Author: Stephen C. North
Publication Overview
Publication period start: 2004
Number of co-authors: 25
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Wijk,
Jarke J. van,
North,
Stephen C.,
Shen,
Han-Wei
(2010):
Guest Editors' Introduction: Highlights from IEEE Pacific Visualization.
In
IEEE Computer Graphics and Applications,
30
(6)
pp. 14-15.
https://dx.doi.org/10.1109/MCG.2010.111
Keim,
Daniel A.,
Panse,
Christian,
North,
Stephen C.
(2005):
Medial-Axis-Based Cartograms.
In
IEEE Computer Graphics and Applications,
25
(3)
pp. 60-68.
https://doi.ieeecomputersociety.org/10.1109/MCG.2005.64
Keim,
Daniel A.,
Panse,
Christian,
Sips,
Mike,
North,
Stephen C.
(2004):
Visual Data Mining in Large Geospatial Point Sets.
In
IEEE Computer Graphics and Applications,
24
(5)
pp. 36-44.
https://doi.ieeecomputersociety.org/10.1109/MCG.2004.41
Keim,
Daniel A.,
Panse,
Christian,
Sips,
Mike,
North,
Stephen C.
(2004):
Pixel based visual data mining of geo-spatial data.
In
Computers & Graphics,
28
(3)
pp. 327-344.
https://dx.doi.org/10.1016/j.cag.2004.03.022
Wei,
Bin,
Silva,
Claudio T.,
Koutsofios,
Eleftherios,
Krishnan,
Shankar,
North,
Stephen C.
(2000):
Visualization Research with Large Displays.
In
IEEE Computer Graphics and Applications,
20
(4)
pp. 50-54.
https://csdl.computer.org/comp/mags/cg/2000/04/g4050abs.htm
Koutsofios,
Eleftherios,
North,
Stephen C.,
Keim,
Daniel A.
(1999):
Visualizing Large Telecommunication Data Sets.
In
IEEE Computer Graphics and Applications,
19
(3)
pp. 16-19.
https://doi.ieeecomputersociety.org/10.1109/38.761543
North,
Stephen C.,
Koutsofios,
Eleftherios
(1994):
Application of graph visualization.
In:
Graphics Interface 94
May 18-20,
1994,
Banff, Alberta, Canada.
pp. 235-245.
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
Lakkaraju,
Kiran,
Bearavolu,
Ratna,
Slagell,
Adam J.,
Yurcik,
William,
North,
Stephen C.
(2005):
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations.
In:
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
pp. 9.
https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.3
Jaech,
Jeremy,
North,
Stephen C.,
Peery,
Mike,
Schroeder,
Will,
Thomas,
Jim
(2003):
The Visualization Market: Open Source vs. Commercial Approaches.
In:
Turk,
Greg,
Wijk,
Jarke J. van,
II,
Robert J. Moorhead
(eds.)
14th IEEE Visualization 2003 Conference VIS 2003
19-24 October,
2003,
Seattle, WA, USA.
pp. 21-24.
Koutsofios,
Eleftherios,
North,
Stephen C.,
Truscott,
Russell,
Keim,
Daniel A.
(1999):
Visualizing Large-Scale Telecommunication Networks and Services.
In:
IEEE Visualization 1999
,
1999,
.
pp. 457-461.
North,
Stephen C.
(2000):
Towards a 3D Visualization Framework for Construction Planning with Procession.
In:
IV 2000
,
2000,
.
pp. 577-582.
https://csdl.computer.org/comp/proceedings/iv/2000/0743/00/07430577abs.htm
Keim,
Daniel A.,
North,
Stephen C.,
Panse,
Christian,
Schneidewind,
Jorn
(2002):
Efficient Cartogram Generation: A Comparison.
In:
InfoVis 2002 - 2002 IEEE Symposium on Information Visualization
27 October - 1 November,
2002,
Boston, MA, USA.
pp. 33-36.
https://csdl.computer.org/comp/proceedings/infovis/2002/1751/00/17510033abs.htm
Gansner,
Emden R.,
Koren,
Yehuda,
North,
Stephen C.
(2004):
Topological Fisheye Views for Visualizing Large Graphs.
In:
InfoVis 2004 - 10th IEEE Symposium on Information Visualization
10-12 October,
2004,
Austin, TX, USA.
pp. 175-182.
https://doi.ieeecomputersociety.org/10.1109/INFOVIS.2004.66
Gansner,
Emden R.,
Mocenigo,
John M.,
North,
Stephen C.
(2003):
Visualizing software for telecommunication services.
In:
Proceedings of the ACM Symposium on Software Visualization
,
2003,
.
pp. 151-ff.
https://doi.acm.org/10.1145/774833.774855
Mansmann,
Florian,
Fischer,
Fabian,
Keim,
Daniel A.,
North,
Stephen C.
(2009):
Visual support for analyzing network traffic and intrusion detection events using TreeMap .
In:
Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology
,
2009,
.
pp. 3.
https://dx.doi.org/10.1145/1641587.1641590