, D.; Li, M.; Black, M. P.; and Narayanan, S. S.
Computer, Speech, and Language, 28(2): 375-391. Mar 2014.
doi
link
bibtex
@article{Bone2014IntoxicatedSpeechDetection:A,
author = {Bone, Daniel and Li, Ming and Black, Matthew P. and Narayanan, Shrikanth S.},
bib2html_rescat = {},
doi = {dx.doi.org/10.1016/j.csl.2012.09.004.},
journal = {Computer, Speech, and Language},
link = {http://sail.usc.edu/publications/files/Bone_et_al_IS11.PDF},
month = {Mar},
number = {2},
pages = {375-391},
title = {Intoxicated Speech Detection: A Fusion Framework with Speaker-Normalized Hierarchical Functionals and GMM Supervectors},
volume = {28},
year = {2014}
}
Intra-die process variation aware anomaly detection in FPGAs.
Pino, Y.; Jyothi, V.; and French, M.
In
2014 International Test Conference, pages 1-6, Oct 2014.
doi
link
bibtex
@INPROCEEDINGS{7035343,
author={Y. {Pino} and V. {Jyothi} and M. {French}},
booktitle={2014 International Test Conference},
title={Intra-die process variation aware anomaly detection in FPGAs},
year={2014},
volume={},
number={},
pages={1-6},
keywords={field programmable gate arrays;hardware-software codesign;integrated circuit testing;invasive software;logic design;VLSI;intradie process variation aware;nondestructive method;hardware trojans;VLSI layer;configurable logic blocks;switch blocks;chip under test;anomaly detection;Xili1nx Virtex-4;Virtex-5;Virtex-6 FPGA devices;Field programmable gate arrays;Trojan horses;Frequency measurement;Hardware;Delays;Correlation;Fabrics},
doi={10.1109/TEST.2014.7035343},
ISSN={1089-3539},
month={Oct},}
Iterated crowdsourcing dilemma game.
Oishi, K.; Cebrian, M.; Abeliuk, A.; and Masuda, N.
Scientific reports, abs/1401.4267. February 2014.
Paper
link
bibtex
@article{journals/corr/OishiCAM14,
added-at = {2018-08-13T00:00:00.000+0200},
author = {Oishi, Koji and Cebrian, Manuel and Abeliuk, Andr{\'{e}}s and Masuda, Naoki},
biburl = {https://www.bibsonomy.org/bibtex/2c007321db634b239e3953aa963f54921/dblp},
interhash = {0c934cdfdae79770c2a4728ecebd8885},
intrahash = {c007321db634b239e3953aa963f54921},
journal = {Scientific reports},
keywords = {dblp},
publisher={Nature Publishing Group},
timestamp = {2018-08-14T12:27:05.000+0200},
title = {Iterated crowdsourcing dilemma game.},
url = {https://rdcu.be/ci7Xb},
volume = {abs/1401.4267},
month = feb,
year = 2014
}
Joint Filtering and Factorization for Recovering Latent Structure from Noisy Speech Data.
Vaz, C.; Ramanarayanan, V.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Vaz2014JointFilteringandFactorization,
author = {Vaz, Colin and Ramanarayanan, Vikram and Narayanan, Shrikanth},
bib2html_rescat = {},
booktitle = {Proceedings of Interspeech},
doi = {},
link = {http://sail.usc.edu/publications/files/vaz-joint_filtering_factorization.pdf},
month = {Sep},
title = {Joint Filtering and Factorization for Recovering Latent Structure from Noisy Speech Data},
year = {2014}
}
Learning Multiple Concepts with Incremental Diverse Density.
Gibson, J.; and Narayanan, S.
In
Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP), May 2014.
doi
link
bibtex
@inproceedings{Gibson2014IncrementalDD,
author = {Gibson, James and Narayanan, Shrikanth},
booktitle = {Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2014.6854465},
link = {http://sail.usc.edu/publications/files/p4591-gibson.pdf},
location = {Florence, Italy},
month = {May},
title = {Learning Multiple Concepts with Incremental Diverse Density},
year = {2014}
}
Leveraging Semantics to Improve Reproducibility in Scientific Workflows.
Santana-Perez, I.; Ferreira da Silva, R.; Rynge, M.; Deelman, E.; Perez-Hernandez, M. S.; and Corcho, O.
In
The reproducibility at XSEDE workshop, 2014.
Funding Acknowledgments: NSF FutureGrid 0910812
Paper
link
bibtex
@InProceedings{ santanaperez2014reproducibility,
Author = {Idafen Santana-Perez and Ferreira da Silva, Rafael and
Mats Rynge and Ewa Deelman and Maria S. Perez-Hernandez and
Oscar Corcho},
URL = {http://pegasus.isi.edu/publications/2014/2014-xsede.pdf},
Title = {Leveraging Semantics to Improve Reproducibility in
Scientific Workflows},
BookTitle = {The reproducibility at XSEDE workshop},
Year = {2014},
Note = {Funding Acknowledgments: NSF FutureGrid 0910812}
}
Leveraging position bias to improve peer recommendation.
Lerman, K.; and Hogg, T.
PLoS One, 9(6): e98914. 2014.
Paper
Blog
link
bibtex
abstract
71 downloads
@ARTICLE{Lerman14plosone,
AUTHOR = {Kristina Lerman and Tad Hogg},
TITLE = {Leveraging position bias to improve peer recommendation},
JOURNAL = {PLoS One},
YEAR = {2014},
volume = {9},
number = {6},
pages = {e98914},
url = {http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0098914},
urlBlog={http://crowdresearch.org/blog/?p=8881},
abstract = {With the advent of social media and peer production, the amount of new online content has grown dramatically. To identify interesting items in the vast stream of new content, providers must rely on peer recommendation to aggregate opinions of their many users. Due to human cognitive biases, the presentation order strongly affects how people allocate attention to the available content. Moreover, we can manipulate attention through the presentation order of items to change the way peer recommendation works. We experimentally evaluate this effect using Amazon Mechanical Turk.
We find that different policies for ordering content can steer user attention so as to improve the outcomes of peer recommendation.
},
keywords = {social-dynamics},
}
With the advent of social media and peer production, the amount of new online content has grown dramatically. To identify interesting items in the vast stream of new content, providers must rely on peer recommendation to aggregate opinions of their many users. Due to human cognitive biases, the presentation order strongly affects how people allocate attention to the available content. Moreover, we can manipulate attention through the presentation order of items to change the way peer recommendation works. We experimentally evaluate this effect using Amazon Mechanical Turk. We find that different policies for ordering content can steer user attention so as to improve the outcomes of peer recommendation.
Life-Experience Passwords (LEPs).
Woo, S. S; Mirkovic, J.; Artstein, R.; and Kaiser, E.
In
Symposium on Usable Privacy and Security (SOUPS), 2014.
link
bibtex
@inproceedings{woo2014life,
title={Life-Experience Passwords (LEPs)},
author={Woo, Simon S and Mirkovic, Jelena and Artstein, Ron and Kaiser, Elsi},
booktitle={Symposium on Usable Privacy and Security (SOUPS)},
year={2014}
}
Load-dependent power-efficient passive optical network architectures.
Sankaran, G. C; and Sivalingam, K. M
IEEE/OSA Journal of Optical Communications and Networking, 6(12): 1104–1114. 2014.
link
bibtex
@article{sankaran2014load,
title={Load-dependent power-efficient passive optical network architectures},
author={Sankaran, Ganesh C and Sivalingam, Krishna M},
journal={IEEE/OSA Journal of Optical Communications and Networking},
volume={6},
number={12},
pages={1104--1114},
year={2014},
publisher={IEEE}
}
Location Prediction With Sparse GPS Data.
Jaiswal, A.; Chiang, Y.; Knoblock, C. A.; and Lan, L.
In
Proceedings of the 8th Geographic Information Science, 2014.
Paper
Slides
link
bibtex
15 downloads
@inproceedings{jaiswal14-giscience,
author = {Ayush Jaiswal and Yao-Yi Chiang and Craig A. Knoblock and Liang Lan},
booktitle = {Proceedings of the 8th Geographic Information Science},
title = {Location Prediction With Sparse {GPS} Data},
urlPaper= "http://usc-isi-i2.github.io/papers/jaiswal14-giscience.pdf",
urlSlides= "http://usc-isi-i2.github.io/slides/jaiswal14-giscience-poster.pdf",
year = {2014}
}
MAX 2-SAT with up to 108 qubits.
Santra, S.; Quiroz, G.; Ver Steeg, G.; and Lidar, D.
New J. Phys., 16: 045006. 2014.
link
bibtex
@article{maxsat,
Author = {Santra, Siddhartha and Quiroz, Greg and {Ver Steeg}, Greg and Lidar, Daniel},
Journal = {New J. Phys.},
Pages = {045006},
Title = {MAX 2-SAT with up to 108 qubits},
Volume = {16},
Year = {2014}}
Mapping hierarchical sources into RDF using the RML mapping language.
Dimou, A.; Sande, M. V.; Slepicka, J.; Szekely, P.; Mannens, E.; Knoblock, C. A.; and Walle, R. V. d.
In
IEEE International Conference on Semantic Computing (ICSC), pages 151–158, 2014. IEEE
Paper
Link
link
bibtex
@inproceedings{dimou2014mapping,
Author = {Dimou, Anastasia and Sande, Miel Vander and Slepicka, Jason and Szekely, Pedro and Mannens, Erik and Knoblock, Craig A. and Walle, Rik Van de},
Booktitle = {IEEE International Conference on Semantic Computing (ICSC)},
Organization = {IEEE},
Pages = {151--158},
Title = {Mapping hierarchical sources into RDF using the RML mapping language},
Year = {2014},
urlPaper= "http://usc-isi-i2.github.io/papers/dimou14-icsc.pdf",
urlLink="http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=6882016"
}
Measuring DANE TLSA Deployment.
Zhu, L.; Wessels, D.; Mankin, A.; and Heidemann, J.
Presentation at DNS-OARC Fall Workshop, October 2014.
Paper
link
bibtex
abstract
@Misc{Zhu14c,
author = "Liang Zhu and Duane Wessels and Allison
Mankin and John Heidemann",
title = "Measuring {DANE} {TLSA} Deployment",
howpublished = "Presentation at DNS-OARC Fall Workshop",
address = "Los Angeles, California, USA",
month = oct,
year = 2014,
sortdate = "2014-10-01",
jlocation = "johnh: pafile",
keywords = "DANE TLSA, DNS, PKI",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Zhu14c.pdf",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Zhu14c.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
project = "ant, lacrend, tdns",
blogurl = "https://ant.isi.edu/blog/?p=546",
abstract = "As adoption of DNS Security Extensions (DNSSEC) grows, DNS-based
Authentication of Named Entities (DANE) provides an alternative to
traditional CA-based certificate authentication. The DANE TLSA
protocol specification was published in 2012. It's generally unknown
to the DNS community how widely DANE TLSA has been deployed and how
TLSA records are used. In this talk, we present a survey of current
deployment of DANE TLSA. We developed PryDane, a tool for actively
probing names possibly having TLSA records validating those records
with the server certificates. Based on the data we collected, we
conclude that DANE TLSA is not widely deployed at this time. Our
probing data shows the most common (more than 80\%) usage of TLSA record is:
domain-issued cert matching full cert with SHA-256. Our validation
results show there are consistently about 7\%--10\% of DANE-enabled
names having invalid TLSA records. We explored the reasons for
these mismatches, such as wrong certs and incorrect parameters in
TLSA records.",
}
As adoption of DNS Security Extensions (DNSSEC) grows, DNS-based Authentication of Named Entities (DANE) provides an alternative to traditional CA-based certificate authentication. The DANE TLSA protocol specification was published in 2012. It's generally unknown to the DNS community how widely DANE TLSA has been deployed and how TLSA records are used. In this talk, we present a survey of current deployment of DANE TLSA. We developed PryDane, a tool for actively probing names possibly having TLSA records validating those records with the server certificates. Based on the data we collected, we conclude that DANE TLSA is not widely deployed at this time. Our probing data shows the most common (more than 80%) usage of TLSA record is: domain-issued cert matching full cert with SHA-256. Our validation results show there are consistently about 7%–10% of DANE-enabled names having invalid TLSA records. We explored the reasons for these mismatches, such as wrong certs and incorrect parameters in TLSA records.
Mixed Membership Blockmodels for Dynamic Networks with Feedback.
Cho, Y.; Ver Steeg, G.; and Galstyan, A.
2014.
link
bibtex
@misc{cho2014mixed,
title={Mixed Membership Blockmodels for Dynamic Networks with Feedback.},
author={Cho, Yoon-Sik and Ver Steeg, Greg and Galstyan, Aram},
year={2014}
}
Modeling Therapist Empathy through Prosody in Drug Addiction Counseling.
Xiao, B.; Bone, D.; Van Segbroeck, M.; Imel, Z. E.; Atkins, D.; Georgiou, P.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Xiao2014ModelingTherapistEmpathythrough,
author = {Xiao, Bo and Bone, Daniel and Van Segbroeck, Maarten and Imel, Zac E. and Atkins, David and Georgiou, Panayiotis and Narayanan, Shrikanth},
bib2html_rescat = {bsp, aaa},
booktitle = {Proceedings of Interspeech},
link = {http://sail.usc.edu/publications/files/xiao2014_modeling-therap.pdf},
month = {Sep},
title = {Modeling Therapist Empathy through Prosody in Drug Addiction Counseling},
year = {2014}
}
Modeling temporal activity patterns in dynamic social networks.
Raghavan, V.; Ver Steeg, G.; Galstyan, A.; and Tartakovsky, A. G
IEEE Transactions on Computational Social Systems, 1(1): 89–107. 2014.
link
bibtex
@article{raghavan2014modeling,
title={Modeling temporal activity patterns in dynamic social networks},
author={Raghavan, Vasanthan and Ver Steeg, Greg and Galstyan, Aram and Tartakovsky, Alexander G},
journal={IEEE Transactions on Computational Social Systems},
volume={1},
number={1},
pages={89--107},
year={2014},
publisher={IEEE}
}
Modified- prior i-Vector Estimation for Language Identification of Short Duration Utterances.
Travadi, R.; Van Segbroeck, M.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Travadi2014Modified-priori-VectorEstimation,
author = {Travadi, Ruchir and Van Segbroeck, Maarten and Narayanan, Shrikanth},
bib2html_rescat = {rats},
booktitle = {Proceedings of Interspeech},
link = {http://sail.usc.edu/publications/files/interspeech_paper_submitted_ruchir.pdf},
month = {Sep},
title = {Modified- prior i-Vector Estimation for Language Identification of Short Duration Utterances},
year = {2014}
}
Motor control primitives arising from a learned dynamical systems model of speech articulation.
