VIS 2013 Presentation
Paper is available here: http://www.oerc.ox.ac.uk/personal-pages/emaguire/AutoMacron.pdf
Code is available here: http://github.com/isa-tools/automacron
Evaluating Surrogate Models for Robot Swarm SimulationsDaniel H. Stolfi
Realistic robotic simulations are computationally demanding, especially when considering large swarms of autonomous robots. This makes the optimisation of such systems intractable, thus limiting the instances' and swarms' size. In this article we study the viability of using surrogate models based on Gaussian processes, Artificial Neural Networks, and simplified simulations, as predictors of the robots' behaviour, when performing formations around a central point of interest. We have trained the predictors and tested them in terms of accuracy and execution time. Our findings show that they can be used as an alternative way of calculating fitness values for swarm configurations which can be used in optimisation processes, increasing the number evaluations and reducing execution times and computing cluster budget.
https://doi.org/10.1007/978-3-031-34020-8_17
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...P singh
As the time passed, multiple techniques have been proposed on the invisible video watermarking. Watermarking basically means to hide the information into many multiple objects. If the object is video then the name given to this technique is video watermarking. The information which is hidden in the object and isn't seen by anyone then it is called as an invisible watermarking. In this paper, we are using the LSB, SS (Spread Spectrum) and DWT technique for embedding the information into the video and also work on the rational distortion. Today distortion is the biggest problem. This distortion can be destroyed the hide information. The reason of distortion is transmission channel, hackers, viruses etc. In my proposed work, we are working on the rational 6th order model distortion. We are finding the PSNR, SSIM (Structural similarity index measure), Correlation, BER (Bit Error Rate), MSE (Mean Square Error) parameters for the distorted watermarked video and also detects the watermark (hide) information from the distorted watermarked video.
Get the most out of Oracle Data Guard - OOW versionLudovico Caldara
If you use Oracle Data Guard feature just for data protection, you are using less than half of its potential. You already pay for it, so why not getting the most out of it? In this session I will show how you can use Oracle Data Guard capabilities for common tasks such as database cloning, database migration and reporting, with the help of other features included in Oracle Database Enterprise Edition
Research @ RELEASeD (presented at SATTOSE2013)kim.mens
An overview of recent research results and directions at Prof. Kim Mens's RELEASeD research lab. Presented in July 2013 at SATTOSE2013 in Bern, Switzerland.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Big Spatial(!) Data Processing mit GeoMesa. AGIT 2019, Salzburg, Austria.Anita Graser
This talk introduces GeoMesa and discusses how it can be used to store and analyze massive amounts of movement data.
Talk recording: https://av.tib.eu/media/42874
Tech talk by Serena Signorelli (https://www.linkedin.com/in/serenasignorelli/) in the event ''Tensorflow and Sparklyr: Scaling Deep Learning and R to the Big Data ecosystem'', May 15, 2017 at ICTeam Grassobbio (BG). The event was part of the Data Science Milan Meetup (https://www.meetup.com/it-IT/Data-Science-Milan/).
Full-stack Web Development with MongoDB, Node.js and AWSMongoDB
Akira Technologies will share its experience of building a universal scalable high-performance platform for conducting surveys. Using MongoDB allowed replacing dozens unique survey systems with a single flexible solution, improved data and questionnaire reusability, simplified data analysis. We will also cover full-stack development and integration with Node.js, Hadoop, deployment to AWS Cloud, offline caching and stress-tecting the entire system with Tsung. A working prototype will be demonstrated including multiple surveys, dynamically rebuilding interface, geolocation, data analysis and visualization.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Evaluating Surrogate Models for Robot Swarm SimulationsDaniel H. Stolfi
Realistic robotic simulations are computationally demanding, especially when considering large swarms of autonomous robots. This makes the optimisation of such systems intractable, thus limiting the instances' and swarms' size. In this article we study the viability of using surrogate models based on Gaussian processes, Artificial Neural Networks, and simplified simulations, as predictors of the robots' behaviour, when performing formations around a central point of interest. We have trained the predictors and tested them in terms of accuracy and execution time. Our findings show that they can be used as an alternative way of calculating fitness values for swarm configurations which can be used in optimisation processes, increasing the number evaluations and reducing execution times and computing cluster budget.
https://doi.org/10.1007/978-3-031-34020-8_17
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...P singh
As the time passed, multiple techniques have been proposed on the invisible video watermarking. Watermarking basically means to hide the information into many multiple objects. If the object is video then the name given to this technique is video watermarking. The information which is hidden in the object and isn't seen by anyone then it is called as an invisible watermarking. In this paper, we are using the LSB, SS (Spread Spectrum) and DWT technique for embedding the information into the video and also work on the rational distortion. Today distortion is the biggest problem. This distortion can be destroyed the hide information. The reason of distortion is transmission channel, hackers, viruses etc. In my proposed work, we are working on the rational 6th order model distortion. We are finding the PSNR, SSIM (Structural similarity index measure), Correlation, BER (Bit Error Rate), MSE (Mean Square Error) parameters for the distorted watermarked video and also detects the watermark (hide) information from the distorted watermarked video.
