IEEE Trans Vis Comput Graph
August 2024
Machine learning techniques are a driving force for research in various fields, from credit card fraud detection to stock analysis. Recently, a growing interest in increasing human involvement has emerged, with the primary goal of improving the interpretability of machine learning models. Among different techniques, Partial Dependence Plots (PDP) represent one of the main model-agnostic approaches for interpreting how the features influence the prediction of a machine learning model.
View Article and Find Full Text PDFIEEE Trans Vis Comput Graph
December 2022
RadViz contributes to multidimensional analysis by using 2D points for encoding data elements and interpreting them along the original data dimensions. For these characteristics it is used in different application domains, like clustering, anomaly detection, and software visualization. However, it is likely that using the dimension arrangement that comes with the data will produce a plot that leads users to make inaccurate conclusions about points values and data distribution.
View Article and Find Full Text PDFAnnu Int Conf IEEE Eng Med Biol Soc
July 2020
Due to the advent of novel technologies and digital opportunities allowing to simplify user lives, healthcare is increasingly evolving towards digitalization. This represent a great opportunity on one side but it also exposes healthcare organizations to multiple threats (both digital and not) that may lead an attacker to compromise the security of medial processes and potentially patients' safety. Today technical cybersecurity countermeasures are used to protect the confidentiality, integrity and availability of data and information systems - especially in the healthcare domain.
View Article and Find Full Text PDFVulnerabilities represent one of the main weaknesses of IT systems and the availability of consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for using them to compute the paths an attacker is likely to follow. However, even if patches are available, business constraints or lack of resources create obstacles to their straightforward application. As a consequence, the security manager of a network needs to deal with a large number of vulnerabilities, making decisions on how to cope with them.
View Article and Find Full Text PDFIEEE Trans Vis Comput Graph
July 2016
With today's technical possibilities, a stable visualization scenario can no longer be assumed as a matter of course, as underlying data and targeted display setup are much more in flux than in traditional scenarios. Incremental visualization approaches are a means to address this challenge, as they permit the user to interact with, steer, and change the visualization at intermediate time points and not just after it has been completed. In this paper, we put forward a model for incremental visualizations that is based on the established Data State Reference Model, but extends it in ways to also represent partitioned data and visualization operators to facilitate intermediate visualization updates.
View Article and Find Full Text PDFA home is smart when, being aware of its own state and that of its users, is capable of controlling itself in order to support the user wishes and thus improving their quality of life. This holds both for users with special needs and for those with ordinary domestic needs. In this paper, we overview the Smart Homes for All project which represents the current state of the art with respect to software control and user interfaces in the smart homes arena.
View Article and Find Full Text PDF