Ramanarayanan, V.; Goldstein, L.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
doi
link
bibtex
@inproceedings{Ramanarayanan2014Motorcontrolprimitivesarising,
author = {Ramanarayanan, Vikram and Goldstein, Louis and Narayanan, Shrikanth},
bib2html_rescat = {span},
booktitle = {Proceedings of Interspeech},
doi = {https://doi.org/10.1121/1.4831280},
link = {http://sail.usc.edu/publications/files/control_primitives_LD_IS2014.pdf},
month = {Sep},
title = {Motor control primitives arising from a learned dynamical systems model of speech articulation},
year = {2014}
}
Multiancestral analysis of inflammation-related genetic variants and C-reactive protein in the Population Architecture using Genomics and Epidemiology study.
Kocarnik, J. M.; Pendergrass, S. A.; Carty, C. L.; Pankow, J. S.; Schumacher, F. R.; Cheng, I.; Durda, P.; Ambite, J. L.; Deelman, E.; Cook, N. R.; Liu, S.; Wactawski-Wende, J.; Hutter, C.; Brown-Gentry, K.; Wilson, S.; Best, L. G.; Pankratz, N.; Hong, C.; Cole, S. A.; Voruganti, V. S.; B ̊u ̌zkova, P.; Jorgensen, N. W.; Jenny, N. S.; Wilkens, L. R.; Haiman, C. A.; Kolonel, L. N.; Lacroix, A.; North, K.; Jackson, R.; Le Marchand, L.; Hindorff, L. A.; Crawford, D. C.; Gross, M.; and Peters, U.
Circulation. Cardiovascular genetics, 7: 178–188. April 2014.
Paper
doi
link
bibtex
abstract
@article{KocarnikPendergrassCartyEtAl2014,
abstract = {C-reactive protein (CRP) is a biomarker of inflammation. Genome-wide association studies ({GWAS}) have identified single-nucleotide polymorphisms (SNPs) associated with CRP concentrations and inflammation-related traits such as cardiovascular disease, type 2 diabetes mellitus, and obesity. We aimed to replicate previous CRP-{SNP} associations, assess whether these associations generalize to additional race/ethnicity groups, and evaluate inflammation-related SNPs for a potentially pleiotropic association with CRP. We selected and analyzed 16 CRP-associated and 250 inflammation-related {GWAS} SNPs among 40 473 African American, American Indian, Asian/Pacific Islander, European American, and Hispanic participants from 7 studies collaborating in the {Population Architecture using Genomics and Epidemiology} (PAGE) study. Fixed-effect meta-analyses combined study-specific race/ethnicity-stratified linear regression estimates to evaluate the association between each {SNP} and high-sensitivity CRP. Overall, 18 SNPs in 8 loci were significantly associated with CRP (Bonferroni-corrected P<3.1×10(-3) for replication, P<2.0×10(-4) for pleiotropy): Seven of these were specific to European Americans, while 9 additionally generalized to African Americans (1), Hispanics (5), or both (3); 1 {SNP} was seen only in African Americans and Hispanics. Two SNPs in the CELSR2/PSRC1/SORT1 locus showed a potentially novel association with CRP: rs599839 (P=2.0×10(-6)) and rs646776 (P=3.1×10(-5)). We replicated 16 {SNP}-CRP associations, 10 of which generalized to African Americans and/or Hispanics. We also identified potentially novel pleiotropic associations with CRP for two SNPs previously associated with coronary artery disease and/or low-density lipoprotein-cholesterol. These findings demonstrate the benefit of evaluating genotype-phenotype associations in multiple race/ethnicity groups and looking for pleiotropic relationships among SNPs previously associated with related phenotypes.},
author = {Kocarnik, Jonathan M. and Pendergrass, Sarah A. and Carty, Cara L. and Pankow, James S. and Schumacher, Fredrick R. and Cheng, Iona and Durda, Peter and Ambite, Jos{\'e} Luis and Deelman, Ewa and Cook, Nancy R. and Liu, Simin and Wactawski-Wende, Jean and Hutter, Carolyn and Brown-Gentry, Kristin and Wilson, Sarah and Best, Lyle G. and Pankratz, Nathan and Hong, Ching-Ping and Cole, Shelley A. and Voruganti, V. Saroja and B{\r u}{\v z}kova, Petra and Jorgensen, Neal W. and Jenny, Nancy S. and Wilkens, Lynne R. and Haiman, Christopher A. and Kolonel, Laurence N. and Lacroix, Andrea and North, Kari and Jackson, Rebecca and Le Marchand, Loic and Hindorff, Lucia A. and Crawford, Dana C. and Gross, Myron and Peters, Ulrike},
chemicals = {C-Reactive Protein},
citation-subset = {IM},
completed = {2015-03-09},
country = {United States},
doi = {10.1161/CIRCGENETICS.113.000173},
issn = {1942-3268},
issn-linking = {1942-3268},
issue = {2},
journal = {Circulation. Cardiovascular genetics},
keywords = {Adult; African Continental Ancestry Group, genetics; Aged; Asian Continental Ancestry Group, genetics; C-Reactive Protein, metabolism; Female; Genetic Variation; Genome-Wide Association Study; Hispanic Americans, genetics; Humans; Indians, North American, genetics; Inflammation, blood, epidemiology, ethnology, genetics; Male; Middle Aged; Polymorphism, Single Nucleotide; United States, epidemiology; Young Adult; C-reactive protein; continental population groups; ethnic groups; genetic pleiotropy; inflammation; molecular epidemiology; polymorphism, single nucleotide},
mid = {NIHMS575195},
month = apr,
nlm-id = {101489144},
owner = {NLM},
pages = {178--188},
pii = {CIRCGENETICS.113.000173},
pmc = {PMC4104750},
pmid = {24622110},
url = {https://pubmed.ncbi.nlm.nih.gov/24622110/},
pubmodel = {Print-Electronic},
pubstate = {ppublish},
revised = {2019-12-20},
title = {Multiancestral analysis of inflammation-related genetic variants and {C}-reactive protein in the {Population Architecture using Genomics and Epidemiology} study.},
volume = {7},
year = {2014},
bdsk-url-1 = {https://pubmed.ncbi.nlm.nih.gov/24622110/},
bdsk-url-2 = {https://doi.org/10.1161/CIRCGENETICS.113.000173}}
C-reactive protein (CRP) is a biomarker of inflammation. Genome-wide association studies (GWAS) have identified single-nucleotide polymorphisms (SNPs) associated with CRP concentrations and inflammation-related traits such as cardiovascular disease, type 2 diabetes mellitus, and obesity. We aimed to replicate previous CRP-SNP associations, assess whether these associations generalize to additional race/ethnicity groups, and evaluate inflammation-related SNPs for a potentially pleiotropic association with CRP. We selected and analyzed 16 CRP-associated and 250 inflammation-related GWAS SNPs among 40 473 African American, American Indian, Asian/Pacific Islander, European American, and Hispanic participants from 7 studies collaborating in the Population Architecture using Genomics and Epidemiology (PAGE) study. Fixed-effect meta-analyses combined study-specific race/ethnicity-stratified linear regression estimates to evaluate the association between each SNP and high-sensitivity CRP. Overall, 18 SNPs in 8 loci were significantly associated with CRP (Bonferroni-corrected P<3.1×10(-3) for replication, P<2.0×10(-4) for pleiotropy): Seven of these were specific to European Americans, while 9 additionally generalized to African Americans (1), Hispanics (5), or both (3); 1 SNP was seen only in African Americans and Hispanics. Two SNPs in the CELSR2/PSRC1/SORT1 locus showed a potentially novel association with CRP: rs599839 (P=2.0×10(-6)) and rs646776 (P=3.1×10(-5)). We replicated 16 SNP-CRP associations, 10 of which generalized to African Americans and/or Hispanics. We also identified potentially novel pleiotropic associations with CRP for two SNPs previously associated with coronary artery disease and/or low-density lipoprotein-cholesterol. These findings demonstrate the benefit of evaluating genotype-phenotype associations in multiple race/ethnicity groups and looking for pleiotropic relationships among SNPs previously associated with related phenotypes.
Multimodal prediction of affective dimensions and depression in human-computer interactions.
Gupta, R.; Malandrakis, N.; Xiao, B.; Guha, T.; Van Segbroeck, M.; Black, M. P.; Potamianos, A.; and Narayanan, S.
In
4th International Workshop on Audio/Visual Emotion Challenge, pages 33-40, 2014. ACM
doi
link
bibtex
@inproceedings{Gupta2014Multimodalpredictionofaffective,
author = {Gupta, Rahul and Malandrakis, Nikolaos and Xiao, Bo and Guha, Tanaya and Van Segbroeck, Maarten and Black, Matthew P. and Potamianos, Alexandros and Narayanan, Shrikanth},
bib2html_rescat = {bsp, emotion},
booktitle = {4th International Workshop on Audio/Visual Emotion Challenge},
doi = {10.1145/2661806.2661810},
link = {http://sail.usc.edu/publications/files/guptaacm2014.pdf},
location = {Orlando},
pages = {33-40},
publisher = {ACM},
title = {Multimodal prediction of affective dimensions and depression in human-computer interactions},
year = {2014}
}
Network Weirdness: Exploring the Origins of Network Paradoxes.
Kooti, F.; Hodas, N. O.; and Lerman, K.
In
International Conference on Weblogs and Social Media (ICWSM), March 2014.
Paper
Blog
link
bibtex
abstract
52 downloads
@inproceedings{Kooti14icwsm,
abstract = {Social networks have many counter-intuitive properties, including the
"friendship paradox" that states, on average, your friends have more friends
than you do. Recently, a variety of other paradoxes were demonstrated in online
social networks. This paper explores the origins of these network paradoxes.
Specifically, we ask whether they arise from mathematical properties of the
networks or whether they have a behavioral origin. We show that sampling from
heavy-tailed distributions always gives rise to a paradox in the mean, but not
the median. We propose a strong form of network paradoxes, based on utilizing
the median, and validate it empirically using data from two online social
networks. Specifically, we show that for any user the majority of user's
friends and followers have more friends, followers, etc. than the user, and
that this cannot be explained by statistical properties of sampling. Next, we
explore the behavioral origins of the paradoxes by using the shuffle test to
remove correlations between node degrees and attributes. We find that paradoxes
for the mean persist in the shuffled network, but not for the median. We
demonstrate that strong paradoxes arise due to the assortativity of user
attributes, including degree, and correlation between degree and attribute.},
author = {Kooti, Farshad and Hodas, Nathan O. and Lerman, Kristina},
booktitle = {International Conference on Weblogs and Social Media (ICWSM)},
keywords = {social-networks},
month = mar,
title = {Network Weirdness: Exploring the Origins of Network Paradoxes},
url = {http://arxiv.org/abs/1403.7242},
year = {2014},
urlBlog={http://crowdresearch.org/blog/?p=8749}
}
Social networks have many counter-intuitive properties, including the "friendship paradox" that states, on average, your friends have more friends than you do. Recently, a variety of other paradoxes were demonstrated in online social networks. This paper explores the origins of these network paradoxes. Specifically, we ask whether they arise from mathematical properties of the networks or whether they have a behavioral origin. We show that sampling from heavy-tailed distributions always gives rise to a paradox in the mean, but not the median. We propose a strong form of network paradoxes, based on utilizing the median, and validate it empirically using data from two online social networks. Specifically, we show that for any user the majority of user's friends and followers have more friends, followers, etc. than the user, and that this cannot be explained by statistical properties of sampling. Next, we explore the behavioral origins of the paradoxes by using the shuffle test to remove correlations between node degrees and attributes. We find that paradoxes for the mean persist in the shuffled network, but not for the median. We demonstrate that strong paradoxes arise due to the assortativity of user attributes, including degree, and correlation between degree and attribute.
Network security through data analysis: building situational awareness.
Collins, M.; and Collins, M. S
2014.
link
bibtex
@misc{collins2014network,
title={Network security through data analysis: building situational awareness},
author={Collins, Michael and Collins, Michael S},
year={2014},
publisher={" O'Reilly Media, Inc."}
}
New approaches for in-system debug of behaviorally-synthesized FPGA circuits.
Monson, J. S; and Hutchings, B.
In
Field Programmable Logic and Applications (FPL), 2014 24th International Conference on, pages 1–6, September 2014. IEEE
doi
link
bibtex
@InProceedings{Monson2014,
author = {Monson, Joshua S and Hutchings, Brad},
title = {New approaches for in-system debug of behaviorally-synthesized FPGA circuits},
booktitle = {Field Programmable Logic and Applications (FPL), 2014 24th International Conference on},
year = {2014},
pages = {1--6},
organization = {IEEE},
month = sep,
doi = {10.1109/FPL.2014.6927495}
}
OSDC BigDataBus: Towards an Unified Architecture for Scientific Data Aggregation - Poster.
Bello-Maldonado, P.; Oprescu, A.; Grosso, P.; Alvarez, H.; and Gutierrez, I.
07/2014 2014.
Paper
link
bibtex
@conference {7337,
title = {OSDC BigDataBus: Towards an Unified Architecture for Scientific Data Aggregation - Poster},
booktitle = {XSEDE14 Conference},
year = {2014},
month = {07/2014},
address = {Atlanta, Georgia},
url = {https://urldefense.com/v3/__https://www.xsede.org/web/conference/posters__;!!FjuHKAHQs5udqho!OrfqNEjI8IYnpYEY3Wc7S4oSY6Kf82MHM8jGAJar7qa8MoXzNwtTTC2HiJsVSREP5YicoFyUQE2tuQ$ },
author = {Pedro Bello-Maldonado and Ana Oprescu and Paola Grosso and Heidi Alvarez and Indira Gutierrez}
}
Occlusion Edge Detection in RGB-D Frames Using Deep Convolutional Networks.
Sarkar, S.; Vivek, V.; Reddy, K.; Giering, M.; Ryde, J.; and Jaitly, N.
. December 2014.
Paper
link
bibtex
abstract
@article{Sarkar2014Occlusion-,
abstract = {Occlusion edges in images which correspond to range discontinuity in the scene from the point of view of the observer are an important prerequisite for many vision and mobile robot tasks. Although they can be extracted from range data however extracting them from images and videos would be extremely beneficial. We trained a deep convolutional neural network (CNN) to identify occlusion edges in images and videos with both RGB-D and RGB inputs. The use of CNN avoids hand-crafting of features for automatically isolating occlusion edges and distinguishing them from appearance edges. Other than quantitative occlusion edge detection results, qualitative results are provided to demonstrate the trade-off between high resolution analysis and frame-level computation time which is critical for real-time robotics applications.},
author = {Sarkar, Soumik and Venugopalan Vivek and Reddy, Kishore and Giering, Michael and Ryde, Julian and Jaitly,Navdeep},
date-added = {2020-01-20 18:26:26 -0500},
date-modified = {2020-01-20 18:26:26 -0500},
eprint = {1412.7007},
month = dec,
year = {2014},
title = {{Occlusion Edge Detection in RGB-D Frames Using Deep Convolutional Networks}},
url = {http://arxiv.org/abs/1412.7007},
Bdsk-Url-1 = {http://arxiv.org/abs/1412.7007}}
Occlusion edges in images which correspond to range discontinuity in the scene from the point of view of the observer are an important prerequisite for many vision and mobile robot tasks. Although they can be extracted from range data however extracting them from images and videos would be extremely beneficial. We trained a deep convolutional neural network (CNN) to identify occlusion edges in images and videos with both RGB-D and RGB inputs. The use of CNN avoids hand-crafting of features for automatically isolating occlusion edges and distinguishing them from appearance edges. Other than quantitative occlusion edge detection results, qualitative results are provided to demonstrate the trade-off between high resolution analysis and frame-level computation time which is critical for real-time robotics applications.
