Meta-Algorithmics Patterns for Robust, Low Cost, High Quality Systems

Total Page:16

File Type:pdf, Size:1020Kb

Meta-Algorithmics Patterns for Robust, Low Cost, High Quality Systems STEVEN J. SIMSKE META-ALGORITHMICS PATTERNS FOR ROBUST, LOW COST, HIGH QUALITY SYSTEMS META-ALGORITHMICS META-ALGORITHMICS PATTERNS FOR ROBUST, LOW-COST, HIGH-QUALITY SYSTEMS Steven J. Simske HP Labs, Colorado, USA C 2013 John Wiley & Sons, Ltd Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com. The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. It is sold on the understanding that the publisher is not engaged in rendering professional services and neither the publisher nor the author shall be liable for damages arising herefrom. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Library of Congress Cataloging-in-Publication Data Simske, Steven J. Meta-algorithmics : patterns for robust, low-cost, high-quality systems / Dr. Steven J. Simske, Hewlett-Packard Labs. pages cm ISBN 978-1-118-34336-4 (hardback) 1. Computer algorithms. 2. Parallel algorithms. 3. Heuristic programming. 4. Computer systems–Costs. 5. Computer systems–Quality control. I. Title. QA76.9.A43S543 2013 005.1–dc23 2013004488 A catalogue record for this book is available from the British Library. ISBN: 9781118343364 Typeset in 10/12pt Times by Aptara Inc., New Delhi, India Contents Acknowledgments xi 1 Introduction and Overview 1 1.1 Introduction 1 1.2 Why Is This Book Important? 2 1.3 Organization of the Book 3 1.4 Informatics 4 1.5 Ensemble Learning 6 1.6 Machine Learning/Intelligence 7 1.6.1 Regression and Entropy 8 1.6.2 SVMs and Kernels 9 1.6.3 Probability 15 1.6.4 Unsupervised Learning 17 1.6.5 Dimensionality Reduction 18 1.6.6 Optimization and Search 20 1.7 Artificial Intelligence 22 1.7.1 Neural Networks 22 1.7.2 Genetic Algorithms 25 1.7.3 Markov Models 28 1.8 Data Mining/Knowledge Discovery 31 1.9 Classification 32 1.10 Recognition 38 1.11 System-Based Analysis 39 1.12 Summary 39 References 40 2 Parallel Forms of Parallelism 42 2.1 Introduction 42 2.2 Parallelism by Task 43 2.2.1 Definition 43 2.2.2 Application to Algorithms and Architectures 46 2.2.3 Application to Scheduling 51 2.3 Parallelism by Component 52 2.3.1 Definition and Extension to Parallel-Conditional Processing 52 vi Contents 2.3.2 Application to Data Mining, Search, and Other Algorithms 55 2.3.3 Application to Software Development 59 2.4 Parallelism by Meta-algorithm 64 2.4.1 Meta-algorithmics and Algorithms 66 2.4.2 Meta-algorithmics and Systems 67 2.4.3 Meta-algorithmics and Parallel Processing 68 2.4.4 Meta-algorithmics and Data Collection 69 2.4.5 Meta-algorithmics and Software Development 70 2.5 Summary 71 References 72 3 Domain Areas: Where Are These Relevant? 73 3.1 Introduction 73 3.2 Overview of the Domains 74 3.3 Primary Domains 75 3.3.1 Document Understanding 75 3.3.2 Image Understanding 77 3.3.3 Biometrics 78 3.3.4 Security Printing 79 3.4 Secondary Domains 86 3.4.1 Image Segmentation 86 3.4.2 Speech Recognition 90 3.4.3 Medical Signal Processing 90 3.4.4 Medical Imaging 92 3.4.5 Natural Language Processing 95 3.4.6 Surveillance 97 3.4.7 Optical Character Recognition 98 3.4.8 Security Analytics 101 3.5 Summary 101 References 102 4 Applications of Parallelism by Task 104 4.1 Introduction 104 4.2 Primary Domains 105 4.2.1 Document Understanding 112 4.2.2 Image Understanding 118 4.2.3 Biometrics 126 4.2.4 Security Printing 131 4.3 Summary 135 References 136 5 Application of Parallelism by Component 137 5.1 Introduction 137 5.2 Primary Domains 138 5.2.1 Document Understanding 138 5.2.2 Image Understanding 152 Contents vii 5.2.3 Biometrics 162 5.2.4 Security Printing 170 5.3 Summary 172 References 173 6 Introduction to Meta-algorithmics 175 6.1 Introduction 175 6.2 First-Order Meta-algorithmics 178 6.2.1 Sequential Try 178 6.2.2 Constrained Substitute 181 6.2.3 Voting and Weighted Voting 184 6.2.4 Predictive Selection 189 6.2.5 Tessellation