Abstract
Human pattern recognition skills are remarkable and in many situations far exceed the ability of automated mining algorithms. By building domain-specific interfaces that present information visually, we can combine human detection with machines' far greater computational capacity. We illustrate our ideas by describing a suite of visual interfaces we built for telephone fraud detection.
Similar content being viewed by others
References
Antis, Jacqueline M., Eick, Stephen G., and Pyrce, John D. 1996. Visualizing the structure of relational databases. IEEE Software, 72–79.
Ball, Thomas A. and Eick, Stephen G. 1996. Software visualization in the large. IEEE Computer, 29(4):33–43.
Battista, G. Di, Eades, P., Tamassia, R., and Tollis, I.G. 1994. Algorithms for drawing graphs: An annotated bibliography. Computational Geometry Theory and Applications, 4:235–282.
Becker, Richard A., Eick, Stephen G., and Wilks, Allan R. 1995. Visualizing network data. IEEE Transactions on Visualization and Computer Graphics, 1(1):16–28.
Eick, Stephen G. and Fyock, Daniel E. 1996. Visualizing corporate data. AT&T Technical Journal, 75(1):74–86.
Eick, Stephen G. and Wills, Graham J. 1993. Navigating large networks with hierarchies. In Visualization '93 Conference Proceedings, San Jose, California, pp. 204–210.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Cox, K.C., Eick, S.G., Wills, G.J. et al. Brief Application Description; Visual Data Mining: Recognizing Telephone Calling Fraud. Data Mining and Knowledge Discovery 1, 225–231 (1997). https://doi.org/10.1023/A:1009740009307
Issue Date:
DOI: https://doi.org/10.1023/A:1009740009307