
A. Marie VansHP Inc. | HP · Printing and Content Lab
A. Marie Vans
Ph.D. Computer Science
About
75
Publications
17,549
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,707
Citations
Citations since 2017
Introduction
Additional affiliations
November 2008 - October 2015
January 2000 - November 2008
Hewlett-Packard Labs, Haifa, Israel
Position
- Researcher
August 1990 - December 1996
Publications
Publications (75)
In 2006, the French government discretely asked for an assessment of the highest accuracy means available at the time to translate Russian speech into French text. One of us was working with the Grenoble HP site at the time, and so promptly assessed the possibilities using existing speech-to-text and translation software (Nuance and Speechworks). T...
Faced with the possibility of running out of storage space and losing important born-digital cultural heritage artifacts, we are embarking on a project to design a process for preserving objects generated by our virtual world-based group so that these issues will not become critical in the future. Because of the high-turnover nature of student-base...
Examines ways librarians can utilize virtual worlds to share information and resources including virtual communities.
In the world of ground truthing--that is, the collection of highly valuable labeled training and validation data-there is a tendency to follow the path of first training on a set of data, then validating the data, and then testing the data. However, in many cases the labeled training data is of non-uniform quality, and thus of non-uniform value for...
TF*IDF (term frequency times inverse document frequency) is a common metric used to automatically discover keywords in documents for use in classification and other text processing applications. We are interested in determining whether these measures can help in determining the most relevant sentences for summarization and classification purposes....
An example apparatus may include a processor and a memory device including computer program code. The memory device and the computer program code may, with the processor, cause the apparatus to provide modified serialization codes for a first entity in a serialization flow to replace existing serialization codes for the first entity. In various exa...
Documenting and preserving educational experiences in virtual worlds can be a challenge, especially for semester-length courses of up to 16 weeks. Vast amounts of data are generated such as objects created in-world, project data contained on social media networks, and real-time educational events. While it is probably not feasible to preserve all t...
We have previously described the Progressive Barcode, a high-density color barcode that changes over incrementally. This article expands on previously published work [S. J. Simske and A. M. Vans, "Archive-enabling tagging using progressive barcodes," Proc. of Archiving (Los Angeles, CA, 2015), pp. 130-135]. We describe how the progressive barcode w...
Summarization techniques can be applied to non-text data in order to perform classification and clustering of important imaging, video and other document-associated but non-text content. The advantage to this approach is that there is a multiplicity of inexpensive (even free) summarization engines, and so a robust solution can be crafted with relat...
Automated inspection method for detecting a defect in a printed image, comprising processing a raster image, sending the raster image to a print process, printing a printed image corresponding to the raster image onto a medium, capturing a target image from at least a part of the printed image at a lower resolution than the printed image, at least...
A system for enhancing security printing includes a segmentation system, a secure database in operative communication with the segmentation system, a secure registry in selective operative communication with the segmentation system, and an analysis system in operative communication with the segmentation system and the secure database, and in select...
An image is obtained of an identifying object that is on a printed document. A forensic signature is extracted from the image. Access to the extracted forensic signature profile is enabled via information encoded in the identifying object. The identifying object may be interpreted to access the forensic signature for comparison with another.
Color barcodes offer increased density over two-dimensional barcodes, which can be taken advantage of to embed longer data strings in the same printed/displayed area. However, the color channels also offer the possibility of containing multiple, distinct sets of
data in the same “hybrid” mark.The four-dimensional progressive barcode is a printed ma...
In the fast-changing world of actionable printing, there has recently been a huge increase in the adoption of two-dimensional (2D) barcodes for enterprise and consumer applications. The Data Matrix 2D barcode has become a primary carrier of supply chain information,
most notably for track and trace. The QR (Quick Response) 2D barcode, meanwhile, ha...
Barcodes are a familiar data-carrying mark printed onto physical items such as packaging, labels, magazines, etc. Many consumers, retailers, and distributors are routinely reading them with their mobile devices. We introduce the four-dimensional Progressive Barcode which is a printed mark that does not take up more real estate as it is used to adva...
As "going green" becomes the expectation rather than the exception, models for proving the environmental compatibility of the entire ecosystem-rather than point devices-will be necessary. In this paper, we explore the ecosystem advantages of variable data printing for sustainability. Sustainability, like security, is more effective when built in fr...
