144 results on '"Kennedy, Jessie"'
Search Results
2. PfSPZ-CVac malaria vaccine demonstrates safety among malaria-experienced adults: A randomized, controlled phase 1 trial
- Author
-
Coulibaly, Drissa, Kone, Abdoulaye K., Traore, Karim, Niangaly, Amadou, Kouriba, Bourema, Arama, Charles, Zeguime, Amatigue, Dolo, Amagana, Lyke, Kirsten E., Plowe, Christopher V., Abebe, Yonas, Potter, Gail E., Kennedy, Jessie K., Galbiati, Shirley M., Nomicos, Effie, Deye, Gregory A., Richie, Thomas L., James, Eric R., KC, Natasha, Sim, B. Kim Lee, Hoffman, Stephen L., Doumbo, Ogobara K., Thera, Mahamadou A., and Laurens, Matthew B.
- Published
- 2022
- Full Text
- View/download PDF
3. EVITA Dengue: a cluster-randomized controlled trial to EValuate the efficacy of Wolbachia-InfecTed Aedes aegypti mosquitoes in reducing the incidence of Arboviral infection in Brazil
- Author
-
Collins, Matthew H., Potter, Gail E., Hitchings, Matt D. T., Butler, Ellie, Wiles, Michelle, Kennedy, Jessie K., Pinto, Sofia B., Teixeira, Adla B. M., Casanovas-Massana, Arnau, Rouphael, Nadine G., Deye, Gregory A., Simmons, Cameron P., Moreira, Luciano A., Nogueira, Mauricio L., Cummings, Derek A. T., Ko, Albert I., Teixeira, Mauro M., and Edupuganti, Srilatha
- Published
- 2022
- Full Text
- View/download PDF
4. Chloroquine as weekly chemoprophylaxis or intermittent treatment to prevent malaria in pregnancy in Malawi: a randomised controlled trial
- Author
-
Divala, Titus H, Mungwira, Randy G, Mawindo, Patricia M, Nyirenda, Osward M, Kanjala, Maxwell, Ndaferankhande, Masiye, Tsirizani, Lufina E, Masonga, Rhoda, Muwalo, Francis, Boudová, Sarah, Potter, Gail E, Kennedy, Jessie, Goswami, Jaya, Wylie, Blair J, Muehlenbachs, Atis, Ndovie, Lughano, Mvula, Priscilla, Mbilizi, Yamikani, Tomoka, Tamiwe, and Laufer, Miriam K
- Published
- 2018
- Full Text
- View/download PDF
5. Novel Visualisation Techniques for Working with Multiple, Overlapping Classification Hierarchies
- Author
-
Graham, Martin, Watson, Mark F., and Kennedy, Jessie B.
- Published
- 2002
- Full Text
- View/download PDF
6. Implementation of the Prometheus Taxonomic Model: A Comparison of Database Models and Query Languages and an Introduction to the Prometheus Object-Oriented Model
- Author
-
Raguenaud, Cédric, Pullan, Martin R., Watson, Mark F., Kennedy, Jessie B., Newman, Mark F., and Barclay, Peter J.
- Published
- 2002
- Full Text
- View/download PDF
7. The Prometheus Taxonomic Model: A Practical Approach to Representing Multiple Classifications
- Author
-
Pullan, Martin R., Watson, Mark F., Kennedy, Jessie B., Raguenaud, Cédric, and Hyam, Roger
- Published
- 2000
- Full Text
- View/download PDF
8. A randomized, controlled Phase 1b trial of the Sm-TSP-2 Vaccine for intestinal schistosomiasis in healthy Brazilian adults living in an endemic area.
- Author
-
Diemert, David J., Correa-Oliveira, Rodrigo, Fraga, Carlo Geraldo, Talles, Frederico, Silva, Marcella Rezende, Patel, Shital M., Galbiati, Shirley, Kennedy, Jessie K., Lundeen, Jordan S., Gazzinelli, Maria Flavia, Li, Guangzhao, Hoeweler, Lara, Deye, Gregory A., Bottazzi, Maria Elena, Hotez, Peter J., El Sahly, Hana M., Keitel, Wendy A., Bethony, Jeffrey, and Atmar, Robert L.
