nested model - sci.utah.edu
TRANSCRIPT
![Page 1: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/1.jpg)
cs7960 | January 15 2013
NESTED MODELMiriah Meyer
slide acknowledgements: Tamara Munzner, UBCMike Gleicher, U of Wisconsin
![Page 2: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/2.jpg)
ADMINISTRIVIA...
2
![Page 3: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/3.jpg)
3
- Thursday paper presentations: sign up!
- design study papers for the next 3 classes...
- Ben Fry round-table
![Page 4: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/4.jpg)
LAST TIME
4
![Page 5: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/5.jpg)
design study - a project
- analyze a real-world problem
- design a visualization system
- validate the design
- reflect about lessons learned
Design Study Methodology: Reflections for the Trenches and the Stacks.
M. Sedlmair, M. Meyer, T. Munzner, IEEE TVCG (Proceedings of InfoVis 2012).
![Page 6: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/6.jpg)
6
10 properties of a wicked problem
![Page 7: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/7.jpg)
7You have to be at least this far in order to start designing a visualization solution.
Now
it’s so well-defined that w
e can write
an algorithm to solve the problem
.
![Page 8: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/8.jpg)
MizBee A Multiscale Synteny Browser
Miriah MeyerTamara Munzner
Hanspeter Pfister12
1
1Harvard UniversityUniversity of British Columbia2
chrI
chrII
chrIII
chrIV
chrIX
chrV
chrVI
chrVII
chrVIII
chrX
chrXIchrXII
chrXIII
chrXIV
chrXIX
chrXV
chrXVI
chrXVII
chrXVIII
chrXX
chrXXI
chrUn
chrI
chr1
chr2
chr3
chr4
chr5
chr6
chr7
chr8chr9
chr10
chr11
chr12
chr13
chr14
chr15
chr16
chr17
chr18
chr19chr20chr21
saturationline
- +
10Mb
chrI
go to:
chrI chr10
7,522,019 10,194,592
7,552,761 10,162,878
orientation:match
inversion
invert
out i n
![Page 9: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/9.jpg)
9
- nested model for design
- extension of blocks and guidelines
- application to recent InfoVis paper
![Page 10: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/10.jpg)
10
BUT FIRST...
![Page 11: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/11.jpg)
11
design models vs process modelsdomain problem characterization
data/task abstraction design
encoding/interaction technique design
algorithm design
design model: describes levels of design inherent to, and should be considered in, the creation of a tool
nested model
![Page 12: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/12.jpg)
12
design models vs process modelsdomain problem characterization
data/task abstraction design
encoding/interaction technique design
algorithm design
PRECONDITIONpersonal validation
COREinward-facing validation
ANALYSISoutward-facing validation
learn implementwinnow cast discover design deploy reflect write
design model: describes levels of design inherent to, and should be considered in, the creation of a tool
process model: gives practical advice in how to design and develop a tool
nested model
9-stage framework
![Page 13: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/13.jpg)
A Nested Model for Visualization Design and Validation
Tamara MunznerUniversity of British ColumbiaDepartment of Computer Science
![Page 14: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/14.jpg)
How do you show your system is good?