On Linking Heterogeneous Dataset Collections.
Kejriwal, M.; and Miranker, D. P.
In Horridge, M.; Rospocher, M.; and van Ossenbruggen, J., editor(s),
Proceedings of the ISWC 2014 Posters & Demonstrations Track a track within the 13th International Semantic Web Conference, ISWC 2014, Riva del Garda, Italy, October 21, 2014, volume 1272, of
CEUR Workshop Proceedings, pages 217–220, 2014. CEUR-WS.org
Paper
link
bibtex
@inproceedings{DBLP:conf/semweb/KejriwalM14,
author = {Mayank Kejriwal and
Daniel P. Miranker},
editor = {Matthew Horridge and
Marco Rospocher and
Jacco van Ossenbruggen},
title = {On Linking Heterogeneous Dataset Collections},
booktitle = {Proceedings of the {ISWC} 2014 Posters {\&} Demonstrations Track a
track within the 13th International Semantic Web Conference, {ISWC}
2014, Riva del Garda, Italy, October 21, 2014},
series = {{CEUR} Workshop Proceedings},
volume = {1272},
pages = {217--220},
publisher = {CEUR-WS.org},
year = {2014},
url = {http://ceur-ws.org/Vol-1272/paper\_17.pdf},
timestamp = {Tue, 07 Sep 2021 13:47:43 +0200},
biburl = {https://dblp.org/rec/conf/semweb/KejriwalM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
One-way games.
Abeliuk, A.; Berbeglia, G.; and Hentenryck, P. V.
In Bazzan, A. L. C.; Huhns, M. N.; Lomuscio, A.; and Scerri, P., editor(s),
AAMAS, pages 1519-1520, May 2014. IFAAMAS/ACM
Link
Paper
link
bibtex
@inproceedings{conf/atal/AbeliukBH14,
added-at = {2014-09-25T00:00:00.000+0200},
author = {Abeliuk, Andr{\'{e}}s and Berbeglia, Gerardo and Hentenryck, Pascal Van},
biburl = {https://www.bibsonomy.org/bibtex/20aae72ad9b129a6c76cdb4e57e44df5a/dblp},
booktitle = {AAMAS},
crossref = {conf/atal/2014},
editor = {Bazzan, Ana L. C. and Huhns, Michael N. and Lomuscio, Alessio and Scerri, Paul},
ee = {http://dl.acm.org/citation.cfm?id=2616041},
interhash = {f569a85e77276e361214907e5837a42d},
intrahash = {0aae72ad9b129a6c76cdb4e57e44df5a},
isbn = {978-1-4503-2738-1},
keywords = {dblp},
pages = {1519-1520},
publisher = {IFAAMAS/ACM},
timestamp = {2015-04-28T17:57:34.000+0200},
title = {One-way games.},
url = {http://dl.acm.org/citation.cfm?id=2616041},
month = may,
year = 2014
}
Open Geospatial Consortium Testbed 10 Provenance Engineering Report.
Maso, J.; Closa, G.; Gil, Y.; and Pross, B.
2014.
Open Geospatial Consortium (OGC) Technical Report 14-001
Paper
link
bibtex
@misc{ ogc-prov-report-14,
title = {Open Geospatial Consortium Testbed 10 Provenance Engineering Report},
author = {Joan Maso and Guillem Closa and Yolanda Gil and Benjamin Pross},
note = {Open Geospatial Consortium (OGC) Technical Report 14-001},
year = {2014},
url = {https://portal.opengeospatial.org/files/?artifact_id=58967}
}
Openwave: Collaboration Between Industry and Government.
Alvarez, H.; Cox, D. A.; and Ibarra, J.
03/2014 2014.
link
bibtex
@conference {7338,
title = {Openwave: Collaboration Between Industry and Government},
booktitle = {Managing Critical Infrastructure in a Changing Natural and Socio-Economic Environment, 2014 ICPC Plenary Meeting},
year = {2014},
month = {03/2014},
address = {Dubai},
author = {Heidi Alvarez and Donald A. Cox and Julio Ibarra}
}
Opinion dynamics with confirmation bias.
Allahverdyan, A. E; and Galstyan, A.
PloS one, 9(7): e99557. 2014.
link
bibtex
@article{allahverdyan2014opinion,
title={Opinion dynamics with confirmation bias},
author={Allahverdyan, Armen E and Galstyan, Aram},
journal={PloS one},
volume={9},
number={7},
pages={e99557},
year={2014},
publisher={Public Library of Science}
}
Optimal Application Allocation on Multiple Public Clouds.
Woo, S. S; and Mirkovic, J.
Computer Networks. 2014.
link
bibtex
@article{woo2014optimal,
title={Optimal Application Allocation on Multiple Public Clouds},
author={Woo, Simon S and Mirkovic, Jelena},
journal={Computer Networks},
year={2014},
publisher={Elsevier}
}
Optimizing the Chase: Scalable Data Integration under Constraints.
Konstantinidis, G.; and Ambite, J. L.
PVLDB, 7(14): 1869-1880. 2014.
link
bibtex
@Article{konstantinidis2014:pvldb,
author = {George Konstantinidis and Jos\'{e} Luis Ambite},
title = {Optimizing the Chase: Scalable Data Integration under Constraints},
journal = {PVLDB},
year = {2014},
volume = {7},
number = {14},
pages = {1869-1880},
}
Placing User-generated Content on the Map with Confidence.
Intagorn, S.; and Lerman, K.
In
ACM GIS, 2014.
Paper
link
bibtex
abstract
@INPROCEEDINGS{Intagorn14acmgis,
AUTHOR = {Suradej Intagorn and Kristina Lerman},
TITLE = {Placing User-generated Content on the Map with Confidence},
BOOKTITLE = {ACM GIS},
YEAR = {2014},
abstract = {We describe a method that predicts the location of user-generated
content using textual features alone. Unlike previous methods for
geotagging text documents, our proposed method is not sensitive
to how we discretize space. We also discover that spatial resolu-
tion has an impact on the prediction accuracy, which allows us to
trade-off the spatial resolution of the predicted location against our
confidence about its accuracy. Our method can be used to estimate
the error in document�s predicted location, enabling us to filter out
poor quality predictions. We evaluate the proposed method exten-
sively on user-generated content collected from two different social
media sites, Flickr and Twitter. Our evaluation examines its perfor-
mance on the geotagging task and with respect to different parame-
ters. We achieve state-of-the-art results for all three tasks: location
prediction, error estimation and result ranking and also provide a
theoretical explanation of the effect of spatial resolution factor on
geotagging accuracy. Our findings provide valuable insights into
the design of geotagging systems and their quality control.},
keywords = {social-annotation},
url={http://www.isi.edu/integration/people/lerman/papers/Intagorn14acmgis.pdf}
}
We describe a method that predicts the location of user-generated content using textual features alone. Unlike previous methods for geotagging text documents, our proposed method is not sensitive to how we discretize space. We also discover that spatial resolu- tion has an impact on the prediction accuracy, which allows us to trade-off the spatial resolution of the predicted location against our confidence about its accuracy. Our method can be used to estimate the error in document�s predicted location, enabling us to filter out poor quality predictions. We evaluate the proposed method exten- sively on user-generated content collected from two different social media sites, Flickr and Twitter. Our evaluation examines its perfor- mance on the geotagging task and with respect to different parame- ters. We achieve state-of-the-art results for all three tasks: location prediction, error estimation and result ranking and also provide a theoretical explanation of the effect of spatial resolution factor on geotagging accuracy. Our findings provide valuable insights into the design of geotagging systems and their quality control.
Populating Entity Name Systems for Big Data Integration.
Kejriwal, M.
In Mika, P.; Tudorache, T.; Bernstein, A.; Welty, C.;
Knoblock, C. A.; Vrandecic, D.; Groth, P.; Noy, N. F.; Janowicz, K.; and Goble, C. A., editor(s),
The Semantic Web - ISWC 2014 - 13th International Semantic Web Conference, Riva del Garda, Italy, October 19-23, 2014. Proceedings, Part II, volume 8797, of
Lecture Notes in Computer Science, pages 521–528, 2014. Springer
Paper
doi
link
bibtex
2 downloads
@inproceedings{DBLP:conf/semweb/Kejriwal14,
author = {Mayank Kejriwal},
editor = {Peter Mika and
Tania Tudorache and
Abraham Bernstein and
Chris Welty and
Craig A. Knoblock and
Denny Vrandecic and
Paul Groth and
Natasha F. Noy and
Krzysztof Janowicz and
Carole A. Goble},
title = {Populating Entity Name Systems for Big Data Integration},
booktitle = {The Semantic Web - {ISWC} 2014 - 13th International Semantic Web Conference,
Riva del Garda, Italy, October 19-23, 2014. Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {8797},
pages = {521--528},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-11915-1\_34},
doi = {10.1007/978-3-319-11915-1\_34},
timestamp = {Tue, 07 Sep 2021 13:48:13 +0200},
biburl = {https://dblp.org/rec/conf/semweb/Kejriwal14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Practical Resource Monitoring for Robust High Throughput Computing.
Juve, G.; Tovar, B.; Ferreira da Silva, R.; Robinson, C.; Thain, D.; Deelman, E.; Allcock, W.; and Livny, M.
Technical Report Technical Report 14-950, University of Southern California, 2014.
Funding Acknowledgments: DOE contract for dv/dt ER26110
Paper
link
bibtex
@TechReport{ juve2014monitoring,
Author = {Gideon Juve and Benjamin Tovar and Ferreira da Silva,
Rafael and Casey Robinson and Douglas Thain and Ewa Deelman
and William Allcock and Miron Livny},
URL = {http://pegasus.isi.edu/publications/2014/2014-dvdtreport.pdf},
Title = {Practical Resource Monitoring for Robust High Throughput
Computing},
Institution = {University of Southern California},
Number = {Technical Report 14-950},
Year = {2014},
Note = {Funding Acknowledgments: DOE contract for dv/dt ER26110}
}
Predicting Clients inclination towards Target Behavior Change in Motivational Interviewing and investigating the role of laughter.
Gupta, R.; Georgiou, P.; Atkins, D.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Gupta2014PredictingClientsinclinationtowards,
author = {Gupta, Rahul and Georgiou, Panayiotis and Atkins, David and Narayanan, Shrikanth},
bib2html_rescat = {bsp},
booktitle = {Proceedings of Interspeech},
doi = {},
link = {http://sail.usc.edu/publications/files/bi_modelling.pdf},
month = {Sep},
title = {Predicting Clients inclination towards Target Behavior Change in Motivational Interviewing and investigating the role of laughter},
year = {2014}
}
Probabilistic Models for Collective Entity Resolution Between Knowledge Graphs.
Pujara, J.; Murphy, K.; Dong, X. L.; and Janssen, C.
In
Bay Area Machine Learning Symposium, 2014.
link
bibtex
@inproceedings{pujara:baylearn14,
Author = "Pujara, Jay and Murphy, Kevin and Dong, Xin Luna and Janssen, Curtis",
Booktitle = "Bay Area Machine Learning Symposium",
Title = "{Probabilistic Models for Collective Entity Resolution Between Knowledge Graphs}",
Year = "2014",
bib_url = "/pubs/bib/pujara-baylearn14.bib",
pdf_url = "/pubs/2014/pujara-baylearn14/pujara-baylearn14.pdf",
sec = "ws"
}
Probabilistic sequence alignment of stratigraphic records.
Lin, L.; Khider, D.; Lisiecki, L. E; and Lawrence, C. E
Paleoceanography, 29(10): 976–989. 2014.
Paper
doi
link
bibtex
@article{lin_probabilistic_2014,
title = {Probabilistic sequence alignment of stratigraphic records},
volume = {29},
url = {https://github.com/khider/khider.github.io/blob/master/papers/Lin%20et%20al._2014_Paleoceanography.pdf},
doi = {10.1002/2014PA002713},
number = {10},
journal = {Paleoceanography},
author = {Lin, Luan and Khider, Deborah and Lisiecki, Lorraine E and Lawrence, Charles E},
year = {2014},
pages = {976--989},
}
Proceedings of the Second Workshop on Services and Applications over Linked APIs and Data.
Maleshkova, M.; Verborgh, R.; Stadtmüller, S.; and Szekely, P.
. 2014.
link
bibtex
@article{maleshkova2014proceedings,
title={Proceedings of the Second Workshop on Services and Applications over Linked APIs and Data},
author={Maleshkova, Maria and Verborgh, Ruben and Stadtm{\"u}ller, Steffen and Szekely, Pedro},
year={2014}
}
Publishing the Data of the Smithsonian American Art Museum to the Linked Data Cloud.
Szekely, P.; Knoblock, C. A; Yang, F.; Fink, E. E; Gupta, S.; Allen, R.; and Goodlander, G.
International Journal of Humanities and Arts Computing, 8(supplement): 152–166. 2014.
link
bibtex
@article{szekely2014publishing,
title={Publishing the Data of the Smithsonian American Art Museum to the Linked Data Cloud},
author={Szekely, Pedro and Knoblock, Craig A and Yang, Fengyu and Fink, Eleanor E and Gupta, Shubham and Allen, Rachel and Goodlander, Georgina},
journal={International Journal of Humanities and Arts Computing},
volume={8},
number={supplement},
pages={152--166},
year={2014},
publisher={Edinburgh University Press 22 George Square, Edinburgh EH8 9LF UK}
}
Publishing the Data of the Smithsonian American Art Museum to the Linked Data Cloud.
Szekely, P.; Knoblock, C. A.; Yang, F.; Zhu, X.; Fink, E.; Allen, R.; and Goodlander, G.
International Journal of Humanities and Art Computing (IJHAC), 8: 152-166. 2014.
Paper
Link
link
bibtex
153 downloads
@article{szekely14:ijhac,
title = {Publishing the Data of the Smithsonian American Art Museum to the Linked Data Cloud},
author = {Pedro Szekely and Craig A. Knoblock and Fengyu Yang and Xuming Zhu and Eleanor Fink and Rachel Allen and Georgina Goodlander},
journal = {International Journal of Humanities and Art Computing (IJHAC)},
year = {2014},
mont = {March},
volume=8,
pages={152-166},
urlPaper= "http://usc-isi-i2.github.io/papers/szekely14-ijhac.pdf",
urlLink="http://www.euppublishing.com/doi/abs/10.3366/ijhac.2014.0104"
}
Real-time magnetic resonance imaging and electromagnetic articulography database for speech production research (TC).
Narayanan, S. S.; Toutios, A.; Ramanarayanan, V.; Lammert, A.; Kim, J.; Lee, S.; Nayak, K. S.; Kim, Y.; Zhu, Y.; Goldstein, L.; Byrd, D.; Bresch, E.; Ghosh, P. K.; Katsamanis, A.; and Proctor, M. I.