Security printing, security, payload density, barcode, DataMatrix Security barcodes and other barcodes linked to on-line databases have become commonplace due to the increased availability of mobile phones equipped with high quality cameras. In this paper, we provide methods for quantifying the entropy of the embedded barcode data, assuming methods...
HP Laboratories HPL-2008-163R1 Variable data printing, high-speed inspection, print defect detection, scanning, GPU We propose a system for automatic, on-line visual inspection and print defect detection for Variable -Data Printing (VDP). This system can be used to automatically stop the printing process and alert the operator to problems. We prese...
We have previously described the printing of information in 2D color (or "3D") barcodes for subsequent reading with scanners and/or mobile cameras. In this paper, we describe how color tiles can be used in different aggregations (single tiles, 2x2 pairings of tiles, 3x3 pairings of tiles, etc.) to provide data that is readable by a wide array of im...
Modern variable data presses use substantial processing power. In many cases, a bank of processors is used to manage the RIP (raster image processing), and print jobs are performed using sophisticated parallel scheduling approaches. The high processing power of digital presses enables the possibility of performing valuable imaging tasks using the s...
Error-Correcting Code (ECC) provides robust readability to both linear and two-dimensional (2D) barcodes, particularly for localized damage. Many ECC approaches, however, are based on assumptions about the types of damage or the communication channel used. As the applications for barcodes rapidly evolve with the increasing ubiquity of mobile camera...
Security and forensic printing are needed to connect a physical object to the infrastructure -servers, databases, services, etc. -that is necessarily deployed for the "downstream" aspects of an anti-counterfeiting ecosystem. These aspects include investigation (secret shopping, evidence gathering, and analytics) and prosecution. For many branded pr...
Security barcodes and other "actionable" barcodes have become commonplace as a consequence of the recent ubiquity of mobile phones equipped with high-quality cameras. In this paper, we provide methods for quantifying the entropy of the embedded barcode data, assuming methods other than the standards-specified error correcting code (ECC) approaches...
Security printing jobs incorporate variable data into explicit regions, called deterrents, which can be read later, usually by a visible spectrum imager (e.g. scanner or camera). In order to initiate a security printing job, a number of authorization steps must be performed. These include the press operator entering the username, password and, poss...
HIPIE 2 is an internal code name for the HP Smartstream Photo Enhancement Server, – a robust, scalable, and automatic photo image enhancement application, designed for photo specialty work flows ful filled using Indigo presses. It is intended for 24/7 operation, without
human intervention, and is part of HP Indigo's Smartstream work flow offering....
We present a document processing method that addresses some of the practical challenges in image enhancement for digital photo album in PDF documents. With the advent of digital offset presses, consumer photo books are becoming increasingly popular, and most such workflows convert the consumer's photos and layout into PDF documents. In order to pro...
Biblio is an adaptive system that automatically extracts meta-data from semi-structured and structured scanned documents.
Instead of using hand-coded templates or other methods manually customized for each given document format, it uses example-based
machine learning to adapt to customer-defined document and meta-data types. We provide results from...
Color consistency is crucial for both photo and commercial printing applications. Dot gain tables are updated regularly, however between updates colors can shift due to process drift in the press, which is a common problem of both digital and offset presses. The goal of this investigation is to dynamically control the dot gain table and developer v...
This paper reports on a software understanding field study of corrective maintenance of large-scale software. Participants were professional software maintenance engineers. The paper reports on the general understanding process, the types of actions programmers preferred during the debugging task, the level of abstraction at which they were working...
This paper reports on a software understanding study during
adaptation of large-scale software by software maintenance
professionals. The paper explains the general understanding process, the
information needs of these software engineers during their tasks, and
the tool capabilities that would help them to be more productive. We
also contrast progr...
We report on a software understanding study during adaptation, of
large-scale software. Participants were professional software
maintenance engineers. The paper reports on the general understanding
process, the types of actions programmers preferred during the
adaptation task, and the level of abstraction, at which they were
working. The results of...
This paper reports on detailed observations during software enhancement tasks of five programmers enhancing software. The enhancement tasks represent realistic work behavior by industrial programmers. The paper describes the kinds of actions programmers preferred during their task, the level of abstraction at which they were working, and the role o...
