The field of information visualization is in permanent expansion and new and innovative ways of visualizing large volumes of abstract data are being developed. The use of virtual metaphoric worlds is one of them, but ...
详细信息
ISBN:
(纸本)0819444057
The field of information visualization is in permanent expansion and new and innovative ways of visualizing large volumes of abstract data are being developed. The use of virtual metaphoric worlds is one of them, but these visualizations per se are only truly useful if the user is provided a means of exploring the information. A common way of dataexploration is navigation. In the case of three-dimensional (3D) information visualization, navigation as a means of information exploration attains even more importance due to the extra exploitable dimension. Nonetheless, navigation in large virtual worlds is still a difficult task and not only for naive users, there is anecdotal evidence that electronic navigation is considered difficult even by the virtual worlds builders. Wayfinding, "knowing where to go", is sometimes perceived as the hardest part;other times, it is the locomotion, "getting there", that is found difficult. This paper presents a navigation strategy that attempts to solve these problems by combining physical/metaphoric navigation with semantic navigation. We present a framework for navigating large virtual worlds that relies heavily on the use of visual metaphors. The combination of physical and semantic navigation embedded in the metaphor components allows for a powerful dataexploration and electronic navigation mechanism.
Temporal data are abundantly present in many applications such as banking, financial, clinical, geographical applications and so on. For a long time, tools for dataanalysis have been only based on statistics. A more ...
详细信息
visual surveillance systems are often installed in concourses, car park areas and high security sites to monitor the flow of pedestrians and vehicles for security and dataanalysis. The job of monitoring image sequenc...
详细信息
ISBN:
(纸本)0780374886
visual surveillance systems are often installed in concourses, car park areas and high security sites to monitor the flow of pedestrians and vehicles for security and dataanalysis. The job of monitoring image sequences is usually assigned to a human operator who waits for important events or specially appointed objects to occur. Operators become bored and lose concentration. It is therefore essential to devise autonomous surveillance systems, which can search and track appointed objects in a wide region and alert a human operator only when appointed objects appear in these watched areas. We report a study on a new region-wide automatic visual search and pursuit surveillance system for appointed objects using networks. By processing image sequences on the basis of object properties, such color and shape (vehicle) or height and gait (pedestrian), the system can search, recognize and track the appointed object. The system uses multiple cameras and every camera carries a set of software. We explain the integrated software system and show an experiment system and experimental results. The system recognizes objects region-wide by using a network. Correct classification yields are 92% for vehicles, 64% for pedestrians. The system is able to process about 2 frames per second.
In this article we present a new method for automatic landmark extraction from the contours of biological specimens. Our ultimate goal is to enable automatic identification of biological specimens in photographs and d...
详细信息
ISBN:
(纸本)0780376226
In this article we present a new method for automatic landmark extraction from the contours of biological specimens. Our ultimate goal is to enable automatic identification of biological specimens in photographs and drawings held in a database. We propose to use Active Appearance Models for visual indexing of both photographs and drawings. Automatic landmark extraction will assist us in building the models. Below we describe the results of using our method on drawings and photographs of examples of diatoms, and present an Active Shape Model built using automatically extracted data.
The development of cryptographic logics to analyze security protocols has provided one technique for ensuring the correctness of these protocols. However, it is commonly acknowledged that analysis using a modal logic ...
详细信息
ISBN:
(纸本)0792375068
The development of cryptographic logics to analyze security protocols has provided one technique for ensuring the correctness of these protocols. However, it is commonly acknowledged that analysis using a modal logic such as GNY tends to be inaccessible and obscure for the uninitiated. In this paper we describe the SPEAR ii graphically-based security protocol engineering environment that can be used to easily conduct GNY analyses. SPEAR ii consists of three primary components: a protocol specification environment (GYPSIE), a GNY statement construction interface (visual GNY) and a Prolog-based GNY analysis engine (GYNGER). In contrast to other tools, SPEAR ii offers a multi-dimensional approach to protocol engineering, integrating protocol design and analysis into one consistent and unified interface. The interface and techniques used within this tool are built on the foundation of previous experience with the original SPEAR tool and GNY analysis research. We also show how the SPEAR ii tool is used to conduct a GNY analysis and how it distances protocol engineers from any associated syntactical issues, allowing them to focus more on the associated semantics and distil the critical issues that arise. By freeing individuals to focus on an analysis, instead of hampering them with the necessary syntax, we can ensure that the fundamental concepts and advantages related to GNY analysis are kept in mind and applied as well.