and Recombination 192 6.3 Second-Order Meta-algorithmics 195 6.3.1 Confusion Matrix and Weighted Confusion Matrix 195 6.3.2 Confusion Matrix with Output Space Transformation (Probability Space Transformation) 199 6.3.3 Tessellation and Recombination with Expert Decisioner 203 6.3.4 Predictive Selection with Secondary Engines 206 6.3.5 Single Engine with Required Precision 208 6.3.6 Majority Voting or Weighted Confusion Matrix 209 6.3.7 Majority Voting or Best Engine 210 6.3.8 Best Engine with Differential Confidence or Second Best Engine 212 6.3.9 Best Engine with Absolute Confidence or Weighted Confusion Matrix 217 6.4 Third-Order Meta-algorithmics 218 6.4.1 Feedback 219 6.4.2 Proof by Task Completion 221 6.4.3 Confusion Matrix for Feedback 224 6.4.4 Expert Feedback 228 6.4.5 Sensitivity Analysis 232 6.4.6 Regional Optimization (Extended Predictive Selection) 236 6.4.7 Generalized Hybridization 239 6.5 Summary 240 References 240 7 First-Order Meta-algorithmics and Their Applications 241 7.1 Introduction 241 7.2 First-Order Meta-algorithmics and the “Black Box” 241 7.3 Primary Domains 242 7.3.1 Document Understanding 242 7.3.2 Image Understanding 246 7.3.3 Biometrics 252 7.3.4 Security Printing 256 7.4 Secondary Domains 257 7.4.1 Medical Signal Processing 258 viii Contents 7.4.2 Medical Imaging 264 7.4.3 Natural Language Processing 268 7.5 Summary 271 References 271 8 Second-Order Meta-algorithmics and Their Applications 272 8.1 Introduction 272 8.2 Second-Order Meta-algorithmics and Targeting the “Fringes” 273 8.3 Primary Domains 279 8.3.1 Document Understanding 280 8.3.2 Image Understanding 293 8.3.3 Biometrics 297 8.3.4 Security Printing 299 8.4 Secondary Domains 304 8.4.1 Image Segmentation 305 8.4.2 Speech Recognition 307 8.5 Summary 308 References 308 9 Third-Order Meta-algorithmics and Their Applications 310 9.1 Introduction 310 9.2 Third-Order Meta-algorithmic Patterns 311 9.2.1 Examples Covered 311 9.2.2 Training-Gap-Targeted Feedback 311 9.3 Primary Domains 313 9.3.1 Document Understanding 313 9.3.2 Image Understanding 315 9.3.3 Biometrics 318 9.3.4 Security Printing 323 9.4 Secondary Domains 328 9.4.1 Surveillance 328 9.4.2 Optical Character Recognition 334 9.4.3 Security Analytics 337 9.5 Summary 340 References 341 10 Building More Robust Systems 342 10.1 Introduction 342 10.2 Summarization 342 10.2.1 Ground Truthing for Meta-algorithmics 342 10.2.2 Meta-algorithmics for Keyword Generation 347 10.3 Cloud Systems 350 10.4 Mobile Systems 353 10.5 Scheduling 355 10.6 Classification 356 10.7 Summary 358 Reference 359 Contents ix 11 The Future 360 11.1 Recapitulation 360 11.2 The Pattern of All Patience 362 11.3 Beyond the Pale 365 11.4 Coming Soon 367 11.5 Summary 368 References 368 Index 369 Acknowledgments The goals of this book were ambitious—perhaps too ambitious—both in breadth (domains ad- dressed) and depth (number and variety of parallel processing and meta-algorithmic patterns). The book represents, or at least builds on, the work of many previous engineers, scientists and knowledge workers. Undoubtedly most, if not all, of the approaches in this book have been elaborated elsewhere, either overtly or in some disguise. One contribution of this book is to bring these disparate approaches together in one place, systematizing the design of in- telligent parallel systems. In progressing from the design of parallel systems using traditional by-component and by-task approaches to meta-algorithmic parallelism, the advantages of hybridization for system accuracy, robustness and cost were shown. I have a lot of people to thank for making this book a reality. First and foremost, I’d like to thank my wonderful family—Tess, Kieran and Dallen—for putting up with a year’s worth of weekends and late nights spent designing and running the many “throw away” experiments necessary to illustrate the application of meta-algorithmics (not to mention that little thing of actually writing).
