Philip A. Legg
Glyph visualization: A fail-safe design scheme based on quasi-hamming distances
Legg, Philip A.; Legg, Philip; Maguire, Eamonn; Walton, Simon; Chen, Min
Authors
Professor Phil Legg Phil.Legg@uwe.ac.uk
Professor in Cyber Security
Eamonn Maguire
Simon Walton
Min Chen
Abstract
© 1981-2012 IEEE. In many spatial and temporal visualization applications, glyphs provide an effective means for encoding multivariate data. However, because glyphs are typically small, they are vulnerable to various perceptual errors. This article introduces the concept of a quasi-Hamming distance in the context of glyph design and examines the feasibility of estimating the quasi-Hamming distance between a pair of glyphs and the minimal Hamming distance for a glyph set. The authors demonstrate the design concept by developing a file-system event visualization that can depict the activities of multiple users.
Journal Article Type | Article |
---|---|
Acceptance Date | Apr 8, 2016 |
Publication Date | Mar 1, 2017 |
Deposit Date | Apr 11, 2016 |
Publicly Available Date | Jun 1, 2016 |
Journal | IEEE Computer Graphics and Applications |
Print ISSN | 0272-1716 |
Publisher | Institute of Electrical and Electronics Engineers |
Peer Reviewed | Peer Reviewed |
Volume | 37 |
Issue | 2 |
Pages | 31-41 |
DOI | https://doi.org/10.1109/MCG.2016.66 |
Keywords | glyph visualization, user perception, design study, file system visualization |
Public URL | https://uwe-repository.worktribe.com/output/1433990 |
Publisher URL | http://dx.doi.org/10.1109/MCG.2016.66 |
Additional Information | Additional Information : (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. |
Contract Date | Apr 11, 2016 |
Files
CG_CG&A-2015-11-0124.R2_Legg.pdf
(2.5 Mb)
PDF
You might also like
Visual analytics of e-mail sociolinguistics for user behavioural analysis
(2014)
Journal Article
Visualizing the insider threat: Challenges and tools for identifying malicious user activity
(2015)
Presentation / Conference Contribution
Quasi-Hamming distances: An overarching concept for measuring glyph similarity
(2015)
Presentation / Conference Contribution
Understanding insider threat: A framework for characterising attacks
(2014)
Presentation / Conference Contribution
Glyph sorting: Interactive visualization for multi-dimensional data
(2013)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search