Professor Phil Legg Phil.Legg@uwe.ac.uk
Professor in Cyber Security
Quasi-Hamming distances: An overarching concept for measuring glyph similarity
Legg, Philip A.; Maguire, Eamonn; Walton, Simon; Chen, Min
Authors
Eamonn Maguire
Simon Walton
Min Chen
Abstract
In many applications of spatial or temporal visualization, glyphs provide an effective means for encoding mul- tivariate data objects. However, because glyphs are typically small, they are vulnerable to various perceptual errors. In data communication, the concept of Hamming distance underpins the study of codes that support error detection and correction by the receiver without the need for corroboration from the sender. In this extended abstract, we outline a novel concept of quasi-Hamming distance in the context of glyph design. We discuss the feasibility of estimating quasi-Hamming distance between a pair of glyphs, and the minimal Hamming distance for a glyph set. This measurement enables glyph designers to determine the differentiability between glyphs, facilitating design optimization by maximizing distances between glyphs under various constraints (e.g., the available number of visual channels and their encoding bandwidth).
Presentation Conference Type | Conference Paper (unpublished) |
---|---|
Conference Name | EGUK Computer Graphics and Visual Computing 2015 |
Start Date | Sep 16, 2015 |
End Date | Sep 17, 2015 |
Publication Date | Sep 1, 2015 |
Publicly Available Date | Jun 6, 2019 |
Peer Reviewed | Peer Reviewed |
Keywords | quasi-Hamming distances, glyph similarity |
Public URL | https://uwe-repository.worktribe.com/output/829197 |
Publisher URL | http://cgvc15.cs.ucl.ac.uk/ |
Additional Information | Title of Conference or Conference Proceedings : EGUK Computer Graphics and Visual Computing 2015 |
Files
Hamming.pdf
(1.2 Mb)
PDF
You might also like
Visual analytics of e-mail sociolinguistics for user behavioural analysis
(2014)
Journal Article
Visualizing the insider threat: Challenges and tools for identifying malicious user activity
(2015)
Presentation / Conference Contribution
Understanding insider threat: A framework for characterising attacks
(2014)
Presentation / Conference Contribution
Glyph sorting: Interactive visualization for multi-dimensional data
(2013)
Journal Article
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
(2015)
Presentation / Conference Contribution
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search