Get the most out of Oracle Data Guard - OOW versionLudovico Caldara
If you use Oracle Data Guard feature just for data protection, you are using less than half of its potential. You already pay for it, so why not getting the most out of it? In this session I will show how you can use Oracle Data Guard capabilities for common tasks such as database cloning, database migration and reporting, with the help of other features included in Oracle Database Enterprise Edition
Research @ RELEASeD (presented at SATTOSE2013)kim.mens
An overview of recent research results and directions at Prof. Kim Mens's RELEASeD research lab. Presented in July 2013 at SATTOSE2013 in Bern, Switzerland.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Big Spatial(!) Data Processing mit GeoMesa. AGIT 2019, Salzburg, Austria.Anita Graser
This talk introduces GeoMesa and discusses how it can be used to store and analyze massive amounts of movement data.
Talk recording: https://av.tib.eu/media/42874
Tech talk by Serena Signorelli (https://www.linkedin.com/in/serenasignorelli/) in the event ''Tensorflow and Sparklyr: Scaling Deep Learning and R to the Big Data ecosystem'', May 15, 2017 at ICTeam Grassobbio (BG). The event was part of the Data Science Milan Meetup (https://www.meetup.com/it-IT/Data-Science-Milan/).
Full-stack Web Development with MongoDB, Node.js and AWSMongoDB
Akira Technologies will share its experience of building a universal scalable high-performance platform for conducting surveys. Using MongoDB allowed replacing dozens unique survey systems with a single flexible solution, improved data and questionnaire reusability, simplified data analysis. We will also cover full-stack development and integration with Node.js, Hadoop, deployment to AWS Cloud, offline caching and stress-tecting the entire system with Tsung. A working prototype will be demonstrated including multiple surveys, dynamically rebuilding interface, geolocation, data analysis and visualization.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Monitoring Java Application Security with JDK Tools and JFR Events
Visual Compression of Workflow Visualizations with Automated Detection of Macro Motifs
1. Visual Compression of Workflow Visualizations with
Automated Detection of Macro Motifs
Eamonn Maguire, Philippe Rocca-Serra, Susanna-Assunta Sansone, Jim Davies
and Min Chen
University of Oxford e-Research Centre
University of Oxford Department of Computer Science
VIS 2013, 13th-18th October 2013
2. Some terminology
Workflow
Literally a flow of work showing the
processes enacted from start to finish in
say business processes, software
execution, analysis procedures, or in our
case, biological experiments.
They are used to enable reproducibility.
Motif
Commonly observed subgraphs
Very commonly seen used in:
biology - protein-protein
interaction, transcription/regulation
networks; chemistry; and even
visualization (e.g. VisComplete)
e.g VisTrails in our VIS community - 40,000 downloads
Macro
D
A single instruction that expands
automatically in to a more complex
set of instructions.
VIS 2013, 13th-18th October 2013
E
Q
Q
D
Q
E
Q
7. Blockades
Macros in electronic circuit
diagrams are the product of
years of refinement.
No semantics
Current Motif Detection
Algorithm Limitations
VIS 2013, 13th-18th October 2013
Limited motif sizes
(Max 10)
Deciding what should
be a Macro
Macros in biological
workflows for instance is
new...how do we determine
what should be a macro?
9. Extension on Previous Work
Taxonomy-based Glyph Design
Visualizing (ISA based) workflows of
biological experiments
Maguire et al, 2012
IEEE TVCG
VIS 2013, 13th-18th October 2013
10. A Typical Biological Experiment
Hypothesis
VIS 2013, 13th-18th October 2013
Experiment
Analysis
Results
&
Paper
11. Representing an Experiment - Workflows!
Source name
Sampling Protocol
Sample name
Chemical Label
Labeling Protocol
Describe the flow of work from a
biological sample to the data file.
Workflow varies between technologies,
but there is a large commonality in steps.
Labeled Extract
Hybridisation Protocol
Assay Name
Scanning Protocol
Raw Data File
Feature Extraction Protocol
For example, the labeling step is very
common in DNA microarray experiments.
