Envisioning User Access to a Large Data Archive
نویسندگان
چکیده
We are overwhelmed by the vast amounts of data accumulating daily. The extraction of information from online data sources is becoming more and more difficult. For example, if a query to a large archive returns hundreds of “hits”, the most effective presentation is probably not a list of items, but some other type of graphical display. The concept of spatialization offers a promising potential to overcome the current impediments of retrieving items from large volume archives. Spatialization involves effective combination of powerful scientific visualization techniques with spatial metaphors that represent data that are not necessarily spatial in nature. Familiar spatial concepts such as distance and direction, scale, arrangement etc. which are part of the human experience in everyday life, are applied to create lower-dimensional digital representations of complex digital data. Skupin and Buttenfield (1996;1997) have demonstrated how spatial metaphors can be constructed for abstract information spaces. However, as these authors (1996: 616) point out, there has not yet been any subject testing to determine the appropriateness of such methods for visualization. We are not certain how people comprehend spatialized views, or whether the components of distance, direction and so forth are understood by viewers. This paper presents an experimental design to explore how spatialized views are understood by users. Subject testing procedures on graphical displays are outlined, which include the collection of performance measures on information retrieval tasks. The experimental application will rely on data collected from the Alexandria Digital Library Project.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملتشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی
Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...
متن کاملImage information mining: tools for interactive value adding on large remote sensing data sets
We present an intelligent satellite information mining system, a next generation architecture to help a user to rapidly gather information about courses of action, a tool to add value and to manage the huge amounts of historical and newly acquired satellite data-sets by giving to experts access to relevant information in an understandable and directly usable form and to provide friendly interfa...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملToward Practical Private Access to Data Centers via Parallel ORAM
Recent events have shown online service providers the perils of possessing private information about users. Encrypting data mitigates but does not eliminate this threat: the pattern of data accesses still reveals information. Thus, we present Shroud, a general storage system that hides data access patterns from the servers running it, protecting user privacy. Shroud functions as a virtual disk ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997