- Subjects
BRAZILIANS ,VACCINE trials ,SCHISTOSOMIASIS ,HEPATITIS B vaccines ,SCHISTOSOMA mansoni ,NEUTRALIZATION tests ,BURULI ulcer ,HEPATITIS B - Abstract
Background: Recombinant Schistosoma mansoni Tetraspanin-2 formulated on Alhydrogel (Sm-TSP-2/Alhydrogel) is being developed to prevent intestinal and hepatic disease caused by S. mansoni. The tegumentary Sm-TSP-2 antigen was selected based on its unique recognition by cytophilic antibodies in putatively immune individuals living in areas of ongoing S. mansoni transmission in Brazil, and preclinical studies in which vaccination with Sm-TSP-2 protected mice following infection challenge. Methods: A randomized, observer-blind, controlled, Phase 1b clinical trial was conducted in 60 healthy adults living in a region of Brazil with ongoing S. mansoni transmission. In each cohort of 20 participants, 16 were randomized to receive one of two formulations of Sm-TSP-2 vaccine (adjuvanted with Alhydrogel only, or with Alhydrogel plus the Toll-like receptor-4 agonist, AP 10–701), and 4 to receive Euvax B hepatitis B vaccine. Successively higher doses of antigen (10 μg, 30 μg, and 100 μg) were administered in a dose-escalation fashion, with progression to the next dose cohort being dependent upon evaluation of 7-day safety data after all participants in the preceding cohort had received their first dose of vaccine. Each participant received 3 intramuscular injections of study product at intervals of 2 months and was followed for 12 months after the third vaccination. IgG and IgG subclass antibody responses to Sm-TSP-2 were measured by qualified indirect ELISAs at pre- and post-vaccination time points through the final study visit. Results: Sm-TSP-2/Alhydrogel administered with or without AP-10-701 was well-tolerated in this population. The most common solicited adverse events were mild injection site tenderness and pain, and mild headache. No vaccine-related serious adverse events or adverse events of special interest were observed. Groups administered Sm-TSP-2/Alhydrogel with AP 10–701 had higher post-vaccination levels of antigen-specific IgG antibody. A significant dose-response relationship was seen in those administered Sm-TSP-2/Alhydrogel with AP 10–701. Peak anti-Sm-TSP-2 IgG levels were observed approximately 2 weeks following the third dose, regardless of Sm-TSP-2 formulation. IgG levels fell to low levels by Day 478 in all groups except the 100 μg with AP 10–701 group, in which 50% of subjects (4 of 8) still had IgG levels that were ≥4-fold higher than baseline. IgG subclass levels mirrored those of total IgG, with IgG1 being the predominant subclass response. Conclusions: Vaccination of adults with Sm-TSP-2/Alhydrogel in an area of ongoing S. mansoni transmission was safe, minimally reactogenic, and elicited significant IgG and IgG subclass responses against the vaccine antigen. These promising results have led to initiation of a Phase 2 clinical trial of this vaccine in an endemic region of Uganda. Trial registration: NCT03110757. Author summary: Infection caused by Schistosoma mansoni is a major neglected tropical disease with significant associated morbidity. New tools, such as vaccines, are needed due to the inadequacy of current control strategies. Tetraspanin-2 of S. mansoni (Sm-TSP-2) is one of the lead vaccine candidates for hepatic/intestinal schistosomiasis. Antibodies induced by this vaccine are postulated to interfere with the development of the tegument of adult S. mansoni worms, thereby impairing their development and survival. We conducted a Phase 1 trial of recombinant Sm-TSP-2 adjuvanted with Alhydrogel in 60 healthy adults living in Brazil. Each participant received three vaccinations every 2 months by intramuscular injection of the vaccine administered with or without an aqueous solution of the Toll-like receptor-4 agonist, Glucopyranosyl Lipid A (AP 10–701). Sm-TSP-2/Alhydrogel was well tolerated in schistosomiasis-exposed adults; no vaccine-related severe or serious adverse events were observed. Antigen-specific IgG antibodies were induced in a dose-dependent fashion with increasing levels observed after each vaccination. The addition of AP 10–701 to the vaccine resulted in significantly higher antibody responses. Based on these results, the vaccine has been advanced into a Phase 2 clinical trial in an endemic region of Africa. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Managing Social Capital as Knowledge Management - Some Specification and Representation Issues.
- Author
-
Davenport, Elisabeth, Graham, Martin, Kennedy, Jessie, and Taylor, Katharine
- Abstract
This research attempts to identify how social capital is manifest within the contexts of small firm networks that rely on rapid turnover of projects. Presents work to date that converts tacit knowledge into sets of explicit and manageable local data, and provides examples of information visualizations for profiling and retrieval that support the management of social capital. (Author/AEF)
- Published
- 2003
10. Design and Evaluation of Visualisation Techniques to Facilitate Argument Exploration
- Author
-
Kennedy, Jessie, Khartabil, Dana, Wells, Simon, Collins, Christopher, and Bach, Benjamin
- Subjects
Centre for Algorithms, Visualisation and Evolving Systems ,interaction, visualization, Text visualisation, Hybrid visualisation techniques ,Information visualisation - Abstract
This paper reports the design and comparison of three visualizations to represent the structure and content within arguments. Arguments are artefacts of reasoning widely used across domains such as education, policy making, and science. An argument is made up of sequences of statements (premises) which can support or contradict each other, individually or in groups through Boolean operators. Understanding the resulting hierarchical structure of arguments while being able to read the arguments’ text poses problems related to overview, detail, and navigation. Based on interviews with argument analysts we iterativelydesigned three techniques, each using combinations of tree visualizations (sunburst, icicle), content display (in-situ, tooltip) and interactive navigation. Structured discussions with the analysts show benefits of each these techniques; e.g., sunburst being good in presenting overview but showing arguments in-situ is better than pop-ups. A controlled user study with 21 participants and three tasks shows complementary evidence suggesting that a sunburst with pop-up for the content is the best trade-off solution. Our results can inform visualizations within existing argument visualization tools and increase the visibility of ‘novel and effective’ visualizations in the argument visualization community.
- Published
- 2021
11. The Prometheus Description Model: An Examination of the Taxonomic Description-Building Process and Its Representation
- Author
-
Pullan, Martin R., Armstrong, Kate E., Paterson, Trevor, Cannon, Alan, Kennedy, Jessie B., Watson, Mark F., McDonald, Sarah, and Raguenaud, Cédric
- Published
- 2005
- Full Text
- View/download PDF
12. Updating the Mozilla public license: an analysis of the key terms and provisions in MPL 2.0
- Author
-
Kennedy, Jessie Grodstein
- Subjects
Public software -- Laws, regulations and rules ,Government regulation ,Product licensing ,Open source software ,Computers ,Law - Abstract
On March 10, 2010, the Mozilla Foundation announced the launch of a public process to update the Mozilla Public License (MPL), the signature license for Mozilla code. Stating the project's [...]
- Published
- 2011
13. Special Issue Integrated health records: practice and technology
- Author
-
Hartswood, Mark, Kennedy, Jessie, Monteiro, Eric, Rouncefield, Mark, and Martin, Dave
- Subjects
Integrated delivery networks -- Usage -- Evaluation ,Medical records -- Usage ,E-health -- Evaluation -- Usage ,Computers and office automation industries ,Health ,Evaluation ,Usage - Abstract
Byline: Mark Hartswood (Edinburgh University); Jessie Kennedy (Napier University, eSI Research Theme Leader); Eric Monteiro (Norwegian University of Science and Technology); Mark Rouncefield (Lancaster University); Dave Martin (Lancaster University) 75 [...]
