{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T04:42:51Z","timestamp":1726461771553},"reference-count":28,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2013,7,12]],"date-time":"2013-07-12T00:00:00Z","timestamp":1373587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Information Visualization"],"published-print":{"date-parts":[[2014,10]]},"abstract":" The annual Visual Analytics Science and Technology (VAST) challenge provides Visual Analytics researchers, developers, and designers an opportunity to apply their best tools and techniques against invented problems that include a realistic scenario, data, tasks, and questions to be answered. Submissions are processed much like conference papers, contestants are provided reviewer feedback, and excellence is recognized with awards. A day-long VAST Challenge workshop takes place each year at the IEEE VAST conference to share results and recognize outstanding submissions. Short papers are published each year in the annual VAST proceedings. Over the history of the challenge, participants have investigated a wide variety of scenarios, such as bioterrorism, epidemics, arms smuggling, social unrest, and computer network attacks, among many others. Contestants have been provided with large numbers of realistic but synthetic Coast Guard interdiction records, intelligence reports, hospitalization records, microblog records, personal RFID tag locations, huge amounts of cyber security log data, and several hours of video. This paper describes the process for developing the synthetic VAST Challenge datasets and conducting the annual challenges. This paper also provides an introduction to this special issue of Information Visualization, focusing on the impacts of the VAST Challenge. <\/jats:p>","DOI":"10.1177\/1473871613490678","type":"journal-article","created":{"date-parts":[[2013,7,13]],"date-time":"2013-07-13T05:36:36Z","timestamp":1373693796000},"page":"301-312","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":24,"title":["The VAST Challenge: history, scope, and outcomes: An introduction to the Special Issue"],"prefix":"10.1177","volume":"13","author":[{"given":"Kristin","family":"Cook","sequence":"first","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA, USA"}]},{"given":"Georges","family":"Grinstein","sequence":"additional","affiliation":[{"name":"University of Massachusetts-Lowell, Lowell, MA"}]},{"given":"Mark","family":"Whiting","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA, USA"}]}],"member":"179","published-online":{"date-parts":[[2013,7,12]]},"reference":[{"volume-title":"Illuminating the path: the research and development agenda for visual analytics","year":"2005","author":"Thomas J","key":"bibr1-1473871613490678"},{"key":"bibr2-1473871613490678","unstructured":"University of Maryland. Visual analytics benchmark repository, http:\/\/hcil.cs.umd.edu\/localphp\/hcil\/vast\/archive\/provenance.php (accessed 20 January 2013)."},{"key":"bibr3-1473871613490678","unstructured":"Institute for Intelligence Studies at Mercyhurst. http:\/\/www.iismu.org\/ (accessed 24 May 2013)."},{"key":"bibr4-1473871613490678","unstructured":"Pacific Northwest National Laboratory. IN-SPIRE\u2122 visual document analysis, http:\/\/in-spire.pnnl.gov\/ (accessed 31 October 2012)."},{"key":"bibr5-1473871613490678","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78246-9_38"},{"volume-title":"Proceedings of the 2008 Workshop on BEyond time and errors: novel evaluation methods for Information Visualization April 5, 2008, a publication of conference CHI\u201908 CHI Conference on Human Factors in Computing Systems","author":"Whiting M","key":"bibr6-1473871613490678"},{"volume-title":"You can write a mystery (You can write it)","year":"1999","author":"Roberts G","key":"bibr7-1473871613490678"},{"volume-title":"Cheating and deception","year":"1991","author":"Bell J","key":"bibr8-1473871613490678"},{"volume-title":"From welcomed exiles to illegal immigrants: Cuban migration to the US, 1959\u20131995","year":"1996","author":"Masud-Piloto F","key":"bibr9-1473871613490678"},{"key":"bibr10-1473871613490678","first-page":"1657","volume":"36","author":"Zimmerman M","year":"2003","journal-title":"Vanderbilt J Transnatl Law"},{"key":"bibr11-1473871613490678","first-page":"107","volume-title":"Visualization for computer security","author":"Amico A","year":"2005"},{"key":"bibr12-1473871613490678","doi-asserted-by":"publisher","DOI":"10.2172\/1023739"},{"volume-title":"ISCRAM","year":"2010","author":"Brigantic R","key":"bibr13-1473871613490678"},{"volume-title":"International conference on complex systems","author":"Tisue S","key":"bibr14-1473871613490678"},{"key":"bibr15-1473871613490678","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70412"},{"key":"bibr16-1473871613490678","doi-asserted-by":"publisher","DOI":"10.1145\/1117454.1117466"},{"first-page":"215","volume-title":"Visual analytics science and technology","author":"Grinstein G","key":"bibr17-1473871613490678"},{"first-page":"231","volume-title":"Visual analytics science and technology","author":"Grinstein G","key":"bibr18-1473871613490678"},{"first-page":"195","volume-title":"Visual analytics science and technology","author":"Grinstein G","key":"bibr19-1473871613490678"},{"first-page":"243","volume-title":"Visual analytics science and technology","author":"Grinstein G","key":"bibr20-1473871613490678"},{"first-page":"263","volume-title":"Visual analytics science and technology","author":"Grinstein G","key":"bibr21-1473871613490678"},{"volume-title":"Visual analytics science and technology","author":"Grinstein G","key":"bibr22-1473871613490678"},{"key":"bibr23-1473871613490678","first-page":"251","volume-title":"Visual analytics science and technology","author":"Cook K","year":"2012"},{"key":"bibr24-1473871613490678","unstructured":"Visual Analytics Community. VAST Challenge 2012 sponsorship call, http:\/\/www.vacommunity.org\/VAST+Challenge+2012+Sponsorship+Call (2012, accessed 11 November 2012)."},{"key":"bibr25-1473871613490678","unstructured":"Palantir. VAST 2010 Challenge, http:\/\/www.palantir.com\/2010\/12\/vast2010\/ (2010, accessed 11 November 2012)."},{"key":"bibr26-1473871613490678","doi-asserted-by":"publisher","DOI":"10.1057\/ivs.2009.16"},{"key":"bibr27-1473871613490678","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-242-8.ch056"},{"key":"bibr28-1473871613490678","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.163"}],"container-title":["Information Visualization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1473871613490678","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1473871613490678","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1473871613490678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T03:50:30Z","timestamp":1726458630000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1473871613490678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,12]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["10.1177\/1473871613490678"],"URL":"https:\/\/doi.org\/10.1177\/1473871613490678","relation":{},"ISSN":["1473-8716","1473-8724"],"issn-type":[{"type":"print","value":"1473-8716"},{"type":"electronic","value":"1473-8724"}],"subject":[],"published":{"date-parts":[[2013,7,12]]}}}