Philip A. Legg
Glyph visualization: A fail-safe design scheme based on quasi-hamming distances
Legg, Philip A.; Legg, Philip; Maguire, Eamonn; Walton, Simon; Chen, Min
Authors
Abstract
© 1981-2012 IEEE. In many spatial and temporal visualization applications, glyphs provide an effective means for encoding multivariate data. However, because glyphs are typically small, they are vulnerable to various perceptual errors. This article introduces the concept of a quasi-Hamming distance in the context of glyph design and examines the feasibility of estimating the quasi-Hamming distance between a pair of glyphs and the minimal Hamming distance for a glyph set. The authors demonstrate the design concept by developing a file-system event visualization that can depict the activities of multiple users.
Citation
Legg, P. A., Legg, P., Maguire, E., Walton, S., & Chen, M. (2017). Glyph visualization: A fail-safe design scheme based on quasi-hamming distances. IEEE Computer Graphics and Applications, 37(2), 31-41. https://doi.org/10.1109/MCG.2016.66
Journal Article Type | Article |
---|---|
Acceptance Date | Apr 8, 2016 |
Publication Date | Mar 1, 2017 |
Journal | IEEE Computer Graphics and Applications |
Print ISSN | 0272-1716 |
Publisher | Institute of Electrical and Electronics Engineers |
Peer Reviewed | Peer Reviewed |
Volume | 37 |
Issue | 2 |
Pages | 31-41 |
DOI | https://doi.org/10.1109/MCG.2016.66 |
Keywords | glyph visualization, user perception, design study, file system visualization |
Public URL | https://uwe-repository.worktribe.com/output/1433990 |
Publisher URL | http://dx.doi.org/10.1109/MCG.2016.66 |
Additional Information | Additional Information : (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. |
Files
CG_CG&A-2015-11-0124.R2_Legg.pdf
(2.5 Mb)
PDF
You might also like
RicherPicture: Semi-automated cyber defence using context-aware data analytics
(2017)
Presentation / Conference
Visual analytics for non-expert users in cyber situation awareness
(2016)
Journal Article
Enhancing cyber situation awareness for non-expert users using visual analytics
(2016)
Presentation / Conference
Visualizing the insider threat: Challenges and tools for identifying malicious user activity
(2015)
Presentation / Conference