- Published
- 2008
- Full Text
- View/download PDF
14. PfSPZ-CVac efficacy against malaria increases from 0% to 75% when administered in the absence of erythrocyte stage parasitemia: A randomized, placebo-controlled trial with controlled human malaria infection.
- Author
-
Murphy, Sean C., Deye, Gregory A., Sim, B. Kim Lee, Galbiati, Shirley, Kennedy, Jessie K., Cohen, Kristen W., Chakravarty, Sumana, K. C., Natasha, Abebe, Yonas, James, Eric R., Kublin, James G., Hoffman, Stephen L., Richie, Thomas L., and Jackson, Lisa A.
- Subjects
PARASITEMIA ,VACCINE effectiveness ,CLINICAL trial registries ,ERYTHROCYTES ,MALARIA vaccines ,MALARIA - Abstract
PfSPZ-CVac combines 'PfSPZ Challenge', which consists of infectious Plasmodium falciparum sporozoites (PfSPZ), with concurrent antimalarial chemoprophylaxis. In a previously-published PfSPZ-CVac study, three doses of 5.12x10
4 PfSPZ-CVac given 28 days apart had 100% vaccine efficacy (VE) against controlled human malaria infection (CHMI) 10 weeks after the last immunization, while the same dose given as three injections five days apart had 63% VE. Here, we conducted a dose escalation trial of similarly condensed schedules. Of the groups proceeding to CHMI, the first study group received three direct venous inoculations (DVIs) of a dose of 5.12x104 PfSPZ-CVac seven days apart and the next full dose group received three DVIs of a higher dose of 1.024x105 PfSPZ-CVac five days apart. CHMI (3.2x103 PfSPZ Challenge) was performed by DVI 10 weeks after the last vaccination. In both CHMI groups, transient parasitemia occurred starting seven days after each vaccination. For the seven-day interval group, the second and third vaccinations were therefore administered coincident with parasitemia from the prior vaccination. Parasitemia was associated with systemic symptoms which were severe in 25% of subjects. VE in the seven-day group was 0% (7/7 infected) and in the higher-dose, five-day group was 75% (2/8 infected). Thus, the same dose of PfSPZ-CVac previously associated with 63% VE when given on a five-day schedule in the prior study had zero VE here when given on a seven-day schedule, while a double dose given on a five-day schedule here achieved 75% VE. The relative contributions of the five-day schedule and/or the higher dose to improved VE warrant further investigation. It is notable that administration of PfSPZ-CVac on a schedule where vaccine administration coincided with blood-stage parasitemia was associated with an absence of sterile protective immunity. Clinical trials registration: NCT02773979. Author summary: The world needs a protective malaria vaccine. One approach is to repeatedly administer whole sporozoites, the parasite form that is transmitted from mosquitos to humans. Without treatment, sporozoites enter the liver, grow for a week, and then infect red blood cells, causing clinical disease. Here, we gave a vaccine consisting of sporozoites with a drug that prevents red blood cell infections to eliminate clinical illness. This approach was protective in other studies so we initially evaluated a faster schedule where the vaccine was given weekly. Surprisingly, there was no protection observed. We determined that weekly intervals led the second and third vaccine doses to be administered just as the previous dose of sporozoites was transitioning from the liver to the blood stage. Even though blood stage infection was stopped in this study by the co-administered drug (chloroquine), we hypothesized that it was problematic to administer a vaccine during blood stage infection. Therefore, we gave the vaccinations every five days so that upon the second and third doses, there were no blood-stage parasites present. With five-day spacing and a higher dose, the vaccine protected 75% of participants. These findings suggest that blood-stage infections may hinder formation of protective responses to malaria. [ABSTRACT FROM AUTHOR]- Published
- 2021
- Full Text
- View/download PDF
15. Teallach: a model-based user interface development environment for object databases
- Author
-
Griffiths, Tony, Barclay, Peter J, Paton, Norman W, McKirdy, Jo, Kennedy, Jessie, Gray, Philip D, Cooper, Richard, Goble, Carole A, and da Silva, Paulo Pinheiro
- Published
- 2001
- Full Text
- View/download PDF
16. Towards a methodology for developing visualizations
- Author
-
GRAHAM, MARTIN, KENNEDY, JESSIE, and BENYON, DAVID
- Published
- 2000
- Full Text
- View/download PDF
17. Dose-Dependent Infectivity of Aseptic, Purified, Cryopreserved Plasmodium falciparum 7G8 Sporozoites in Malaria-Naive Adults.
