380789_Artigo científico
-
Upload
nibl1019222 -
Category
Documents
-
view
222 -
download
0
Transcript of 380789_Artigo científico
-
8/6/2019 380789_Artigo cientfico
1/20
Artigo cientficoIntroduo Pesquisa em Engenharia de
Computao
-
8/6/2019 380789_Artigo cientfico
2/20
Um artigo cientfico : Segundo Roth1:
Uma sntese de descobertas, acompanhadas de
avaliao e interpretao; Um trabalho original quanto s idias;
Um trabalho que reconhece as fontes utilizadas.1 ROTH, Audrey J. The research paper: process, form, and content. 7. ed. Belmont: Wadsworth,
1994.
-
8/6/2019 380789_Artigo cientfico
3/20
Um artigo cientfico no : Segundo Roth1:
Um resumo de outra fonte.
Repetio de idias de outros, sem crticas.
Uma srie de citaes.
Opinio pessoal no demonstrada.
Cpia do trabalho de outros.1 ROTH, Audrey J. The research paper: process, form, and content. 7. ed. Belmont: Wadsworth,
1994.
-
8/6/2019 380789_Artigo cientfico
4/20
Como escrever um resumo
(abstract)
-
8/6/2019 380789_Artigo cientfico
5/20
Orientaes importantes Respeitar o limite de palavras.
Incluirpalavras-chaves.
Incluirmais ou menos uma frase para cada
uma das partes de um resumo.
-
8/6/2019 380789_Artigo cientfico
6/20
Partes de um resumo Motivao por qu?
Importncia, dificuldade, impacto
Objetivo, soluo proposta
Mtodo
Resultados
Concluses mais importantes
-
8/6/2019 380789_Artigo cientfico
7/20
Exemplo de resumoWe consider the problem of nding duplicates in data streams.
Duplicate detection in data streams is utilized in variousapplications including fraud detection. We develop a solution
based on Bloom Filters [9], and discuss the space and timerequirements for running the proposed algorithm in both thecontexts of sliding, and landmark stream windows. We run a
comprehensive set of experiments, using both real andsynthetic click streams, to evaluate the performance of the
proposed solution. The results emonstrate that the proposedsolution yields extremely low error rates.(METWALLY, A.; AGRAWAL, D.; ABBADI, A. Duplicate Detection in Click
Streams. In: INTERNATIONAL WORLD WIDE WEB CONFERENCE, 2005,
Chiba. Proceedings ... New York: ACM, 2005.p. 12-21)
-
8/6/2019 380789_Artigo cientfico
8/20
-
8/6/2019 380789_Artigo cientfico
9/20
Exemplo de resumoWepresent the bubble cursor a new target acquisition technique
based on area cursors. The bubble cursor improves upon areacursors by dynamically resizing its activation area depending on
theprox
imity of surrounding targets, such that only one target isselectable at any time. We also present two controlledexperiments that evaluate bubble cursorperformance in 1D and2D target acquisition tasks, in complex situations with multipletargets of varying layout densities. Results show that the bubblecursor significantly outperforms the point cursor and the object
pointing technique [8], and that bubble cursorperformance can beaccurately modeled and predicted using Fitts law.(GROSSMAN, T.; BALAKRISHNAN, R. The Bubble Cursor: Enhancing Target Acquisition by
Dynamic Resizing of the Cursors Activation Area. In: INTERNATIONAL CONFERENCE ON HUMAN FACTORS
IN COMPUTING SYSTEMS, 2005, Portland. Proceedings... New York: ACM, 2005. p. 281-290)
-
8/6/2019 380789_Artigo cientfico
10/20
Levantamento do Estado
da Arte
-
8/6/2019 380789_Artigo cientfico
11/20
Exemplo 1 Zhao et al. Face Recognition: A Literature
Survey. ACM Computing Surveys, Vol. 35, No.