Recommended publications
  • Theoretical Computer Science Knowledge a Selection of Latest Research Visit Springer.Com for an Extensive Range of Books and Journals in the field
    ABCD springer.com Theoretical Computer Science Knowledge A Selection of Latest Research Visit springer.com for an extensive range of books and journals in the field Theory of Computation Classical and Contemporary Approaches Topics and features include: Organization into D. C. Kozen self-contained lectures of 3-7 pages 41 primary lectures and a handful of supplementary lectures Theory of Computation is a unique textbook that covering more specialized or advanced topics serves the dual purposes of covering core material in 12 homework sets and several miscellaneous the foundations of computing, as well as providing homework exercises of varying levels of difficulty, an introduction to some more advanced contempo- many with hints and complete solutions. rary topics. This innovative text focuses primarily, although by no means exclusively, on computational 2006. 335 p. 75 illus. (Texts in Computer Science) complexity theory. Hardcover ISBN 1-84628-297-7 $79.95 Theoretical Introduction to Programming B. Mills page, this book takes you from a rudimentary under- standing of programming into the world of deep Including well-digested information about funda- technical software development. mental techniques and concepts in software construction, this book is distinct in unifying pure 2006. XI, 358 p. 29 illus. Softcover theory with pragmatic details. Driven by generic ISBN 1-84628-021-4 $69.95 problems and concepts, with brief and complete illustrations from languages including C, Prolog, Java, Scheme, Haskell and HTML. This book is intended to be both a how-to handbook and easy reference guide. Discussions of principle, worked Combines theory examples and exercises are presented. with practice Densely packed with explicit techniques on each springer.com Theoretical Computer Science Knowledge Complexity Theory Exploring the Limits of Efficient Algorithms computer science.
    [Show full text]
  • Graph Visualization and Navigation in Information Visualization 1
    HERMAN ET AL.: GRAPH VISUALIZATION AND NAVIGATION IN INFORMATION VISUALIZATION 1 Graph Visualization and Navigation in Information Visualization: a Survey Ivan Herman, Member, IEEE CS Society, Guy Melançon, and M. Scott Marshall Abstract—This is a survey on graph visualization and navigation techniques, as used in information visualization. Graphs appear in numerous applications such as web browsing, state–transition diagrams, and data structures. The ability to visualize and to navigate in these potentially large, abstract graphs is often a crucial part of an application. Information visualization has specific requirements, which means that this survey approaches the results of traditional graph drawing from a different perspective. Index Terms—Information visualization, graph visualization, graph drawing, navigation, focus+context, fish–eye, clustering. involved in graph visualization: “Where am I?” “Where is the 1 Introduction file that I'm looking for?” Other familiar types of graphs lthough the visualization of graphs is the subject of this include the hierarchy illustrated in an organisational chart and Asurvey, it is not about graph drawing in general. taxonomies that portray the relations between species. Web Excellent bibliographic surveys[4],[34], books[5], or even site maps are another application of graphs as well as on–line tutorials[26] exist for graph drawing. Instead, the browsing history. In biology and chemistry, graphs are handling of graphs is considered with respect to information applied to evolutionary trees, phylogenetic trees, molecular visualization. maps, genetic maps, biochemical pathways, and protein Information visualization has become a large field and functions. Other areas of application include object–oriented “sub–fields” are beginning to emerge (see for example Card systems (class browsers), data structures (compiler data et al.[16] for a recent collection of papers from the last structures in particular), real–time systems (state–transition decade).