- Author
-
Laurens, Matthew B, Berry, Andrea A, Travassos, Mark A, Strauss, Kathy, Adams, Matthew, Shrestha, Biraj, Li, Tao, Eappen, Abraham, Manoj, Anita, Abebe, Yonas, Murshedkar, Tooba, Gunasekera, Anusha, Richie, Thomas L, Lyke, Kirsten E, Plowe, Christopher V, Kennedy, Jessie K, Potter, Gail E, Deye, Gregory A, Sim, B K L, and Hoffman, Stephen L
- Subjects
PLASMODIUM falciparum ,SPOROZOITES ,ADULTS ,MALARIA ,VACCINATION ,MALARIA prevention ,IMMUNITY ,IMMUNIZATION ,INTRAVENOUS therapy ,PROTOZOA ,VACCINES ,SPORES - Abstract
Direct venous inoculation of 3.2 × 103 aseptic, purified, cryopreserved, vialed Plasmodium falciparum (Pf) strain NF54 sporozoites, PfSPZ Challenge (NF54), has been used for controlled human malaria infection (CHMI) in the United States, 4 European countries, and 6 African countries. In nonimmune adults, this results in 100% infection rates. We conducted a double-blind, randomized, dose-escalation study to assess the infectivity of the 7G8 clone of Pf (PfSPZ Challenge [7G8]). Results showed dose-dependent infectivity from 43% for 8 × 102 PfSPZ to 100% for 4.8 × 103 PfSPZ. PfSPZ Challenge (7G8) will allow for more complete assessment by CHMI of antimalarial vaccines and drugs. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
18. MLCut : exploring Multi-Level Cuts in dendrograms for biological data
- Author
-
Vogogias, Athanasios, Kennedy, Jessie, Archaumbault, Daniel, Smith, Victoria Anne, Currant, Hannah, Turkay, Cagatay, Wan, Tao R., University of St Andrews. School of Biology, University of St Andrews. Scottish Oceans Institute, University of St Andrews. Institute of Behavioural and Neural Sciences, University of St Andrews. Centre for Research into Ecological & Environmental Modelling, and University of St Andrews. Centre for Biological Diversity
- Subjects
QA75 ,QH301 ,QA75 Electronic computers. Computer science ,QH301 Biology - Abstract
Choosing a single similarity threshold for cutting dendrograms is not sufficient for performing hierarchical clustering analysis of heterogeneous data sets. In addition, alternative automated or semi-automated methods that cut dendrograms in multiple levels make assumptions about the data in hand. In an attempt to help the user to find patterns in the data and resolve ambiguities in cluster assignments, we developed MLCut: a tool that provides visual support for exploring dendrograms of heterogeneous data sets in different levels of detail. The interactive exploration of the dendrogram is coordinated with a representation of the original data, shown as parallel coordinates. The tool supports three analysis steps. Firstly, a single-height similarity threshold can be applied using a dynamic slider to identify the main clusters. Secondly, a distinctiveness threshold can be applied using a second dynamic slider to identify “weak-edges” that indicate heterogeneity within clusters. Thirdly, the user can drill-down to further explore the dendrogram structure - always in relation to the original data - and cut the branches of the tree at multiple levels. Interactive drill-down is supported using mouse events such as hovering, pointing and clicking on elements of the dendrogram. Two prototypes of this tool have been developed in collaboration with a group of biologists for analysing their own data sets. We found that enabling the users to cut the tree at multiple levels, while viewing the effect in the original data, isa promising method for clustering which could lead to scientific discoveries. Postprint
- Published
- 2016
19. BayesPiles.
- Author
-
Vogogias, Athanasios, Kennedy, Jessie, Archambault, Daniel, Bach, Benjamin, Smith, V. Anne, and Currant, Hannah
- Subjects
- *
BIOINFORMATICS , *DATA visualization , *COMPUTATIONAL biology , *BIOLOGISTS , *HEURISTIC algorithms - Abstract
We address the problem of exploring, combining, and comparing large collections of scored, directed networks for understanding inferred Bayesian networks used in biology. In this field, heuristic algorithms explore the space of possible network solutions, sampling this space based on algorithm parameters and a network score that encodes the statistical fit to the data. The goal of the analyst is to guide the heuristic search and decide how to determine a final consensus network structure, usually by selecting the top-scoring network or constructing the consensus network from a collection of high-scoring networks. BayesPiles, our visualisation tool, helps with understanding the structure of the solution space and supporting the construction of a final consensus network that is representative of the underlying dataset. BayesPiles builds upon and extends MultiPiles to meet our domain requirements. We developed BayesPiles in conjunction with computational biologists who have used this tool on datasets used in their research. The biologists found our solution provides them with new insights and helps them achieve results that are representative of the underlying data. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
20. Biological Data Visualization (Dagstuhl Seminar 12372)
- Author
-
Görg, Carsten, Hunter, Lawrence, Kennedy, Jessie, O'Donoghue, Sean, and Van Wijk, Jarke J.
- Subjects
000 Computer science, knowledge, general works ,Computer Science - Abstract
The topic of visualizing biological data has recently seen growing interest. Visualization approaches can help researchers understand and analyze today's large and complex biological datasets. The aim of this seminar was to bring together biologists, bioinformaticians, and computer scientists to survey the current state of tools for visualizing biological data and to define a research agenda for developing the next generation of tools. During the seminar, the participants formed working groups on nine different topics, reflected on the ongoing research in those areas, and discussed how to address key challenges; six talks complemented the work in the breakout groups. This report documents the program and the outcome of Dagstuhl Seminar 12372 "Biological Data Visualization".
- Published
- 2013
- Full Text
- View/download PDF
21. A comparison of techniques for name matching
- Author
-
Peng, Taoxin, Li, Lin, and Kennedy, Jessie
- Subjects
QA76 Computer software ,004 Data processing & computer science ,dataset ,Centre for Algorithms, Visualisation and Evolving Systems ,Software systems ,Name matching ,AI and Technologies - Abstract
Information explosion is a problem for everyone nowadays. It is a great challenge to all kinds of businesses to maintain high quality of data in their information applications, such as data integration, text and web mining, information retrieval, search engine, etc. In such applications, matching names is one of the popular tasks. There are a number of name matching techniques available. Unfortunately, there is no existing name matching technique that performs the best in all situations. Therefore, a problem that every researcher or a practitioner has to face is how to select an appropriate technique for a given dataset. This paper analyses and evaluates a set of popular name matching techniques on several carefully designed different datasets. The experimental comparison confirms the statement that there is no clear best technique. Some suggestions have been presented, which can be used as guidance for researchers and practitioners to select an appropriate name matching technique in a given dataset.