J. Acoust. Soc. Am., 136(3): 1307-1311. Sep 2014.
doi
link
bibtex
@article{Narayanan2014Real-timemagneticresonanceimaging,
author = {Narayanan, Shrikanth S. and Toutios, Asterios and Ramanarayanan, Vikram and Lammert, Adam and Kim, Jangwon and Lee, Sungbok and Nayak, Krishna S. and Kim, Yoon-Chul and Zhu, Yinghua and Goldstein, Louis and Byrd, Dani and Bresch, Erik and Ghosh, Prasanta Kumar and Katsamanis, Athanasios and Proctor, Michael I.},
bib2html_rescat = {span},
doi = {dx.doi.org/10.1121/1.4890284},
journal = {J. Acoust. Soc. Am.},
link = {http://sail.usc.edu/publications/files/14890284.pdf},
month = {Sep},
number = {3},
pages = {1307-1311},
title = {Real-time magnetic resonance imaging and electromagnetic articulography database for speech production research (TC)},
volume = {136},
year = {2014}
}
Replication of Associations Between GWAS SNPs and Melanoma Risk in the Population Architecture Using Genomics and Epidemiology (PAGE) Study.
Kocarnik, J. M A. P.; S Lani AND Han, J. A. D.; Logan AND Cheng, I. A. W.; Lynne R AND Schumacher, F. R A. K.; Laurence AND Carlson, C. S A. C.; Dana C AND Goodloe, R. J A. D.; Holli AND Baker, P. A. R.; Danielle AND Ambite, J. L. A. S.; Fengju AND Quresh, A. A A. Z.; Mingfeng AND Duggan, D. A. H.; Carolyn AND Hindorff, L. A A. B.; William S AND Kooperberg, C. A. L. M.; and Loic AND Peters, U.
Journal of Investigative Dermatology, 134(7): 2049–52. 2014.
doi: 10.1038/jid.2014.53
link
bibtex
@article{kocarnik2014:id,
author = {Kocarnik, Jonathan M AND Park, S Lani AND Han, Jiali AND Dumitrescu, Logan AND Cheng, Iona AND Wilkens, Lynne R AND Schumacher, Fredrick R AND Kolonel, Laurence AND Carlson, Chris S AND Crawford, Dana C AND Goodloe, Robert J AND Dilks, Holli AND Baker, Paxton AND Richardson, Danielle AND Ambite, Jos\'{e} Luis AND Song, Fengju AND Quresh, Abrar A AND Zhang, Mingfeng AND Duggan, David AND Hutter, Carolyn AND Hindorff, Lucia A AND Bush, William S AND Kooperberg, Charles AND Le Marchand, Loic AND Peters, Ulrike},
title = {{Replication of Associations Between GWAS SNPs and Melanoma Risk in the Population Architecture Using Genomics and Epidemiology (PAGE) Study}},
journal = {Journal of Investigative Dermatology},
year = {2014},
volume = {134},
number = {7},
pages = {2049--52},
note = {doi: 10.1038/jid.2014.53},
}
Rethinking Centrality: The Role of Dynamical Processes in Social Network Analysis.
Ghosh, R.; and Lerman, K.
Discrete and Continuous Dynamical Systems Series B, 19(5): 1355 – 1372. July 2014.
Paper
link
bibtex
abstract
44 downloads
@ARTICLE{Ghosh14dcds,
AUTHOR = {Rumi Ghosh and Kristina Lerman},
TITLE = {Rethinking Centrality: The Role of Dynamical Processes in Social Network Analysis},
JOURNAL = {Discrete and Continuous Dynamical Systems Series B},
YEAR = {2014},
volume = {19},
number = {5},
pages = {1355 -- 1372},
month = {July},
note = {},
abstract = {Many popular measures used in social network analysis, including
centrality, are based on the random walk. The random walk is a model of a
stochastic process where a node interacts with one other node at a time. How-
ever, the random walk may not be appropriate for modeling social phenomena,
including epidemics and information diffusion, in which one node may interact
with many others at the same time, for example, by broadcasting the virus or
information to its neighbors. To produce meaningful results, social network
analysis algorithms have to take into account the nature of interactions be-
tween the nodes. In this paper we classify dynamical processes as conservative
and non-conservative and relate them to well-known measures of centrality
used in network analysis: PageRank and Alpha-Centrality. We demonstrate,
by ranking users in online social networks used for broadcasting information,
that non-conservative Alpha-Centrality generally leads to a better agreement
with an empirical ranking scheme than the conservative PageRank. http://arxiv.org/abs/1209.4616},
keywords = {social-networks},
url = {http://aimsciences.org/journals/displayArticlesnew.jsp?paperID=9862},
}
Many popular measures used in social network analysis, including centrality, are based on the random walk. The random walk is a model of a stochastic process where a node interacts with one other node at a time. How- ever, the random walk may not be appropriate for modeling social phenomena, including epidemics and information diffusion, in which one node may interact with many others at the same time, for example, by broadcasting the virus or information to its neighbors. To produce meaningful results, social network analysis algorithms have to take into account the nature of interactions be- tween the nodes. In this paper we classify dynamical processes as conservative and non-conservative and relate them to well-known measures of centrality used in network analysis: PageRank and Alpha-Centrality. We demonstrate, by ranking users in online social networks used for broadcasting information, that non-conservative Alpha-Centrality generally leads to a better agreement with an empirical ranking scheme than the conservative PageRank. http://arxiv.org/abs/1209.4616
Robust Language Identification Using Convolutional Neural Network Features.
Ganapathy, S.; Han, K. J.; Samuel, T.; Omar, M. K.; Van Segbroeck, M.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Ganapathy2014RobustLanguageIdentificationUsing,
author = {Ganapathy, Sriram and Han, Kyu Jeong and Samuel, Thomas and Omar, Mohamed K. and Van Segbroeck, Maarten and Narayanan, Shrikanth},
bib2html_rescat = {rats},
booktitle = {Proceedings of Interspeech},
link = {http://sail.usc.edu/publications/files/ganapathy_interspeech_14.pdf},
month = {Sep},
title = {Robust Language Identification Using Convolutional Neural Network Features},
year = {2014}
}
Robust Ramsey sequences with Raman adiabatic rapid passage.
Kotru, K.; Brown, J. M; Butts, D. L; Kinast, J. M; and Stoner, R. E
Physical Review A, 90(5): 053611. 2014.
link
bibtex
@article{kotru2014robust,
title={Robust Ramsey sequences with Raman adiabatic rapid passage},
author={Kotru, Krish and Brown, Justin M and Butts, David L and Kinast, Joseph M and Stoner, Richard E},
journal={Physical Review A},
volume={90},
number={5},
pages={053611},
year={2014},
publisher={APS}
}
Robust Unsupervised Arousal Rating: A rule-based framework with knowledge-inspired vocal features.
Bone, D.; Lee, C.; and Narayanan, S. S.
IEEE Transactions on Affective Computing, 5(1): 201-213. Apr 2014.
doi
link
bibtex
@article{Bone2014RobustUnsupervisedArousalRating:,
author = {Bone, Daniel and Lee, Chi-Chun and Narayanan, Shrikanth S.},
bib2html_rescat = {emotion},
doi = {10.1109/TAFFC.2014.2326393},
journal = {IEEE Transactions on Affective Computing},
link = {http://sail.usc.edu/publications/files/bone_ieeetaffc_2014.pdf},
month = {Apr},
number = {1},
pages = {201-213},
title = {Robust Unsupervised Arousal Rating: A rule-based framework with knowledge-inspired vocal features},
volume = {5},
year = {2014}
}
Robust object classification in underwater sidescan sonar images by using reliability aware fusion of shadow features.
Kumar, N.; Mitra, U.; and Narayanan, S. S.
IEEE Journal of Oceanic Engineering. 2014.
doi
link
bibtex
@article{Kumar2014Robustobjectclassificationin,
author = {Kumar, Naveen and Mitra, Urbashi and Narayanan, Shrikanth S.},
bib2html_rescat = {},
doi = {https://doi.org/10.1109/joe.2014.2344971},
journal = {IEEE Journal of Oceanic Engineering},
title = {Robust object classification in underwater sidescan sonar images by using reliability aware fusion of shadow features},
year = {2014}
}
SAIL-GRS: Grammar Induction for Spoken Dialogue Systems using CF-IRF Rule Similarity.
Zervanou, K.; Malandrakis, N.; and Narayanan, S. S.
In
Proceedings of SemEval 2014, Aug 2014.
doi
link
bibtex
@inproceedings{Zervanou2014SAIL-GRS:GrammarInductionfor,
author = {Zervanou, Kalliopi and Malandrakis, Nikolaos and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of SemEval 2014},
doi = {https://doi.org/10.3115/v1/s14-2088},
link = {http://sail.usc.edu/publications/files/semeval2014_gr.pdf},
location = {Dublin, Ireland},
month = {Aug},
title = {SAIL-GRS: Grammar Induction for Spoken Dialogue Systems using CF-IRF Rule Similarity},
year = {2014}
}
SAIL: Sentiment Analysis using Semantic Similarity and Contrast Features.
Malandrakis, N.; Falcone, M.; Vaz, C.; Bisogni, J.; Potamianos, A.; and Narayanan, S. S.
In
Proceedings of SemEval 2014, Aug 2014.
link
bibtex
@inproceedings{Mal2014SAIL:SentimentAnalysisusing,
author = {Malandrakis, Nikolaos and Falcone, Michael and Vaz, Colin and Bisogni, Jesse and Potamianos, Alexandros and Narayanan, Shrikanth S.},
booktitle = {Proceedings of SemEval 2014},
keyword = {emotion},
link = {http://sail.usc.edu/publications/files/semeval2014.pdf},
location = {Dublin, Ireland},
month = {Aug},
title = {SAIL: Sentiment Analysis using Semantic Similarity and Contrast Features},
year = {2014}
}
SENSS: Software Defined Security Service.
Yu, M.; Zhang, Y.; Mirkovic, J.; and Alwabel, A.
In
Open Networking Summit (ONS 2014), 2014.
link
bibtex
@inproceedings{yu2014senss,
title={SENSS: Software Defined Security Service},
author={Yu, Minlan and Zhang, Ying and Mirkovic, Jelena and Alwabel, Abdulla},
booktitle={Open Networking Summit (ONS 2014)},
year={2014}
}
Safe and automated live malware experimentation on public testbeds.
Alwabel, A.; Shi, H.; Bartlett, G.; and Mirkovic, J.
In
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014.
link
bibtex
@inproceedings{alwabel2014safe,
title={Safe and automated live malware experimentation on public testbeds},
author={Alwabel, Abdulla and Shi, Hao and Bartlett, Genevieve and Mirkovic, Jelena},
booktitle={7th Workshop on Cyber Security Experimentation and Test (CSET 14)},
year={2014}
}
Scheduling in data center networks with optical traffic grooming.
Sankaran, G. C; and Sivalingam, K. M
In
2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), pages 179–184, 2014. IEEE
link
bibtex
@inproceedings{sankaran2014scheduling,
title={Scheduling in data center networks with optical traffic grooming},
author={Sankaran, Ganesh C and Sivalingam, Krishna M},
booktitle={2014 IEEE 3rd International Conference on Cloud Networking (CloudNet)},
pages={179--184},
year={2014},
organization={IEEE}
}
Schema matching over relations, attributes, and data values.
Tian, A.; Kejriwal, M.; and Miranker, D. P.
In Jensen, C. S.; Lu, H.; Pedersen, T. B.; Thomsen, C.; and Torp, K., editor(s),
Conference on Scientific and Statistical Database Management, SSDBM '14, Aalborg, Denmark, June 30 - July 02, 2014, pages 28:1–28:12, 2014. ACM
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/ssdbm/TianKM14,
author = {Aibo Tian and
Mayank Kejriwal and
Daniel P. Miranker},
editor = {Christian S. Jensen and
Hua Lu and
Torben Bach Pedersen and
Christian Thomsen and
Kristian Torp},
title = {Schema matching over relations, attributes, and data values},
booktitle = {Conference on Scientific and Statistical Database Management, {SSDBM}
'14, Aalborg, Denmark, June 30 - July 02, 2014},
pages = {28:1--28:12},
publisher = {{ACM}},
year = {2014},
url = {https://doi.org/10.1145/2618243.2618248},
doi = {10.1145/2618243.2618248},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ssdbm/TianKM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
SchizConnect: Large-Scale Schizophrenia Neuroimaging Data Integration and Sharing.
Wang, L; Alpert, K.; Calhoun, V; Keator, D; King, M; Kogan, A; Landis, D; Tallis, M; Potkin, S.; Turner, J.; and Ambite, J.
In
Annual Meeting of the American College of Neuropsychopharmacology (ACNP), Phoenix, Arizona, 2014.
Abstract+Poster
link
bibtex
@InProceedings{wang2014,
author = {L Wang and KI Alpert and V Calhoun and D Keator and M King and A Kogan and D Landis and M Tallis and SG Potkin and JA Turner and JL Ambite},
title = {SchizConnect: Large-Scale Schizophrenia Neuroimaging Data Integration and Sharing},
booktitle = {Annual Meeting of the American College of Neuropsychopharmacology (ACNP)},
year = {2014},
address = {Phoenix, Arizona},
note = {Abstract+Poster},
}
Selection of optimal vocal tract regions using real-time magnetic resonance imaging for robust voice activity detection.
Prasad, A.; Ghosh, P. K.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Prasad2014Selectionofoptimalvocal,
author = {Prasad, Abhay and Ghosh, Prasanta Kumar and Narayanan, Shrikanth},
bib2html_rescat = {span},
booktitle = {Proceedings of Interspeech},
keyword = {SPAN},
month = {Sep},
title = {Selection of optimal vocal tract regions using real-time magnetic resonance imaging for robust voice activity detection},
year = {2014}
}
Semi-supervised term-weighted value rescoring for keyword search.
Audhkhasi, K.; Sethy, A.; Ramabhadran, B.; and Narayanan, S.
In
Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP), May 2014.
doi
link
bibtex
@inproceedings{Audhkhasi2014SemiSupervisedTW,
author = {Audhkhasi, Kartik and Sethy, Abhinav and Ramabhadran, Bhuvana and Narayanan, Shrikanth},
bib2html_rescat = {span},
booktitle = {Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2014.6855132},
link = {http://sail.usc.edu/publications/files/p7919-audhkhasi.pdf},
location = {Florence, Italy},
month = {May},
title = {Semi-supervised term-weighted value rescoring for keyword search},
year = {2014}
}
Service directory for quick and simplified application identification.
Sankaran, G. C.; and Karthikeyan, K.
September~18 2014.
US Patent 10,608,899
link
bibtex
@misc{sankaran2014service,
title={Service directory for quick and simplified application identification},
author={Sankaran, Ganesh Chennimalai and Karthikeyan, Krishnamoorthy},
year={2014},
month=sep # "~18",
note={US Patent 10,608,899}
}
Sharing Network Data: Bright Gray Days Ahead.
Heidemann, J.
Keynote talk at Passive and Active Measurements Conference, March 2014.
