Sciweavers

961 search results - page 63 / 193
» Visual Cryptography on Graphs
Sort
View
INFOVIS
2003
IEEE
15 years 7 months ago
EdgeLens: An Interactive Method for Managing Edge Congestion in Graphs
An increasing number of tasks require people to explore, navigate and search extremely complex data sets visualized as graphs. Examples include electrical and telecommunication ne...
Nelson Wong, M. Sheelagh T. Carpendale, Saul Green...
SOSYM
2010
107views more  SOSYM 2010»
15 years 23 days ago
A UML/OCL framework for the analysis of graph transformation rules
In this paper we present an approach for the analysis of graph transformation rules based on an intermediate OCL representation. We translate different rule semantics into OCL, to...
Jordi Cabot, Robert Clarisó, Esther Guerra,...
VLC
2008
191views more  VLC 2008»
15 years 2 months ago
Visual specification of measurements and redesigns for domain specific visual languages
Ensuring model quality is a key success factor in many computer science areas, and becomes crucial in recent software engineering paradigms like the one proposed by model-driven s...
Esther Guerra, Juan de Lara, Paloma Díaz
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
15 years 9 months ago
Algebraic visual analysis: the Catalano phone call data set case study
While many clever techniques have been proposed for visual analysis, most of these are “one of” and it is not easy to see how to combine multiple techniques. We propose an alg...
Anna A. Shaverdian, Hao Zhou, George Michailidis, ...
ENTCS
2006
116views more  ENTCS 2006»
15 years 2 months ago
Semantics of Visual Models in a Rule-based Setting
In this paper, some fundamental aspects of the semantics of rule-based systems are sketched and related to the semantics of visual models. A rule-based system comprises a set of r...
Hans-Jörg Kreowski, Karsten Hölscher, Pe...