Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1268517.1268554acmotherconferencesArticle/Chapter ViewAbstractPublication PagesgiConference Proceedingsconference-collections
Article

Progressive multiples for communication-minded visualization

Published: 28 May 2007 Publication History

Abstract

This paper describes a communication-minded visualization called progressive multiples that supports both the forensic analysis and presentation of multidimensional event data. We combine ideas from progressive disclosure, which reveals data to the user on demand, and small multiples [21], which allows users to compare many images at once. Sets of events are visualized as timelines. Events are placed in temporal order on the x-axis, and a scalar dimension of the data is mapped to the y-axis. To support forensic analysis, users can pivot from an event in an existing timeline to create a new timeline of related events. The timelines serve as an exploration history, which has two benefits. First, this exploration history allows users to backtrack and explore multiple paths. Second, once a user has concluded an analysis, these timelines serve as the raw visual material for composing a story about the analysis. A narrative that conveys the analytical result can be created for a third party by copying and reordering timelines from the history. Our work is motivated by working with network security administrators and researchers in political communication. We describe a prototype that we are deploying with administrators and the results of a user study where we applied our technique to the visualization of a simulated epidemic.

References

[1]
Abdullah, K., C. Lee, G. Conti, and J. A. Copeland. Visualizing network data for intrusion detection. IEEE Information Assurance Workshop, 2005. pp. 100--08, 2005.
[2]
Abdullah, K., C. P. Lee, G. Conti, J. A. Copeland, and J. Stasko. IDS RainStorm: Visualizing IDS alarms. IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05). pp. 1--10, 2005.
[3]
Ahlberg, C. and B. Shneiderman. Visual information seeking using the FilmFinder. Conference on Human Factors in Computing Systems: ACM Press New York, NY, USA. pp. 433--34, 1994.
[4]
Becker, R. A. and W. S. Cleveland. Brushing Scatterplots. Technometrics 29(2): JSTOR. pp. 127--42, 1987.
[5]
Becker, R. A., S. G. Eick, and A. R. Wilks. Visualizing network data. IEEE Transactions on Visualization and Computer Graphics 1(1). pp. 16--28, 1995.
[6]
Chi, E. H. H., P. Barry, J. Riedl, and J. Konstan. A spreadsheet approach to information visualization. Information Visualization, 1997. Proceedings., IEEE Symposium on. pp. 17--24, 1997.
[7]
Cox, K. C. and S. G. Eick. Case study: 3D displays of Internet traffic. Proceedings of INFOVIS 1995. pp. 129--31, 1995.
[8]
Fails, J. A., A. Karlson, L. Shahamat, and B. Shneiderman. A Visual Interface for Multivariate Temporal Data: Finding Patterns of Events over Time. In Proceedings of IEEE Symposium on Visual Analytics Science and Technology (VAST '06), 2006.
[9]
Goodall, J. R., W. G. Lutters, P. Rheingans, and A. Komlodi. Preserving the Big Picture: Visual Network Traffic Analysis with TNV. IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05). 2005.
[10]
Goodall, J. R., A. A. Ozok, W. G. Lutters, and A. Komlodi. A user-centered approach to visualizing network traffic for intrusion detection. Conference on Human Factors in Computing Systems: ACM Press New York, NY, USA. pp. 1403--06, 2005.
[11]
Groth, D. P. and K. Streefkerk. Provenance and Annotation for Visual Exploration Systems. IEEE Transactions on Visualization and Computer Graphics 12(6), 2006.
[12]
Hochheiser, H. and B. Shneiderman. Dynamic query tools for time series data sets: Timebox widgets for interactive exploration. Information Visualization 3. pp. 1--18, 2004.
[13]
Jankun-Kelly, T. J., K. L. Ma, and M. Gertz. A model for the visualization exploration process. Proceedings of the IEEE Conference on Visualization. pp. 323--30, 2002.
[14]
Lakkaraju, K., W. Yurcik, and A. J. Lee. NVisionIP: netflow visualizations of system state for security situational awareness. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security: ACM Press New York, NY, USA. pp. 65--72, 2004.
[15]
Munzner, T., E. Hoffman, K. Claffy, and B. Fenner. Visualizing the global topology of the MBone. Proceedings of IEEE Symposium on Information Visualization, San Francisco, California, USA, 1996.
[16]
Phan, D., L. Xiao, R. Yeh, P. Hanrahan, and T. Winograd. Flow Map Layout. IEEE Symposium on Information Visualization, 2005. INFOVIS 2005. pp. 219--24, 2005.
[17]
Plaisant, C., B. Milash, A. Rose, S. Widoff, and B. Shneiderman. LifeLines: visualizing personal histories. Proceedings of the SIGCHI conference on Human factors in computing systems: common ground: ACM Press New York, NY, USA, 1996.
[18]
Rao, R. and S. K. Card. The table lens: merging graphical and symbolic representations in an interactive focus+ context visualization for tabular information. Proceedings of the SIGCHI conference on Human factors in computing systems: celebrating interdependence: ACM Press New York, NY, USA. pp. 318--22, 1994.
[19]
Ren, P., Y. Gao, Z. Li, Y. Chen, and B. Watson. IDGraphs: Intrusion Detection and Analysis Using Histographs. In Proceedings of Workshop of Visualization for Computer Security, 2005.
[20]
Stolte, C., D. Tang, and P. Hanrahan. Polaris: A System for Query, Analysis, and Visualization of Multidimensional Relational Databases. IEEE Transactions on Visualization and Computer Graphics 8(1). pp. 52--65, 2002.
[21]
Tufte, E. R., Envisioning Information: Graphics Press 1990.
[22]
Tukey, J. W., Exploratory data analysis: Addison-Wesley Menlo Park, CA 1977.
[23]
Viégas, F. and M. Wattenberg. Communication-Minded Visualization: A Call to Action. IBM Systems Journal 45(4), 2006.
[24]
Yin, X., W. Yurcik, M. Treaster, Y. Li, and K. Lakkaraju. VisFlowConnect: netflow visualizations of link relationships for security situational awareness. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security: ACM Press New York, NY, USA. pp. 26--34, 2004.