Paper
link
bibtex
abstract
@Misc{Heidemann14b,
author = "John Heidemann",
title = "Sharing Network Data: Bright Gray Days Ahead",
howpublished = "Keynote talk at Passive and Active
Measurements Conference",
month = mar,
year = 2014,
sortdate = "2014-03-01",
project = "ant, lacrend",
jsubject = "network_observation",
jlocation = "johnh: pafile",
keywords = "data sharing, predict, lander, lacrend, keynote",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann14b.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann14b.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
abstract = "
Sharing data is what we expect as a community. From the IMC best
paper award requiring a public dataset to NSF data management plans,
we know that data is crucial to reproducible science. Yet privacy
concerns today make data acquisition difficult and sharing harder
still. AOL and Netflix have released anonymized datasets that leaked
customer information, at least for a few customers and with some
effort. With the EU suggesting that IP addresses are personally
identifiable information, are we doomed to IP-address free ``Internet''
datasets? \newline \indent
In this talk I will explore the issues in data sharing, suggesting
that we need to move beyond black and white definitions of private and
public datasets, to embrace the gray shades of data sharing in our
future. Gray need not be gloomy. I will discuss some new ideas in
sharing that suggest that, if we move beyond ``anonymous ftp'' as our
definition, the future may be gray but bright.
",
}
% correcttitle = "{T-DNS}: Connection-Oriented {DNS} to Improve Privacy and Security",
Sharing data is what we expect as a community. From the IMC best paper award requiring a public dataset to NSF data management plans, we know that data is crucial to reproducible science. Yet privacy concerns today make data acquisition difficult and sharing harder still. AOL and Netflix have released anonymized datasets that leaked customer information, at least for a few customers and with some effort. With the EU suggesting that IP addresses are personally identifiable information, are we doomed to IP-address free ``Internet'' datasets? \newline ∈dent In this talk I will explore the issues in data sharing, suggesting that we need to move beyond black and white definitions of private and public datasets, to embrace the gray shades of data sharing in our future. Gray need not be gloomy. I will discuss some new ideas in sharing that suggest that, if we move beyond ``anonymous ftp'' as our definition, the future may be gray but bright.
Similarity assessment and efficient retrieval of semantic workflows.
Bergmann, R.; and Gil, Y.
Inf. Syst., 40: 115–127. 2014.
Paper
doi
link
bibtex
35 downloads
@article{DBLP:journals/is/BergmannG14,
author = {Ralph Bergmann and
Yolanda Gil},
title = {Similarity assessment and efficient retrieval of semantic workflows},
journal = {Inf. Syst.},
volume = {40},
pages = {115--127},
year = {2014},
url = {https://doi.org/10.1016/j.is.2012.07.005},
doi = {10.1016/J.IS.2012.07.005},
timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/is/BergmannG14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Simplified Supervised I-vector Modeling with application to Robust and Efficient Language Identification and Speaker Verification.
Li, M.; and Narayanan, S.
Computer, Speech, and Language. 2014.
doi
link
bibtex
@article{Li2014SimplifiedSupervisedI-vectorModeling,
author = {Li, Ming and Narayanan, Shrikanth},
bib2html_rescat = {},
doi = {10.1016/j.csl.2014.02.004},
journal = {Computer, Speech, and Language},
link = {http://sail.usc.edu/publications/files/li-csl-2014-simplifiedsupervisedi-vector.pdf},
title = {Simplified Supervised I-vector Modeling with application to Robust and Efficient Language Identification and Speaker Verification},
year = {2014}
}
Simplified and Supervised i-vector Modeling for Speaker Age Regression.
Gurunath Shivakumar, P.; Li, M.; Dhandhania, V.; and Narayanan, S.
In
Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP), May 2014.
doi
link
bibtex
@inproceedings{Shivakumar2014SimplifiedIvector,
author = {Gurunath Shivakumar, Prashanth and Li, Ming and Dhandhania, Vedant and Narayanan, Shrikanth},
bib2html_rescat = {rats},
booktitle = {Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2014.6854520},
link = {http://sail.usc.edu/publications/files/p4866-gurunath_shivakumar.pdf},
location = {Florence, Italy},
month = {May},
title = {Simplified and Supervised i-vector Modeling for Speaker Age Regression},
year = {2014}
}
Solid state electrochemical alkali sources for cold atom sensing.
Bernstein, J.; Whale, A.; Brown, J. D; Johnson, C.; Cook, E.; Calvez, L.; Zhang, X.; and Martin, S. W
In
Solid State Sensors, Actuators and Microsystems Workshop, 2014.
link
bibtex
@inproceedings{bernstein2014solid,
title={Solid state electrochemical alkali sources for cold atom sensing},
author={Bernstein, Jonathan and Whale, Alison and Brown, Justin D and Johnson, Cort and Cook, Eugene and Calvez, Laurent and Zhang, Xianghua and Martin, Steve W},
booktitle={Solid State Sensors, Actuators and Microsystems Workshop},
year={2014}
}
Stochastic Contextual Edit Distance and Probabilistic FSTs.
Cotterell, R.; Peng, N.; and Eisner, J.
In
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014.
link
bibtex
@inproceedings{cotterell2014stochastic,
title={Stochastic Contextual Edit Distance and Probabilistic FSTs},
author={Cotterell, Ryan and Peng, Nanyun and Eisner, Jason},
booktitle={Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics},
year={2014}
}
Systemic Reciprocal Rewards.
DeAngelis, D.; and Barber, S.
International Journal of Agent Technologies and Systems, 6(2): 30–50. apr 2014.
Paper
doi
link
bibtex
abstract
@article{DeAngelis2014a,
abstract = {Online communities such as question and answer (QA) systems are growing rapidly and we increasingly rely on them for valuable information and entertainment. However, finding meaningful rewards to motivate participation from the most qualified users, or experts, presents researchers with two main challenges: identifying these users and (2) rewarding their participation. Using an interdisciplinary theoretical framework, we illustrate possibilities for identifying and motivating the most valuable contributors to online communities. We suggest that access to peer-generated content can directly motivate people to apply their own expertise, thereby generating more content. Survey data from 380 participants suggests that users strongly prefer a novel class of incentives—reciprocal systemic rewards—to traditional achievement-based rewards. Overall, this research presents important considerations for many different types of online communities, including social networking and news aggregation sites.},
author = {DeAngelis, David and Barber, Suzanne},
doi = {10.4018/ijats.2014040102},
file = {:home/dave/Documents/References/DeAngelis, Barber - 2014 - Systemic Reciprocal Rewards.pdf:pdf},
issn = {1943-0744},
journal = {International Journal of Agent Technologies and Systems},
keywords = {expertise,motivation,online communities,recommendation,systemic reciprocal rewards,trust},
month = {apr},
number = {2},
pages = {30--50},
title = {Systemic Reciprocal Rewards},
url = {http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijats.2014040102},
volume = {6},
year = {2014}
}
Online communities such as question and answer (QA) systems are growing rapidly and we increasingly rely on them for valuable information and entertainment. However, finding meaningful rewards to motivate participation from the most qualified users, or experts, presents researchers with two main challenges: identifying these users and (2) rewarding their participation. Using an interdisciplinary theoretical framework, we illustrate possibilities for identifying and motivating the most valuable contributors to online communities. We suggest that access to peer-generated content can directly motivate people to apply their own expertise, thereby generating more content. Survey data from 380 participants suggests that users strongly prefer a novel class of incentives—reciprocal systemic rewards—to traditional achievement-based rewards. Overall, this research presents important considerations for many different types of online communities, including social networking and news aggregation sites.
T-DNS: Connection-Oriented DNS to Improve Privacy and Security.
Heidemann, J.
Presentation at the Spring DNS-OARC Meeting, May 2014.
This talk is about the technical report ISI-TR-2014-688, joint work with Liang Zhu, Zi Hu, duane Wessels, Allison Mankin, and Nikita Somaiya
Paper
link
bibtex
abstract
@Misc{Heidemann14c,
author = "John Heidemann",
title = "T-DNS: Connection-Oriented {DNS} to Improve Privacy and Security",
howpublished = "Presentation at the Spring DNS-OARC Meeting",
month = may,
year = 2014,
sortdate = "2014-05-01",
project = "ant, lacrend, tdns",
jsubject = "dns",
jlocation = "johnh: pafile",
keywords = "based on [Zhu14a]",
note = "This talk is about the technical report
ISI-TR-2014-688, joint work with Liang Zhu, Zi Hu,
duane Wessels, Allison Mankin, and Nikita Somaiya",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann14c.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann14c.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
blogurl = "https://ant.isi.edu/blog/?p=491",
abstract = "
This talk will discuss \emph{connection-oriented DNS} to improve DNS
security and privacy. DNS is the canonical example of a
connectionless, single packet, request/response protocol, with UDP as
its dominant transport. Yet DNS today is challenged by eavesdropping
that compromises privacy, source-address spoofing that results in
denial-of-service (DoS) attacks on the server and third parties,
injection attacks that exploit fragmentation, and size limitations
that constrain policy and operational choices. We propose \emph{t-DNS}
to address these problems: it uses TCP to smoothly
support large payloads and mitigate spoofing and amplification for
DoS. T-DNS uses transport-layer security (TLS) to provide privacy
from users to their DNS resolvers and optionally to authoritative
servers. \newline \indent
Traditional wisdom is that connection setup will balloon latency for
clients and overwhelm servers. We provide data to show that these
assumptions are overblown---our model of end-to-end latency shows
\emph{TLS to the recursive resolver is only about 5--24\% slower}, with
UDP to the authoritative server. End-to-end latency is 19--33\% slower
with TLS to recursive and TCP to authoritative. Experiments behind
these models show that after connection establishment, TCP and TLS
latency is equivalent to UDP. Using diverse trace data we show that
frequent connection reuse is possible (60--95\% for stub and recursive
resolvers, although half that for authoritative servers). With
conservative timeouts (20 s at authoritative servers and 60 s
elsewhere) we show that \emph{server memory requirements match current
hardware}: a large recursive resolver may have 25k active connections
consuming about 9 GB of RAM. These results depend on specific
design and implementation decisions---query pipelining, out-of-order
responses, TLS connection resumption, and plausible timeouts. \newline \indent
We hope to solicit feedback from the OARC community about this work to
understand design and operational concerns if T-DNS deployment was
widespread. The work in the talk is by Liang Zhu, Zi Hu, and John Heidemann
(all of USC/ISI), Duane Wessels and Allison Mankin (both of Verisign),
and Nikita Somaiya (USC/ISI). \newline \indent
A technical report describing the work is
at \url{https://ant.isi.edu/%7ejohnh/PAPERS/Zhu14a.pdf}
and the protocol changes are described
as \url{http://datatracker.ietf.org/doc/draft-hzhwm-start-tls-for-dns/}.
",
}
% correcttitle = "{Internet} Populations (Good and Bad): Measurement, Estimation, and Correlation",
This talk will discuss \emphconnection-oriented DNS to improve DNS security and privacy. DNS is the canonical example of a connectionless, single packet, request/response protocol, with UDP as its dominant transport. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address spoofing that results in denial-of-service (DoS) attacks on the server and third parties, injection attacks that exploit fragmentation, and size limitations that constrain policy and operational choices. We propose \empht-DNS to address these problems: it uses TCP to smoothly support large payloads and mitigate spoofing and amplification for DoS. T-DNS uses transport-layer security (TLS) to provide privacy from users to their DNS resolvers and optionally to authoritative servers. \newline ∈dent Traditional wisdom is that connection setup will balloon latency for clients and overwhelm servers. We provide data to show that these assumptions are overblown—our model of end-to-end latency shows \emphTLS to the recursive resolver is only about 5–24% slower, with UDP to the authoritative server. End-to-end latency is 19–33% slower with TLS to recursive and TCP to authoritative. Experiments behind these models show that after connection establishment, TCP and TLS latency is equivalent to UDP. Using diverse trace data we show that frequent connection reuse is possible (60–95% for stub and recursive resolvers, although half that for authoritative servers). With conservative timeouts (20 s at authoritative servers and 60 s elsewhere) we show that \emphserver memory requirements match current hardware: a large recursive resolver may have 25k active connections consuming about 9 GB of RAM. These results depend on specific design and implementation decisions—query pipelining, out-of-order responses, TLS connection resumption, and plausible timeouts. \newline ∈dent We hope to solicit feedback from the OARC community about this work to understand design and operational concerns if T-DNS deployment was widespread. The work in the talk is by Liang Zhu, Zi Hu, and John Heidemann (all of USC/ISI), Duane Wessels and Allison Mankin (both of Verisign), and Nikita Somaiya (USC/ISI). \newline ∈dent A technical report describing the work is at ˘rlhttps://ant.isi.edu/%7ejohnh/PAPERS/Zhu14a.pdf and the protocol changes are described as ˘rlhttp://datatracker.ietf.org/doc/draft-hzhwm-start-tls-for-dns/.
T-DNS: Connection-Oriented DNS to Improve Privacy and Security.
Zhu, L.; Hu, Z.; Heidemann, J.; Wessels, D.; Mankin, A.; and Somaiya, N.
Technical Report ISI-TR-2014-688, USC/Information Sciences Institute, February 2014.
This technical report has been superceeded by ISI-TR-2014-693
Paper
link
bibtex
abstract
@TechReport{Zhu14a,
author = "Liang Zhu and Zi Hu and John Heidemann and
Duane Wessels and Allison Mankin and Nikita Somaiya",
title = "T-{DNS}: Connection-Oriented {DNS} to Improve Privacy and Security",
institution = "USC/Information Sciences Institute",
note = "This technical report has been superceeded by ISI-TR-2014-693",
year = 2014,
sortdate = "2014-02-01",
number = "ISI-TR-2014-688",
month = feb,
jlocation = "johnh: pafile",
keywords = "network outage detection, hurricane sandy",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Zhu14a.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Zhu14a.pdf",
otherurl = "ftp://ftp.isi.edu/isi-pubs/tr-688.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
project = "ant, lacrend, tdns",
abstract = "This paper explores \emph{connection-oriented DNS} to improve DNS
security and privacy. DNS is the canonical example of a
connectionless, single packet, request/response protocol, with UDP as
its dominant transport. Yet DNS today is challenged by eavesdropping
that compromises privacy, source-address spoofing that results in
denial-of-service (DoS) attacks on the server and third parties,
injection attacks that exploit fragmentation, and size limitations
that constrain policy and operational choices. We propose
\emph{t-DNS} to address these problems: it combines TCP to smoothly
support large payloads and mitigate spoofing and amplification for
DoS\@. T-DNS uses transport-layer security (TLS) to provide privacy
from users to their DNS resolvers and optionally to authoritative
servers. Traditional wisdom is that connection setup will balloon
latency for clients and overwhelm servers. These are myths---our
model of end-to-end latency shows \emph{TLS to the recursive resolver
is only about 21\% slower}, with UDP to the authoritative server.
End-to-end latency is 90\% slower with TLS to recursive and TCP to
authoritative. Experiments behind these models show that after
connection establishment, TCP and TLS latency is equivalent to UDP\@.
