Author: Stephen C. North

Publication Overview

Publication period start: 2004
Number of co-authors: 25

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Wijk, Jarke J. van, North, Stephen C., Shen, Han-Wei (2010): Guest Editors' Introduction: Highlights from IEEE Pacific Visualization. In IEEE Computer Graphics and Applications, 30 (6) pp. 14-15. https://dx.doi.org/10.1109/MCG.2010.111
Keim, Daniel A., Panse, Christian, North, Stephen C. (2005): Medial-Axis-Based Cartograms. In IEEE Computer Graphics and Applications, 25 (3) pp. 60-68. https://doi.ieeecomputersociety.org/10.1109/MCG.2005.64
Keim, Daniel A., Panse, Christian, Sips, Mike, North, Stephen C. (2004): Visual Data Mining in Large Geospatial Point Sets. In IEEE Computer Graphics and Applications, 24 (5) pp. 36-44. https://doi.ieeecomputersociety.org/10.1109/MCG.2004.41
Keim, Daniel A., Panse, Christian, Sips, Mike, North, Stephen C. (2004): Pixel based visual data mining of geo-spatial data. In Computers & Graphics, 28 (3) pp. 327-344. https://dx.doi.org/10.1016/j.cag.2004.03.022
Wei, Bin, Silva, Claudio T., Koutsofios, Eleftherios, Krishnan, Shankar, North, Stephen C. (2000): Visualization Research with Large Displays. In IEEE Computer Graphics and Applications, 20 (4) pp. 50-54. https://csdl.computer.org/comp/mags/cg/2000/04/g4050abs.htm
Koutsofios, Eleftherios, North, Stephen C., Keim, Daniel A. (1999): Visualizing Large Telecommunication Data Sets. In IEEE Computer Graphics and Applications, 19 (3) pp. 16-19. https://doi.ieeecomputersociety.org/10.1109/38.761543
North, Stephen C., Koutsofios, Eleftherios (1994): Application of graph visualization. In: Graphics Interface 94 May 18-20, 1994, Banff, Alberta, Canada. pp. 235-245.
Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA.
Lakkaraju, Kiran, Bearavolu, Ratna, Slagell, Adam J., Yurcik, William, North, Stephen C. (2005): Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 9. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.3
Jaech, Jeremy, North, Stephen C., Peery, Mike, Schroeder, Will, Thomas, Jim (2003): The Visualization Market: Open Source vs. Commercial Approaches. In: Turk, Greg, Wijk, Jarke J. van, II, Robert J. Moorhead (eds.) 14th IEEE Visualization 2003 Conference VIS 2003 19-24 October, 2003, Seattle, WA, USA. pp. 21-24.
Koutsofios, Eleftherios, North, Stephen C., Truscott, Russell, Keim, Daniel A. (1999): Visualizing Large-Scale Telecommunication Networks and Services. In: IEEE Visualization 1999 , 1999, . pp. 457-461.
North, Stephen C. (2000): Towards a 3D Visualization Framework for Construction Planning with Procession. In: IV 2000 , 2000, . pp. 577-582. https://csdl.computer.org/comp/proceedings/iv/2000/0743/00/07430577abs.htm
Keim, Daniel A., North, Stephen C., Panse, Christian, Schneidewind, Jorn (2002): Efficient Cartogram Generation: A Comparison. In: InfoVis 2002 - 2002 IEEE Symposium on Information Visualization 27 October - 1 November, 2002, Boston, MA, USA. pp. 33-36. https://csdl.computer.org/comp/proceedings/infovis/2002/1751/00/17510033abs.htm
Gansner, Emden R., Koren, Yehuda, North, Stephen C. (2004): Topological Fisheye Views for Visualizing Large Graphs. In: InfoVis 2004 - 10th IEEE Symposium on Information Visualization 10-12 October, 2004, Austin, TX, USA. pp. 175-182. https://doi.ieeecomputersociety.org/10.1109/INFOVIS.2004.66
Gansner, Emden R., Mocenigo, John M., North, Stephen C. (2003): Visualizing software for telecommunication services. In: Proceedings of the ACM Symposium on Software Visualization , 2003, . pp. 151-ff. https://doi.acm.org/10.1145/774833.774855
Mansmann, Florian, Fischer, Fabian, Keim, Daniel A., North, Stephen C. (2009): Visual support for analyzing network traffic and intrusion detection events using TreeMap . In: Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology , 2009, . pp. 3. https://dx.doi.org/10.1145/1641587.1641590
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel stuck? Want Freedom?

Get one powerful email each week, like 325,714 others.

Learn to design a life you love.

Next email in:
5
days
3
hrs
41
mins
45
secs