{"title":"Visual exploration of large telecommunication data sets","authors":"D. Keim, E. Koutsofios, S. North","doi":"10.1109/UIDIS.1999.791458","DOIUrl":null,"url":null,"abstract":"Visual exploration of massive data sets arising in the telecommunication industry is a challenge. This paper describes a number of different techniques for visually exploring large data sets. The techniques cover a wide range of techniques, including statistical 2D displays, pixel-oriented displays, and dynamic 3D displays with variable resolution. The techniques have been successfully applied in the telecommunications industry to analyze call detail data for understanding customer behavior and preventing fraudulent usage, and to monitor network traffic for analyzing unexpected network events such as high volumes of unanswered calls.","PeriodicalId":319239,"journal":{"name":"Proceedings User Interfaces to Data Intensive Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings User Interfaces to Data Intensive Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UIDIS.1999.791458","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
Visual exploration of massive data sets arising in the telecommunication industry is a challenge. This paper describes a number of different techniques for visually exploring large data sets. The techniques cover a wide range of techniques, including statistical 2D displays, pixel-oriented displays, and dynamic 3D displays with variable resolution. The techniques have been successfully applied in the telecommunications industry to analyze call detail data for understanding customer behavior and preventing fraudulent usage, and to monitor network traffic for analyzing unexpected network events such as high volumes of unanswered calls.