Using diverse trace data we show that frequent connection reuse is
possible (60--95\% for stub and recursive resolvers, although half
that for authoritative servers). With conservative timeouts (20\,s at
authoritative servers and 60\,s elsewhere) we show that \emph{server
memory requirements match current hardware}: a large recursive
resolver may have 25k active connections consuming about 9\,GB of
RAM\@. We identify the key design and implementation decisions needed
to minimize overhead---query pipelining, out-of-order responses, TLS
connection resumption, and plausible timeouts.",
}
% correcttitle = "{T-DNS}: Connection-Oriented {DNS} to Improve Privacy and Security (extended)",
This paper explores \emphconnection-oriented DNS to improve DNS security and privacy. DNS is the canonical example of a connectionless, single packet, request/response protocol, with UDP as its dominant transport. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address spoofing that results in denial-of-service (DoS) attacks on the server and third parties, injection attacks that exploit fragmentation, and size limitations that constrain policy and operational choices. We propose \empht-DNS to address these problems: it combines TCP to smoothly support large payloads and mitigate spoofing and amplification for DoS\@. T-DNS uses transport-layer security (TLS) to provide privacy from users to their DNS resolvers and optionally to authoritative servers. Traditional wisdom is that connection setup will balloon latency for clients and overwhelm servers. These are myths—our model of end-to-end latency shows \emphTLS to the recursive resolver is only about 21% slower, with UDP to the authoritative server. End-to-end latency is 90% slower with TLS to recursive and TCP to authoritative. Experiments behind these models show that after connection establishment, TCP and TLS latency is equivalent to UDP\@. Using diverse trace data we show that frequent connection reuse is possible (60–95% for stub and recursive resolvers, although half that for authoritative servers). With conservative timeouts (20\,s at authoritative servers and 60\,s elsewhere) we show that \emphserver memory requirements match current hardware: a large recursive resolver may have 25k active connections consuming about 9\,GB of RAM\@. We identify the key design and implementation decisions needed to minimize overhead—query pipelining, out-of-order responses, TLS connection resumption, and plausible timeouts.
T-DNS: Connection-Oriented DNS to Improve Privacy and Security (extended).
Zhu, L.; Hu, Z.; Heidemann, J.; Wessels, D.; Mankin, A.; and Somaiya, N.
Technical Report ISI-TR-2014-693, USC/Information Sciences Institute, June 2014.
Paper
link
bibtex
abstract
@TechReport{Zhu14b,
author = "Liang Zhu and Zi Hu and John Heidemann and
Duane Wessels and Allison Mankin and Nikita Somaiya",
title = "T-{DNS}: Connection-Oriented {DNS} to Improve Privacy and Security (extended)",
institution = "USC/Information Sciences Institute",
year = 2014,
sortdate = "2014-06-01",
number = "ISI-TR-2014-693",
month = jun,
jlocation = "johnh: pafile",
keywords = "network outage detection, hurricane sandy",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Zhu14b.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Zhu14b.pdf",
otherurl = "ftp://ftp.isi.edu/isi-pubs/tr-693.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
project = "ant, retrofuture, lacrend, tdns",
blogurl = "https://ant.isi.edu/blog/?p=508",
datasetlurl = "https://ant.isi.edu/datasets/all.html",
codeurl = "https://ant.isi.edu/software/tdns/index.html",
abstract = "
DNS is the canonical protocol for connectionless UDP. Yet DNS today
is challenged by eavesdropping that compromises privacy,
source-address spoofing that results in denial-of-service (DoS)
attacks on the server and third parties, injection attacks that
exploit fragmentation, and size limitations that constrain policy and
operational choices. We propose \emph{T-DNS} to address these
problems. It uses TCP to smoothly support large payloads and to
mitigate spoofing and amplification for DoS. T-DNS uses
transport-layer security (TLS) to provide privacy from users to their
DNS resolvers and optionally to authoritative servers. Expectations
about DNS suggest connections will balloon client latency and
overwhelm server with state, but our evaluation shows costs are
modest: end-to-end latency
from \emph{TLS to the recursive resolver is only about 9\% slower}
when UDP is used to the authoritative
server, and 22\% slower with TCP to the authoritative. With diverse
traces we show that frequent connection reuse is possible (60--95\%
for stub and recursive resolvers, although half that for authoritative
servers), and after connection establishment, we show TCP and TLS
latency is equivalent to UDP. With conservative timeouts (20\,s at
authoritative servers and 60\,s elsewhere) and conservative estimates
of connection state memory requirements, we show
that \emph{server memory requirements match current hardware}:
a large recursive
resolver may have 24k active connections requiring about 3.6\,GB
additional RAM. We identify the key design and implementation
decisions needed to minimize overhead: query pipelining, out-of-order
responses, TLS connection resumption, and plausible timeouts.
",
}
DNS is the canonical protocol for connectionless UDP. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address spoofing that results in denial-of-service (DoS) attacks on the server and third parties, injection attacks that exploit fragmentation, and size limitations that constrain policy and operational choices. We propose \emphT-DNS to address these problems. It uses TCP to smoothly support large payloads and to mitigate spoofing and amplification for DoS. T-DNS uses transport-layer security (TLS) to provide privacy from users to their DNS resolvers and optionally to authoritative servers. Expectations about DNS suggest connections will balloon client latency and overwhelm server with state, but our evaluation shows costs are modest: end-to-end latency from \emphTLS to the recursive resolver is only about 9% slower when UDP is used to the authoritative server, and 22% slower with TCP to the authoritative. With diverse traces we show that frequent connection reuse is possible (60–95% for stub and recursive resolvers, although half that for authoritative servers), and after connection establishment, we show TCP and TLS latency is equivalent to UDP. With conservative timeouts (20\,s at authoritative servers and 60\,s elsewhere) and conservative estimates of connection state memory requirements, we show that \emphserver memory requirements match current hardware: a large recursive resolver may have 24k active connections requiring about 3.6\,GB additional RAM. We identify the key design and implementation decisions needed to minimize overhead: query pipelining, out-of-order responses, TLS connection resumption, and plausible timeouts.
T-DNS: Connection-Oriented DNS to Improve Privacy and Security (poster abstract).
Zhu, L.; Hu, Z.; Heidemann, J.; Mankin, A.; and Wessels, D.
Poster at SIGCOMM 2014, August 2014.
Paper
doi
link
bibtex
abstract
@Misc{Zhu14d,
author = "Liang Zhu and Zi Hu and John Heidemann and
Allison Mankin and Duane Wessels",
title = "T-DNS: Connection-Oriented {DNS} to Improve Privacy
and Security (poster abstract)",
howpublished = "Poster at SIGCOMM 2014",
month = aug,
year = 2014,
keywords = "DNS, privacy, t-dns, dns-over-tcp, dns-over-tls",
jlocation = "johnh: pafile xxx not on file",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Zhu14d.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Zhu14d.pdf",
doi = "http://dx.doi.org/10.1145/2740070.2631442",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
abstract = "DNS is the canonical protocol for connectionless UDP. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address spoofing that results in denial-of-service (DoS) attacks on the server and third parties, injection attacks that exploit fragmentation, and size limitations that constrain policy and operational choices. We propose T-DNS to address these problems. It uses TCP to smoothly support large payloads and to mitigate spoofing and amplification for DoS. T-DNS uses transport-layer security (TLS) to provide privacy from users to their DNS resolvers and optionally to authoritative servers. Our model shows end-to-end latency from TLS to the recursive resolver is only about 9\% slower when UDP is used to the authoritative server, and 22\% slower with TCP to the authoritative. With diverse traces we show that frequent connection reuse is possible (60-95\% for stub and recursive resolvers, although half that for authoritative servers). Our experiment shows that after connection establishment, TCP and TLS latency is equivalent to UDP. With conservative timeouts (20 s at authoritative servers and 60 s elsewhere) and conservative estimates of connection state memory requirements, we show that server memory requirements well within current, commodity server hardware. We identify the key design and implementation decisions needed to minimize overhead: query pipelining, out-of-order responses, TLS connection resumption, and plausible timeouts. This poster abstract summarizes work we describe in detail in ISI-TR-2014-693."
}
DNS is the canonical protocol for connectionless UDP. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address spoofing that results in denial-of-service (DoS) attacks on the server and third parties, injection attacks that exploit fragmentation, and size limitations that constrain policy and operational choices. We propose T-DNS to address these problems. It uses TCP to smoothly support large payloads and to mitigate spoofing and amplification for DoS. T-DNS uses transport-layer security (TLS) to provide privacy from users to their DNS resolvers and optionally to authoritative servers. Our model shows end-to-end latency from TLS to the recursive resolver is only about 9% slower when UDP is used to the authoritative server, and 22% slower with TCP to the authoritative. With diverse traces we show that frequent connection reuse is possible (60-95% for stub and recursive resolvers, although half that for authoritative servers). Our experiment shows that after connection establishment, TCP and TLS latency is equivalent to UDP. With conservative timeouts (20 s at authoritative servers and 60 s elsewhere) and conservative estimates of connection state memory requirements, we show that server memory requirements well within current, commodity server hardware. We identify the key design and implementation decisions needed to minimize overhead: query pipelining, out-of-order responses, TLS connection resumption, and plausible timeouts. This poster abstract summarizes work we describe in detail in ISI-TR-2014-693.
Teaching parallelism without programming: a data science curriculum for non-CS students.
Gil, Y.
In Prasad, S. K., editor(s),
Proceedings of the Workshop on Education for High-Performance Computing, EduHPC '14, New Orleans, Louisiana, USA, November 16-21, 2014, pages 42–48, 2014. IEEE Computer Society
Paper
doi
link
bibtex
2 downloads
@inproceedings{DBLP:conf/sc/Gil14,
author = {Yolanda Gil},
editor = {Sushil K. Prasad},
title = {Teaching parallelism without programming: a data science curriculum
for non-CS students},
booktitle = {Proceedings of the Workshop on Education for High-Performance Computing,
EduHPC '14, New Orleans, Louisiana, USA, November 16-21, 2014},
pages = {42--48},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/EduHPC.2014.12},
doi = {10.1109/EDUHPC.2014.12},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sc/Gil14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Ten Simple Rules for the Care and Feeding of Scientific Data.
Goodman, A.; Pepe, A.; Blocker, A. W.; Borgman, C. L.; Cranmer, K.; Crosas, M.; Stefano, R. D.; Gil, Y.; Groth, P.; Hedstrom, M. L.; Hogg, D. W.; Kashyap, V.; Mahabal, A.; Siemiginowska, A.; and Slavkovic, A. B.
PLoS Comput. Biol., 10(4). 2014.
Paper
doi
link
bibtex
1 download
@article{DBLP:journals/ploscb/GoodmanPBBCCSGGHHKMSS14,
author = {Alyssa Goodman and
Alberto Pepe and
Alexander W. Blocker and
Christine L. Borgman and
Kyle Cranmer and
Merc{\`{e}} Crosas and
Rosanne Di Stefano and
Yolanda Gil and
Paul Groth and
Margaret L. Hedstrom and
David W. Hogg and
Vinay Kashyap and
Ashish Mahabal and
Aneta Siemiginowska and
Aleksandra B. Slavkovic},
title = {Ten Simple Rules for the Care and Feeding of Scientific Data},
journal = {PLoS Comput. Biol.},
volume = {10},
number = {4},
year = {2014},
url = {https://doi.org/10.1371/journal.pcbi.1003542},
doi = {10.1371/JOURNAL.PCBI.1003542},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ploscb/GoodmanPBBCCSGGHHKMSS14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Ten simple rules for starting a research group.
Gil, Y.
AI Matters, 1(2): 4–10. 2014.
Paper
doi
link
bibtex
2 downloads
@article{DBLP:journals/aimatters/Gil14a,
author = {Yolanda Gil},
title = {Ten simple rules for starting a research group},
journal = {{AI} Matters},
volume = {1},
number = {2},
pages = {4--10},
year = {2014},
url = {https://doi.org/10.1145/2685328.2685330},
doi = {10.1145/2685328.2685330},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/aimatters/Gil14a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
The Interplay Between Dynamics and Networks: Centrality, Communities, and Cheeger Inequality.
Ghosh, R.; Lerman, K.; Teng, S.; and Yan, X.
In
Proceedings of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'2014), 2014.
Paper
link
bibtex
abstract
45 downloads
@inproceedings{Ghosh14kdd,
abstract = {We study the interplay between a dynamic process and the structure of the
network on which it is defined. Specifically, we examine the impact of this
interaction on the quality-measure of network clusters and node centrality.
This enables us to effectively identify network communities and important nodes
participating in the dynamics. As the first step towards this objective, we
introduce an umbrella framework for defining and characterizing an ensemble of
dynamic processes on a network. This framework generalizes the traditional
Laplacian framework to continuous-time biased random walks and also allows us
to model some epidemic processes over a network. For each dynamic process in
our framework, we can define a function that measures the quality of every
subset of nodes as a potential cluster (or community) with respect to this
process on a given network. This subset-quality function generalizes the
traditional conductance measure for graph partitioning. We partially justify
our choice of the quality function by showing that the classic Cheeger's
inequality, which relates the conductance of the best cluster in a network with
a spectral quantity of its Laplacian matrix, can be extended from the
Laplacian-conductance setting to this more general setting.},
author = {Ghosh, Rumi and Lerman, Kristina and Teng, Shang-Hua and Yan, Xiaoran},
booktitle = {Proceedings of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'2014)},
keywords = {social-networks},
url = {http://arxiv.org/abs/1406.3387},
title = {The Interplay Between Dynamics and Networks: Centrality, Communities, and Cheeger Inequality},
year = {2014}
}
We study the interplay between a dynamic process and the structure of the network on which it is defined. Specifically, we examine the impact of this interaction on the quality-measure of network clusters and node centrality. This enables us to effectively identify network communities and important nodes participating in the dynamics. As the first step towards this objective, we introduce an umbrella framework for defining and characterizing an ensemble of dynamic processes on a network. This framework generalizes the traditional Laplacian framework to continuous-time biased random walks and also allows us to model some epidemic processes over a network. For each dynamic process in our framework, we can define a function that measures the quality of every subset of nodes as a potential cluster (or community) with respect to this process on a given network. This subset-quality function generalizes the traditional conductance measure for graph partitioning. We partially justify our choice of the quality function by showing that the classic Cheeger's inequality, which relates the conductance of the best cluster in a network with a spectral quantity of its Laplacian matrix, can be extended from the Laplacian-conductance setting to this more general setting.
The Need for End-to-End Evaluation of Cloud Availability.
Hu, Z.; Zhu, L.; Ardi, C.; Katz-Bassett, E.; Madhyastha, H. V.; Heidemann, J.; and Yu, M.
