WEBVIZ: A TOOL FOR WORLD-WIDE WEB ACCESS LOG ANALYSIS
|
|
|
- Nicholas Gilbert
- 10 years ago
- Views:
Transcription
1 WEBVIZ: A TOOL FOR WORLD-WIDE WEB ACCESS LOG ANALYSIS James E. Pitkow & Krishna A. Bharat Graphics, Visualization and Usability Center College of Computing Georgia Institute of Technology Atlanta, GA {pitkow, kb}@cc.gatech.edu ABSTRACT Various programs have emerged that provide statistical analysis of World-Wide Web (WWW) access logs. These programs typically detail the number of accesses for a file, the number of times a site has visited the database, and some programs even provide temporal analysis of requests 1. However, these programs are not interactive nor do they provide visualizations of the local database. WebViz was developed with the intention of providing WWW database maintainers and designers with a graphical view of their local database and access patterns. That is, by incorporating the Web-Path paradigm into interactive software, users can see not only the documents (represented visually as nodes) in their database but also the hyperlinks travelled (represented visually as links) by users requesting documents from the database. WebViz further enables uses to selectively filter the access log (i.e. restrict the graphical view by specifying the desired domain names or DSN numbers, directory names, and start and stop times), control bindings to graph attributes (i.e. node size, border width and color as well as link width and color can be bound to frequency and recency information), play back the events in the access log (i.e. re-issue the logged sequence of requests), select a layout of nodes and links that best presents the database s structure, and examine the graph at any instant in time. Clearly, WebViz is a useful WWW database utility given that it can provide the user with graphical information about document accesses and the paths taken by users through the database. Such analyses can facilitate structural and contextual changes resulting in a more efficient use of the document space. This paper details the implementation of WebViz and outlines possible future extensions. KEYWORDS visualization, HTTP, administration, tools, statistics, access logs INTRODUCTION World-Wide Web (WWW) database developers, designers, and maintainers have a potentially formable task in analyzing the overall efficiency of their database. Following in the footsteps of the all-too-common end-user question: Where am I? [Nielson, 1990], comes the database-provider question: How are people using our database? The latter question requires analyses of the structure of the hyperlinks as well as the content of the documents in the database. The end products of such analyses might include 1) the frequency of visits per document, 2) the most recent visit per document, 3) who is visiting which document, 4) the frequency of use of each hyperlink and 5) the most recent use of each hyperlink. Granted, this list does not include all potentially useful analyses; rather, it provides a starting point for the development of tools to provide such functionality. Towards this end, we developed a C++ visualization tool (running on SunOS and X) called WebViz. The next section describes the underlying concept of WebViz, the Web-Path paradigm. WEB-PATH PARADIGM Collections of hypertext documents can be categorized by the underlying topology of links and nodes [Parunak, 1989]. WWW databases are intrinsically directed cyclic graphs. This can be thought of as a web-like structure. Yet most WWW databases reside on file systems that are explicitly hierarchical, e.g. UNIX TM, Macintosh, VAX, etc. As a result of this incongruence, problems can arises when one attempts to view such databases. WebViz tackles this problem by displaying the database as a directed graph 2, with nodes representing separate documents in the database and links representing the hyperlinks, or paths, between documents. When a user travels from a source document to a separate destination document via the hyperlink embedded in the source document, a path is said to have been taken 3. This path corresponds to the user clicking on the anchor 1. For the purposes of this paper, the terms accesses and document requests will be used interchangeably. 2. The screen capture presented does not display arrows at the end of links. The data structure WebViz uses, however contains directional information. Arrows are soon to be implemented.
2 Site Site Site Known URL Known URLs Known URLs HyperLink (used) HyperLink (not used) HyperLink (not used) DOCUMENT A DOCUMENT B DOCUMENT A DOCUMENT B DOCUMENT A DOCUMENT B CASE ONE Figure 1: Three different access patterns CASE TWO CASE THREE point and retrieving the anchor (See Case One in Figure 1). We refer to this scenario as internal referencing (point of origin coming from within the database). Note that since WWW enables users to enter a database via any document (via a known Uniform Resource Locator, or URL [Berners-Lee 1994]), causality between successive document requests is not always decidable. That is, even though there may exist a path between document A and document B and the access log records a request for document A followed by a request for document B from the same site, it remains a possibility that 1) the user at the site knew the location of both document A and document B and requested each file separately (See Case Two in Figure 1), or 2) there were two different users logged onto the same site who happened to request document A and document B individually and in that order (See Case Three in Figure 1). That is the users did not click on the hyperlink in A to get to B. We refer to these scenarios as external referencing (point of origin exists outside the database) and dual referencing (points of origin in same address space). Even though the possibility of other cases exists, WebViz assumes the Case One scenario for successive document requests. It is this assumption that underlies the algorithm for determining the paths taken by users in the access log. WebViz uses the Web-Path paradigm to display the relations between the access log and the local database. Specifically, the program displays the documents of the local database and the connections between the documents as a web-like graph structure. Information is gathered from the access log about the number of times documents have been accessed as well as the recency of these accesses. WebViz further infers 3. This contrasts to hyperlinks which point to different