A. Marie Vans

A. Marie Vans
HP Inc. | HP · Printing and Content Lab

Ph.D. Computer Science

About

75
Publications
17,549
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,707
Citations
Citations since 2017
22 Research Items
339 Citations
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
Additional affiliations
November 2008 - October 2015
HP Inc.
Position
  • Researcher
January 2000 - November 2008
Hewlett-Packard Labs, Haifa, Israel
Position
  • Researcher
August 1990 - December 1996
Colorado State University

Publications

Publications (75)
Article
In 2006, the French government discretely asked for an assessment of the highest accuracy means available at the time to translate Russian speech into French text. One of us was working with the Grenoble HP site at the time, and so promptly assessed the possibilities using existing speech-to-text and translation software (Nuance and Speechworks). T...
Conference Paper
Full-text available
Faced with the possibility of running out of storage space and losing important born-digital cultural heritage artifacts, we are embarking on a project to design a process for preserving objects generated by our virtual world-based group so that these issues will not become critical in the future. Because of the high-turnover nature of student-base...
Article
Full-text available
Examines ways librarians can utilize virtual worlds to share information and resources including virtual communities.
Conference Paper
In the world of ground truthing--that is, the collection of highly valuable labeled training and validation data-there is a tendency to follow the path of first training on a set of data, then validating the data, and then testing the data. However, in many cases the labeled training data is of non-uniform quality, and thus of non-uniform value for...
Article
TF*IDF (term frequency times inverse document frequency) is a common metric used to automatically discover keywords in documents for use in classification and other text processing applications. We are interested in determining whether these measures can help in determining the most relevant sentences for summarization and classification purposes....
Patent
Full-text available
An example apparatus may include a processor and a memory device including computer program code. The memory device and the computer program code may, with the processor, cause the apparatus to provide modified serialization codes for a first entity in a serialization flow to replace existing serialization codes for the first entity. In various exa...
Article
Full-text available
Documenting and preserving educational experiences in virtual worlds can be a challenge, especially for semester-length courses of up to 16 weeks. Vast amounts of data are generated such as objects created in-world, project data contained on social media networks, and real-time educational events. While it is probably not feasible to preserve all t...
Article
We have previously described the Progressive Barcode, a high-density color barcode that changes over incrementally. This article expands on previously published work [S. J. Simske and A. M. Vans, "Archive-enabling tagging using progressive barcodes," Proc. of Archiving (Los Angeles, CA, 2015), pp. 130-135]. We describe how the progressive barcode w...
Article
Summarization techniques can be applied to non-text data in order to perform classification and clustering of important imaging, video and other document-associated but non-text content. The advantage to this approach is that there is a multiplicity of inexpensive (even free) summarization engines, and so a robust solution can be crafted with relat...
Patent
Automated inspection method for detecting a defect in a printed image, comprising processing a raster image, sending the raster image to a print process, printing a printed image corresponding to the raster image onto a medium, capturing a target image from at least a part of the printed image at a lower resolution than the printed image, at least...
Patent
Full-text available
A system for enhancing security printing includes a segmentation system, a secure database in operative communication with the segmentation system, a secure registry in selective operative communication with the segmentation system, and an analysis system in operative communication with the segmentation system and the secure database, and in select...
Patent
An image is obtained of an identifying object that is on a printed document. A forensic signature is extracted from the image. Access to the extracted forensic signature profile is enabled via information encoded in the identifying object. The identifying object may be interpreted to access the forensic signature for comparison with another.
Article
Full-text available
Color barcodes offer increased density over two-dimensional barcodes, which can be taken advantage of to embed longer data strings in the same printed/displayed area. However, the color channels also offer the possibility of containing multiple, distinct sets of data in the same “hybrid” mark.The four-dimensional progressive barcode is a printed ma...
Article
In the fast-changing world of actionable printing, there has recently been a huge increase in the adoption of two-dimensional (2D) barcodes for enterprise and consumer applications. The Data Matrix 2D barcode has become a primary carrier of supply chain information, most notably for track and trace. The QR (Quick Response) 2D barcode, meanwhile, ha...
Article
Barcodes are a familiar data-carrying mark printed onto physical items such as packaging, labels, magazines, etc. Many consumers, retailers, and distributors are routinely reading them with their mobile devices. We introduce the four-dimensional Progressive Barcode which is a printed mark that does not take up more real estate as it is used to adva...
Article
As "going green" becomes the expectation rather than the exception, models for proving the environmental compatibility of the entire ecosystem-rather than point devices-will be necessary. In this paper, we explore the ecosystem advantages of variable data printing for sustainability. Sustainability, like security, is more effective when built in fr...
Article
Full-text available