- Published
- 2012
22. Proc. BioVis 2011, Symposium on Biological Data Visualization, Providence, Rhode Island, USA, 23-23 October
- Author
-
Kennedy, Jessie, Roerdink, Jos B. T. M., and Scientific Visualization and Computer Graphics
- Published
- 2011
23. A standard data model representation for taxonomic information
- Author
-
Kennedy, Jessie, Hyam, Roger, Kukla, Robert, and Paterson, Trevor
- Subjects
XML schema ,005 Computer programming, programs & data ,QH301 Biology ,Taxon names ,Taxa ,Standard data model ,Centre for Algorithms, Visualisation and Evolving Systems ,Information visualisation ,AI and Technologies ,Biological data ,Comparisons ,QA76 Computer software ,Global unique identifiersComputing ,Software systems ,Taxonomy ,578 Natural history of organisms - Abstract
The names used by biologists to label the observations they make are imprecise. This is an issue as workers increasingly seek to exploit data gathered from multiple, unrelated sources on line. Even when the international codes of nomenclature are followed strictly the resultingnames (Taxon Names) do not uniquely identify the taxa (Taxon Concepts) that have been described by taxonomists but merely groups of type specimens. A standard data model for exchange of taxonomic information is described. It addresses this issue by facilitating explicit communication of information about Taxon Concepts and their associated names. A representation of this model as a XML Schema is introduced and the implications of the useof Globally Unique Identifiers discussed.
- Published
- 2006
24. Pathways for Theoretical Advances in Visualization.
- Author
-
Chen, Min, Grinstein, Georges, Johnson, Chris R., Kennedy, Jessie, and Tory, Melanie
- Subjects
DATA visualization ,ONTOLOGIES (Information retrieval) ,TAXONOMY ,COMPUTER graphics ,QUANTITATIVE research - Abstract
There is little doubt that having a theoretic foundation will benefit the field of visualization, including its main subfields. Because there has been a substantial amount of work on taxonomies and conceptual models in the visualization literature and some recent work on theoretic frameworks, such a theoretic foundation is not a foolish or impractical ambition. This article asks, “How can we build a theoretic foundation for visualization collectively as a community?” The authors envision the pathways for four different aspects of a theoretic foundation: taxonomies and ontologies, principles and guidelines, conceptual models and theoretic frameworks, and quantitative laws and theoretic systems. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
25. Animated interval scatter-plot views for the exploratory analysis of large scale microarray time-course data
- Author
-
Craig, Paul, Kennedy, Jessie, and Cumming, Andrew
- Subjects
005 Computer programming, programs & data ,Data analysis ,QH426 Genetics ,Animation ,Centre for Algorithms, Visualisation and Evolving Systems ,Computer programming ,Information visualisation ,Microarray technology ,576 Genetics & evolution ,AI and Technologies ,Gene activity ,QA76 Computer software ,Pattern recognition ,Evaluation ,Biology ,Time Series Explorer program ,Scatter-plot - Abstract
Microarray technologies are a relatively new development that allow biologists to monitor the activity of thousands of genes (normally around 8,000) in parallel across multiple stages of a biological process. While this new perspective on biological functioning is recognised as having the potential to have a significant impact on the diagnosis, treatment, and prevention of diseases, it is only through effective analysis of the data produced that biologists can begin to unlock this potential. A significant obstacle to achieving effective analysis of microarray time-course is the combined scale and complexity of the data. This inevitably makes it difficult to reveal certain significant patterns in the data. In particular, it is less dominant patterns and, specifically, patterns that occur over smaller intervals of an experiment's overall time-frame that are more difficult to find. While existing techniques are capable of finding either unexpected patterns of activity over the majority of an experiment's time-frame or expected patterns of activity over smaller intervals of the time-frame, there are no techniques, or combination of techniques, that are suitable for finding unsuspected patterns of activity over smaller intervals. In order to overcome this limitation we have developed the Time-series Explorer, which specifically supports biologists in their attempts to reveal these types of pattern by allowing them to control an animated interval scatter-plot view of their data. This paper discusses aspects of the technique that make such an animated overview viable and describes the results of a user evaluation assessing the practical utility of the technique within the wider context of microarray time-series analysis as a whole.
- Published
- 2005
26. A methodology for composing well-defined character descriptions
- Author
-
Paterson, Trevor, Cannon, Alan, Raguenaud, Cedric, Russell, Gordon, Armstrong, Kate E, MacDonald, Sarah M, Pullan, Martin R, Watson, Mark F, and Kennedy, Jessie
- Subjects
Database ,005 Computer programming, programs & data ,QA76 Computer software ,Characterisation ,Ontology ,QH Natural history ,Description ,Computer Model ,Centre for Algorithms, Visualisation and Evolving Systems ,Software systems ,Biology ,Taxonomy ,AI and Technologies - Abstract
Taxonomy has been described as “the science of documenting biodiversity”, which involves collecting, naming, describing, identifying and classifying specimens of organisms (Keogh, 1995). Descriptions are the fundamental information units used in the process of constructing classifications and communicating taxonomic concepts. The quality of stored description data is limited by the lack of a formal model and methodology for composing specimen descriptions, and by the absence of an agreed defined terminology. This impedes the communication, interpretation and reuse of original descriptions. This paper describes a novel approach to composing and recording taxonomic descriptions of botanical specimens. An underlying model for creating character descriptions is presented together with a process for creating an ontology of defined terms, which will be used to compose these description elements. It is hoped that these developments will facilitate the unambiguous interpretation of descriptions and enhance the taxonomic process.
- Published
- 2003
27. Temporal Multivariate Networks.
- Author
-
Archambault, Daniel, Abello, James, Kennedy, Jessie, Kobourov, Stephen, Ma, Kwan-Liu, Miksch, Silvia, Muelder, Chris, and Telea, Alexandru C.
