Introducing Uncharted's Argument Mapper
Reasoned assessment, analysis, and decision making
Intelligence analysts, criminal investigators and legal practitioners frequently face complex cases with large volumes of ambiguous, uncertain, contradictory or inconclusive evidence. They must rapidly analyze the evidence, assess the situation and recommend options with clear justification to decision makers. Moreover, inherent human cognitive biases, such as neglect of probability, confirmation bias and recency bias further complicate objective analysis.
DARPA's 60th Anniversary
Uncharted finds a place of honor in DARPA's storied history
Uncharted congratulates DARPA on its recent 60th anniversary. For nearly 20 years, we have worked with leading minds on “DARPA-hard” technology challenges. This immense privilege has afforded us the opportunity to apply thought, design, and implementation leadership in the data-driven art and science of visual analytics to new breakthroughs in human empowerment.
Graph Mapping Featured in Leading InfoVis Research Journal
Novel interactive visualization technique for massive graph data reveals hierarchical community structures and entity relationships in large-scale networks
An Uncharted research product for the visual analysis of massive graph data is featured in the pages and on the cover of the latest issue of Information Visualization, a leading peer-reviewed journal on the study and application of information visualization.
Virtual Reality Taxi Trips in NYC
Interactive 3D Visualization of High-Density Plots
What if you could move freely through Manhattan and watch every licensed taxi pick up and drop off every one of its passengers at the same time? What movement patterns would you see? That’s what we aimed to find out by extending our Salt library to plot high-density New York City traffic data in three dimensions.
Data Flow in the Tor Network
The Tor project is an open network for anonymous communication over the internet. Tor routes users’ internet traffic through a series of volunteer-run relay nodes to conceal its origin and destination from potential surveillance or censorship. While Tor is built for anonymity, the structure of the network and locations of many of the relay nodes is open.