Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrative visual analytics for suspicious behavior detection., , , , , , , and . IEEE VAST, page 253-254. IEEE Computer Society, (2009)BANKSAFE: A visual situational awareness tool for large-scale computer networks: VAST 2012 challenge award: Outstanding comprehensive submission, including multiple vizes., , , and . IEEE VAST, page 257-258. IEEE Computer Society, (2012)Pixnostics: Towards Measuring the Value of Visualization., , and . IEEE VAST, page 199-206. IEEE Computer Society, (2006)Using visual analytics to provide situation awareness for movement and communication data., , , and . VAST, page 121-122. IEEE Computer Society, (2015)A Novel Approach to Mining Travel Sequences Using Collections of Geotagged Photos., , and . AGILE Conf., page 163-182. Springer, (2010)Scalable Pixel-based Visual Interfaces: Challenges and Solutions., , , and . IV, page 32-38. IEEE Computer Society, (2006)Visualization of Geo-spatial Point Sets via Global Shape Transformation and Local Pixel Placement., , , and . IEEE Trans. Vis. Comput. Graph., 12 (5): 749-756 (2006)Automated Analytical Methods to Support Visual Exploration of High-Dimensional Data., , , , , , and . IEEE Trans. Vis. Comput. Graph., 17 (5): 584-597 (2011)Spatiotemporal Analysis of Sensor Logs using Growth Ring Maps., , , and . IEEE Trans. Vis. Comput. Graph., 15 (6): 913-920 (2009)The Role of Uncertainty, Awareness, and Trust in Visual Analytics., , , , and . IEEE Trans. Vis. Comput. Graph., 22 (1): 240-249 (2016)