- Published
- 2014
- Full Text
- View/download PDF
28. On temporal versioning in object oriented databases
- Author
-
Lu, J., Barclay, Peter J., and Kennedy, Jessie
- Subjects
Temporal Version Management model ,Object evolution ,Alternative versions ,005 Computer programming, programs & data ,QA76 Computer software ,Version management ,Object oriented databases ,Applications ,Historical versions ,Data modelling ,Data management ,Combined approach ,Temporal data - Abstract
This paper describes the development of the data model TVM which contains a new concept, temporal versioning. This generalises the ideas of temporal databases and version management to object-oriented databases. TVM provides a new approach for data modelling and management; it allows the user to define a multi-dimensional temporal storage space and to model the evolution of objects within that space. It supports historical versions and alternative versions of objects at instance level and as well as schema level. as how these different solutions can be combined have not yet been tackled. Many applications require databases that support both temporal data and version management (such as design of engineering objects). Figure 1 shows a Car-Manufacturing Database. There are several types of lock which can be used in this car model. These locks are an alternatives of each other and valid at same time. The historical information of engine design is important, the updated data is need to be preserved. It is considered historical (temporal).
- Published
- 1996
29. A Task Taxonomy for Temporal Graph Visualisation.
- Author
-
Kerracher, Natalie, Kennedy, Jessie, and Chalmers, Kevin
- Subjects
DATA visualization ,MULTIVARIATE analysis ,NUMERICAL analysis ,FINITE difference method ,GRAPHICAL modeling (Statistics) - Abstract
By extending and instantiating an existing formal task framework, we define a task taxonomy and task design space for temporal graph visualisation. We discuss the process involved in their generation, and describe how the design space can be ‘sliced and diced’ into multiple overlapping task categories, requiring distinct visual techniques for their support. The approach addresses deficiencies in the task literature, offering domain independence, greater task coverage, and unambiguous task specification. The taxonomy and design space capture tasks for temporal graphs, and also static graphs, multivariate graphs, and graph comparison, and will be of value in the design and evaluation of temporal graph visualisation systems. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
30. Visual cleaning of genotype data.
- Author
-
Kennedy, Jessie, Graham, Martin, Paterson, Trevor, and Law, Andy
- Published
- 2013
- Full Text
- View/download PDF
31. Pianola - Visualization of Multivariate Time-Series Security Event Data.
- Author
-
Thomson, Alistair, Graham, Martin, and Kennedy, Jessie
- Published
- 2013
- Full Text
- View/download PDF
32. Redeeming pedigree data with an interactive error cleaning visualisation.
- Author
-
Graham, Martin, Kennedy, Jessie, Paterson, Trevor, and Law, Andy
- Published
- 2012
- Full Text
- View/download PDF
33. MaTSE: The microarray time-series explorer.
- Author
-
Craig, Paul, Cannon, Alan, Kukla, Robert, and Kennedy, Jessie
- Abstract
This paper describes the design, development and evaluation of the Microarray Time-Series Explorer (MaTSE), a novel information visualization application for the exploratory analysis of large scale microarray timeseries data. The software combines a variety of visualization and interaction techniques, which work together to allow biologists to explore their data and reveal patterns that would otherwise be impossible to find. These include a scatter-plot that can be animated to view different temporal intervals of the data, a multiple coordinated view framework to support the cross reference of multiple experimental conditions, a novel method for highlighting overlapping groups in the scatter-plot, and a pattern browser component that can be used with scatterplot box queries to support cooperative visualization. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
34. A Rule Based Taxonomy of Dirty Data.
- Author
-
Lin Li, Taoxin Peng, and Kennedy, Jessie
- Subjects
DATA quality ,DATA corruption ,INFORMATION technology ,KNOWLEDGE management ,DATABASES - Abstract
There is a growing awareness that high quality of data is a key to today's business success and that dirty data existing within data sources is one of the causes of poor data quality. To ensure high quality data, enterprises need to have a process, methodologies and resources to monitor and analyze the quality of data, methodologies for preventing and/or detecting and repairing dirty data. Nevertheless, research shows that many enterprises do not pay adequate attention to the existence of dirty data and have not applied useful methodologies to ensure high quality data for their applications. One of the reasons is a lack of appreciation of the types and extent of dirty data. In practice, detecting and cleaning all the dirty data that exists in all data sources is quite expensive and unrealistic. The cost of cleaning dirty data needs to be considered for most of enterprises. This problem has not attracted enough attention from researchers. In this paper, a rule-based taxonomy of dirty data is developed. The proposed taxonomy not only provides a mechanism to deal with this problem but also includes more dirty data types than any of existing such taxonomies. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
35. Pattern Browsing and Query Adjustment for the Exploratory Analysis and Cooperative Visualisation of Microarray Time-Course Data.
- Author
-
Craig, Paul, Cannon, Alan, Kennedy, Jessie, and Kukla, Robert
- Abstract
This paper presents work to support collaborative visualisation and data analysis in the microarray time-series explorer (MaTSE) software. We introduce a novel visualisation component called the `pattern browser΄ which is used to support the annotation and adjustment of user queries. This includes an explanation of why this component is required and how it can be used with our online pattern repository by biologists collaborating in the analysis of a microarray time-course data set. To conclude we suggest which other types of collaborative visualisation would benefit from the introduction of a component with comparable functionality. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
36. A Multiple Viewed Interrelated Ontology Model for Holistic Component Specification and Retrieval.
- Author
-
Li, Chengpu, Liu, Xiaodong, and Kennedy, Jessie
- Abstract
Despite the success that Component-Based Development has achieved so far, component mismatch remains as a major hurdle for wider and smoother component reuse due to the lack of effective and automated approaches to component specification and retrieval. This paper presents a novel ontology-based approach to solve the above problem via holistic, semantic-based and adaptation-aware component specification and retrieval. The Multiple-Viewed and Interrelated Component Specification ontology model (MVICS) provides an ontology based architecture to specify components in a spectrum of perspectives. A semantic-based component retrieval method is then developed and the result of retrieval is presented to CBD engineers in a comprehensive component matching profile. Uniquely, the effect of possible component adaptation is included in the MVICS model and associated component specification and retrieval, which enables a more systematic and holistic view in component specification and selection. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
37. Concept relationship editor: a visual interface to support the assertion of synonymy relationships between taxonomic classifications.