This paper reports on an empirical strategy of software
understanding during corrective maintenance of large-scale software with
professional maintenance programmers. Hypotheses are key drivers in
program understanding and influence the direction program understanding
can take. This paper reports on the types of hypotheses programmers
make, how the...
An abstract is not available.
We report on a software understanding field study during
corrective maintenance of large-scale software by professional software
maintenance engineers. We explain the general understanding process, the
information needs of these software engineers during their tasks, and
the tool capabilities that would help them to be more productive
This paper reports on a software understanding field study during the enhancement of large-scale software. The participants were professional software maintenance personnel from industry. The paper reports on the general understanding process, the kinds of actions programmers preferred during the enhancement task, the level of abstraction at which...
We present results of observing professional maintenance engineers
working with industrial code at actual maintenance tasks. Protocol
analysis is used to explore how code understanding might differ for
small versus large scale code. The experiment confirms that cognition
processes work at all levels of abstraction simultaneously as
programmers buil...
Maintenance frequently consumes more resources than new software development. A major portion of the maintenance effort is spent on the reverse engineering activity of understanding existing software. If we can learn more about how programmers understand code successfully, we can build better tools to support the understanding process. This contrib...
We present results of observing professional maintenance engineers working with industrial code at actual maintenance tasks. Protocol analysis is used to explore how code understanding might differ for small versus large scale code. The experiment confirms that cognition processes work at all levels of abstraction simultaneously as programmers buil...
A major portion of the maintenance effort is spent understanding existing software. We present an integrated code comprehension model and our experiences with it in an industrial setting. We use audio-taped, think-aloud reports to investigate how well our integrated code comprehension model works during industrial maintenance activities ranging fro...
Hypotheses are major drivers of program comprehension. We report
on a case study observing an experienced software engineer porting a
large software system and the role of hypotheses in accomplishing the
porting task. Observations confirm some existing theoretic models and
experimental findings, but not all. While generalization based on a case
stu...
This paper reports on a software understanding experiment during
re-engineering of large-scale software. Participants were professional
software maintenance engineers. The paper explains the general
understanding process, the information needs of these software engineers
during their tasks, and the tool capabilities that would help them to be
more...
AbstractModels of how programmers understand code they have not written have been developed and analyzed for many years. These models describe program comprehension at various levels of detail. This papers puts them in perspective, particularly with regard to specialized maintenance tasks versus general code understanding needs. Experiments support...
Maintenance frequently consumes more resources than new software
development. A major portion of the maintenance effort is spent trying
to understand existing software. If more can be learnt about how
programmers understand code successfully, better tools to support this
understanding process can be built. This contributes to higher quality
and imp...
Code cognition models examine how programmers understand program
code. The authors survey the current knowledge in this area by comparing
six program comprehension models: the Letovsky (1986) model; the
Shneiderman and Mayer (1979) model; the Brooks (1983) model; Soloway,
Adelson and Ehrlich's (1988) top-down model; Pennington's (1987)
bottom-up mo...
Describes code cognition behaviors when maintenance engineers try
to understand large-scale code. It reports on low level and higher level
aggregate comprehension processes, hypotheses, and strategies. Results
are based on the integrated meta-model of code cognition and use
protocol analysis of code cognition sessions
this paper was written in 1981, in the past 12 years very few theories concerning program comprehension have been advanced. Theories regarding large scale program comprehension for specialized maintenance tasks are in their infancy. 6 Conclusion
We present results of observing professional maintenance engineers working with industrial code at actual maintenance tasks. Protocol analysis is used to explore how code understanding might differ for small versus large scale code. The experiment confirms that cognition processes work at all levels of abstraction simultaneously as programmers buil...
A major portion of the software maintenance effort is spent on the
reverse engineering activity of understanding existing software. If one
can learn more about how programmers understand code successfully, one
can build better tools to support the understanding process. This
contributes to higher quality and improved efficiency of maintenance
tasks...
A major portion of the maintenance effort is spent understanding
existing software. The authors present an integrated code comprehension
model and experiences with it in an industrial setting. They use
audio-taped, think-aloud reports to investigate how well this integrated
code comprehension model works during industrial maintenance activities
ran...
A major portion of the maintenance effort is spent trying to
understand existing software. If we can learn more about how programmers
understand code successfully, we can build better tools to support this
understanding process. An effective maintenance tool must help in code
comprehension and support the code understanding process. We present an
i...