{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:33Z","timestamp":1750307073893,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T00:00:00Z","timestamp":1350259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,15]]},"DOI":"10.1145\/2379690.2379698","type":"proceedings-article","created":{"date-parts":[[2012,10,4]],"date-time":"2012-10-04T20:18:52Z","timestamp":1349381932000},"page":"56-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Visualizing distributed memory computations with hive plots"],"prefix":"10.1145","author":[{"given":"Sophie","family":"Engle","sequence":"first","affiliation":[{"name":"University of San Francisco, San Francisco, CA"}]},{"given":"Sean","family":"Whalen","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY"}]}],"member":"320","published-online":{"date-parts":[[2012,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375935.1375938"},{"key":"e_1_3_2_1_3_1","first-page":"309","volume-title":"Proceedings of the 8th European Symposium on Research in Computer Security","author":"Axelsson S.","year":"2003","unstructured":"S. Axelsson . Visualization for Intrusion Detection: Hooking the Worm . In Proceedings of the 8th European Symposium on Research in Computer Security , pages 309 -- 325 , 2003 . S. Axelsson. Visualization for Intrusion Detection: Hooking the Worm. In Proceedings of the 8th European Symposium on Research in Computer Security, pages 309--325, 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2005.47"},{"key":"e_1_3_2_1_5_1","volume-title":"DARPA High Productivity Computing Systems","author":"Colella P.","year":"2004","unstructured":"P. Colella . Defining Software Requirements for Scientific Computing. Technical report , DARPA High Productivity Computing Systems , 2004 . P. Colella. Defining Software Requirements for Scientific Computing. Technical report, DARPA High Productivity Computing Systems, 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"No Starch Press","author":"Conti G.","year":"2007","unstructured":"G. Conti . Security Data Visualization: Graphical Techniques for Network Analysis . No Starch Press , 2007 . G. Conti. Security Data Visualization: Graphical Techniques for Network Analysis. No Starch Press, 2007."},{"key":"e_1_3_2_1_7_1","volume-title":"Inter Journal Complex Systems","author":"Csardi G.","year":"2006","unstructured":"G. Csardi and T. Nepusz . The igraph Software Package for Complex Network Research . Inter Journal Complex Systems , 2006 . G. Csardi and T. Nepusz. The igraph Software Package for Complex Network Research. Inter Journal Complex Systems, 2006."},{"key":"e_1_3_2_1_8_1","volume-title":"Briefings in Bioinformatics","author":"Krzywinski M.","year":"2011","unstructured":"M. Krzywinski , I. Birol , S. J. M. Jones , and M. A. Marra . Hive Plots -- Rational Approach to Visualizing Networks . Briefings in Bioinformatics , 2011 . M. Krzywinski, I. Birol, S. J. M. Jones, and M. A. Marra. Hive Plots -- Rational Approach to Visualizing Networks. Briefings in Bioinformatics, 2011."},{"key":"e_1_3_2_1_9_1","first-page":"197","volume-title":"M\u00fcller. Visualization of Anomaly Detection Using Prediction Sensitivity. In Proceedings of Sicherheit 2005","author":"Laskov P.","year":"2005","unstructured":"P. Laskov , K. Rieck , C. Sch\u00e4fer , and K.- R. M\u00fcller. Visualization of Anomaly Detection Using Prediction Sensitivity. In Proceedings of Sicherheit 2005 , pages 197 -- 208 , 2005 . P. Laskov, K. Rieck, C. Sch\u00e4fer, and K.-R. M\u00fcller. Visualization of Anomaly Detection Using Prediction Sensitivity. In Proceedings of Sicherheit 2005, pages 197--208, 2005."},{"key":"e_1_3_2_1_10_1","volume-title":"Lessons from Three Views of the Internet Topology. Technical report","author":"Mahadevan P.","year":"2005","unstructured":"P. Mahadevan , D. Krioukov , M. Fomenkov , B. Huffaker , X. Dimitropoulos , K. Claffy , and A. Vahdat . Lessons from Three Views of the Internet Topology. Technical report , Coorperative Association for Internet Data Analysis , 2005 . P. Mahadevan, D. Krioukov, M. Fomenkov, B. Huffaker, X. Dimitropoulos, K. Claffy, and A. Vahdat. Lessons from Three Views of the Internet Topology. Technical report, Coorperative Association for Internet Data Analysis, 2005."},{"key":"e_1_3_2_1_11_1","volume-title":"The Visual Display of Quantitative Information","author":"Tufte E.","year":"2001","unstructured":"E. Tufte . The Visual Display of Quantitative Information . Graphics Press , 2 nd edition, 2001 . E. Tufte. The Visual Display of Quantitative Information. Graphics Press, 2nd edition, 2001.","edition":"2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1990.10474926"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342012436618"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 1st International Workshop on Characterizing Applications for Heterogeneous Exascale Systems","author":"Whalen S.","year":"2011","unstructured":"S. Whalen , S. Peisert , and M. Bishop . Network-Theoretic Classification of Parallel Computation Patterns . In Proceedings of the 1st International Workshop on Characterizing Applications for Heterogeneous Exascale Systems , 2011 . S. Whalen, S. Peisert, and M. Bishop. Network-Theoretic Classification of Parallel Computation Patterns. In Proceedings of the 1st International Workshop on Characterizing Applications for Heterogeneous Exascale Systems, 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-98141-3","volume-title":"Elegant Graphics for Data Analysis","author":"Wickham H.","year":"2009","unstructured":"H. Wickham . ggplot2 : Elegant Graphics for Data Analysis . Springer New York , 2009 . H. Wickham. ggplot2: Elegant Graphics for Data Analysis. Springer New York, 2009."},{"key":"e_1_3_2_1_16_1","volume-title":"The Grammar of Graphics","author":"Wilkinson L.","year":"2005","unstructured":"L. Wilkinson . The Grammar of Graphics . Springer , 2 nd edition, 2005 . L. Wilkinson. The Grammar of Graphics. Springer, 2nd edition, 2005.","edition":"2"},{"key":"e_1_3_2_1_17_1","first-page":"1249","volume-title":"Proceedings of the 12th IEEE International Conference on Fuzzy Systems","author":"Xin J.","year":"2003","unstructured":"J. Xin , J. E. Dickerson , and J. A. Dickerson . Fuzzy Feature Extraction and Visualization for Intrusion Detection . In Proceedings of the 12th IEEE International Conference on Fuzzy Systems , pages 1249 -- 1254 , 2003 . J. Xin, J. E. Dickerson, and J. A. Dickerson. Fuzzy Feature Extraction and Visualization for Intrusion Detection. In Proceedings of the 12th IEEE International Conference on Fuzzy Systems, pages 1249--1254, 2003."}],"event":{"name":"VizSec '12: 2012 Symposium on Visualization for Cyber Security","acronym":"VizSec '12","location":"Seattle Washington USA"},"container-title":["Proceedings of the Ninth International Symposium on Visualization for Cyber Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379690.2379698","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2379690.2379698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:33:57Z","timestamp":1750239237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379690.2379698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,15]]},"references-count":16,"alternative-id":["10.1145\/2379690.2379698","10.1145\/2379690"],"URL":"https:\/\/doi.org\/10.1145\/2379690.2379698","relation":{},"subject":[],"published":{"date-parts":[[2012,10,15]]},"assertion":[{"value":"2012-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}