• so many possible ways! • algorithm complexity analysis• field study with target user population• implementation performance (speed, memory)• informal usability study• laboratory user study• qualitative discussion of result pictures• quantitative metrics• requirements justification from task analysis• user anecdotes (insights found)• user community size (adoption)• visual encoding justification from theoretical principles
![Page 15: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/15.jpg)
15
Contribution
• nested model unifying design and validation
• guidance on when to use what validation method
• different threats to validity at each level of model
• recommendations based on model
![Page 16: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/16.jpg)
16
Four kinds of threats to validity
![Page 17: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/17.jpg)
17
Four kinds of threats to validity
domain problem characterization
• wrong problem• they don’t do that
![Page 18: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/18.jpg)
18
Four kinds of threats to validity
domain problem characterization data/operation abstraction design
• wrong problem• they don’t do that
• wrong abstraction• you’re showing them the wrong thing
![Page 19: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/19.jpg)
19
Four kinds of threats to validity
domain problem characterization data/operation abstraction design encoding/interaction technique design
• wrong problem• they don’t do that
• wrong abstraction• you’re showing them the wrong thing
• wrong encoding/interaction technique• the way you show it doesn’t work
![Page 20: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/20.jpg)
20
Four kinds of threats to validity
domain problem characterization data/operation abstraction design encoding/interaction technique design algorithm design
• wrong problem• they don’t do that
• wrong abstraction• you’re showing them the wrong thing
• wrong encoding/interaction technique• the way you show it doesn’t work
• wrong algorithm• your code is too slow
![Page 21: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/21.jpg)
21
threat: wrong problem threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm
• each validation works for only one kind of threat to validity
Match validation method to contributions
![Page 22: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/22.jpg)
22
Analysis examples
justify encoding/interaction design
qualitative result image analysistest on target users, get utility anecdotes
justify encoding/interaction design
measure system time/memory qualitative result image analysis
computational complexity analysis
qualitative/quantitative image analysis
lab study, measure time/errors for operation
Interactive visualization of genealogical graphs. McGuffin and Balakrishnan. InfoVis 2005.
MatrixExplorer. Henry and Fekete. InfoVis 2006.
An energy model for visual graph clustering. (LinLog)Noack. Graph Drawing 2003
Flow map layout. Phan et al. InfoVis 2005.
LiveRAC. McLachlan, Munzner, Koutsofios, and North. CHI 2008.
Effectiveness of animation in trend visualization.Robertson et al. InfoVis 2008.
measure system time/memory qualitative result image analysis
observe and interview target users
justify encoding/interaction design
qualitative result image analysis
observe and interview target users
justify encoding/interaction design
field study, document deployed usage
![Page 23: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/23.jpg)
23
Nested levels in model
domain problem characterization data/operation abstraction design encoding/interaction technique design algorithm design
• output of upstream levelinput to downstream level
• challenge: upstream errors inevitably cascade• if poor abstraction choice made, even perfect technique
and algorithm design will not solve intended problem
![Page 24: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/24.jpg)
24
Characterizing domain problems
• tasks, data, workflow of target users• problems: tasks described in domain terms• requirements elicitation is notoriously hard
problem data/op abstraction enc/interact technique algorithm
![Page 25: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/25.jpg)
25
Designing data/operation abstraction
• mapping from domain vocabulary/concerns to abstraction• may require transformation!
• data types: data described in abstract terms• numeric tables, relational/network, spatial, ...
• operations: tasks described in abstract terms• generic
• sorting, filtering, correlating, finding trends/outliers... • datatype-specific
• path following through network...
problem data/op abstraction enc/interact technique algorithm
![Page 26: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/26.jpg)
26
Designing encoding,interaction techniques
• visual encoding• marks, attributes, ...• extensive foundational work exists
• interaction• selecting, navigating, ordering, ...• significant guidance exists
Semiology of Graphics. Jacques Bertin, Gauthier-Villars 1967, EHESS 1998
problem data/op abstraction enc/interact technique algorithm
![Page 27: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/27.jpg)
27
Designing algorithms
• well-studied computer science problem• create efficient algorithm given clear specification• no human-in-loop questions
problem data/op abstraction enc/interact technique algorithm
![Page 28: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/28.jpg)
28
Immediate vs. downstream validation
threat: wrong problem threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm implement system
![Page 29: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/29.jpg)
29
Domain problem validation
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm implement system
• immediate: ethnographic interviews/observations
![Page 30: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/30.jpg)
30
Domain problem validation
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm implement system validate: observe adoption rates
• downstream: adoption (weak but interesting signal)
![Page 31: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/31.jpg)
31
Abstraction validation
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm implement system validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates
• downstream: can only test with target users doing real work
![Page 32: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/32.jpg)
32
Encoding/interaction technique validation
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm implement system validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates
• immediate: justification useful, but not sufficient - tradeoffs
![Page 33: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/33.jpg)
33
Encoding/interaction technique validation
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm implement system validate: qualitative/quantitative result image analysis validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates
• downstream: discussion of result images very common
![Page 34: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/34.jpg)
34
Encoding/interaction technique validation
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm implement system validate: qualitative/quantitative result image analysis validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates
• downstream: studies add another level of rigor (and time)
![Page 35: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/35.jpg)
35
Encoding/interaction technique validation
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm implement system validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates
• usability testing necessary for validity of downstream testing• not validation method itself!