    [Show full text]
  • Experimental Algorithmics from Algorithm Desig
    Lecture Notes in Computer Science 2547 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Tokyo Rudolf Fleischer Bernard Moret Erik Meineche Schmidt (Eds.) Experimental Algorithmics From Algorithm Design to Robust and Efficient Software 13 Volume Editors Rudolf Fleischer Hong Kong University of Science and Technology Department of Computer Science Clear Water Bay, Kowloon, Hong Kong E-mail: [email protected] Bernard Moret University of New Mexico, Department of Computer Science Farris Engineering Bldg, Albuquerque, NM 87131-1386, USA E-mail: [email protected] Erik Meineche Schmidt University of Aarhus, Department of Computer Science Bld. 540, Ny Munkegade, 8000 Aarhus C, Denmark E-mail: [email protected] Cataloging-in-Publication Data applied for A catalog record for this book is available from the Library of Congress. Bibliographic information published by Die Deutsche Bibliothek Die Deutsche Bibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data is available in the Internet at <http://dnb.ddb.de> CR Subject Classification (1998): F.2.1-2, E.1, G.1-2 ISSN 0302-9743 ISBN 3-540-00346-0 Springer-Verlag Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag.
    [Show full text]
  • Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
    Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. Digital Object Identifier 10.1109/ACCESS.2017.DOI Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey FADOUA DEBBABI1,2, RIHAB JMAL2, LAMIA CHAARI FOURATI2,AND ADLENE KSENTINI.3 1University of Sousse, ISITCom, 4011 Hammam Sousse,Tunisia (e-mail: [email protected]) 2Laboratory of Technologies for Smart Systems (LT2S) Digital Research Center of Sfax (CRNS), Sfax, Tunisia (e-mail: [email protected] [email protected] ) 3Eurecom, France (e-mail: [email protected] ) Corresponding author: Rihab JMAL (e-mail:[email protected]). ABSTRACT One of the key goals of future 5G networks is to incorporate many different services into a single physical network, where each service has its own logical network isolated from other networks. In this context, Network Slicing (NS)is considered as the key technology for meeting the service requirements of diverse application domains. Recently, NS faces several algorithmic challenges for 5G networks. This paper provides a review related to NS architecture with a focus on relevant management and orchestration architecture across multiple domains. In addition, this survey paper delivers a deep analysis and a taxonomy of NS algorithmic aspects. Finally, this paper highlights some of the open issues and future directions. INDEX TERMS Network Slicing, Next-generation networking, 5G mobile communication, QoS, Multi- domain, Management and Orchestration, Resource allocation. I. INTRODUCTION promising solutions to such network re-engineering [3]. A. CONTEXT AND MOTIVATION NS [9] allows the creation of several Fully-fledged virtual networks (core, access, and transport network) over the HE high volume of generated traffics from smart sys- same infrastructure, while maintaining the isolation among tems [1] and Internet of Everything applications [2] T slices.The FIGURE 1 shows the way different slices are complicates the network’s activities and management of cur- isolated.
    [Show full text]
  • A Generative Middleware Specialization Process for Distributed Real-Time and Embedded Systems
    A Generative Middleware Specialization Process for Distributed Real-time and Embedded Systems Akshay Dabholkar and Aniruddha Gokhale ∗Dept. of EECS, Vanderbilt University Nashville, TN 37235, USA Email: {aky,gokhale}@dre.vanderbilt.edu Abstract—General-purpose middleware must often be special- domain and product variant – a process we call middleware ized for resource-constrained, real-time and embedded systems specialization. to improve their response-times, reliability, memory footprint, and even power consumption. Software engineering techniques, Most prior efforts at specializing middleware (and other such as aspect-oriented programming (AOP), feature-oriented system artifacts) [1]–[6] often require manual efforts in iden- programming (FOP), and reflection make the specialization task tifying opportunities for specialization and realizing them on simpler, albeit still requiring the system developer to manually identify the system invariants, and sources of performance the software artifacts. At first glance it may appear that these and memory footprint bottlenecks that determine the required manual efforts are expended towards addressing problems that specializations. Specialization reuse is also hampered due to a are purely accidental in nature. A close scrutiny, however, lack of common taxonomy to document the recurring specializa- reveals that system developers face a number of inherent tions. This paper presents the GeMS (Generative Middleware complexities as well, which stem from the following reasons: Specialization) framework to address these challenges. We present results of applying GeMS to a Distributed Real-time 1. Spatial disparity between OO-based middleware design and Embedded (DRE) system case study that depict a 21-35% and domain-level concerns - Middleware is traditionally ˜ reduction in footprint, and a 36% improvement in performance designed using object-oriented (OO) principles, which enforce while simultaneously alleviating 97%˜ of the developer efforts in specializing middleware.
