The first step of any information visualization system is to enable end user to import their dataset into the system. However, non expert user are faced to the difficult task of ch...
Abstract--This paper presents a survey of trajectory-based activity analysis for visual surveillance. It describes techniques that use trajectory data to define a general set of ac...
Background: When conducting multiple hypothesis tests, it is important to control the number of false positives, or the False Discovery Rate (FDR). However, there is a tradeoff be...
Understanding performance and related issues in a complex system requires analyzing where and why the program spends its resources. In a reactive system such as a interactive appl...
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...