Security printing, security, payload density, barcode, DataMatrix Security barcodes and other barcodes linked to on-line databases have become commonplace due to the increased availability of mobile phones equipped with high quality cameras. In this paper, we provide methods for quantifying the entropy of the embedded barcode data, assuming methods...
Article
Full-text available
HP Laboratories HPL-2008-163R1 Variable data printing, high-speed inspection, print defect detection, scanning, GPU We propose a system for automatic, on-line visual inspection and print defect detection for Variable -Data Printing (VDP). This system can be used to automatically stop the printing process and alert the operator to problems. We prese...
Article
Full-text available
We have previously described the printing of information in 2D color (or "3D") barcodes for subsequent reading with scanners and/or mobile cameras. In this paper, we describe how color tiles can be used in different aggregations (single tiles, 2x2 pairings of tiles, 3x3 pairings of tiles, etc.) to provide data that is readable by a wide array of im...
Article
Modern variable data presses use substantial processing power. In many cases, a bank of processors is used to manage the RIP (raster image processing), and print jobs are performed using sophisticated parallel scheduling approaches. The high processing power of digital presses enables the possibility of performing valuable imaging tasks using the s...
Article
Error-Correcting Code (ECC) provides robust readability to both linear and two-dimensional (2D) barcodes, particularly for localized damage. Many ECC approaches, however, are based on assumptions about the types of damage or the communication channel used. As the applications for barcodes rapidly evolve with the increasing ubiquity of mobile camera...
Article
Full-text available
Security and forensic printing are needed to connect a physical object to the infrastructure -servers, databases, services, etc. -that is necessarily deployed for the "downstream" aspects of an anti-counterfeiting ecosystem. These aspects include investigation (secret shopping, evidence gathering, and analytics) and prosecution. For many branded pr...
Article
Security barcodes and other "actionable" barcodes have become commonplace as a consequence of the recent ubiquity of mobile phones equipped with high-quality cameras. In this paper, we provide methods for quantifying the entropy of the embedded barcode data, assuming methods other than the standards-specified error correcting code (ECC) approaches...
Article
Security printing jobs incorporate variable data into explicit regions, called deterrents, which can be read later, usually by a visible spectrum imager (e.g. scanner or camera). In order to initiate a security printing job, a number of authorization steps must be performed. These include the press operator entering the username, password and, poss...
Article
Full-text available
HIPIE 2 is an internal code name for the HP Smartstream Photo Enhancement Server, – a robust, scalable, and automatic photo image enhancement application, designed for photo specialty work flows ful filled using Indigo presses. It is intended for 24/7 operation, without human intervention, and is part of HP Indigo's Smartstream work flow offering....
Conference Paper
We present a document processing method that addresses some of the practical challenges in image enhancement for digital photo album in PDF documents. With the advent of digital offset presses, consumer photo books are becoming increasingly popular, and most such workflows convert the consumer's photos and layout into PDF documents. In order to pro...
Article
Full-text available
Biblio is an adaptive system that automatically extracts meta-data from semi-structured and structured scanned documents. Instead of using hand-coded templates or other methods manually customized for each given document format, it uses example-based machine learning to adapt to customer-defined document and meta-data types. We provide results from...
Article
Color consistency is crucial for both photo and commercial printing applications. Dot gain tables are updated regularly, however between updates colors can shift due to process drift in the press, which is a common problem of both digital and offset presses. The goal of this investigation is to dynamically control the dot gain table and developer v...
Article
This paper reports on a software understanding field study of corrective maintenance of large-scale software. Participants were professional software maintenance engineers. The paper reports on the general understanding process, the types of actions programmers preferred during the debugging task, the level of abstraction at which they were working...
Conference Paper
This paper reports on a software understanding study during adaptation of large-scale software by software maintenance professionals. The paper explains the general understanding process, the information needs of these software engineers during their tasks, and the tool capabilities that would help them to be more productive. We also contrast progr...
Conference Paper
We report on a software understanding study during adaptation, of large-scale software. Participants were professional software maintenance engineers. The paper reports on the general understanding process, the types of actions programmers preferred during the adaptation task, and the level of abstraction, at which they were working. The results of...
Article
Full-text available
This paper reports on detailed observations during software enhancement tasks of five programmers enhancing software. The enhancement tasks represent realistic work behavior by industrial programmers. The paper describes the kinds of actions programmers preferred during their task, the level of abstraction at which they were working, and the role o...
Conference Paper
This paper reports on an empirical strategy of software understanding during corrective maintenance of large-scale software with professional maintenance programmers. Hypotheses are key drivers in program understanding and influence the direction program understanding can take. This paper reports on the types of hypotheses programmers make, how the...
