Social networks collected by historians or sociologists typically have a large number of attributes associated with their actors, and applying analysis algorithms to these networks will produce additional attributes such as degree, centrality, and clustering coefficients. Understanding the effects of this plethora of graph attributes is one of the main challenges in multivariate social networks. [...]
A new interactive application written by the giCentre uses live data from the Barclays Cycle Hire scheme to reveal patterns in docking station use across London.
BikeGrid uses spatial treemaps to show the last 24 hours use of all London docking stations in a grid.
To use the BikeGrid application, find out where bikes and spaces are available across London and explore spatio-temporal patterns in recent cycle usage, go to [...]
How visualization helps to coordinate firefighting
The large and ever-increasing amounts of time-varying and geospatial digital weather information related to emergency scenarios that must be accessible to the public represent a major research challenge.
A need to analyze and make decisions, often in time-critical situations, demand interactive web-enabled visualization tools that can aid the user to explore, communicate and publish visually large geo-information spaces. In this context, we introduce a web-enabled application for road weather visualization, a tool for analyzing and communicating information about road weather conditions particularly during the Swedish winter months.
In the VAST Challenge 2009 suspicious behavior had to be detected applying visual analytics to heterogeneous data, such as network traffic, social network enriched with geo-spatial attributes, and finally video surveillance data. This paper describes some of the awarded parts from our solution entry.
Harald Bosch, Julian Heinrichm, Benjamin Höferlin, Markus Höferlin, Steffen Koch, Christoph Müller, Guido Reina, Michael Wörner Description The VAST 2009 Challenge consisted of three heterogeneous synthetic data sets organized into separate mini-challenges with minimal correspondence information. The challenge task was the identiﬁcation of a suspected data theft from cyber and real-world traces. The grand challenge [...]