![Page 36: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/36.jpg)
36
Algorithm validation
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates
• immediate vs. downstream here clearly understood in CS
![Page 37: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/37.jpg)
37
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates
Avoid mismatches• can’t validate encoding with wallclock timings
![Page 38: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/38.jpg)
38
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates
Avoid mismatches• can’t validate abstraction with lab study
![Page 39: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/39.jpg)
39
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates
Single paper would include only subset• can’t do all for same project
• not enough space in paper or time to do work
![Page 40: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/40.jpg)
40
threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates
Single paper would include only subset• pick validation method according to contribution claims
![Page 41: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/41.jpg)
41
Real design process
• iterative refinement• levels don’t need to be done in strict order• intellectual value of level separation
• exposition, analysis
• shortcut across inner levels + implementation• rapid prototyping, etc.
• low-fidelity stand-ins so downstream validation can happen sooner
![Page 42: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/42.jpg)
42
Related work
• influenced by many previous pipelines• but none were tied to validation
• [Card, Mackinlay, Shneiderman 99], ...
• many previous papers on how to evaluate• but not when to use what validation methods
• [Carpendale 08], [Plaisant 04], [Tory and Möller 04]
• exceptions• good first step, but no formal framework
[Kosara, Healey, Interrante, Laidlaw, Ware 03]• guidance for long term case studies, but not other contexts
[Shneiderman and Plaisant 06]• only three levels, does not include algorithm
[Ellis and Dix 06], [Andrews 08]
![Page 43: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/43.jpg)
43
Recommendations: authors
• explicitly state level of contribution claim(s)
• explicitly state assumptions for levels upstream of paper focus• just one sentence + citation may suffice
• goal: literature with clearer interlock between papers• better unify problem-driven and technique-driven work
![Page 44: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/44.jpg)
44
Recommendation: publication venues
• we need more problem characterization• ethnography, requirements analysis
• as part of paper, and as full paper• now full papers relegated to CHI/CSCW
• does not allow focus on central vis concerns
• legitimize ethnographic “orange-box” papers!
observe and interview target users
![Page 45: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/45.jpg)
45
Lab study as core now deemed legitimate
justify encoding/interaction design
qualitative result image analysistest on target users, get utility anecdotes
justify encoding/interaction design
measure system time/memory qualitative result image analysis
computational complexity analysis
qualitative/quantitative image analysis
lab study, measure time/errors for operation
Interactive visualization of genealogical graphs. McGuffin and Balakrishnan. InfoVis 2005.
MatrixExplorer. Henry and Fekete. InfoVis 2006.
An energy model for visual graph clustering. (LinLog)Noack. Graph Drawing 2003
Flow map layout. Phan et al. InfoVis 2005.
LiveRAC. McLachlan, Munzner, Koutsofios, and North. CHI 2008.
Effectiveness of animation in trend visualization.Robertson et al. InfoVis 2008.
measure system time/memory qualitative result image analysis
observe and interview target users
justify encoding/interaction design
qualitative result image analysis
observe and interview target users
justify encoding/interaction design
field study, document deployed usage
![Page 46: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/46.jpg)
46
Limitations
• oversimplification
• not all forms of user studies addressed
• infovis-oriented worldview
• are these levels the right division?
![Page 47: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/47.jpg)
47
Conclusion
• new model unifying design and validation• guidance on when to use what validation method• broad scope of validation, including algorithms
• recommendations• be explicit about levels addressed and state
upstream assumptions so papers interlock more• we need more problem characterization work
these slides posted at http://www.cs.ubc.ca/~tmm/talks.html#iv09
![Page 48: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/48.jpg)
48
Mike GleicherBELIV’12
![Page 49: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/49.jpg)
49
![Page 50: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/50.jpg)
50
![Page 51: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/51.jpg)
51
![Page 52: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/52.jpg)
52
![Page 53: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/53.jpg)
53
![Page 54: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/54.jpg)
54
![Page 55: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/55.jpg)
55
![Page 56: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/56.jpg)
56
![Page 57: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/57.jpg)
57
![Page 58: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/58.jpg)
58
![Page 59: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/59.jpg)
The Four-Level Nested Model Revisited: Blocks and Guidelines
59
Miriah Meyer, Michael Selmair, Tamara MunznerBELIV’12
![Page 60: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/60.jpg)
learn implementwinnow cast discover design deploy reflect write
Design Study Methodology: Reflections for the Trenches and the Stacks.
