Professor Phil Legg Phil.Legg@uwe.ac.uk
Professor in Cyber Security
Quasi-Hamming distances: An overarching concept for measuring glyph similarity
Legg, Philip A.; Maguire, Eamonn; Walton, Simon; Chen, Min
Authors
Eamonn Maguire
Simon Walton
Min Chen
Abstract
In many applications of spatial or temporal visualization, glyphs provide an effective means for encoding mul- tivariate data objects. However, because glyphs are typically small, they are vulnerable to various perceptual errors. In data communication, the concept of Hamming distance underpins the study of codes that support error detection and correction by the receiver without the need for corroboration from the sender. In this extended abstract, we outline a novel concept of quasi-Hamming distance in the context of glyph design. We discuss the feasibility of estimating quasi-Hamming distance between a pair of glyphs, and the minimal Hamming distance for a glyph set. This measurement enables glyph designers to determine the differentiability between glyphs, facilitating design optimization by maximizing distances between glyphs under various constraints (e.g., the available number of visual channels and their encoding bandwidth).
Citation
Legg, P. A., Maguire, E., Walton, S., & Chen, M. (2015, September). Quasi-Hamming distances: An overarching concept for measuring glyph similarity. Paper presented at EGUK Computer Graphics and Visual Computing 2015, UCL, London, UK
Presentation Conference Type | Conference Paper (unpublished) |
---|---|
Conference Name | EGUK Computer Graphics and Visual Computing 2015 |
Conference Location | UCL, London, UK |
Start Date | Sep 16, 2015 |
End Date | Sep 17, 2015 |
Publication Date | Sep 1, 2015 |
Publicly Available Date | Mar 29, 2024 |
Peer Reviewed | Peer Reviewed |
Keywords | quasi-Hamming distances, glyph similarity |
Public URL | https://uwe-repository.worktribe.com/output/829197 |
Publisher URL | http://cgvc15.cs.ucl.ac.uk/ |
Additional Information | Title of Conference or Conference Proceedings : EGUK Computer Graphics and Visual Computing 2015 |
Files
Hamming.pdf
(1.2 Mb)
PDF
You might also like
Analyst-driven XAI for time series forecasting: Analytics for telecoms maintenance
(2024)
Conference Proceeding
Improving search space analysis of fuzzing mutators using cryptographic structures
(2023)
Conference Proceeding
Longitudinal risk-based security assessment of docker software container images
(2023)
Journal Article
Teaching offensive and defensive cyber security in schools using a Raspberry Pi Cyber Range
(2023)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search