EG UK Theory and Practice of Computer Graphics 2013
Permanent URI for this collection
Browse
Browsing EG UK Theory and Practice of Computer Graphics 2013 by Subject "Applications"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Geometry-based Algorithm for Detection of Asymmetric Tunnels in Protein Molecules(The Eurographics Association, 2013) Byska, Jan; Jurcik, Adam; Sochor, JirĂ; Silvester Czanner and Wen TangWe present a novel geometry-based method for computing asymmetric tunnels and voids in proteins, approximating their real shape with selected precision. Our method combines ideas from Voronoi and grid based approaches for protein analysis. We represent tunnels in protein using voxel data grid which allows us to store their shape more accurately. Our algorithm employs a tunnel skeleton computed using Voronoi diagram. The skeleton allows us to perform grid computation in a bounded space, with lower time and memory demands, and easily identify and measure individual tunnels.Item NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data(The Eurographics Association, 2013) Nicholls, James; Peters, Dominik; Slawinski, Albert; Spoor, Thomas; Vicol, Sergiu; Happa, Jassim; Goldsmith, Michael; Creese, Sadie; Silvester Czanner and Wen TangComputer network traffic visualizations deliver improved understanding of pattern-of-life for networks, and such enhanced awareness can facilitate the detection of malicious traffic. Existing tools often opt for graph or plotbased visualizations to detect patterns or outliers in the data, but they still largely provide segmented views. In this paper we present a novel framework designed to support multiple heterogeneous visualizations of network traffic data. NetVis enables different visualizations that work in tandem to provide different perspectives of the same data in real-time. As each visualization is modularly tied together, it enables a user to investigate on-going activity, or any subset of it, at their pace and based on their priorities for further exploration. We currently support six visualizations, three are new and three are based on existing literature (parallel coordinate plots, flowscan and spinning cube of potential doom). Our results show that it is possible to use NetVis to detect unusual activity such as cyber attacks on a network. The framework is written to allow future visualizations to be added straightforwardly.