- Author
-
Craig, Paul and Kennedy, Jessie
- Published
- 2008
- Full Text
- View/download PDF
38. Visualisation to Aid Biodiversity Studies through Accurate Taxonomic Reconciliation.
- Author
-
Graham, Martin, Craig, Paul, and Kennedy, Jessie
- Abstract
All aspects of organismal biology rely on the accurate identification of specimens described and observed. This is particularly important for ecological surveys of biodiversity, where organisms must be identified and labelled, both for the purposes of the original research, but also to allow reinterpretation or reuse of collected data by subsequent research projects. Yet it is now clear that biological names in isolation are unsuitable as unique identifiers for organisms. Much modern research in ecology is based on the integration (and re-use) of multiple datasets which are inherently complex, reflecting any of the many spatial and temporal environmental factors and organismal interactions that contribute to a given ecosystem. We describe visualization tools that aid in the process of building concept relations between related classifications and then in understanding the effects of using these relations to match across sets of classifications. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
39. PSMQ: Path Based Storage and Metadata Guided Twig Query Evaluation.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, Richard, Kennedy, Jessie, Archana, M., Narayana, M. Lakshmi, and Kumar, P. Sreenivasa
- Abstract
Efficient evaluation of queries on XML data is a major research issue. Structural join based techniques are well known for XPath evaluation. For the long path expressions, join techniques are not efficient as they increase the number of joins and disk I/O cost. Path based techniques try to reduce the number of joins. In this paper, we propose a metadata guided query evaluation technique which uses path based storage. We use interval encoding for the nodes. In addition, we use Strong DataGuide to assign integer path labels to distinct root-to-node label paths in the data tree. An element list is maintained for each distinct path consisting of nodes that can be reached by that path. The Element-Map gives the one-to-many mapping between element names (or tag names) to element lists with nodes having that tag-name. The Path-Map gives the root-to-leaf path for a given path label. Using these structures, we can combine top-down path matching and bottom-up path selections to efficiently evaluate linear path expressions. For twig queries, we perform structural joins at branch points. Through experimental evaluation on standard datasets, we show that our approach outperforms the existing path-index based approaches which in turn outperform structural join methods. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
40. Parameterized XPath Views.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, Richard, Kennedy, Jessie, Böhme, Timo, and Rahm, Erhard
- Abstract
We present a new approach for accelerating the execution of XPath expressions using parameterized materialized XPath views (PXV). While the approach is generic we show how it can be utilized in an XML extension for relational database systems. Furthermore we discuss an algorithm for automatically determining the best PXV candidates to materialize based on a given workload. We evaluate our approach and show the superiority of our cost based algorithm for determining PXV candidates over frequent pattern based algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
41. A New Approach for Distributed Density Based Clustering on Grid Platform.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, Richard, Kennedy, Jessie, Le-Khac, Nhien-An, Aouad, Lamine M., and Kechadi, M-Tahar
- Abstract
Many distributed data mining DDM tasks such as distributed association rules and distributed classification have been proposed and developed in the last few years. However, only a few research concerns distributed clustering for analysing large, heterogeneous and distributed datasets. This is especially true with distributed density-based clustering although the centralised versions of the technique have been widely used fin different real-world applications. In this paper, we present a new approach for distributed density-based clustering. Our approach is based on two main concepts: the extension of local models created by DBSCAN at each node of the system and the aggregation of these local models by using tree based topologies to construct global models. The preliminary evaluation shows that our approach is efficient and flexible and it is appropriate with high density datasets and a moderate difference in dataset distributions among the sites. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
42. Max-FTP: Mining Maximal Fault-Tolerant Frequent Patterns from Databases.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, Richard, Kennedy, Jessie, Bashir, Shariq, and Baig, Abdul Rauf
- Abstract
Mining Fault-Tolerant (FT) Frequent Patterns in real world (dirty) databases is considered to be a fruitful direction for future data mining research. In last couple of years a number of different algorithms have been proposed on the basis of Apriori-FT frequent pattern mining concept. The main limitation of these existing FT frequent pattern mining algorithms is that, they try to find all FT frequent patterns without considering only useful long (maximal) patterns. This not only increases the processing time of mining process but also generates too many redundant short FT frequent patterns that are un-useful. In this paper we present a novel concept of mining only maximal (long) useful FT frequent patterns. For mining such patterns algorithm we introduce a novel depth first search algorithm Max-FTP (Maximal Fault-Tolerant Frequent Pattern Mining), with its various search space pruning and fast frequency counting techniques. Our different extensive experimental result on benchmark datasets show that Max-FTP is very efficient in filtering un-interesting FT patterns and execution as compared to Apriori-FT. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
43. Extracting Temporal Information from Short Messages.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Kennedy, Jessie, Cooper, Richard, and Manson, Sinclair
- Abstract
Information Extraction, the process of eliciting data from natural language documents, usually relies on the ability to parse the document and then to detect the meaning of the sentences by exploiting the syntactic structures encountered. In previous papers, we have discussed an application to extract information from short (e-mail and text) messages which takes an alternative approach. The application is lightweight and uses pattern matching rather than parsing, since parsing is not feasible for messages in which both the syntax and the spelling are unreliable. The application works in the context of a high level database schema and identifies sentences which make statements about data describable by this schema. The application matches sentences with templates to identify metadata terms and the data values associated with them. However, the initial prototype could only manage simple, time independent assertions about the data, such as "Jane Austen is the author." This paper describes an extension to the application which can extract temporal data, both time instants and time periods. It also manages time stamps - temporal information which partitions the values of time varying attributes, such as the monarch of a country. In order to achieve this, the original data model has had to be extended with a temporal component and a set of sentence templates has been constructed to recognise statements in this model. The paper describes the temporal model and the extensions to the application, concluding with a worked example. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
44. Fine-Grained Access Control for Database Management Systems.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, Richard, Kennedy, Jessie, Zhu, Hong, and Lü, Kevin