    [Show full text]
  • 1. Immersive Analytics: an Introduction
    1. Immersive Analytics: An Introduction Tim Dwyer1, Kim Marriott1, Tobias Isenberg2, Karsten Klein3, Nathalie Riche4, Falk Schreiber1,3, Wolfgang Stuerzlinger5, and Bruce H. Thomas6 1 Monash University, Australia [Tim.Dwyer, Kim.Marriott]@monash.edu 2 Inria and University Paris-Saclay [email protected] 3 ? University of Konstanz, Germany [Karsten.Klein, Falk Schreiber]@uni-konstanz.de 4 Microsoft, USA [email protected] 5 Simon Fraser University, Canada [email protected] 6 University of South Australia [email protected] Abstract. Immersive Analytics is a new research initiative that aims to remove barriers between people, their data and the tools they use for analysis and decision making. Here we clarify the aims of immersive analytics research, its opportunities and historical context, as well as providing a broad research agenda for the feld. In addition, we review how the term immersion has been used to refer to both technological and psychological immersion, both of which are central to immersive analytics research. Keywords: immersive analytics, multi-sensory, 2D and 3D, data analytics, decision making 1.1. What is Immersive Analytics? Immersive Analytics is the use of engaging, embodied analysis tools to support data understanding and decision making. Immersive analytics builds upon the felds of data visualisation, visual analytics, virtual reality, computer graphics, and human-computer interaction. Its goal is to remove barriers between people, their data, and the tools they use for analysis. It aims to support data understanding and decision making everywhere and by everyone, both working individually and collaboratively. While this may be achieved through the use of immersive virtual environment technologies, multisensory presentation, data physicalisation, natural interfaces, or responsive analytics, the feld of immersive analytics is not tied to the use of specifc techniques.
    [Show full text]
  • An Interactive System for Scheduling Jobs in Electronic Assembly
    An Interactive System for Scheduling Jobs in Electronic Assembly Jouni Smed Tommi Johtela Mika Johnsson Mikko Puranen Olli Nevalainen Turku Centre for Computer Science TUCS Technical Report No 233 January 1999 ISBN 952-12-0364-1 ISSN 1239-1891 Abstract In flexible manufacturing systems (FMS) the interaction between the pro- duction planner and the scheduling system is essential. This is a typical situation in printed circuit board (PCB) assembly. We discuss the structure and operation of an interactive scheduling system for surface mount compo- nent printing involving multiple criteria. The user can compose a schedule by using a heuristic algorithm, but the schedule can be manipulated also directly via a graphical user interface. In addition to system description, we present statistical data of the effect of the system in an actual production environment. Keywords: production planning, printed circuit boards, group technology, flexible manufacturing, multiple criteria, fuzzy scheduling TUCS Research Group Algorithmics 1 Introduction A flexible manufacturing system (FMS) comprises a group of programmable production machines integrated with automated material handling equip- ment which are under the direction of a central controller to produce a va- riety of parts at non-uniform production rates, batch sizes and quantities. Flexibility in manufacturing provides an opportunity to capitalize on ba- sic strengths of a company. The flexibility of the FMS is characterized by how well it responds to changes in the product design and the production schedules. The control of the FMS requires a complex interaction of two components [1]: 1. computers to perform automated control and routing activities, and 2. humans to supervise the automation, to monitor the system flow and output, to intervene in the unexpected operation of the system, and to compensate the effect of unanticipated events.
