A useful data mining not only be efficient, but also be effective. For data mining algorithms, especially for classification, cluster analysis, decision tree, etc., an interactive processing between machine and user i...
详细信息
ISBN:
(纸本)0780390350
A useful data mining not only be efficient, but also be effective. For data mining algorithms, especially for classification, cluster analysis, decision tree, etc., an interactive processing between machine and user is necessary. Applying parallel and distributed computing technology, the object of efficient data mining can be reached. Together with parallel visualization platform, an interactive interface is essential in interactive data mining. In this paper a scheme of interactive data mining support system in parallel computing environment is described. The design of interface in the system is illustrated.
This paper presents a new information model to help intelligence analysts in organizing, querying, and visualizing the information present in large volumes of unstructured data sources such as text reports, multi-medi...
详细信息
ISBN:
(纸本)0819457973
This paper presents a new information model to help intelligence analysts in organizing, querying, and visualizing the information present in large volumes of unstructured data sources such as text reports, multi-media, and human discourse. Our primary goal is to create a system that would combine the human pattern recognition abilities of intelligence analysis with the storage and processing capabilities of computers. Our system models the collective mental map of intelligence analysts in the form of the Correlation Graph, a modified graph data structure with objects and events as nodes and subjective probabilistic correlations between them as edges. Objects are entities such as people, places, and things. Events are actions that involve the objects. A taxonomy is also associated with the model to enable intelligence domain specific querying of the data. Graph drawing techniques are used to visualize the information represented by the correlation graph. Through real world examples, we demonstrate that the resulting information model can be used for efficient representation, presentation, and querying to discover novel patterns in the intelligence data via graph visualization techniques.
Monitoring traffic on important links allows network administrators to get insights into how their networks are used or misused. Traffic analysis based on NetFlow records or packet header traces can reveal floods, agg...
详细信息
ISBN:
(纸本)1931971382
Monitoring traffic on important links allows network administrators to get insights into how their networks are used or misused. Traffic analysis based on NetFlow records or packet header traces can reveal floods, aggressive worms, large (unauthorized) servers, spam relays, and many other phenomena of interest. Existing tools can plot time series of pre-defined traffic aggregates, or perform (hierarchical) "heavy hitter" analysis of the traffic. Wisconsin Netpy is a software package that goes beyond the capabilities of other existing tools through its support for interactive analysis and novel powerful visualization of the traffic data. Adaptive sampling of flow records ensures that the performance is good enough for interactive use, while the results of the analyses stay close to the results based on exact data. Among the salient features of the package are: hierarchical analyses of source addresses, destination addresses, or applications within aggregates identified by user-defined filters;time series plots that separate the traffic into categories specified with ACL-like syntax at run time;interactive drill-down into analyses of components of the traffic mix;"heatmap" visualization of traffic that describes how two "dimensions" of the traffic relate to each other (e.g., which sources send to which destinations, or which sources use which service, etc.).
Secure management of file systems of large organizations can present significant challenges to system administrators, in terms of the number of users, shared access to parts of the file system for supporting large sof...
详细信息
ISBN:
(纸本)081945642X
Secure management of file systems of large organizations can present significant challenges to system administrators, in terms of the number of users, shared access to parts of the file system for supporting large software projects, and securing and monitoring critical parts of the file system from intruders. We present interactive visualization tools for monitoring and viewing the complex access control relationships within large file systems. This tool is targeted as an aid to system administrators to manage users, software applications and shared access. We tested our tool on UNC Charlotte ' s Andrew File System (AFS), which contains 7043 users, 560 user groups, and about 2.1 million directories. Our system displays summary information about the file system, and two types of visualizations to explore access control relationships among classes of users. In addition, drill-down features are provided to explore the user file system structure and manage access control information of any directory within the system. All of the views are linked to permit easy navigation and features are provided that make the system scalable to larger filesystems.
The design and evaluation of most current information visualization systems descend from an emphasis on a user's ability to "unpack" the representations of data of interest and operate on them independen...
