Visualization techniques have proven to be critical in helping crime analysis. By interviewing and observing Criminal Intelligence Officers (CIO) and civilian crime analysts at th...
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
Consumer Generated Medias (CGMs) -- such as blogs, news forums, message boards, and web pages -- are emerging as locations where consumers trade, discuss and influence each other...
Amit Behal, Julia Grace, Linda Kato, Ying Chen, Sh...
SeismoSpin is a novel interactive instrument designed around a “Disc-Jockey/mixer” metaphor that gives seismologists a quick and powerful way to explore earthquake data. The c...
Mark McKelvin, Ragnhild Nestande, Leticia Valdez, ...
To date, efforts have been made to enable visually impaired people to gain access to graphics on the Internet. However, these studies only offer a solution for a specific type of ...