location with in the same document. WebViz does not analyze such information since such events are not captured by Hypertext Transfer Protocol (HTTP) servers. paths travelled by users by assuming that successive accesses by each user were internally referenced. The number of times paths were taken as well as the recency of the traversals are also collected by WebViz for display. To recap, WebViz visualizes the collection of hypertext documents as a directed cyclic graph. The links in this web-like structure are referred to as paths, and represent the hyperlinks between documents. Nodes represent separate documents. Documents connected by hyperlinks can be successively accessed either internally or externally. By utilizing the Web-Path paradigm, WebViz collects frequency and recency information about documents and paths to drive the visualization. We now move onto an explanation of how WebViz creates the visualization. The following sections are arranged in the order that each stage is invoked during program execution. INITIALIZATION WebViz currently parses the National Center for Supercomputing Application s (NCSA) Hypertext Transfer Protocol (HTTP) 1.0 server access logs. As demonstrated by other access log analyzers, writing separate parsing routines for other HTTP servers is trivial. The sample access log entries below shows that the time of access, the machine name (either hostname or DSN), and requested file are logged for each transaction. foo.gatech.edu [Tue Mar 8 10:50: ] GET /gvu/intro_gvu.html HTTP/ [Tue Mar 8 10:51: ] GET /gvu/agenda.html HTTP/1.0 bar.gatech.edu [Tue Mar 8 10:52: ] GET /gvu/agenda_more.html HTTP/1.0 Initially, lookups tables of hostname to DSN and DSN to hostname mappings are read into two separate hash tables. The intent here is to reduce the time consuming task of looking up a machine s DSN or hostname, since the log can con-
3 Figure 2: The View Control Window tain either type of entry (see above example). Hence, the process of looking up hostnames and DSN numbers, which is network dependent and therefore potentially prohibitively slow, is done precisely once for each machine in the access log. Next, the specified access log is read into memory into a structure we refer to as the Master Log. With each transaction read, the hash tables are first consulted to see if the mapping is know and as a last resort, attempts the look up using the appropriate system calls. Once the entire access log has been processed, the time of the first and last entry can be extracted from the Master Log for use in the View Control Window. The View Control Window (see Figure 2) enables the user to determine the content of the visualization. Controls are provided the facilitate the selection of specific directories, domain names, and start and stop times. The directory selection allows for an arbitrary number of directories to be added to the visualization. As in the above example, lets assume that the user only wants to view the access patterns of the softviz and people directories, the person would add those directories to the selection list. This permits the user to restrict the contents of the web to only include the files within the specified directories, hence avoiding visualizing unnecessary files and directories. Internally referenced documents are also added to the web, though we plan to make it an option to exclude such connections from the visualization. Thus, even though the user may requests to see only access patterns from a specific directory, additional files from other directories may be included into the visualization; however, embedded media (images, sounds, etc.) are not added. Similarly, the domain selector enables the user to restrict the visualization to only machines that have accessed the database whose hostname or DSN contain the specified substring. This allows the end user to look at the access patterns from local machines, machines from specific companies, etc. (In the above example, we have restricted the view to three companies, two specified by hostname and the other by DSN). Clearly, unless complete or nearly complete DSNs are used, ambiguous results will occur, i.e. numerous machines will match and their all accesses will end up in the visualization. Finally, the user can control the start and stop times used for the visualization. Hence, peak periods can be isolated just as easily as longer periods of time for analysis. To summarize, all the variable attributes recorded in the access log (time, machine making request, and requested file) are subject to user filtering. Once the user has finished determining the view, the specifications are used to create a copy of the Master Log. This copy, called the View List, contains only the entries from the Master Log that the user desires to visualize. While this list provides enough information to determine the number of visits to a file and the times the file was accessed, it does not provide the when and the number of times the path was travelled. This information is gathered by creating an Edge List that contains the source file, the destination file, the access times for both files, and the DSN of the machine traversing the path. A previously stated, an path is considered to have been travelled if there exists a path in the web and the same machine is making the successive requests, disregarding the possibility of external references (Case Two of Figure 1) Figure 3: The WebViz Control Window
4 and dual references (Case Three of Figure 1). We do place a time constraint on the interval between accesses of three days. That is, if the interval is greater than three days, we assume the user requested the document via another hyperlink than the one embedded in the source document. The selection of the three day period was not based on any empirical evidence. Next, the local database is processed. LOCAL DATABASE PROCESSING The local database is processed to ascertain the structure of the web. The files in the database are processed one at a time, with processing proceeding recursively through the file system hierarchy. For each file being processed, if a corresponding node does not already exist in the web, a node is added. Currently, each node contains the file s name, size, and last modification time, though additional information like owner, number and type of embedded media, etc. could be added to facilitate more sophisticated analyses. Files that do not contain Hypertext Markup Language (HTML) are not processed or added to the web at this stage. This decision reflects the implicit assigning of roles in HTML. That is, marked-up files act as either end documents or as intermediary documents with paths to other documents, while non HTML files can only assume end document roles. For each marked-up file, the contents are parsed and the URLs that point within the database are extracted, with relatively addressed URLs are simplified into their full path names. If a node does not already exist for the file, a node is created and inserted into the web. Regardless of document type, a link is added from the processed document to the anchor, since it can be referenced internally and hence of possible analytical interest. At the end of the local database processing stage, the structure of the web has been defined as is ready to be displayed. GRAPH LAYOUT Graph layout is an arduous task in any setting - more so in WebViz since there are multiple, possibly conflicting interests: Clarity: The layout must make good use of the available space to present the information in an easy to read fashion. Occlusion of nodes by other nodes or edges should be avoided. Natural Structure: Hierarchical graphs present a natural structure for embedding. The hierarchy in the web ought to mirrors the file system hierarchy of the database as far as possible. Presentation: The graph must look presentable. Centering, regular spacing between nodes, staggering of nodes to avoid collinearity contribute to this end. A good presentation will minimize the lengths of edges in the Figure 4: WebViz Screen Dump
5 graph. This may be incompatible with a hierarchical embedding since home directories which tend to be high up in the hierarchy have plenty of back edges and are best placed near the center of the graph. A good layout will try and do justice to all these criteria in a judicious fashion. Since there is no clear optimization criterion many schemes are possible [Rivlin, 1994; Parunak, 1989]. The one we adopt presently is a randomized scheme with greedy placement of nodes. Besides being computationally cheap and easy to implement, the randomization has an added benefit. If a certain embedding is not found satisfactory the scheme can generate a new graph for the user s consideration. Specifically, our algorithm is as follows: 1. For each node we compute its depth in the UNIX TM file system hierarchy and use it to sort the nodes. Nodes are embedded in decreasing order of depth. As a result nodes that are high up in the hierarchy and have a lot of references will be placed close to their natural position. 2. The available screen space is partitioned into compartments of uniform size. The number of compartments is of the same order as the number of nodes in the graph. Each compartment will hold at most one of the nodes to be embedded. Note that the partitioning problem is a more complicated in 2D than it is in 1D. 3. Compartments are staggered at regular intervals in the X and Y direction to prevent collinearity. 4. For each node, twenty random empty compartments are sampled. The node is embedded in the compartment which minimizes a penalty function. The penalty function weights the following criteria: a) The Euclidean distance from the vertical line that partitions the screen space into two halves. Note that his criterion tries to keep the nodes close to the center of the screen. b) The Euclidean distance from a horizontal line that represents the natural position of nodes for the given depth value. This helps place nodes close to their natural position in the file system hierarchy. c) The Euclidean distance from all adjacent nodes that have already been embedded. This minimizes the length of edges, i.e. this function attempts to clusters associated nodes. 5. When the graph is drawn, edges (presently straight) are drawn before nodes to prevent occlusion. Occlusion of nodes by other nodes is avoided by the compartment scheme which also ensures moderately good usage of the available space. The embedding produced by this scheme seems balanced and presentable. However, there is always room for other scheme, e.g. a tiered scheme that strictly follows the file system hierarchy or a scheme that minimizes edge intersections (see Future Work section below). We have used straight edges rather than curved edges to simplify picking and speed-up redraw, since the graph needs to redrawn for animation, as edges change thickness and color with the passage of time. VISUAL MAPPING Eventually in a visualization, data (processed or raw) needs to be mapped to visual (or audio) parameters. In our case the visual parameters are the thickness and color of nodes and links. We render labels in a fixed color to maintain readability. Thickness has a low resolution (4 levels currently) while color provides a much richer level of detail. The two parameters in each case are mapped to the either recency or frequency of access. Formally: 1. The recency of access of a node (link) is the time elapsed since the last access (traversal) of the node (link). 2. The frequency of access of a node (link) is the number of accesses (traversals) it has suffered since the beginning of the simulation expressed as a percentage of the maximum number of accesses (traversals) of any node (link) in the graph. Since frequency and recency ranges tend to be large and it is desirable that the sensitivity of the mapping be greater for small values than larger values, we use a quasi-logarithmic function to map from four data ranges called Quartiles to the visual parameter range. Recency Quartile Frequency 0-60 secs First % 1-60 mins Second 50-21% 1-24 hrs Third 20-6% > 1 day Fourth 6-0% Table 1: Quartile Mappings for Recency and Frequency To simplify computation we use a piecewise-linear curve, consisting of four linear segments. In the case of recency we map the real-time duration since the last access to the visual parameter. In case of frequency it is the number of accesses expressed as percentage of the maximum number of accesses in the log. The four quartiles are mapped to colors as shown in Figure 5. This intuitively mimics the non-linear cooling curve of a hot body; from white hot to yellow hot through red hot to blue. The initial variation is rapid and corresponds to the first quartile. The variation slows down gradually and never quite reaches the end of the 4th quartile. For the 4th Quartile we need a finite and reasonable upper bound to get some variation. Values larger than the upper bound map to the end of the 4th Quartile.
