ABSTRACT
We explore people's activities in space and time by analysing publicly available georefenced photographs. We do this using KD-photomap, a web-based visual analytics system for exploring collections of Flickr photographs and meta-data associated with them. The system provides an interface for flexible browsing of photographs in search of interesting pictures, and places, and also a framework for exploration of presence and identification of events in space and time.
- I. Peca, H. Zhi, K. Vrotsou, N. Andrienko, and G. Andrienko. KD-Photomap: Exploring Photographs in Space and Time. In IEEE Symposium on Visual Analytics Science and Technology (poster), pages 289--290, Providence, RI, USA, 2011.Google Scholar
- D. J. Peuquet. It's About Time: A Conceptual Framework for the Representation of Temporal Dynamics in Geographic Information Systems. Annals of the Association of American Geographers, 84(3):441--461, 1994.Google ScholarCross Ref
Index Terms
- Interactive exploration of events and presence of people in space and time through KD-photomap
Recommendations
Strategies for interactive exploration of 3D flow using evenly-spaced illuminated streamlines
SCCG '03: Proceedings of the 19th Spring Conference on Computer GraphicsThis paper presents several strategies to interactively explore 3D flow. Based on a fast illuminated streamlines algorithm, standard graphics hardware is sufficient to gain interactive rendering rates. Our approach does not require the user to have any ...
Interactive Exploration of Implicit and Explicit Relations in Faceted Datasets
Many datasets, such as scientific literature collections, contain multiple heterogeneous facets which derive implicit relations, as well as explicit relational references between data items. The exploration of this data is challenging not only because ...
Interactive Exploration of Data Traffic with Hierarchical Network Maps
Network communication has become indispensable in business, education, and government. With the pervasive role of the Internet as a means of sharing information across networks, its misuse for destructive purposes, such as spreading malicious code, ...
Comments