Form-based visual programming languages, which include commercial spreadsheets and various research systems, have had a substantial impact on end-user computing. Research shows, h...
Gregg Rothermel, Lixin Li, Christopher DuPuis, Mar...
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
—Attention is an integral part of the human visual system and has been widely studied in the visual attention literature. The human eyes fixate at important locations in the scen...
Ajay K. Mishra, Yiannis Aloimonos, Loong Fah Cheon...
Most software development errors are caused by incorrect or ambiguous requirement specifications gathered during the requirement elicitation and analysis phase. For the past decad...
We present an open framework for visual mining of CVS software repositories. We address three aspects: data extraction, analysis and visualization. We first discuss the challenges...