skip to main content
10.1145/1268517.1268554acmotherconferencesArticle/Chapter ViewAbstractPublication PagesgiConference Proceedingsconference-collections
Article

Progressive multiples for communication-minded visualization

Published:28 May 2007Publication History

ABSTRACT

This paper describes a communication-minded visualization called progressive multiples that supports both the forensic analysis and presentation of multidimensional event data. We combine ideas from progressive disclosure, which reveals data to the user on demand, and small multiples [21], which allows users to compare many images at once. Sets of events are visualized as timelines. Events are placed in temporal order on the x-axis, and a scalar dimension of the data is mapped to the y-axis. To support forensic analysis, users can pivot from an event in an existing timeline to create a new timeline of related events. The timelines serve as an exploration history, which has two benefits. First, this exploration history allows users to backtrack and explore multiple paths. Second, once a user has concluded an analysis, these timelines serve as the raw visual material for composing a story about the analysis. A narrative that conveys the analytical result can be created for a third party by copying and reordering timelines from the history. Our work is motivated by working with network security administrators and researchers in political communication. We describe a prototype that we are deploying with administrators and the results of a user study where we applied our technique to the visualization of a simulated epidemic.

References

  1. Abdullah, K., C. Lee, G. Conti, and J. A. Copeland. Visualizing network data for intrusion detection. IEEE Information Assurance Workshop, 2005. pp. 100--08, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  2. Abdullah, K., C. P. Lee, G. Conti, J. A. Copeland, and J. Stasko. IDS RainStorm: Visualizing IDS alarms. IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05). pp. 1--10, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ahlberg, C. and B. Shneiderman. Visual information seeking using the FilmFinder. Conference on Human Factors in Computing Systems: ACM Press New York, NY, USA. pp. 433--34, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Becker, R. A. and W. S. Cleveland. Brushing Scatterplots. Technometrics 29(2): JSTOR. pp. 127--42, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Becker, R. A., S. G. Eick, and A. R. Wilks. Visualizing network data. IEEE Transactions on Visualization and Computer Graphics 1(1). pp. 16--28, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Chi, E. H. H., P. Barry, J. Riedl, and J. Konstan. A spreadsheet approach to information visualization. Information Visualization, 1997. Proceedings., IEEE Symposium on. pp. 17--24, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cox, K. C. and S. G. Eick. Case study: 3D displays of Internet traffic. Proceedings of INFOVIS 1995. pp. 129--31, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Fails, J. A., A. Karlson, L. Shahamat, and B. Shneiderman. A Visual Interface for Multivariate Temporal Data: Finding Patterns of Events over Time. In Proceedings of IEEE Symposium on Visual Analytics Science and Technology (VAST '06), 2006.Google ScholarGoogle Scholar
  9. Goodall, J. R., W. G. Lutters, P. Rheingans, and A. Komlodi. Preserving the Big Picture: Visual Network Traffic Analysis with TNV. IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05). 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Goodall, J. R., A. A. Ozok, W. G. Lutters, and A. Komlodi. A user-centered approach to visualizing network traffic for intrusion detection. Conference on Human Factors in Computing Systems: ACM Press New York, NY, USA. pp. 1403--06, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Groth, D. P. and K. Streefkerk. Provenance and Annotation for Visual Exploration Systems. IEEE Transactions on Visualization and Computer Graphics 12(6), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hochheiser, H. and B. Shneiderman. Dynamic query tools for time series data sets: Timebox widgets for interactive exploration. Information Visualization 3. pp. 1--18, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jankun-Kelly, T. J., K. L. Ma, and M. Gertz. A model for the visualization exploration process. Proceedings of the IEEE Conference on Visualization. pp. 323--30, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Lakkaraju, K., W. Yurcik, and A. J. Lee. NVisionIP: netflow visualizations of system state for security situational awareness. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security: ACM Press New York, NY, USA. pp. 65--72, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Munzner, T., E. Hoffman, K. Claffy, and B. Fenner. Visualizing the global topology of the MBone. Proceedings of IEEE Symposium on Information Visualization, San Francisco, California, USA, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Phan, D., L. Xiao, R. Yeh, P. Hanrahan, and T. Winograd. Flow Map Layout. IEEE Symposium on Information Visualization, 2005. INFOVIS 2005. pp. 219--24, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Plaisant, C., B. Milash, A. Rose, S. Widoff, and B. Shneiderman. LifeLines: visualizing personal histories. Proceedings of the SIGCHI conference on Human factors in computing systems: common ground: ACM Press New York, NY, USA, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Rao, R. and S. K. Card. The table lens: merging graphical and symbolic representations in an interactive focus+ context visualization for tabular information. Proceedings of the SIGCHI conference on Human factors in computing systems: celebrating interdependence: ACM Press New York, NY, USA. pp. 318--22, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Ren, P., Y. Gao, Z. Li, Y. Chen, and B. Watson. IDGraphs: Intrusion Detection and Analysis Using Histographs. In Proceedings of Workshop of Visualization for Computer Security, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Stolte, C., D. Tang, and P. Hanrahan. Polaris: A System for Query, Analysis, and Visualization of Multidimensional Relational Databases. IEEE Transactions on Visualization and Computer Graphics 8(1). pp. 52--65, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Tufte, E. R., Envisioning Information: Graphics Press 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Tukey, J. W., Exploratory data analysis: Addison-Wesley Menlo Park, CA 1977.Google ScholarGoogle Scholar
  23. Viégas, F. and M. Wattenberg. Communication-Minded Visualization: A Call to Action. IBM Systems Journal 45(4), 2006.Google ScholarGoogle Scholar
  24. Yin, X., W. Yurcik, M. Treaster, Y. Li, and K. Lakkaraju. VisFlowConnect: netflow visualizations of link relationships for security situational awareness. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security: ACM Press New York, NY, USA. pp. 26--34, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    GI '07: Proceedings of Graphics Interface 2007
    May 2007
    352 pages
    ISBN:9781568813370
    DOI:10.1145/1268517

    Copyright © 2007 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 28 May 2007

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate206of508submissions,41%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader