[1]Li Jianhe,Wang Cunkui,Mei Jianming,et al.The Character and New Tendency of the Contemporary Terrorism[J].Journal of Chinese People’s Public Security University(Social Sciences Edition),2008,24(3):17.
[2]Joonghoon Lee. Exploring Global Terrorism Data:A Webbased Visualization of Temporal Data[J].Crossroads,2008,15(2):714.
[3]Yang Yubin,Li Ning,Zhang Yao.Networked Data Mining Based on Social Network Visualization[J].Journal of Software,2008,19(8):19801994.
[4]Wang X Y,Miller E,Smarick K,et al.Investigative Visual Analysis of Global Terrorism[J].Computer Graphics Forum,2008,27(3):919626.
[5]Xiao Weidong,Zhou Cheng,Sun Yang,et al.Improvement of Parallel Sets and Its Application in Analyzing Global Terrorism Database[J].Journal of National University of Defense Technology,2011,33(1):115119.
[6]Xie Zaixian,Huang Shiping,Ward M O,et al. Exploratory Visualization of Multivariate Data with Variable Quality[C]∥Visual Analytics Science and Technology, 2006 IEEE Symposium on Digital Object Identifier, 2006:183190.
[7]梁吉业,李德玉.信息系统中的不确定性与知识获取[M].北京:科学出版社,2005.
[8]张文修,梁怡,徐萍.基于包含度的不确定推理[M].北京:清华大学出版社,2007.
[9]Forsell C,Johansson J. TaskBased Evaluation of MultiRelational 3D and Standard 2D Parallel Coordinates[C]∥Proc of SPIEThe International Society for Optical Engineering,2007,6495(64950C):112. |