- Abstract
A practical approach for developing fine-grained access control (FGAC) for database management systems is reported in this paper. We extend SQL language to support security policies. The concept of the policy type for databases is proposed. We implement the policy reuse through the use of policy types and policy instances to alleviate the administration workload of maintaining security policies. The policies for rows and columns can be expressed with policy types. Moreover, complicated database integrity constraints can also be expressed by policy types, and no further purpose-built programs are needed to create specific security control policies. We implement the fine-grained access control in a relational database management system DM5 [4]. The performance test results based on TPC-W are also presented. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
45. Speeding Up Clustering-Based k-Anonymisation Algorithms with Pre-partitioning.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, Richard, Kennedy, Jessie, Loukides, Grigorios, and Shao, Jianhua
- Abstract
K-anonymisation is a technique for protecting privacy contained within a dataset. Many k-anonymisation algorithms have been proposed, and one class of such algorithms are clustering-based. These algorithms can offer high quality solutions, but are rather inefficient to execute. In this paper, we propose a method that partitions a dataset into groups first and then clusters the data within each group for k-anonymisation. Our experiments show that combining partitioning with clustering can improve the performance of clustering-based k-anonymisation algorithms significantly while maintaining the quality of anonymisations they produce. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
46. Knowledge Discovery from Semantically Heterogeneous Aggregate Databases Using Model-Based Clustering.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, Richard, Kennedy, Jessie, Zhang, Shuai, McClean, Sally, and Scotney, Bryan
- Abstract
When distributed databases are developed independently, they may be semantically heterogeneous with respect to data granularity, scheme information and the embedded semantics. However, most traditional distributed knowledge discovery (DKD) methods assume that the distributed databases derive from a single virtual global table, where they share the same semantics and data structures. This data heterogeneity and the underlying semantics bring a considerable challenge for DKD. In this paper, we propose a model-based clustering method for aggregate databases, where the heterogeneous schema structure is due to the heterogeneous classification schema. The underlying semantics can be captured by different clusters. The clustering is carried out via a mixture model, where each component of the mixture corresponds to a different virtual global table. An advantage of our approach is that the algorithm resolves the heterogeneity as part of the clustering process without previously having to homogenise the heterogeneous local schema to a shared schema. Evaluation of the algorithm is carried out using both real and synthetic data. Scalability of the algorithm is tested against the number of databases to be clustered; the number of clusters; and the size of the databases. The relationship between performance and complexity is also evaluated. Our experiments show that this approach has good potential for scalable integration of semantically heterogeneous databases. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
47. XFLab: A Technique of Query Processing over XML Fragment Stream.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, Richard, Kennedy, Jessie, Lee, Sangwook, Kim, Jin, and Kang, Hyunchul
- Abstract
We investigate XML query processing in a portable/handheld client device with limited memory in ubiquitous computing environment. Because of memory limitation in the client, the source XML data possibly of large volume is fragmented in the server and streamed in fragments over which query processing is done in the client. The state-of-the-art techniques employ the hole-filler model in fragmenting XML data and processing queries over XML fragment stream. In this paper, we propose a new technique where an XML labeling scheme is employed instead of the hole-filler model. Through preliminary experiments, we show that our technique outperforms the state-of-the-art techniques both in memory usage and in query processing time. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
48. A Method of Improving the Efficiency of Mining Sub-structures in Molecular Structure Databases.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, Richard, Kennedy, Jessie, Li, Haibo, Wang, Yuanzhen, and Lü, Kevin
- Abstract
One problem exists in current substructure mining algorithms is that when the sizes of molecular structure databases increase, the costs in terms of both time and space increase to a level that normal PCs are not powerful enough to perform substructure data mining tasks. After examining a number of well known molecular structure databases, we found that there exist a large number of common loop substructures within molecular structure databases, and repeatedly mining these same substructures costs the system resources significantly. In this paper, we introduce a new method: (1) to treat these common loop substructures as some kinds of "atom" structures; (2) to maintain the links of the new "atom" structures with the rest of the molecular structures, and to reorganize the original molecular structures. Therefore we avoid repeat many same operations during mining process and produce less redundant results. We tested the method using four real molecular structure databases: AID2DA'99/CA, AID2DA'99/CM, AID2DA'99 and NCI'99. The results indicated that (1) the speed of substructure mining has been improved due to the reorganization; (2) the number of patterns obtained by mining has been reduced with less redundant information. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
49. An Efficient Sheet Partition Technique for Very Large Relational Tables in OLAP.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, Richard, Kennedy, Jessie, Shin, Sung-Hyun, Choi, Hun-Young, and Kim, Jinho
- Abstract
Spreadsheets such as Microsoft Excel are OLAP(On-Line Analytical Processing) [2] applications to easily analyze complex multidimensional data. In general, spreadsheets provide grid-like graphical interfaces together with various chart tools [4,5]. However, previous work on OLAP spreadsheets adopts a naive approach that directly retrieves, transmits, and presents all the resulting data at once. Thus, it is difficult to use the previous work for very large relational tables with millions of rows or columns due to the communication and space overhead. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
50. XML Query Result Size Estimation for Small Bandwidth Devices.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, Richard, Kennedy, Jessie, Böttcher, Stefan, Obermeier, Sebastian, and Wycisk, Thomas
- Abstract
Whenever mobile ad-hoc networks are used as a large data storage, a huge number of queries requesting the same information again and again can slow down the network and drain battery power. In this paper, we introduce an example application, the query classes that are required to be supported, and show up two possible caching methods. The two caching methods are based on the concept of query shipping and data shipping, respectively. Since our caching strategies can be used simultaneously, the decision for doing data shipping depends among other aspects on the overhead of transferred data. We explain why an XML Query Result Size Estimator can assist the application in the question of which mechanism should be used for a certain query, and point to other related estimation techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.