In
Proceedings of the Passive and Active Measurement Workshop, pages 119–130, Marina del Rey, California, USA, March 2014. Springer
Paper
doi
link
bibtex
abstract
@InProceedings{Hu14b,
author = "Zi Hu and Liang Zhu and Calvin Ardi and Ethan Katz-Bassett and Harsha V. Madhyastha and John Heidemann and Minlan Yu",
title = "The Need for End-to-End Evaluation of Cloud Availability",
booktitle = "Proceedings of the " # " Passive and Active Measurement Workshop",
year = 2014,
sortdate = "2014-03-01",
project = "ant, retrofuture, lacrend",
jsubject = "routing",
pages = "119--130",
month = mar,
address = "Marina del Rey, California, USA",
publisher = "Springer",
copyrightholder = "Springer",
copyrightterms = "An author may self-archive an author-created version of his/her article on his/her own website and or in his/her institutional repository. He/she may also deposit this version on his/her funder's or funder's designated repository at the funder's request or as a result of a legal obligation, provided it is not made publicly available until 12 months after official publication. He/she may not use the publisher's PDF version, which is posted on \url{www.springerlink.com}, for the purpose of self-archiving or deposit. Furthermore, the author may only post his/her version provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: ``The final publication is available at www.springerlink.com''. " ,
jlocation = "johnh: pafile",
keywords = "cloud, reliability, outages, ping, TCP, end-to-end",
doi = "10.1007/978-3-319-04918-2_12",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Hu14b.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Hu14b.pdf",
otherurl = "http://link.springer.com/chapter/10.1007/978-3-319-04918-2_12",
blogurl = "https://ant.isi.edu/blog/?p=455",
abstract = "
People's computing lives are moving into the cloud, making
understanding cloud availability increasingly critical. Prior studies
of Internet outages have used ICMP-based pings and traceroutes. While
these studies can detect network availability, we show that they can
be inaccurate at estimating \emph{cloud} availability. Without care,
ICMP probes can \emph{underestimate} availability because ICMP is not
as robust as application-level measurements such as HTTP. They can
\emph{overestimate} availability if they measure reachability of the
cloud's edge, missing failures in the cloud's back-end. We develop
methodologies sensitive to five ``nines'' of reliability, and then we
compare ICMP and end-to-end measurements for both cloud VM and storage
services. We show case studies where one fails and the other
succeeds, and our results highlight the importance of
application-level retries to reach high precision. When possible, we
recommend end-to-end measurement with application-level protocols to
evaluate the availability of cloud services.
",
}
People's computing lives are moving into the cloud, making understanding cloud availability increasingly critical. Prior studies of Internet outages have used ICMP-based pings and traceroutes. While these studies can detect network availability, we show that they can be inaccurate at estimating \emphcloud availability. Without care, ICMP probes can \emphunderestimate availability because ICMP is not as robust as application-level measurements such as HTTP. They can \emphoverestimate availability if they measure reachability of the cloud's edge, missing failures in the cloud's back-end. We develop methodologies sensitive to five ``nines'' of reliability, and then we compare ICMP and end-to-end measurements for both cloud VM and storage services. We show case studies where one fails and the other succeeds, and our results highlight the importance of application-level retries to reach high precision. When possible, we recommend end-to-end measurement with application-level protocols to evaluate the availability of cloud services.
The Psychologist as an Interlocutor in Autism Spectrum Disorder Assessment: Insights from a Study of Spontaneous Prosody.
Bone, D.; Black, M. P.; Lee, C.; Williams, M.; Levitt, P.; Lee, S.; and Narayanan, S. S.
Journal of Speech, Language, and Hearing Research, 57: 1162-1177. Aug 2014.
doi
link
bibtex
@article{Bone2014ThePsychologistasan,
author = {Bone, Daniel and Black, Matthew P. and Lee, Chi-Chun and Williams, Marian and Levitt, Pat and Lee, Sungbok and Narayanan, Shrikanth S.},
bib2html_rescat = {care},
doi = {10.1044/2014_JSLHR-S-13-0062},
journal = {Journal of Speech, Language, and Hearing Research},
keyword = {CARE},
link = {http://sail.usc.edu/publications/files/Bone_JSLHR_2014.pdf},
month = {Aug},
pages = {1162-1177},
title = {The Psychologist as an Interlocutor in Autism Spectrum Disorder Assessment: Insights from a Study of Spontaneous Prosody},
volume = {57},
year = {2014}
}
The Research Object Suite of Ontologies: Sharing and Exchanging Research Data and Methods on the Open Web.
Belhajjame, K.; Zhao, J.; Garijo, D.; Hettne, K. M.; Palma, R.; Corcho, Ó.; Manuél Gómez-Pérez, J.; Bechhofer, S.; Klyne, G.; and Goble, C. A.
http://arxiv.org/abs/1401.4307, 2014.
Paper
link
bibtex
@misc{1401.4307,
title = {The Research Object Suite of Ontologies: Sharing and Exchanging Research Data and Methods on the Open Web},
author = {Belhajjame, Khalid and Zhao, Jun and Garijo, Daniel and Hettne, Kristina M. and Palma, Ra{\'{u}}l and Corcho, {\'{O}}scar and Manu{\'{e}}l G{\'{o}}mez{-}P{\'{e}}rez, Jos{\'{e}} and Bechhofer, Sean and Klyne, Graham and Goble, Carole A.},
year = {2014},
url = {http://dgarijo.com/papers/ro.pdf},
Eprint = {arXiv:1401.4307},
Howpublished = {http://arxiv.org/abs/1401.4307}
}
The Simple Rules of Social Contagion.
Hodas, N. O.; and Lerman, K.
Scientific Reports, 4. 2014.
Paper
doi
link
bibtex
abstract
88 downloads
@article{Hodas14srep,
author = {Hodas, Nathan O. and Lerman, Kristina},
doi = {10.1038/srep04343},
journal = {Scientific Reports},
keywords = {social-dynamics},
title = {The Simple Rules of Social Contagion},
urlPaper = {http://dx.doi.org/10.1038/srep04343},
abstract={It is commonly believed that information spreads between individuals like a pathogen, with each exposure by an informed friend potentially resulting in a naive individual becoming infected. However, empirical studies of social media suggest that individual response to repeated exposure to information is far more complex. As a proxy for intervention experiments, we compare user responses to multiple exposures on two different social media sites, Twitter and Digg. We show that the position of exposing messages on the user-interface strongly affects social contagion. Accounting for this visibility significantly simplifies the dynamics of social contagion. The likelihood an individual will spread information increases monotonically with exposure, while explicit feedback about how many friends have previously spread it increases the likelihood of a response. We provide a framework for unifying information visibility, divided attention, and explicit social feedback to predict the temporal dynamics of user behavior.},
volume = {4},
year = {2014}
}
It is commonly believed that information spreads between individuals like a pathogen, with each exposure by an informed friend potentially resulting in a naive individual becoming infected. However, empirical studies of social media suggest that individual response to repeated exposure to information is far more complex. As a proxy for intervention experiments, we compare user responses to multiple exposures on two different social media sites, Twitter and Digg. We show that the position of exposing messages on the user-interface strongly affects social contagion. Accounting for this visibility significantly simplifies the dynamics of social contagion. The likelihood an individual will spread information increases monotonically with exposure, while explicit feedback about how many friends have previously spread it increases the likelihood of a response. We provide a framework for unifying information visibility, divided attention, and explicit social feedback to predict the temporal dynamics of user behavior.
Theoretical Analysis of Diversity in an Ensemble of Automatic Speech Recognition Systems.
Audhkhasi, K.; Zavou, A.; Georgiou, P.; and Narayanan, S. S.
IEEE/ACM Transactions on Audio, Speech and Language Processing, 22(3). 2014.
doi
link
bibtex
@article{Audhkhasi2014TheoreticalAnalysisofDiversity,
author = {Audhkhasi, Kartik and Zavou, Andreas and Georgiou, Panayiotis and Narayanan, Shrikanth S.},
bib2html_rescat = {rats},
doi = {https://doi.org/10.1109/TASLP.2014.2303295},
journal = {IEEE/ACM Transactions on Audio, Speech and Language Processing},
link = {http://sail.usc.edu/publications/files/diverse_asr_ensemble_taslp2014.pdf},
number = {3},
title = {Theoretical Analysis of Diversity in an Ensemble of Automatic Speech Recognition Systems},
volume = {22},
year = {2014}
}
Towards Understanding Internet Reliability.
Heidemann, J.
Presentation at DHS Cyber Security Division R&D Showcase and Technical Workshop, December 2014.
Paper
link
bibtex
abstract
@Misc{Heidemann14f,
author = "John Heidemann",
title = "Towards Understanding Internet Reliability",
howpublished = "Presentation at DHS Cyber Security Division
R\&D Showcase and Technical Workshop",
month = dec,
year = 2014,
sortdate = "2014-12-16",
project = "ant, lacrend, duoi",
jsubject = "network_topology",
sortdate = "2014-12-01",
jlocation = "johnh: pafile",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann14f.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann14f.pdf",
otherurl = "https://www.signup4.net/public/ap.aspx?EID=20142362E&OID=167",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
abstract = "
Since 2006, we have been studying the public face of
the Internet. We take regular censuses of the Internet address space,
pinging all IPv4 addresses. Recently have studied network outages and
events like Hurricane Sandy, probing much of the Internet every 11
minutes. This talk will examine how a single computer can observe
outages over the whole Internet continuously. We will discuss how
these ideas transition from research to practice. Our work has
includes technology transfer and sharing with academia and industry,
through hundreds of datasets to more than 50 researchers so far, and
joint evaluation of the techniques with other parts of government.",
}
Since 2006, we have been studying the public face of the Internet. We take regular censuses of the Internet address space, pinging all IPv4 addresses. Recently have studied network outages and events like Hurricane Sandy, probing much of the Internet every 11 minutes. This talk will examine how a single computer can observe outages over the whole Internet continuously. We will discuss how these ideas transition from research to practice. Our work has includes technology transfer and sharing with academia and industry, through hundreds of datasets to more than 50 researchers so far, and joint evaluation of the techniques with other parts of government.
Towards workflow ecosystems through semantic and standard representations.
Garijo, D.; Gil, Y.; and Corcho, Ó.
In Montagnat, J.; and Taylor, I. J., editor(s),
Proceedings of the 9th Workshop on Workflows in Support of Large-Scale Science, WORKS '14, New Orleans, Louisiana, USA, November 16-21, 2014, pages 94–104, 2014. IEEE
Paper
doi
link
bibtex
3 downloads
@inproceedings{DBLP:conf/sc/GarijoGC14,
author = {Daniel Garijo and
Yolanda Gil and
{\'{O}}scar Corcho},
editor = {Johan Montagnat and
Ian J. Taylor},
title = {Towards workflow ecosystems through semantic and standard representations},
booktitle = {Proceedings of the 9th Workshop on Workflows in Support of Large-Scale
Science, {WORKS} '14, New Orleans, Louisiana, USA, November 16-21,
2014},
pages = {94--104},
publisher = {{IEEE}},
year = {2014},
url = {https://doi.org/10.1109/WORKS.2014.13},
doi = {10.1109/WORKS.2014.13},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sc/GarijoGC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Training ensemble of diverse classifiers on feature subsets.
Gupta, R.; Audhkhasi, K.; and Narayanan, S.
In
Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP), May 2014.
doi
link
bibtex
@inproceedings{Gupta2014cDiverselassifiers,
author = {Gupta, Rahul and Audhkhasi, Kartik and Narayanan, Shrikanth},
bib2html_rescat = {rats},
booktitle = {Proceedings of IEEE International Conference on Audio, Speech and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2014.6854136},
link = {http://sail.usc.edu/publications/files/p2951-gupta.pdf},
location = {Florence, Italy},
month = {May},
title = {Training ensemble of diverse classifiers on feature subsets},
year = {2014}
}
UBM Fused Total Variability Modeling for Language Identification.
Van Segbroeck, M.; Travadi, R.; and Narayanan, S.
In
Proceedings of Interspeech, pages 3027-3031, Sep 2014.
link
bibtex
@inproceedings{Van2014UBMFusedTotalVariability,
author = {Van Segbroeck, Maarten and Travadi, Ruchir and Narayanan, Shrikanth},
bib2html_rescat = {rats},
booktitle = {Proceedings of Interspeech},
link = {http://sail.usc.edu/publications/files/is14_maarten.pdf},
month = {Sep},
pages = {3027-3031},
title = {UBM Fused Total Variability Modeling for Language Identification},
year = {2014}
}
Understanding Stylistic Coordination in Dialogues.
Gao, S.; Ver Steeg, G.; and Galstyan, A.
In
(submitted), 2014.
link
bibtex
@inproceedings{acl2014,
Author = {Shuyang Gao and Greg {Ver Steeg} and Aram Galstyan},
Booktitle = {(submitted)},
Title = {Understanding Stylistic Coordination in Dialogues},
Year = {2014}}
Unsupervised Speaker Diarization Using Riemannian Manifold Clustering.
Huang, C. W.; Xiao, B.; Georgiou, P.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Huang2014UnsupervisedSpeakerDiarizationUsing,
author = {Huang, Che Wei and Xiao, Bo and Georgiou, Panayiotis and Narayanan, Shrikanth},
bib2html_rescat = {},
booktitle = {Proceedings of Interspeech},
doi = {},
link = {http://sail.usc.edu/publications/files/IS14_poster.pdf},
month = {Sep},
title = {Unsupervised Speaker Diarization Using Riemannian Manifold Clustering},
year = {2014}
}
User Requirements for Geospatial Provenance.
Garijo, D.; Gil, Y.; and Harth, A.
2014.
Provenance Analytics, co-located with the Fifth International Provenance and Annotation Workshop (IPAW)
Paper
link
bibtex
7 downloads
@misc{garijo-etal-provanalytics14,
author = {Daniel Garijo and Yolanda Gil and Andreas Harth},
title = {User Requirements for Geospatial Provenance},
note = {Provenance Analytics, co-located with the Fifth International Provenance and Annotation Workshop (IPAW)},
address = {Cologne, Germany},
year = {2014},
url = {https://knowledgecaptureanddiscovery.github.io/yolanda_gil_website/papers/garijo-etal-provanalytics14.pdf }
}
Variable Span Disfluency Detection in ASR Transcripts.
Gupta, R.; Ananthakrishnan, S.; Yang, Z.; and Narayanan, S.
In
Proceedings of Interspeech, Sep 2014.
link
bibtex
@inproceedings{Gupta2014VariableSpanDisfluencyDetection,
author = {Gupta, Rahul and Ananthakrishnan, Sankaranarayanan and Yang, Zhaojun and Narayanan, Shrikanth},
bib2html_rescat = {rats},
booktitle = {Proceedings of Interspeech},
link = {http://sail.usc.edu/publications/files/gupta_interspeech_2014.pdf},
month = {Sep},
title = {Variable Span Disfluency Detection in ASR Transcripts},
year = {2014}
}
Visualizing Sparse Internet Events: Network Outages and Route Changes.
Quan, L.; Heidemann, J.; and Pradkin, Y.
Computing, 96(1): 39–51. January 2014.