6 R G 1st Quartile (WhiteYellow) 2ndQuartile (Yellow-Red) 3rd Quartile (Red-Magenta) 4th Quartile (Magenta-Blue) Temporal manipulation is achieved by either the slider or by the playback controls. The slider enables the user to select a time to be displayed. the playback controls starting and pausing the re-issuing of the events in the access log. Currently the playback is not synchronized with real-time. The simulation takes discrete steps forward in simulation time, and renders views of the graph in sequence. We are considering making the playback adaptive so that it completes in a user-specified interval of time. B FUTURE WORK Figure 5: Color Map Organization In the case of thickness, the thickness values 4, 3, 2 and 1 correspond to the quartiles 1, 2, 3 and 4 respectively. Given the mappings in Table 1, we can understand the relationship between the visual attributes of nodes and links and their access history. A white-hot body is intuitively one that has just been touched (if color is mapped to recency) or very frequently accessed (if color is mapped to frequency). A blue-body was touched a long time ago (if color is mapped to recency) or very infrequently (if color is mapped to frequency). In the case of recency there is a real-world correspondence. A white-hot body must have been touched within the last minute. A blue body on the other hand is one that has not been touched for at least a day. Thickness and color are typically mapped to separate quantities. If they are mapped to the same quantity we get redundancy, which can be beneficial too. Redundancy can help reinforce the expressiveness of the graph. Now that the steps leading to and the mechanisms behind the visualization have been explained, we next discuss the actual visualization. THE VISUALIZATION The visualization is composed of two separate windows, the WebViz Control Window (see Figure 3) and the actual display window (see Figure 4 4 ). The former provides the user with controls to adjust the bindings (the left-most buttons), select a specific time to view (the Percent Complete slider), control the animation (the play and pause icons), and rearrange the layout (the right-most button). The node and link binding buttons can be bound to either frequency or recency information. In Figure 3, the configuration is such that a node s width corresponds to how often the document was accessed and the node s color corresponds to the recency of the node s last access. Similarly, a link s width represents recency and the link s width represents frequency. The user can adjust these bindings as well as change the layout at time. Given an embedding on the screen the user can select a node or a link to get information about it. 4. WebViz displays are color. Unfortunately, the conversion process to incorporate the images into this document degraded the quality of the images, i.e. the screen capture of the display window looks dramatically different in paper than on screen. While WebViz achieves the goal of being a tool for WWW access log visualization, extensions to the interface, layout, and available analyses will make WebViz more robust. With respect to the View Control Window interface, we intend to create a timeline widget with two sliders and a rescale option to enable better time manipulation. Also, the directory and domain selectors could use some refinement. The WebViz Control Window needs controls for varying the speed of the simulation well adjusting the amount of time used to advance each frame. Clearly, since the current layout scheme does not allow for different layouts to be reproduced, mechanisms that enable the user to add and deleted preferred layouts will be developed. Along these lines, we are currently experimenting with additional layout methods. These include 1) a hierarchical layout that mirrors the organization of the database for a file system perspective, 2) a derivative of the multi dimensional scaling node placement algorithm [Eick, 1993], 3) a layout that uses a node s relative out centrality (ROC) as the primary placement determinant [Rivlin, 1994], and others. Direct manipulation of a node s placement will be added for all selected layout algorithms. We are also experimenting with more sophisticated analyses. For instance, while it is useful to know how many times documents have been accesses and when, presenting the access information based upon what s hot and what s not, (i.e. collapsing the recency and frequency information for each document and path into a quantitizable number), might also prove useful. This type of information answers the question: What is the most popular document at a given moment? To implement this, we are considering adding a connectionist form of short term memory, most likely a gamma based memory [Mozer, 1993]. We are also curious as to the predictive nature of this architecture. Another tools under consideration is based upon initial evidence that the most frequently and recently accessed documents in a given time window (i.e. day 0 through day 7) will be accessed on the day immediately following the time window (i.e. day 8) [Recker, 1994; Anderson, 1991]. Hence, once the access pattern has been established for a database, subsequent access could be compared to the expected value and displayed as positive/negative deviations. Finally, given that all salient information is readily available, WebViz can provided tab delineated file dumps for use by spreadsheets and graphing software. Hence, users can get output for specific files, paths, time intervals, etc. in a point
7 and click manner. While other access log analyzers provide similar functionality as far as document accesses, WebViz provides path analysis in an interactive environment. Thus, users can visualize the data and isolate specific patterns before deciding upon dumping to file for close inspection. CONCLUSIONS Motivated by providing useful analyses of WWW access logs, we developed WebViz. Towards this end, we enable database designers and maintainers to visualize the database s document space and re-issue events from the access log. By providing the user with controls to adjust the bindings properties of nodes and links, access patterns can be inferred. These accesses patterns can contribute to structural and contextual changes in the database. ACKNOWLEDGEMENTS The authors extend their appreciation to the Graphics, Visualization, and Usability Center and its members for their support and assistance, especially John Stasko. REFERENCES Anderson, John R. & Schooler, Lael J. (1991) Reflection of the environment in memory. American Psychological Society, 2, Berners-Lee, T. (1994) Uniform Resource Locators. Internet Engineering Task Force Working Draft, 21 March URL:ftp://ds.internic.net/internet-drafts/ draft-ietf-uri-url-03.txt Eick, Stephen G. & Willis, Graham J. (1993) Navigating large networks with hierarchies. Proceedings of IEEE Visualization Conference, Nielson, Jakob. (1990) The art of navigating through hypertext. Communications of the ACM 33, Mozer, Michael C. (1993) In A. S. Weigend & N. A. Gershenfeld (Eds.). SFI Studies in the Sciences of Complexity, Proc. Vol XV. Addison-Wesley. Parunak, H. Van Dyke. (1989) Hypermedia topologies and user navigation. Hypertext 89 Proceedings Recker, Margaret M. & PItkow, James E. (in preparation) Predicting document access in large, multimedia repositories: a www case study. Rivlin, Ehud & Botafogo, Rodrigo & Shneiderman, Ben. (1994). Navigating in hyperspace: designing a structure-based toolbox. Communications of the ACM 37,
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
TIBCO Spotfire Business Author Essentials Quick Reference Guide. Table of contents:
Table of contents: Access Data for Analysis Data file types Format assumptions Data from Excel Information links Add multiple data tables Create & Interpret Visualizations Table Pie Chart Cross Table Treemap
NS DISCOVER 4.0 ADMINISTRATOR S GUIDE. July, 2015. Version 4.0
NS DISCOVER 4.0 ADMINISTRATOR S GUIDE July, 2015 Version 4.0 TABLE OF CONTENTS 1 General Information... 4 1.1 Objective... 4 1.2 New 4.0 Features Improvements... 4 1.3 Migrating from 3.x to 4.x... 5 2
GAZETRACKERrM: SOFTWARE DESIGNED TO FACILITATE EYE MOVEMENT ANALYSIS
GAZETRACKERrM: SOFTWARE DESIGNED TO FACILITATE EYE MOVEMENT ANALYSIS Chris kankford Dept. of Systems Engineering Olsson Hall, University of Virginia Charlottesville, VA 22903 804-296-3846 [email protected]
SAS BI Dashboard 3.1. User s Guide
SAS BI Dashboard 3.1 User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2007. SAS BI Dashboard 3.1: User s Guide. Cary, NC: SAS Institute Inc. SAS BI Dashboard
Modeling Guidelines Manual
Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe [email protected] Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.
Course Information Course Number: IWT 1229 Course Name: Web Development and Design Foundation
Course Information Course Number: IWT 1229 Course Name: Web Development and Design Foundation Credit-By-Assessment (CBA) Competency List Written Assessment Competency List Introduction to the Internet
Multimedia Applications. Mono-media Document Example: Hypertext. Multimedia Documents
Multimedia Applications Chapter 2: Basics Chapter 3: Multimedia Systems Communication Aspects and Services Chapter 4: Multimedia Systems Storage Aspects Chapter 5: Multimedia Usage and Applications Documents
MyOra 3.0. User Guide. SQL Tool for Oracle. Jayam Systems, LLC
MyOra 3.0 SQL Tool for Oracle User Guide Jayam Systems, LLC Contents Features... 4 Connecting to the Database... 5 Login... 5 Login History... 6 Connection Indicator... 6 Closing the Connection... 7 SQL
Data Visualization. Brief Overview of ArcMap
Data Visualization Prepared by Francisco Olivera, Ph.D., P.E., Srikanth Koka and Lauren Walker Department of Civil Engineering September 13, 2006 Contents: Brief Overview of ArcMap Goals of the Exercise
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
Software Metrics & Software Metrology. Alain Abran. Chapter 4 Quantification and Measurement are Not the Same!
Software Metrics & Software Metrology Alain Abran Chapter 4 Quantification and Measurement are Not the Same! 1 Agenda This chapter covers: The difference between a number & an analysis model. The Measurement
Data Visualization. Prepared by Francisco Olivera, Ph.D., Srikanth Koka Department of Civil Engineering Texas A&M University February 2004
Data Visualization Prepared by Francisco Olivera, Ph.D., Srikanth Koka Department of Civil Engineering Texas A&M University February 2004 Contents Brief Overview of ArcMap Goals of the Exercise Computer
TIBCO Spotfire Metrics Modeler User s Guide. Software Release 6.0 November 2013
TIBCO Spotfire Metrics Modeler User s Guide Software Release 6.0 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
an introduction to VISUALIZING DATA by joel laumans
an introduction to VISUALIZING DATA by joel laumans an introduction to VISUALIZING DATA iii AN INTRODUCTION TO VISUALIZING DATA by Joel Laumans Table of Contents 1 Introduction 1 Definition Purpose 2 Data
Enriched Links: A Framework For Improving Web Navigation Using Pop-Up Views
Enriched Links: A Framework For Improving Web Navigation Using Pop-Up Views Gary Geisler Interaction Design Laboratory School of Information and Library Science University of North Carolina at Chapel Hill
Recording Supervisor Manual Presence Software
Presence Software Version 9.2 Date: 09/2014 2 Contents... 3 1. Introduction... 4 2. Installation and configuration... 5 3. Presence Recording architectures Operating modes... 5 Integrated... with Presence
Creating Basic Custom Monitoring Dashboards Antonio Mangiacotti, Stefania Oliverio & Randy Allen
Creating Basic Custom Monitoring Dashboards by Antonio Mangiacotti, Stefania Oliverio & Randy Allen v1.1 Introduction With the release of IBM Tivoli Monitoring 6.3 and IBM Dashboard Application Services
Interactive Graphic Design Using Automatic Presentation Knowledge
Interactive Graphic Design Using Automatic Presentation Knowledge Steven F. Roth, John Kolojejchick, Joe Mattis, Jade Goldstein School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213
HOW TO LINK AND PRESENT A 4D MODEL USING NAVISWORKS. Timo Hartmann [email protected]
Technical Paper #1 HOW TO LINK AND PRESENT A 4D MODEL USING NAVISWORKS Timo Hartmann [email protected] COPYRIGHT 2009 VISICO Center, University of Twente [email protected] How to link and present
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
TIBCO Spotfire Network Analytics 1.1. User s Manual
TIBCO Spotfire Network Analytics 1.1 User s Manual Revision date: 26 January 2009 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
Chapter-1 : Introduction 1 CHAPTER - 1. Introduction
Chapter-1 : Introduction 1 CHAPTER - 1 Introduction This thesis presents design of a new Model of the Meta-Search Engine for getting optimized search results. The focus is on new dimension of internet
Graph Database Proof of Concept Report
Objectivity, Inc. Graph Database Proof of Concept Report Managing The Internet of Things Table of Contents Executive Summary 3 Background 3 Proof of Concept 4 Dataset 4 Process 4 Query Catalog 4 Environment
Cloud UC Call Recording Interface in SAP dashboard
FUSION CLOUD UC CALL RECORDING ADMIN GUIDE Contents: INTRODUCTION...3 LOGGING ON...4 HOME TAB (DASHBOARD)...6 First Look...6 Calls by Category...8 Frequent Callers...9 Calls by Location... 10 Call Handler
EXPLORER AND REAL-TIME ANALYZER USER GUIDE
EXPLORER AND REAL-TIME ANALYZER USER GUIDE Websense Enterprise Websense Web Security Suite TM -including Corporate Edition v6.3 1996 2006, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd.,
Chapter 2: Getting Started
Chapter 2: Getting Started Once Partek Flow is installed, Chapter 2 will take the user to the next stage and describes the user interface and, of note, defines a number of terms required to understand
How to Configure a Stress Test Project for Microsoft Office SharePoint Server 2007 using Visual Studio Team Suite 2008.
How to Configure a Stress Test Project for Microsoft Office SharePoint Server 2007 using Visual Studio Team Suite 2008. 1 By Steve Smith, MVP SharePoint Server, MCT And Penny Coventry, MVP SharePoint Server,
Chapter 5. Regression Testing of Web-Components
Chapter 5 Regression Testing of Web-Components With emergence of services and information over the internet and intranet, Web sites have become complex. Web components and their underlying parts are evolving
Software Engineering
Software Engineering Lecture 06: Design an Overview Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 35 The Design Phase Programming in
Oracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
1 Log visualization at CNES (Part II)
1 Log visualization at CNES (Part II) 1.1 Background For almost 2 years now, CNES has set up a team dedicated to "log analysis". Its role is multiple: This team is responsible for analyzing the logs after
5.1 Features 1.877.204.6679. [email protected] Denver CO 80202
1.877.204.6679 www.fourwindsinteractive.com 3012 Huron Street [email protected] Denver CO 80202 5.1 Features Copyright 2014 Four Winds Interactive LLC. All rights reserved. All documentation
Visualizing e-government Portal and Its Performance in WEBVS
Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR [email protected] Abstract An e-government
Web Browsing Quality of Experience Score
Web Browsing Quality of Experience Score A Sandvine Technology Showcase Contents Executive Summary... 1 Introduction to Web QoE... 2 Sandvine s Web Browsing QoE Metric... 3 Maintaining a Web Page Library...
HOW TO START WORKING WITH P2WARE PROJECT MANAGER 7?
HOW TO START WORKING WITH P2WARE PROJECT MANAGER 7? This document contains introduction to P2ware Project Manager 7 views (P2ware Project Manager 7 walkthrough) and shows how to create high quality plans
JOOMLA 2.5 MANUAL WEBSITEDESIGN.CO.ZA
JOOMLA 2.5 MANUAL WEBSITEDESIGN.CO.ZA All information presented in the document has been acquired from http://docs.joomla.org to assist you with your website 1 JOOMLA 2.5 MANUAL WEBSITEDESIGN.CO.ZA BACK
MicroStrategy Analytics Express User Guide
MicroStrategy Analytics Express User Guide Analyzing Data with MicroStrategy Analytics Express Version: 4.0 Document Number: 09770040 CONTENTS 1. Getting Started with MicroStrategy Analytics Express Introduction...