详细信息
The design and evaluation of most current information visualization systems descend from an emphasis on a user's ability to "unpack" the representations of data of interest and operate on them independently. Too often, successful decision-making and analysis are more a matter of serendipity and user experience than of intentional design and specific support for such tasks;although humans have considerable abilities in analyzing relationships from data, the utility of visualizations remains relatively variable across users, data sets, and domains. In this paper, we discuss the notion of analytic gaps, which represent obstacles faced by visualizations in facilitating higher-level analytic tasks, such as decision-making and learning. We discuss support for bridging these gaps, propose a framework for the design and evaluation of information visualization systems, and demonstrate its use.
In this work we introduce a method for classification and visualization. In contrast to simultaneous methods like e.g. Kohonen SOM this new approach, called KMC/EDAM, runs through two stages. In the first stage the da...
详细信息
ISBN:
(纸本)3540256776
In this work we introduce a method for classification and visualization. In contrast to simultaneous methods like e.g. Kohonen SOM this new approach, called KMC/EDAM, runs through two stages. In the first stage the data is clustered by classical methods like K-means clustering. In the second stage the centroids of the obtained clusters are visualized in a fixed target space which is directly comparable to that of SOM.
In the industry distributed systems are used increasingly for solving automation problems. Consequently central automation structures become less important [I]. Today a multitude of field bus systems is available for ...
详细信息
ISBN:
(纸本)9789806560543
In the industry distributed systems are used increasingly for solving automation problems. Consequently central automation structures become less important [I]. Today a multitude of field bus systems is available for communication in distributed automation systems. Apart from basic technical conditions and economic considerations the real-time behavior must be considered to reach a decision for a special field-bus-system [2]. in this project typical real-time scenarios were analyzed and put into practice for an experimental setup. The CAN-bus was used to build up the data communication for a closed-loop control system. In an experimental setup the real-time behavior of a distributed CAN based communication system was examined. The measuring data were analyzed and the visualization for real-time violations was developed.
This paper presents an interactive analysis and visualization framework for behavior histories, called mPATH framework. In ubiquitous computing environment, it is possible to infer human activities through various sen...
详细信息
Business data collection is growing exponentially in recent years. A variety of industries and businesses have adopted new technologies of data storages such as data warehouses. On Line Analytical Processing (OLAP) ha...
详细信息
ISBN:
(纸本)3540258620
Business data collection is growing exponentially in recent years. A variety of industries and businesses have adopted new technologies of data storages such as data warehouses. On Line Analytical Processing (OLAP) has become an important tool for executives, managers, and analysts to explore, analyze, and extract interesting patterns from enormous amount of data stored in data warehouses and multidimensional databases. However, it is difficult for human analysts to interpret and extract meaningful information from large amount of data if the data is presented in textual form as relational tables. visualization and interactive tools employ graphical display formats that help analysts to understand and extract useful information fast from huge data sets. This paper presents a new visual interactive exploration technique for an analysis of multidimensional databases. Users can gain both overviews and refine views on any particular region of interest of data cubes through the combination of interactive tools and navigational functions such as drilling down, rolling up, and slicing. Our technique allows users who are not experts in OLAP technology to explore and analyze OLAP data cubes and data warehouses without generating sophisticated queries. Furthermore, the visualization in our technique displays the exploration path enhancing the user's understanding of the exploration.
While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer&...
详细信息
ISBN:
(纸本)0819457973
While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer's compromise often put the entire network at risk. In this paper, we propose an IDS that provides a finer control over the internal network. The system focuses on the variations of connection-based behavior of each single computer, and uses a weighted link graph to visualize the overall traffic abnormalities. The functionality of our system is of a distributed personal IDS system that also provides a centralized traffic analysis by graphical visualization. We use a novel weight assignment schema for the local detection within each end agent. The local abnormalities are quantitatively carried out by the node weight and link weight and further sent to the central analyzer to build the weighted link graph. Thus, we distribute the burden of traffic processing and visualization to each agent and make it more efficient for the overall intrusion detection. As the LANs are more vulnerable to inside attacks, our system is designed as a reinforcement to prevent corruption from the inside.
暂无评论