    [Show full text]
  • Algorithmics in Secondary School: a Comparative Study Between Ukraine and France Simon Modeste, Maryna Rafalska
    Algorithmics in secondary school: A comparative study between Ukraine And France Simon Modeste, Maryna Rafalska To cite this version: Simon Modeste, Maryna Rafalska. Algorithmics in secondary school: A comparative study between Ukraine And France. CERME 10, Feb 2017, Dublin, Ireland. pp.1634-1641. hal-01938178 HAL Id: hal-01938178 https://hal.archives-ouvertes.fr/hal-01938178 Submitted on 28 Nov 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Algorithmics in secondary school: A comparative study between Ukraine And France Simon Modeste¹ and Maryna Rafalska² ¹Université de Montpellier, IMAG – UMR CNRS 5149; [email protected] ²National Pedagogical Dragomanov University; [email protected] This article is focused on the teaching and learning of Algorithmics, a discipline at the intersection of Informatics and Mathematics. We focus on the didactic transposition of Algorithmics in secondary school in France and Ukraine. Based on epistemological and didactical frameworks, we identify the general characteristics of the approaches in the two countries, taking into account the organization of the content and the national contexts (in the course of Mathematics in France and in the course of Informatics in Ukraine).
    [Show full text]
  • Offline Drawing of Dynamic Trees: Algorithmics and Document
    Offline Drawing of Dynamic Trees: Algorithmics and Document Integration? Malte Skambath1 and Till Tantau2 1 Department of Computer Science, Kiel University, Germany [email protected] 2 Institute of Theoretical Computer Science, Universit¨atzu L¨ubeck, Germany [email protected] Abstract. While the algorithmic drawing of static trees is well-under- stood and well-supported by software tools, creating animations depict- ing how a tree changes over time is currently difficult: software support, if available at all, is not integrated into a document production workflow and algorithmic approaches only rarely take temporal information into consideration. During the production of a presentation or a paper, most users will visualize how, say, a search tree evolves over time by manually drawing a sequence of trees. We present an extension of the popular TEX typesetting system that allows users to specify dynamic trees inside their documents, together with a new algorithm for drawing them. Running TEX on the documents then results in documents in the svg format with visually pleasing embedded animations. Our algorithm produces anima- tions that satisfy a set of natural aesthetic criteria when possible. On the negative side, we show that one cannot always satisfy all criteria simultaneously and that minimizing their violations is NP-complete. 1 Introduction Trees are undoubtedly among the most extensively studied graph structures in the field of graph drawing; algorithms for drawing trees date back to the origins of the field [26,40]. However, the extensive, ongoing research on how trees can be drawn efficiently, succinctly, and pleasingly focuses on either drawing a single, \static" tree or on interactive drawings of \dynamic" trees [11,12,27], which are trees that change over time.
    [Show full text]
  • CUBICA: an Example of Mixed Reality
    Journal of Universal Computer Science, vol. 19, no. 17 (2013), 2598-2616 submitted: 15/2/13, accepted: 22/4/13, appeared: 1/11/13 © J.UCS CUBICA: An Example of Mixed Reality Juan Mateu (Universidad Autónoma de Madrid, Madrid, Spain [email protected]) Xavier Alaman (Universidad Autónoma de Madrid, Madrid, Spain [email protected]) Abstract: Nowadays, one of the hot issues in the agenda is, undoubtedly, the concept of Sustainable Computing. There are several technologies in the intersection of Sustainable Computing and Ambient Intelligence. Among them we may mention “Human-Centric Interfaces for Ambient Intelligence” and “Collaborative Smart Objects” technologies. In this paper we present our efforts in developing these technologies for “Mixed Reality”, a paradigm where Virtual Reality and Ambient Intelligence meet. Cubica is a mixed reality educational application that integrates virtual worlds with tangible interfaces. The application is focused on teaching computer science, in particular “sorting algorithms”. The tangible interface is used to simplify the abstract concept of array, while the virtual world is used for delivering explanations. This educational application has been tested with students at different educational levels in secondary education, having obtained promising results in terms of increased motivation for learning and better understanding of abstract concepts. Keywords: Human-centric interfaces for AmI environments, ubiquitous and ambient displays environments, collaborative smart objects Categories: H.1.2, H.5.2, K.3.1, L.3.1, L.7.0 1 Introduction Nowadays one of the hot issues in the agenda is, undoubtedly, the concept of Sustainable Computing. Ambient Intelligence technologies may contribute to sustainability in many ways, as the core of Ambient Intelligence is related with understanding the environment and being able to actuate on it in an intelligent way.