In the last several years, large OLAP databases have become common in a variety of applications such as corporate data warehouses and scientific computing. To support interactive analysis, many of these databases are ...
详细信息
In the last several years, large OLAP databases have become common in a variety of applications such as corporate data warehouses and scientific computing. To support interactive analysis, many of these databases are augmented with hierarchical structures that provide meaningful levels of abstraction that can be leveraged by both the computer and analyst. This hierarchical structure generates many challenges and opportunities in the design of systems for the query, analysis, and visualization of these databases. In this paper, we present an interactive visualexploration tool that facilitates exploratory analysis of data warehouses with rich hierarchical structure, such as might be stored in data cubes. We base this tool on Polaris, a system for rapidly constructing table-based graphical displays of multidimensional databases. Polaris builds visualizations using an algebraic formalism derived from the interface and interpreted as a set of queries to a database. We extend the user interface, algebraic formalism, and generation of data queries in Polaris to expose and take advantage of hierarchical structure. In the resulting system, analysts can navigate through the hierarchical projections of a database, rapidly and incrementally generating visualizations for each projection.
Having a representative work-load of the target domain of a microprocessor is extremely important throughout its design. The composition of a workload involves two issues: (i) which benchmarks to select and (ii) which...
详细信息
ISBN:
(纸本)0769516203
Having a representative work-load of the target domain of a microprocessor is extremely important throughout its design. The composition of a workload involves two issues: (i) which benchmarks to select and (ii) which input data sets to select per benchmark. Unfortunately, it is impossible to select a huge number of benchmarks and respective input sets due to the large instruction counts per benchmark and due to limitations on the available simulation time. In this paper, we use statistical dataanalysis techniques such as principal components analysis (PCA) and cluster analysis to efficiently explore the workload space. Within this workload space, different input data sets for a given benchmark can be displayed, a distance can be measured between program-input pairs that gives us an idea about their mutual behavioral differences and representative input data sets can be selected for the given benchmark. This methodology is validated by showing that program-input pairs that are close to each other in this workload space indeed exhibit similar behavior. The final goal is to select a limited set of representative benchmark-input pairs that span the complete workload space. Next to workload composition, there are a number of other possible applications, namely getting insight in the impact of input data sets on program behavior and profile-guided compiler optimizations.
The current state of the art in visualization research places a strong emphasis on different techniques to derive insight from disparate types of data. However, little work has investigated the visualization process i...
详细信息
The current state of the art in visualization research places a strong emphasis on different techniques to derive insight from disparate types of data. However, little work has investigated the visualization process itself. The information content of the visualization process-the results, history, and relationships between those results-is addressed by this work. A characterization of the visualization process is discussed, leading to a general model of the visualization exploration process. The model, based upon a new parameter derivation calculus, can be used for automated reporting, analysis, or visualized directly. An XML-based language for expressing visualization sessions using the model is also described. These sessions can then be shared and reused by collaborators. The model, along with the XML representation, provides an effective means to utilize the information within the visualization process to further dataexploration.
Most users want to find visual information based on the semantics of visual contents such as a name of person and an action happening in a scene. However, techniques for content-based image or video retrieval are not ...
详细信息
In large data warehouses it is possible to return very fast approximate answers to user queries using pre-computed sampling summaries well-fit for all types of explorationanalysis. However, their usage is constrained...
详细信息
暂无评论