Processed Data File
VIS 2013, 13th-18th October 2013
u
od
pr
e
R
bi
ci
y!
lit
12. Our Process
1
A
s0
A
s1
B
E
s2
B
s3
C
D
H
E
E
G
s4
OCCURRENCE
WORKFLOWS
476
3276
F
n
E
MOTIF EXTRACTION
ALGORITHM
VIS 2013, 13th-18th October 2013
...
MOTIFS
DOMAIN EXPERT
COMPRESSION
1092
C
BIOLOGICAL
WORKFLOW
REPOSITORY
2.87
...
2.87
DOMAIN EXPERT
2.4
OCCURRENCE
WORKFLOWS
COMPRESSION
OCCURRENCE
WORKFLOWS
COMPRESSION
1092
-2.43
Branch & Merge
476
3276
600
240
2400
Branch & Merge
OCCURRENCE
WORKFLOWS
COMPRESSION
20
10
200
RANKING
ALGORITHM
Branch & Merge
SELECTED MACROS
Branch & Merge
MACRO SELECTION
VIA UI
MACRO
SELECTION
GLYPH DESIGN
MACRO
ANNOTATION
MACRO INSERTION
IN GRAPH
13. Our Process
1
A
s0
A
s1
B
E
s2
B
s3
C
D
H
E
E
G
s4
OCCURRENCE
WORKFLOWS
476
3276
F
n
E
MOTIF EXTRACTION
ALGORITHM
VIS 2013, 13th-18th October 2013
...
MOTIFS
DOMAIN EXPERT
COMPRESSION
1092
C
BIOLOGICAL
WORKFLOW
REPOSITORY
2.87
...
2.87
DOMAIN EXPERT
2.4
OCCURRENCE
WORKFLOWS
COMPRESSION
OCCURRENCE
WORKFLOWS
COMPRESSION
1092
-2.43
Branch & Merge
476
3276
600
240
2400
Branch & Merge
OCCURRENCE
WORKFLOWS
COMPRESSION
20
10
200
RANKING
ALGORITHM
Branch & Merge
SELECTED MACROS
Branch & Merge
MACRO SELECTION
VIA UI
MACRO
SELECTION
GLYPH DESIGN
MACRO
ANNOTATION
MACRO INSERTION
IN GRAPH
14. Workflow Repository
9,670 Biological Experiment Workflows
Why such a large number?
We can statistically make suggestions to users about what motifs
can be macros based on a number of metrics (detailed later)
+ we can robustly test our algorithm performance across a huge
cross section of experiments...
VIS 2013, 13th-18th October 2013
15. 1
A
s0
A
s1
B
E
s2
B
s3
C
D
H
E
E
G
s4
OCCURRENCE
WORKFLOWS
476
3276
F
n
E
MOTIF EXTRACTION
ALGORITHM
VIS 2013, 13th-18th October 2013
...
MOTIFS
DOMAIN EXPERT
COMPRESSION
1092
C
BIOLOGICAL
WORKFLOW
REPOSITORY
2.87
...
2.87
DOMAIN EXPERT
2.4
OCCURRENCE
WORKFLOWS
COMPRESSION
OCCURRENCE
WORKFLOWS
COMPRESSION
1092
-2.43
Branch & Merge
476
3276
600
240
2400
Branch & Merge
OCCURRENCE
WORKFLOWS
COMPRESSION
20
10
200
RANKING
ALGORITHM
Branch & Merge
SELECTED MACROS
Branch & Merge
MACRO SELECTION
VIA UI
MACRO
SELECTION
GLYPH DESIGN
MACRO
ANNOTATION
MACRO INSERTION
IN GRAPH
17. The Current Weaknesses
FANMOD, mFinder etc.
No semantics (edge or node)
Small node limit normally <10
Imagine n-grams with no
information other than topology
e.g. bi-grams of DNA ‘motifs’ where instead
of A-T, T-C, T-G > x-x, x-x, x-x
VIS 2013, 13th-18th October 2013
18. The Problem...Current Motif Extraction Algorithms
Unable to infer function
Unable to produce a macro
What’s up?
We can’t infer function
from these results
Ah, and you can’t
have macros without
function...
Exactly!
VIS 2013, 13th-18th October 2013
19. Solution
A
s0
A
s1
B
E
s2
B
s3
C
D
H
E
E
C
E
G
s4
a holding state, with
a pseudo-
F
a star
state
a tr
that
generates a
a tr
does not
generate a
a normal state, with
a ‘’legal’’
G
s4
a normal state, with
a ‘’legal’’
a holding state, with
a pseudo-
F
a star
state
a tr
that
generates a
a tr
does not
generate a
VIS 2013, 13th-18th October 2013
More detail about each individual case, A-H available in paper.