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Configuration Manager
After you have installed Unified Intelligent Contact Management (Unified ICM) and have it running, use the to view and update the configuration information in the Unified ICM database. The configuration
orrelog Ping Monitor Adapter Software Users Manual
orrelog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:[email protected] CorreLog, Ping Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Access 2007 Creating Forms Table of Contents
Access 2007 Creating Forms Table of Contents CREATING FORMS IN ACCESS 2007... 3 UNDERSTAND LAYOUT VIEW AND DESIGN VIEW... 3 LAYOUT VIEW... 3 DESIGN VIEW... 3 UNDERSTAND CONTROLS... 4 BOUND CONTROL... 4
Kaldeera Workflow Designer 2010 User's Guide
Kaldeera Workflow Designer 2010 User's Guide Version 1.0 Generated May 18, 2011 Index 1 Chapter 1: Using Kaldeera Workflow Designer 2010... 3 1.1 Getting Started with Kaldeera... 3 1.2 Importing and exporting
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
Semantic Search in Portals using Ontologies
Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br
SAS BI Dashboard 4.3. User's Guide. SAS Documentation
SAS BI Dashboard 4.3 User's Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2010. SAS BI Dashboard 4.3: User s Guide. Cary, NC: SAS Institute
An Instructional Aid System for Driving Schools Based on Visual Simulation
An Instructional Aid System for Driving Schools Based on Visual Simulation Salvador Bayarri, Rafael Garcia, Pedro Valero, Ignacio Pareja, Institute of Traffic and Road Safety (INTRAS), Marcos Fernandez
Information Visualization of Attributed Relational Data
Information Visualization of Attributed Relational Data Mao Lin Huang Department of Computer Systems Faculty of Information Technology University of Technology, Sydney PO Box 123 Broadway, NSW 2007 Australia
Application Developer Guide
IBM Maximo Asset Management 7.1 IBM Tivoli Asset Management for IT 7.1 IBM Tivoli Change and Configuration Management Database 7.1.1 IBM Tivoli Service Request Manager 7.1 Application Developer Guide Note
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2
Welcome to icue! Version 4
Welcome to icue! Version 4 icue is a fully configurable teleprompter for ipad. icue can be used with an external monitor, controlled by remote and can easily share files in a variety of fashions. 1 of
ORACLE BUSINESS INTELLIGENCE WORKSHOP
ORACLE BUSINESS INTELLIGENCE WORKSHOP Creating Interactive Dashboards and Using Oracle Business Intelligence Answers Purpose This tutorial shows you how to build, format, and customize Oracle Business
STATGRAPHICS Online. Statistical Analysis and Data Visualization System. Revised 6/21/2012. Copyright 2012 by StatPoint Technologies, Inc.
STATGRAPHICS Online Statistical Analysis and Data Visualization System Revised 6/21/2012 Copyright 2012 by StatPoint Technologies, Inc. All rights reserved. Table of Contents Introduction... 1 Chapter
Contents WEKA Microsoft SQL Database
WEKA User Manual Contents WEKA Introduction 3 Background information. 3 Installation. 3 Where to get WEKA... 3 Downloading Information... 3 Opening the program.. 4 Chooser Menu. 4-6 Preprocessing... 6-7
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
An Introduction to KeyLines and Network Visualization
An Introduction to KeyLines and Network Visualization 1. What is KeyLines?... 2 2. Benefits of network visualization... 2 3. Benefits of KeyLines... 3 4. KeyLines architecture... 3 5. Uses of network visualization...
Paper 10-27 Designing Web Applications: Lessons from SAS User Interface Analysts Todd Barlow, SAS Institute Inc., Cary, NC
Paper 10-27 Designing Web Applications: Lessons from SAS User Interface Analysts Todd Barlow, SAS Institute Inc., Cary, NC ABSTRACT Web application user interfaces combine aspects of non-web GUI design
AXIGEN Mail Server Reporting Service
AXIGEN Mail Server Reporting Service Usage and Configuration The article describes in full details how to properly configure and use the AXIGEN reporting service, as well as the steps for integrating it
D1.1 Service Discovery system: Load balancing mechanisms
D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction
FastTrack Schedule 10. Tutorials Manual. Copyright 2010, AEC Software, Inc. All rights reserved.
FastTrack Schedule 10 Tutorials Manual FastTrack Schedule Documentation Version 10.0.0 by Carol S. Williamson AEC Software, Inc. With FastTrack Schedule 10, the new version of the award-winning project
Product Guide. Sawmill Analytics, Swindon SN4 9LZ UK [email protected] tel: +44 845 250 4470
Product Guide What is Sawmill Sawmill is a highly sophisticated and flexible analysis and reporting tool. It can read text log files from over 800 different sources and analyse their content. Once analyzed
File Management. Chapter 12
Chapter 12 File Management File is the basic element of most of the applications, since the input to an application, as well as its output, is usually a file. They also typically outlive the execution
What is Visualization? Information Visualization An Overview. Information Visualization. Definitions
What is Visualization? Information Visualization An Overview Jonathan I. Maletic, Ph.D. Computer Science Kent State University Visualize/Visualization: To form a mental image or vision of [some
An Interactive Visualization Tool for the Analysis of Multi-Objective Embedded Systems Design Space Exploration
An Interactive Visualization Tool for the Analysis of Multi-Objective Embedded Systems Design Space Exploration Toktam Taghavi, Andy D. Pimentel Computer Systems Architecture Group, Informatics Institute
http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
Microsoft Outlook 2010 Part 1: Introduction to Outlook
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2010 Part 1: Introduction to Outlook Spring 2012, Version 1.0 Table of Contents Introduction...3 Starting the
NVMS-1200. User Manual
NVMS-1200 User Manual Contents 1 Software Introduction... 1 1.1 Summary... 1 1.2 Install and Uninstall... 1 1.2.1 Install the Software... 1 2 Login Software... 3 2.1 Login... 3 2.2 Control Panel Instruction...