    [Show full text]
  • Algorithmics of Motion: from Robotics, Through Structural Biology, Toward Atomic-Scale CAD Juan Cortés
    Algorithmics of motion: From robotics, through structural biology, toward atomic-scale CAD Juan Cortés To cite this version: Juan Cortés. Algorithmics of motion: From robotics, through structural biology, toward atomic-scale CAD. Robotics [cs.RO]. Universite Toulouse III Paul Sabatier, 2014. tel-01110545 HAL Id: tel-01110545 https://tel.archives-ouvertes.fr/tel-01110545 Submitted on 28 Jan 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Habilitation a Diriger des Recherches (HDR) delivr´eepar l'Universit´ede Toulouse pr´esent´eeau Laboratoire d'Analyse et d'Architecture des Syst`emes par : Juan Cort´es Charg´ede Recherche CNRS Algorithmics of Motion: From Robotics, Through Structural Biology, Toward Atomic-Scale CAD Soutenue le 18 Avril 2014 devant le Jury compos´ede : Michael Nilges Institut Pasteur, Paris Rapporteurs Fr´ed´ericCazals INRIA Sophia Antipolis-Mediterrane St´ephane Doncieux ISIR, UPMC-CNRS, Paris Oliver Brock Technische Universit¨atBerlin Examinateurs Jean-Pierre Jessel IRIT, UPS, Toulouse Jean-Paul Laumond LAAS-CNRS, Toulouse Pierre Monsan INSA, Toulouse Membre invit´e Thierry Sim´eon LAAS-CNRS, Toulouse Parrain Contents Curriculum Vitæ1 1 Research Activities5 1.1 Introduction...................................5 1.2 Methodological advances............................6 1.2.1 Algorithmic developments in a general framework...........6 1.2.2 Methods for molecular modeling and simulation...........
    [Show full text]
  • Virtual Reality And/Or Augmented Reality), Immersive 3D Visualization (Immersive Analytics)
    JOB ADVERTISEMENT IMT ATLANTIQUE is recruiting an Associate Professor in Computer Science, specialized in HCI and Mixed Reality Brest campus http://www.imt-atlantique.fr Start date: December 2020 Keywords: Human-Computer Interaction, 3D User Interaction, Mixed Reality (Virtual Reality and/or Augmented Reality), Immersive 3D Visualization (Immersive Analytics) Administrative status: Associate/Assistant Professor, civil servant of the French Ministry of Economy and Industry Presentation of the school IMT Atlantique, internationally recognized for the quality of its research, is a leading general engineering school under the aegis of the Ministry of Industry and Digital Technology, ranked in the 3 main international rankings (THE, SHANGAI, QS) Situated on 3 campuses, Brest, Nantes and Rennes, IMT Atlantique aims to combine digital technology and energy to transform society and industry through training, research and innovation. It aims to be the leading French higher education and research institution in this field on an international scale. With 290 researchers and permanent lecturers, 1000 publications and 18 M€ of contracts, it supervises 2300 students each year and its training courses are based on cutting-edge research carried out within 6 joint research units: GEPEA, IRISA, LATIM, Lab-STICC, LS2N and SUBATECH. Presentation of the scientific field The computer science department of IMT Atlantique is recruiting a research lecturer specialized in the fields of HCI and Mixed Reality for its INUIT team . The computer science department of IMT-Atlantique is located in Brest. With about 50 people it contributes to the Lab-STICC (Laboratoire des Sciences et Techniques de l'Information, de la Communication et de la Connaissance, UMR CNRS 6285) research laboratory, which is present inthe cities of Brest, Quimper, Lorient and Vannes.
    [Show full text]