Paper
doi
link
bibtex
abstract
@Article{Quan14d,
author = "Lin Quan and John Heidemann and Yuri Pradkin",
title = "Visualizing Sparse Internet Events: Network Outages and Route Changes",
journal = "Computing",
publisher = "Springer",
month = jan,
year = 2014,
sortdate = "2014-01-01",
project = "ant, nocredit, lacrend, lander, duoi",
jsubject = "topology_modeling",
volume = "96",
number = "1",
pages = "39--51",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "Springer",
jlocation = "johnh: pafile",
keywords = "internet visualization, workshop, front matter",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Quan14d.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Quan14d.pdf",
doi = "10.1007/s00607-013-0283-7",
abstract = "To understand network behavior, researchers and enterprise network
operators must interpret large amounts of network data. To understand
and manage network events such as outages, route instability, and spam
campaigns, they must interpret data that covers a range of networks
and evolves over time. We propose a simple clustering algorithm that
helps identify spatial clusters of network events based on
correlations in event timing, producing 2-D visualizations. We show
that these visualizations where they reveal the extent, timing, and
dynamics of network outages such as January 2011 Egyptian change of
government, and the March 2011 Japanese earthquake. We also show they
reveal correlations in routing changes that are hidden from AS-path
analysis.",
}
To understand network behavior, researchers and enterprise network operators must interpret large amounts of network data. To understand and manage network events such as outages, route instability, and spam campaigns, they must interpret data that covers a range of networks and evolves over time. We propose a simple clustering algorithm that helps identify spatial clusters of network events based on correlations in event timing, producing 2-D visualizations. We show that these visualizations where they reveal the extent, timing, and dynamics of network outages such as January 2011 Egyptian change of government, and the March 2011 Japanese earthquake. We also show they reveal correlations in routing changes that are hidden from AS-path analysis.
Web-scale Content Reuse Detection (extended).
Ardi, C.; and Heidemann, J.
Technical Report ISI-TR-2014-692, USC/Information Sciences Institute, June 2014.
Paper
link
bibtex
abstract
@TechReport{Ardi14a,
author = "Calvin Ardi and John Heidemann",
title = "Web-scale Content Reuse Detection (extended)",
institution = "USC/Information Sciences Institute",
year = 2014,
sortdate = "2014-06-01",
number = "ISI-TR-2014-692",
month = jun,
jlocation = "johnh: pafile",
keywords = "hashing, content reuse, wikipedia, copying",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Ardi14a.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Ardi14a.pdf",
otherurl = "ftp://ftp.isi.edu/isi-pubs/tr-692.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
project = "ant, mega",
abstract = "
With the vast amount of accessible, online content, it is not
surprising that unscrupulous entities ``borrow'' from the web to
provide filler for advertisements, link farms, and spam and make a
quick profit. Our insight is that cryptographic hashing and
fingerprinting can efficiently identify content reuse for web-size
corpora. We develop two related algorithms, one to
automatically \emph{discover} previously unknown
duplicate content in the web, and
the second to \emph{detect} copies of discovered or manually
identified content in the web. Our detection can also \emph{bad
neighborhoods}, clusters of pages where copied content is frequent.
We verify our approach with controlled experiments with two large
datasets: a Common Crawl subset the web, and a copy of Geocities, an
older set of user-provided web content. We then demonstrate that we
can discover otherwise unknown examples of duplication for spam, and
detect both discovered and expert-identified content in these large
datasets. Utilizing an original copy of Wikipedia as identified
content, we find 40 sites that reuse this content, 86\% for commercial
benefit.
",
}
With the vast amount of accessible, online content, it is not surprising that unscrupulous entities ``borrow'' from the web to provide filler for advertisements, link farms, and spam and make a quick profit. Our insight is that cryptographic hashing and fingerprinting can efficiently identify content reuse for web-size corpora. We develop two related algorithms, one to automatically \emphdiscover previously unknown duplicate content in the web, and the second to \emphdetect copies of discovered or manually identified content in the web. Our detection can also \emphbad neighborhoods, clusters of pages where copied content is frequent. We verify our approach with controlled experiments with two large datasets: a Common Crawl subset the web, and a copy of Geocities, an older set of user-provided web content. We then demonstrate that we can discover otherwise unknown examples of duplication for spam, and detect both discovered and expert-identified content in these large datasets. Utilizing an original copy of Wikipedia as identified content, we find 40 sites that reuse this content, 86% for commercial benefit.
When the Internet Sleeps: Correlating Diurnal Networks With External Factors.
Quan, L.; Heidemann, J.; and Pradkin, Y.
In
Proceedings of the ACM Internet Measurement Conference, pages 87–100, Vancouver, BC, Canada, November 2014. ACM
Paper
doi
link
bibtex
abstract
@InProceedings{Quan14c,
author = "Lin Quan and John Heidemann and Yuri Pradkin",
title = "When the {Internet} Sleeps: Correlating
Diurnal Networks With External Factors" ,
booktitle = "Proceedings of the " # "ACM Internet Measurement Conference",
year = 2014,
sortdate = "2014-11-01",
project = "ant, lacrend, retrofuture, duoi",
jsubject = "routing",
pages = "87--100",
month = nov,
address = "Vancouver, BC, Canada",
publisher = "ACM",
jlocation = "johnh: pafile",
keywords = "routing outage detection, diurnal network
behavior, active probing,
ntework outages",
doi = "http://dx.doi.org/10.1145/2663716.2663721",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Quan14b.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Quan14b.pdf",
otherurl = "ftp://ftp.isi.edu/isi-pubs/tr-699b.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
copyrightterms = " Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. Copyright is held by the owner/author(s). Publication rights licensed to ACM. ",
abstract = "
As the Internet matures, policy questions loom larger in its
operation. When should an ISP, city, or government invest in
infrastructure? How do their policies affect use? In this work, we
develop a new approach to evaluate how policies, economic conditions
and technology correlates with Internet use around the world. First,
we develop an adaptive and accurate approach to
estimate \emph{block availability},
the fraction of active IP addresses in each /24 block
over short timescales (every 11 minutes). Our estimator provides a
new lens to interpret data taken from existing long-term outage
measurements, thus requiring no additional traffic. (If new
collection was required, it would be lightweight, since on average,
outage detection requires less than 20 probes per hour per /24 block;
less than 1\% of background radiation.) Second, we show that spectral
analysis of this measure can identify \emph{diurnal usage}: blocks
where addresses are regularly used during part of the day and idle in
other times. Finally, we analyze data for the entire responsive
Internet (3.7M /24 blocks) over 35 days. These global observations
show \emph{when} and \emph{where} the Internet sleeps---networks are
mostly always-on in the US and Western Europe, and diurnal in much of
Asia, South America, and Eastern Europe. ANOVA (Analysis of Variance)
testing shows that diurnal networks correlate negatively with country
GDP and electrical consumption, quantifying that national policies and
economics relate to networks.
",
}
As the Internet matures, policy questions loom larger in its operation. When should an ISP, city, or government invest in infrastructure? How do their policies affect use? In this work, we develop a new approach to evaluate how policies, economic conditions and technology correlates with Internet use around the world. First, we develop an adaptive and accurate approach to estimate \emphblock availability, the fraction of active IP addresses in each /24 block over short timescales (every 11 minutes). Our estimator provides a new lens to interpret data taken from existing long-term outage measurements, thus requiring no additional traffic. (If new collection was required, it would be lightweight, since on average, outage detection requires less than 20 probes per hour per /24 block; less than 1% of background radiation.) Second, we show that spectral analysis of this measure can identify \emphdiurnal usage: blocks where addresses are regularly used during part of the day and idle in other times. Finally, we analyze data for the entire responsive Internet (3.7M /24 blocks) over 35 days. These global observations show \emphwhen and \emphwhere the Internet sleeps—networks are mostly always-on in the US and Western Europe, and diurnal in much of Asia, South America, and Eastern Europe. ANOVA (Analysis of Variance) testing shows that diurnal networks correlate negatively with country GDP and electrical consumption, quantifying that national policies and economics relate to networks.
When the Internet Sleeps: Correlating Diurnal Networks With External Factors (extended).
Quan, L.; Heidemann, J.; and Pradkin, Y.
Technical Report ISI-TR-2014-691b, USC/Information Sciences Institute, May 2014.
(updated August 2014)
Paper
link
bibtex
abstract
@TechReport{Quan14b,
author = "Lin Quan and John Heidemann and Yuri Pradkin",
title = "When the {Internet} Sleeps: Correlating
Diurnal Networks With External Factors (extended)" ,
institution = "USC/Information Sciences Institute",
year = 2014,
sortdate = "2014-05-01",
project = "ant, lacrend, retrofuture, duoi",
jsubject = "routing",
number = "ISI-TR-2014-691b",
month = may,
note = "(updated August 2014)",
jlocation = "johnh: pafile",
keywords = "routing outage detection, diurnal network
behavior, active probing,
ntework outages",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Quan14b.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Quan14b.pdf",
otherurl = "ftp://ftp.isi.edu/isi-pubs/tr-699b.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
abstract = "
As the Internet matures, policy questions loom larger in its
operation. When should an ISP, city, or government invest in
infrastructure? How do their policies affect use? In this work, we
develop a new approach to evaluate how policies, economic conditions
and technology correlates with Internet use around the world. First,
we develop an adaptive and accurate approach to estimate \emph{block
availability}, the fraction of active IP addresses in each /24 block
over short timescales (every 11 minutes). Our estimator provides a
new lens to interpret data taken from existing long-term outage
measurements, this requiring no no additional traffic. (If new
collection was required, it would be lightweight, since on average,
outage detection requires less than 20 probes per hour per /24 block;
less than 1\% of background radiation.) Second, we show that spectral
analysis of this measure can identify \emph{diurnal usage}: blocks
where addresses are regularly used during part of the day and idle in
other times. Finally, we analyze data for the entire responsive
Internet (3.7M /24 blocks) over 35 days. These global observations
show \emph{when} and \emph{where} the Internet sleeps---networks are
mostly always-on in the US and Western Europe, and diurnal in much of
Asia, South America, and Eastern Europe. ANOVA testing shows that
diurnal networks correlate negatively with country GDP and electrical
consumption, quantifying that national policies and economics relate
to networks.
",
}
As the Internet matures, policy questions loom larger in its operation. When should an ISP, city, or government invest in infrastructure? How do their policies affect use? In this work, we develop a new approach to evaluate how policies, economic conditions and technology correlates with Internet use around the world. First, we develop an adaptive and accurate approach to estimate \emphblock availability, the fraction of active IP addresses in each /24 block over short timescales (every 11 minutes). Our estimator provides a new lens to interpret data taken from existing long-term outage measurements, this requiring no no additional traffic. (If new collection was required, it would be lightweight, since on average, outage detection requires less than 20 probes per hour per /24 block; less than 1% of background radiation.) Second, we show that spectral analysis of this measure can identify \emphdiurnal usage: blocks where addresses are regularly used during part of the day and idle in other times. Finally, we analyze data for the entire responsive Internet (3.7M /24 blocks) over 35 days. These global observations show \emphwhen and \emphwhere the Internet sleeps—networks are mostly always-on in the US and Western Europe, and diurnal in much of Asia, South America, and Eastern Europe. ANOVA testing shows that diurnal networks correlate negatively with country GDP and electrical consumption, quantifying that national policies and economics relate to networks.
Where and why users “check in”.
Cho, Y.; Ver Steeg, G.; and Galstyan, A.
In
Proc. of AAAI, volume 14, pages 269–275, 2014.
link
bibtex
40 downloads
@inproceedings{cho2014and,
title={Where and why users “check in”},
author={Cho, Yoon-Sik and Ver Steeg, Greg and Galstyan, Aram},
booktitle={Proc. of AAAI},
volume={14},
pages={269--275},
year={2014}
}
Window-Based Descriptors for Arabic Handwritten Alphabet Recognition: A Comparative Study on a Novel Dataset.
Torki, M.; Hussein, M. E.; Elsallamy, A.; Fayyaz, M.; and Yaser, S.
. 2014.
Paper
link
bibtex
abstract
@article{torki_window-based_2014,
title = {Window-Based Descriptors for Arabic Handwritten Alphabet Recognition: A Comparative Study on a Novel Dataset},
rights = {All rights reserved},
url = {http://arxiv.org/abs/1411.3519},
shorttitle = {Window-Based Descriptors for Arabic Handwritten Alphabet Recognition},
abstract = {This paper presents a comparative study for window-based descriptors on the application of Arabic handwritten alphabet recognition. We show a detailed experimental evaluation of different descriptors with several classifiers. The objective of the paper is to evaluate different window-based descriptors on the problem of Arabic letter recognition. Our experiments clearly show that they perform very well. Moreover, we introduce a novel spatial pyramid partitioning scheme that enhances the recognition accuracy for most descriptors. In addition, we introduce a novel dataset for Arabic handwritten isolated alphabet letters, which can serve as a benchmark for future research.},
journaltitle = {{arXiv}:1411.3519 [cs]},
author = {Torki, Marwan and Hussein, Mohamed E. and Elsallamy, Ahmed and Fayyaz, Mahmoud and Yaser, Shehab},
urldate = {2019-05-01},
date = {2014-11-13},
year = {2014},
eprinttype = {arxiv},
eprint = {1411.3519},
keywords = {Computer Science - Computer Vision and Pattern Recognition, I.5.2, I.7.5},
file = {arXiv\:1411.3519 PDF:C\:\\Users\\Mohamed Hussein\\Zotero\\storage\\ZRQW78SU\\Torki et al. - 2014 - Window-Based Descriptors for Arabic Handwritten Al.pdf:application/pdf;arXiv.org Snapshot:C\:\\Users\\Mohamed Hussein\\Zotero\\storage\\REA9GRJU\\1411.html:text/html}
}
This paper presents a comparative study for window-based descriptors on the application of Arabic handwritten alphabet recognition. We show a detailed experimental evaluation of different descriptors with several classifiers. The objective of the paper is to evaluate different window-based descriptors on the problem of Arabic letter recognition. Our experiments clearly show that they perform very well. Moreover, we introduce a novel spatial pyramid partitioning scheme that enhances the recognition accuracy for most descriptors. In addition, we introduce a novel dataset for Arabic handwritten isolated alphabet letters, which can serve as a benchmark for future research.
Workflow Reuse in Practice: A Study of Neuroimaging Pipeline Users.
Garijo, D.; Corcho, Ó.; Gil, Y.; Braskie, M. N.; Hibar, D. P.; Hua, X.; Jahanshad, N.; Thompson, P. M.; and Toga, A. W.
In
10th IEEE International Conference on e-Science, eScience 2014, Sao Paulo, Brazil, October 20-24, 2014, pages 239–246, 2014. IEEE Computer Society
Paper
doi
link
bibtex
5 downloads
@inproceedings{DBLP:conf/eScience/GarijoCGBHHJTT14,
author = {Daniel Garijo and
{\'{O}}scar Corcho and
Yolanda Gil and
Meredith N. Braskie and
Derrek P. Hibar and
Xue Hua and
Neda Jahanshad and
Paul M. Thompson and
Arthur W. Toga},
title = {Workflow Reuse in Practice: {A} Study of Neuroimaging Pipeline Users},
booktitle = {10th {IEEE} International Conference on e-Science, eScience 2014,
Sao Paulo, Brazil, October 20-24, 2014},
pages = {239--246},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/eScience.2014.33},
doi = {10.1109/ESCIENCE.2014.33},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/eScience/GarijoCGBHHJTT14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}