How To Run A Factory I/O On A Microsoft Gpu 2.5 (Sdk) On A Computer Or Microsoft Powerbook 2.3 (Powerpoint) On An Android Computer Or Macbook 2 (Powerstation) On
User Guide November 19, 2014 Contents 3 Welcome 3 What Is FACTORY I/O 3 How Does It Work 4 I/O Drivers: Connecting To External Technologies 5 System Requirements 6 Run Mode And Edit Mode 7 Controls 8 Cameras
Hierarchy and Tree Visualization
Hierarchy and Tree Visualization Definition Hierarchies An ordering of groups in which larger groups encompass sets of smaller groups. Data repository in which cases are related to subcases Hierarchical
Master Data Services Environment
Master Data Services Training Guide Master Data Services Environment Portions developed by Profisee Group, Inc. 2010 Microsoft Master Data Services Overview Master Data Services Implementation Master Data
Hamline University Administrative Computing Page 1
User Guide Banner Handout: BUSINESS OBJECTS ENTERPRISE (InfoView) Document: boxi31sp3-infoview.docx Created: 5/11/2011 1:24 PM by Chris Berry; Last Modified: 8/31/2011 1:53 PM Purpose:... 2 Introduction:...
CONCEPT-II. Overview of demo examples
CONCEPT-II CONCEPT-II is a frequency domain method of moment (MoM) code, under development at the Institute of Electromagnetic Theory at the Technische Universität Hamburg-Harburg (www.tet.tuhh.de). Overview
Cache Configuration Reference
Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...
Usage Analysis Tools in SharePoint Products and Technologies
Usage Analysis Tools in SharePoint Products and Technologies Date published: June 9, 2004 Summary: Usage analysis allows you to track how websites on your server are being used. The Internet Information
Web Design Competition 2013. College of Computing Science, Department of Information Systems. New Jersey Institute of Technology
COMPETITION PURPOSE The Web is the most transformable invention of our time. This competition features the creation of high-quality, well-designed and original Websites, while seeking to identify and encourage
Web Analysis Visualization Spreadsheet
Web Analysis Visualization Spreadsheet Ed Huai-hsin Chi Xerox Palo Alto Researh Center 3333 Coyote Hill Road Palo Alto, CA 94304 [email protected] Abstract In this paper, we present methods of information visualization
DESIGN A WEB SITE USING PUBLISHER Before you begin, plan your Web site
Page 1 of 22 DESIGN A WEB SITE USING PUBLISHER Before you begin, plan your Web site Before you create your Web site, ask yourself these questions: What do I want the site to do? Whom do I want to visit
IT Service Level Management 2.1 User s Guide SAS
IT Service Level Management 2.1 User s Guide SAS The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS IT Service Level Management 2.1: User s Guide. Cary, NC:
Ovation Operator Workstation for Microsoft Windows Operating System Data Sheet
Ovation Operator Workstation for Microsoft Windows Operating System Features Delivers full multi-tasking operation Accesses up to 200,000 dynamic points Secure standard operating desktop environment Intuitive
Model Simulation in Rational Software Architect: Business Process Simulation
Model Simulation in Rational Software Architect: Business Process Simulation Mattias Mohlin Senior Software Architect IBM The BPMN (Business Process Model and Notation) is the industry standard notation
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
MyOra 3.5. User Guide. SQL Tool for Oracle. Kris Murthy
MyOra 3.5 SQL Tool for Oracle User Guide Kris Murthy Contents Features... 4 Connecting to the Database... 5 Login... 5 Login History... 6 Connection Indicator... 6 Closing the Connection... 7 SQL Editor...
Create an Excel BI report and share on SharePoint 2013
2013 Create an Excel BI report and share on SharePoint 2013 Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web
Software Requirements Specification
METU DEPARTMENT OF COMPUTER ENGINEERING Software Requirements Specification SNMP Agent & Network Simulator Mustafa İlhan Osman Tahsin Berktaş Mehmet Elgin Akpınar 05.12.2010 Table of Contents 1. Introduction...
LetsVi: A Collaborative Video Editing Tool Based on Cloud Storage
LetsVi: A Collaborative Video Editing Tool Based on Cloud Storage Hyeong-Bae An Department of Electrical/Electronic and Computer Engineering, University of Ulsan, Nam-gu, Ulsan, South Korea. E-mail: [email protected]
Bitrix Site Manager 4.1. User Guide
Bitrix Site Manager 4.1 User Guide 2 Contents REGISTRATION AND AUTHORISATION...3 SITE SECTIONS...5 Creating a section...6 Changing the section properties...8 SITE PAGES...9 Creating a page...10 Editing
WebSphere Business Monitor
WebSphere Business Monitor Dashboards 2010 IBM Corporation This presentation should provide an overview of the dashboard widgets for use with WebSphere Business Monitor. WBPM_Monitor_Dashboards.ppt Page
E-mail Listeners. E-mail Formats. Free Form. Formatted
E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail
Toad for Oracle 8.6 SQL Tuning
Quick User Guide for Toad for Oracle 8.6 SQL Tuning SQL Tuning Version 6.1.1 SQL Tuning definitively solves SQL bottlenecks through a unique methodology that scans code, without executing programs, to