20. Solution
A
s0
A
s1
B
E
s2
B
s3
C
D
H
E
E
C
E
G
s4
a holding state, with
a pseudo-
F
a star
state
a tr
that
generates a
a tr
does not
generate a
a normal state, with
a ‘’legal’’
G
s4
a normal state, with
a ‘’legal’’
a holding state, with
a pseudo-
F
a star
state
3
a tr
that
generates a
a tr
does not
generate a
VIS 2013, 13th-18th October 2013
More detail about each individual case, A-H available in paper.
21. Resulting In...
VIS 2013, 13th-18th October 2013
From our algorithm, running over 9,670 workflows, we
retrieved ~12,000 motifs up to depth 12
22. Resulting In...
From our algorithm, running over 9,670 workflows, we
retrieved ~12,000 motifs up to depth 12
Semantically aware
Limited by depth, not node count - we
have motifs with > 80 nodes
Essentially, more complicated topologically sensitive n-grams
VIS 2013, 13th-18th October 2013
23. 1
A
s0
A
s1
B
E
s2
B
s3
C
D
H
E
E
G
s4
OCCURRENCE
WORKFLOWS
476
3276
F
n
E
MOTIF EXTRACTION
ALGORITHM
VIS 2013, 13th-18th October 2013
...
MOTIFS
DOMAIN EXPERT
COMPRESSION
1092
C
BIOLOGICAL
WORKFLOW
REPOSITORY
2.87
...
2.87
DOMAIN EXPERT
2.4
OCCURRENCE
WORKFLOWS
COMPRESSION
OCCURRENCE
WORKFLOWS
COMPRESSION
1092
-2.43
Branch & Merge
476
3276
600
240
2400
Branch & Merge
OCCURRENCE
WORKFLOWS
COMPRESSION
20
10
200
RANKING
ALGORITHM
Branch & Merge
SELECTED MACROS
Branch & Merge
MACRO SELECTION
VIA UI
MACRO
SELECTION
GLYPH DESIGN
MACRO
ANNOTATION
MACRO INSERTION
IN GRAPH
25. Ranking Algorithm
1,043
M1 - Occurrences in data
repository
VIS 2013, 13th-18th October 2013
...
640
M2 -Workflow Presence
M3 -Compression
Potention
26. Ranking Algorithm
1,043
M1 - Occurrences in data
repository
VIS 2013, 13th-18th October 2013
...
640
M2 -Workflow Presence
M3 -Compression
Potention
27. Ranking Algorithm
1,043
M1 - Occurrences in data
repository
VIS 2013, 13th-18th October 2013
...
640
M2 -Workflow Presence
M3 -Compression
Potention
28. Ranking Algorithm
1,043
M1 - Occurrences in data
repository
...
640
M2 -Workflow Presence
M3 -Compression
Potention
For At, Aw and Ac, we map it to a fixed range [−1, 1] using a linear mapping based on the min-max
range of each indicator, yielding three normalized metrics M1 , M2 and M3
No algorithm would be complete without a weighting element. So each metric can be weighted. We
use a default weight of 1.
