Many Eyes is a web site that provides collaborative visualization services, allowing users to upload data sets, visualize them, and comment on each other's visualizations. This paper describes a first interview-ba...
详细信息
ISBN:
(纸本)9781605580111
Many Eyes is a web site that provides collaborative visualization services, allowing users to upload data sets, visualize them, and comment on each other's visualizations. This paper describes a first interview-based study of Many Eyes users, which sheds light on user motivation for creating public visualizations. Users talked about data for many reasons, from scientific research to political advocacy to hobbies. One consistent theme across these different scenarios is the use of visualizations in communication and collaborative practices. Collaboration and conversation, however, often took place outside the site, leaving no traces on Many Eyes itself. In other words, despite spurring significant social activity, Many Eyes is not so much an online community as a "community component" which users insert into pre-existing online social systems.
The representation of a speaker's identity by means of Gaussian supervectors (GSV) is at the heart of most of the state-of-the-art recognition systems. In this paper we present a novel procedure for the visualizat...
详细信息
ISBN:
(纸本)9781615673780
The representation of a speaker's identity by means of Gaussian supervectors (GSV) is at the heart of most of the state-of-the-art recognition systems. In this paper we present a novel procedure for the visualization of GSV by which qualitative insight about the information being captured can be obtained. Based on this visualization approach, the Switchboard-I database (SWB-I) is used to study the relationship between a data-driven partition of the acoustic space and a knowledge based partition (i.e., broad phonetic classes). Moreover, the structure of an intersession variability subspace (IVS), computed from the SWB-I database, is analyzed by displaying the projection of a speaker's GSV into the set of eigenvectors with highest eigenvalues. This analysis reveals a strong presence of linguistic information in the IVS components with highest energy. Finally, after projecting away the information contained in the IVS from the speaker's GSV, a visualization of the resulting GSV provides information about the characteristic patterns of spectral allocation of energy of a speaker.
Interactive visual presentation of information can help an analyst gain faster and better insight from data. When combined with situational or context information, visualization on mobile devices is invaluable to in-f...
详细信息
ISBN:
(纸本)9780819469939
Interactive visual presentation of information can help an analyst gain faster and better insight from data. When combined with situational or context information, visualization on mobile devices is invaluable to in-field responders and investigators. However, several challenges are posed by the form-factor of mobile devices in developing such systems. In this paper, we classify these challenges into two broad categories - issues in general mobile computing and issues specific to visual analysis on mobile devices. Using NetworkVis and Infostar as example systems, we illustrate some of the techniques that we employed to overcome many of the identified challenges. NetworkVis is an OpenVC-based real-time network monitoring and visualization system developed for Windows Mobile devices. Infostar is a flash-based interactive, real-time visualization application intended to provide attendees access to conference information. Linked time-synchronous visualization, stylus/button-based interactivity, vector graphics, overview-context techniques, details-on-demand and statistical information display are some of the highlights of these applications.
We describe G-Space, a straightforward linear time layout algorithm that draws undirected graphs based purely on their topological features. The algorithm is divided into two phases. The first phase is an embedding of...
详细信息
ISBN:
(纸本)9780819469816
We describe G-Space, a straightforward linear time layout algorithm that draws undirected graphs based purely on their topological features. The algorithm is divided into two phases. The first phase is an embedding of the graph into a 2-D plane using the graph-theoretical distances as coordinates. These coordinates are computed with the same process used by HDE (High-Dimensional Embedding) algorithms. In our case we do a Low-Dimensional Embedding (LDE), and directly map the graph distances into a two dimensional geometric space. The second phase is the resolution of the many-to-one mappings that frequently occur within the low dimensional embedding. The resulting layout appears to have advantages over existing methods: it can be computed rapidly, and it can be used to answer topological questions quickly and intuitively.
Although information visualization technologies are indispensable in complex dataanalysis, wide-spread tools still need to be developed, as successful information visualization applications often require domain-speci...
详细信息
ISBN:
(纸本)9783540881919
Although information visualization technologies are indispensable in complex dataanalysis, wide-spread tools still need to be developed, as successful information visualization applications often require domain-specific customization. In this paper we introduce a software framework JSNVA for network visual analysis in different applications. JSNVA has a clear architecture and supports a more systematic way of implementing different straight-line graph drawing algorithms which show different networks on different views. JSNVA can be used as a front-end for visualization and a back-end for analysis in applications, and it can be customized for different applications. To evaluate JSNVA, we will give its applications in different graph mining tasks. Through visual analyzing these networks by different interactive visualization techniques and algorithms, we can get their underlying structure intuitively and quickly.
Exploratory data mining is fundamental to fostering an appreciation of complex datasets. For large and continuously growing datasets, such as obtained by regular sampling of an organisation's communications, the e...
详细信息
The multi views analysis and design of information is one of the key contents of Personalization Set-vice of Document Information Technology. The programming with architecture of Model-View-Controller shows the separa...
详细信息
ISBN:
(纸本)9787121074370
The multi views analysis and design of information is one of the key contents of Personalization Set-vice of Document Information Technology. The programming with architecture of Model-View-Controller shows the separation of data operation and data display. This architecture not only can be used in the visible programming, but also visible component to deal with their individual business. This article discussed on the function and relationship of each part in the WC structure from two aspects-complete executable program and visual component object, explaining how did the system structure apply in information visualizationanalysis and design by using information multi-view design example.
Multidimensional scaling is a technique for exploratory analysis of multidimensional data widely usable in different applications. By means of this technique the image points in a low-dimensional embedding space can b...
详细信息
作者:
Ho, QuanJern, Mikael
Department of Science and Technology University of Linkoping Norrkoping Sweden
In this paper, we extend our generic "GeoAnalytics" visualization (GAV) component toolkit, based on the principles behind Visual Analytics (VA), to also support time-oriented, geographically referenced and m...
详细信息
Today's complex networks with their large traffic volume and increased malicious activity, make intrusion detection awareness difficult. The traditional analyst-based review of stand-alone intrusion detection syst...
详细信息
ISBN:
(纸本)9781906638009
Today's complex networks with their large traffic volume and increased malicious activity, make intrusion detection awareness difficult. The traditional analyst-based review of stand-alone intrusion detection system (IDS) alerts is rapidly exceeding human capability. Several different areas of research focus on reducing the number of alerts. One example would be the reduction of the number of false positive alerts generated by these IDS tools. However, the number of alerts remains large. Recent research focuses on aggregating alerts for a single tool or even the fusion of data between alerts from multiple tools and system logs, all with the goal of reducing duplicates and shortening the analysis loop across different tool sets. The research in this paper targets this fused set of alerts and log entries as our basis for developing interactive visualizations. This fused data is an aggregation of several sources providing more "information" than the raw alert data. The presence of "information" allows our visualizations to provide the analyst with more context and knowledge than traditional IDS-ievel datavisualizations such as parallel axis plots, etc. Providing both increased context and interaction for data exploration enables an analyst to achieve increased situational awareness quicker and easier. Linking multiple views of the information to maintain focus and context allows the analyst to see not only malicious activity, but also what assets are affected and where activities may be directed next. The traditional approach of an analyst working in isolation with a single tool's output and then passing brief reports to others to correlate are limiting activities. Synergistic visualizations of the network data aggregated from alerts and logs can lead to the elimination of an entire layer or phase of analysis operations. visualizations of the fused data allow direct analysis across tools thus improving the analysis process.
暂无评论