4, December 2003, pp. 399458. 168 referncias
7 livros
-
8/6/2019 380789_Artigo cientfico
12/20
Exemplo 1 (Extratos)Caricatures [Brennan 1985; Bruce 1988; Perkins 1975]: A
caricature can be formally defined [Perkins 1975] as asymbol that exaggerates measurements relative to any
measure which varies from one person to another. Thus the
length of a nose is a measure that varies from person toperson, and could be useful as a symbol in caricaturing
someone, but not the number of ears. A standard caricaturealgorithm [Brennan 1985] can be applied to different qualitiesof image data (line drawings and photographs). Caricatures
of line drawings do not contain as much information asphotographs, but they manage to capture the importantcharacteristics of a face; experiments based on nonordinaryfaces comparing the usefulness of linedrawing caricatures
and unexaggerated line drawings decidedly favor the former[Bruce 1988].
-
8/6/2019 380789_Artigo cientfico
13/20
Exemplo 1 (Extratos)The last method that we review in this category is based
on recent advances in component-based
detection/recognition [Heisele et al. 2001] and
3D morphable models [Blanz and Vetter 1999]. The basicidea of component-based methods [Heisele et al. 2001]
is to decompose a face into a set of facial components
such as mouth and eyes that are interconntected by a
flexible geometrical model. (Notice how this method issimilar to the EBGM system [Okada et al. 1998; Wiskott
et al. 1997] except that gray-scale components are used
nstead of Gabor wavelets.)
-
8/6/2019 380789_Artigo cientfico
14/20
Exemplo 1 (Extratos)Until recently, there did not exist a common FRT
evaluation protocol that included large
databases and standard evaluation methods.This made it difficult to assess the status of FRT
for real applications, even though many existing
systems reported almost perfect performance
on small databases.
-
8/6/2019 380789_Artigo cientfico
15/20
Exemplo 1 (Extratos) Uma concluso:
Recognition of faces from a video sequence(specially a surveillance video) is still one of the
most challenging problems in face recognitionbecause video is of low quality and the imagesare small. Often, the subjects of interest are notcooperative, for example, not looking into the
camera. One particular difficulty in these
applications is how to obtain good-qualitygallery images. Nevertheless, video-based facerecognition systems using multiple cues have
demonstrated good results in relativelycontrolled environments. (grifo meu)
-
8/6/2019 380789_Artigo cientfico
16/20
Exemplo 2 S. Androutsellis-Theotokis and D. Spinellis. A
Survey ofPeer-to-Peer Content Distribution
Technologies. ACM Computing Surveys, Vol. 36,No. 4, December 2004, pp. 335371.
-
8/6/2019 380789_Artigo cientfico
17/20
Exemplo 2 (Extratos) Concluses:
Finally, as peer-to-peer technologies are stillevolving, there are a multitude of open research
problems, directions, and opportunities, including,but not limited to:
The design of new distributed object location,routing and distributed hash table data structures
and algorithms for maximizing performance,security and scalability, both in structured andunstructured network architectures.
(...)
-
8/6/2019 380789_Artigo cientfico
18/20
Exemplo 3 KEPHART, Jeffrey O. Research Challenges
of Autonomic Computing. ICSE05, May 15
21, 2005, St. Louis, Missouri, USA. 8 pginas
53 referncias
-
8/6/2019 380789_Artigo cientfico
19/20
Exemplo 3 (Extratos)One interesting line of research [11] uses information
theoretic techniques to identify optimally small and
efficient sets or sequences of probes that can inpoint
problems; efforts are being made now to extend thework to scale to larger systems and handle multiple
simultaneous failures. Problem localization techniques
such as these rely on a knowledge of patterns of
interconnection, or dependencies, among systemcomponents. This brings up yet another challenge that
is beginning to be addressed [22]: how to extract these
dependencies automatically as the systems
configuration continually shifts?
-
8/6/2019 380789_Artigo cientfico
20/20
Exemplo 3 (Extratos)Littman et al. [42] have taken a radically different approach
that completely bypasses diagnosis and localization.They formulate autonomic network repair as a
reinforcement learning problem in which numerousdifferent fault types are injected into the network duringtraining. The reinforcement learning algorithm explores
several alternative test and repair actions. Over time, thealgorithm learns which repair actions lead to the highest
reward without learning any intermediate problemdiagnosis representation. An important question iswhether this technique can scale to larger, more complexsystems in which the range of possible faults, elements,
and remediation actions is significantly larger.