VIS 2013, 13th-18th October 2013
29. Ranking Algorithm
Motifs arranged
by depth
3 Normalized metrics
Filter by
min/max depth
Filter by pattern presence
Linear, branching and merging
Motif subgraph 3 Glyph representations
VIS 2013, 13th-18th October 2013
Depth 6 motifs with
magnified view in B
and detailed popup of
selected motif in D
30. Ranking Algorithm
Motifs arranged
by depth
3 Normalized metrics
Filter by
min/max depth
Filter by pattern presence
Linear, branching and merging
Motif subgraph 3 Glyph representations
VIS 2013, 13th-18th October 2013
Depth 6 motifs with
magnified view in B
and detailed popup of
selected motif in D
Score
Occurrences Workflow Compression
presence
Potential
31. Ranking Algorithm
Motifs arranged
by depth
Filter by
min/max depth
Filter by pattern presence
Linear, branching and merging
Depth 6 motifs with
magnified view in B
and detailed popup of
selected motif in D
Score
Occurrences Workflow Compression
presence
Potential
Downgrade
Icon
Adjusted
Score
3 Normalized metrics
Motif subgraph 3 Glyph representations
VIS 2013, 13th-18th October 2013
32. Ranking Algorithm
Motifs arranged
by depth
Filter by
min/max depth
Filter by pattern presence
Linear, branching and merging
Depth 6 motifs with
magnified view in B
and detailed popup of
selected motif in D
Score
Occurrences Workflow Compression
presence
Potential
1000
Downgrade
Icon
Adjusted
Score
3 Normalized metrics
Motif subgraph 3 Glyph representations
VIS 2013, 13th-18th October 2013
33. Ranking Algorithm
Motifs arranged
by depth
Filter by
min/max depth
Filter by pattern presence
Linear, branching and merging
Depth 6 motifs with
magnified view in B
and detailed popup of
selected motif in D
Score
Occurrences Workflow Compression
presence
Potential
1000
Subset of
1200
3 Normalized metrics
Motif subgraph 3 Glyph representations
VIS 2013, 13th-18th October 2013
Downgrade
Icon
Adjusted
Score
34. Ranking Algorithm
Motifs arranged
by depth
Filter by
min/max depth
Filter by pattern presence
Linear, branching and merging
Depth 6 motifs with
magnified view in B
and detailed popup of
selected motif in D
Score
Occurrences Workflow Compression
presence
Potential
1000
Subset of
1200
3 Normalized metrics
200
Motif subgraph 3 Glyph representations
VIS 2013, 13th-18th October 2013
Downgrade
Icon
Adjusted
Score
35. 1
A
s0
A
s1
B
E
s2
B
s3
C
D
H
E
E
G
s4
OCCURRENCE
WORKFLOWS
476
3276
F
n
E
MOTIF EXTRACTION
ALGORITHM
VIS 2013, 13th-18th October 2013
...
MOTIFS
DOMAIN EXPERT
COMPRESSION
1092
C
BIOLOGICAL
WORKFLOW
REPOSITORY
2.87
...
2.87
DOMAIN EXPERT
2.4
OCCURRENCE
WORKFLOWS
COMPRESSION
OCCURRENCE
WORKFLOWS
COMPRESSION
1092
-2.43
Branch & Merge
476
3276
600
240
2400
Branch & Merge
OCCURRENCE
WORKFLOWS
COMPRESSION
20
10
200
RANKING
ALGORITHM
Branch & Merge
SELECTED MACROS
Branch & Merge
MACRO SELECTION
VIA UI
MACRO
SELECTION
GLYPH DESIGN
MACRO
ANNOTATION
MACRO INSERTION
IN GRAPH
56. Overcoming the blockades
Macros in electronic circuit
diagrams are the product of
years of refinement.
No semantics
Current Motif Detection
Algorithm Limitations
VIS 2013, 13th-18th October 2013
Limited motif sizes
(Max 10)
Deciding what should
be a Macro
Macros in biological
workflows for instance is
new...how do we determine
what should be a macro?
57. Overcoming the blockades
Macros in electronic circuit
diagrams are the product of
years of refinement.
hm
ri t
al
t ic
en
ly
an
Current Motif Detection
em
s
ew
Algorithm Limitations
N
VIS 2013, 13th-18th October 2013
go
al semantics
d
eNo
bl
a
Limited motif sizes
(Max 10)
Deciding what should
be a Macro
Macros in biological
workflows for instance is
new...how do we determine
what should be a macro?
58. Overcoming the blockades
hm
ri t
al
t ic
en
ly
an
Current Motif Detection
em
s
ew
Algorithm Limitations
N
go
al semantics
d
eNo
bl
a
Limited motif sizes
(Max 10)
om s
Macros n fr w
in electronic circuit
tio arelo product of
c
kf the
diagramsor
e le w
s
f
dyearsoof refinement.
e
rm rpus
fo co
in e
l l y rg
ica a la
Macros in biological
ist f
t
t a is o
Swhatsshould
Deciding
workflows for instance is
y
be a nal
a Macro
new...how do we determine
what should be a macro?
VIS 2013, 13th-18th October 2013
59. Summary
A
s0
A
s1
B
E
s2
B
s3
C
C
D
H
E
E
G
s4
F
New semantically enabled motif discovery algorithm
E
Statistically informed selection of macro candidates for use in biological workflow
visualizations
Automated macro image generation from inferred from algorithm states
Integration of final selections and utility to compress in ISAcreator tool for curators
and biologists alike
Open source - we want you to extend!
VIS 2013, 13th-18th October 2013
60. And yes.
Co-authors
Philippe Rocca-Serra
Susanna-Assunta Sansone
Jim Davies
Min Chen
It is open source!
Bye.
You can download this software
now!
Also
Alejandra Gonzalez Beltran
for many useful discussions
VIS 2013, 13th-18th October 2013
github.com/isa-tools/automacron