Cited By

View all
  • (2022)VBridge: Connecting the Dots Between Features and Data to Explain Healthcare ModelsIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2021.311483628:1(378-388)Online publication date: 1-Jan-2022
  • (2019)progViz: Visualizing Patient Journeys Based on Finite State Models2019 23rd International Conference Information Visualisation (IV)10.1109/IV.2019.00075(405-410)Online publication date: Jul-2019
  • (2019)Understanding Partitioning and Sequence in Data-Driven StorytellingInformation in Contemporary Society10.1007/978-3-030-15742-5_32(327-338)Online publication date: 13-Mar-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
GI '07: Proceedings of Graphics Interface 2007
May 2007
352 pages
ISBN:9781568813370
DOI:10.1145/1268517
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • CHCCS: The Canadian Human-Computer Communications Society

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 May 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. communication-minded visualization
  2. permutation matrices
  3. small multiples
  4. time-series data

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 206 of 508 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)VBridge: Connecting the Dots Between Features and Data to Explain Healthcare ModelsIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2021.311483628:1(378-388)Online publication date: 1-Jan-2022
  • (2019)progViz: Visualizing Patient Journeys Based on Finite State Models2019 23rd International Conference Information Visualisation (IV)10.1109/IV.2019.00075(405-410)Online publication date: Jul-2019
  • (2019)Understanding Partitioning and Sequence in Data-Driven StorytellingInformation in Contemporary Society10.1007/978-3-030-15742-5_32(327-338)Online publication date: 13-Mar-2019
  • (2016)A Survey on Information Visualization for Network and Service ManagementIEEE Communications Surveys & Tutorials10.1109/COMST.2015.245053818:1(285-323)Online publication date: Sep-2017
  • (2014)Using visualizations to monitor changes and harvest insights from a global-scale logging infrastructure at Twitter2014 IEEE Conference on Visual Analytics Science and Technology (VAST)10.1109/VAST.2014.7042487(113-122)Online publication date: Oct-2014
  • (2014)DecisionFlow: Visual Analytics for High-Dimensional Temporal Event Sequence DataIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2014.234668220:12(1783-1792)Online publication date: 31-Dec-2014
  • (2014)Enhanced Timeline Analysis for Digital Forensic InvestigationsInformation Security Journal: A Global Perspective10.1080/19393555.2014.89740123:1-2(32-44)Online publication date: 1-Jan-2014
  • (2012)TimeSliceProceedings of the International Working Conference on Advanced Visual Interfaces10.1145/2254556.2254639(433-436)Online publication date: 21-May-2012
  • (2012)A Framework for Enhanced Timeline Analysis in Digital ForensicsProceedings of the 2012 IEEE International Conference on Green Computing and Communications10.1109/GreenCom.2012.50(253-256)Online publication date: 20-Nov-2012
  • (2011)LifeFlowProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/1978942.1979196(1747-1756)Online publication date: 7-May-2011
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media