Conference Paper
We report on a software understanding field study during corrective maintenance of large-scale software by professional software maintenance engineers. We explain the general understanding process, the information needs of these software engineers during their tasks, and the tool capabilities that would help them to be more productive
Article
This paper reports on a software understanding field study during the enhancement of large-scale software. The participants were professional software maintenance personnel from industry. The paper reports on the general understanding process, the kinds of actions programmers preferred during the enhancement task, the level of abstraction at which...
Article
We present results of observing professional maintenance engineers working with industrial code at actual maintenance tasks. Protocol analysis is used to explore how code understanding might differ for small versus large scale code. The experiment confirms that cognition processes work at all levels of abstraction simultaneously as programmers buil...
Article
Full-text available
Maintenance frequently consumes more resources than new software development. A major portion of the maintenance effort is spent on the reverse engineering activity of understanding existing software. If we can learn more about how programmers understand code successfully, we can build better tools to support the understanding process. This contrib...
Article
Full-text available
We present results of observing professional maintenance engineers working with industrial code at actual maintenance tasks. Protocol analysis is used to explore how code understanding might differ for small versus large scale code. The experiment confirms that cognition processes work at all levels of abstraction simultaneously as programmers buil...
Article
Full-text available
A major portion of the maintenance effort is spent understanding existing software. We present an integrated code comprehension model and our experiences with it in an industrial setting. We use audio-taped, think-aloud reports to investigate how well our integrated code comprehension model works during industrial maintenance activities ranging fro...
Conference Paper
Full-text available
Hypotheses are major drivers of program comprehension. We report on a case study observing an experienced software engineer porting a large software system and the role of hypotheses in accomplishing the porting task. Observations confirm some existing theoretic models and experimental findings, but not all. While generalization based on a case stu...
Conference Paper
This paper reports on a software understanding experiment during re-engineering of large-scale software. Participants were professional software maintenance engineers. The paper explains the general understanding process, the information needs of these software engineers during their tasks, and the tool capabilities that would help them to be more...
Article
AbstractModels of how programmers understand code they have not written have been developed and analyzed for many years. These models describe program comprehension at various levels of detail. This papers puts them in perspective, particularly with regard to specialized maintenance tasks versus general code understanding needs. Experiments support...
Article
Maintenance frequently consumes more resources than new software development. A major portion of the maintenance effort is spent trying to understand existing software. If more can be learnt about how programmers understand code successfully, better tools to support this understanding process can be built. This contributes to higher quality and imp...
Article
Full-text available
Code cognition models examine how programmers understand program code. The authors survey the current knowledge in this area by comparing six program comprehension models: the Letovsky (1986) model; the Shneiderman and Mayer (1979) model; the Brooks (1983) model; Soloway, Adelson and Ehrlich's (1988) top-down model; Pennington's (1987) bottom-up mo...
Conference Paper
Describes code cognition behaviors when maintenance engineers try to understand large-scale code. It reports on low level and higher level aggregate comprehension processes, hypotheses, and strategies. Results are based on the integrated meta-model of code cognition and use protocol analysis of code cognition sessions
Article
Full-text available
this paper was written in 1981, in the past 12 years very few theories concerning program comprehension have been advanced. Theories regarding large scale program comprehension for specialized maintenance tasks are in their infancy. 6 Conclusion
Conference Paper
We present results of observing professional maintenance engineers working with industrial code at actual maintenance tasks. Protocol analysis is used to explore how code understanding might differ for small versus large scale code. The experiment confirms that cognition processes work at all levels of abstraction simultaneously as programmers buil...
Conference Paper
Full-text available
A major portion of the software maintenance effort is spent on the reverse engineering activity of understanding existing software. If one can learn more about how programmers understand code successfully, one can build better tools to support the understanding process. This contributes to higher quality and improved efficiency of maintenance tasks...
Conference Paper
Full-text available
A major portion of the maintenance effort is spent understanding existing software. The authors present an integrated code comprehension model and experiences with it in an industrial setting. They use audio-taped, think-aloud reports to investigate how well this integrated code comprehension model works during industrial maintenance activities ran...
Conference Paper
A major portion of the maintenance effort is spent trying to understand existing software. If we can learn more about how programmers understand code successfully, we can build better tools to support this understanding process. An effective maintenance tool must help in code comprehension and support the code understanding process. We present an i...

Network

Cited By