M. Sedlmair, M. Meyer, T. Munzner, IEEE TVCG (Proceedings of InfoVis 2012).
![Page 61: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/61.jpg)
learn implementwinnow cast discover design deploy reflect write
Design Study Methodology: Reflections for the Trenches and the Stacks.
M. Sedlmair, M. Meyer, T. Munzner, IEEE TVCG (Proceedings of InfoVis 2012).
confirm | refine | reject | proposeguidelines
![Page 62: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/62.jpg)
domain problem characterization data/task abstraction design
encoding/interaction technique designalgorithm design
Munzner 2009
NESTED MODEL
![Page 63: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/63.jpg)
dom
ain
prob
lem
ab
stra
ctio
nte
chni
que
algo
rithm
EXTENSION
blocks
domain problem characterization data/task abstraction design
encoding/interaction technique designalgorithm design
Munzner 2009
NESTED MODEL
outcome of a design decision
![Page 64: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/64.jpg)
dom
ain
prob
lem
ab
stra
ctio
nte
chni
que
algo
rithm
EXTENSION
blocks
domain problem characterization data/task abstraction design
encoding/interaction technique designalgorithm design
Munzner 2009
NESTED MODEL
directed graph
outcome of a design decision
node-link diagram
force-directed layout
![Page 65: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/65.jpg)
dom
ain
prob
lem
ab
stra
ctio
nte
chni
que
algo
rithm
EXTENSION
blocks
domain problem characterization data/task abstraction design
encoding/interaction technique designalgorithm design
Munzner 2009
NESTED MODEL
outcome of a design decision
![Page 66: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/66.jpg)
dom
ain
prob
lem
ab
stra
ctio
nte
chni
que
algo
rithm
EXTENSION
domain problem characterization data/task abstraction design
encoding/interaction technique designalgorithm design
Munzner 2009
NESTED MODEL
blocksguidelines
statement about relationship between blocks
![Page 67: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/67.jpg)
dom
ain
prob
lem
ab
stra
ctio
nte
chni
que
algo
rithm
EXTENSION
domain problem characterization data/task abstraction design
encoding/interaction technique designalgorithm design
Munzner 2009
NESTED MODEL
blocksguidelines
good for categorical data
hue colormap appropriate
categorical data
hue colormap
![Page 68: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/68.jpg)
dom
ain
prob
lem
ab
stra
ctio
nte
chni
que
algo
rithm
EXTENSION
domain problem characterization data/task abstraction design
encoding/interaction technique designalgorithm design
Munzner 2009
NESTED MODEL
blocksguidelines
Nocaj 2012 Balzer 2005
faster Voronoi treemap
![Page 69: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/69.jpg)
dom
ain
prob
lem
ab
stra
ctio
nte
chni
que
algo
rithm
EXTENSION
domain problem characterization data/task abstraction design
encoding/interaction technique designalgorithm design
Munzner 2009
NESTED MODEL
blocksguidelinesbetween-level guideline
within-level guideline
![Page 70: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/70.jpg)
dom
ain
prob
lem
ab
stra
ctio
nte
chni
que
algo
rithm
EXTENSION
blocksguidelines
implications-mapping problems to abstractions-mapping algorithms to techniques-reporting algorithm comparisons
between-level guideline
within-level guideline
![Page 71: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/71.jpg)
![Page 72: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/72.jpg)
L4: Design Model
REQUIRED READING
71
![Page 73: NESTED MODEL - sci.utah.edu](https://reader031.vdocument.in/reader031/viewer/2022012510/6187ee881e03443a183d7e6d/html5/thumbnails/73.jpg)
72
choose your own adventure