By Topic

Cyberworlds (CW), 2011 International Conference on

Date 4-6 Oct. 2011

Filter Results

Displaying Results 1 - 25 of 55
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (287 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2011, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (89 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cyberworlds 2011 Scope

    Publication Year: 2011, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2011, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2011, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Conference Venue and Sponsors

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Keynote Speakers Extended Abstracts

    Publication Year: 2011, Page(s):xv - xvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (114 KB)

    These tutorials discuss the following: cyberspace terrorism; EEG-enabled personalized digital experience; and nontraditional modelling. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial Speakers Extended Abstracts

    Publication Year: 2011, Page(s):xviii - xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (135 KB)

    Presents abstracts of tutorials from the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CW 2011 Special Session: Arts &Virtual Worlds

    Publication Year: 2011, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Crossing the Line: Terrorism in Cyberspace and Targets in Real-Space

    Publication Year: 2011, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    The boundaries between virtual reality and physical reality are becoming ever more blurred as activities in cyber worlds bleed into everyday life and sophisticated software now crosses the line from digital interaction to physical destruction. This paper examines what might be learned from the real-world exploits of the sophisticated software worm known as Stuxnet and from the speculations and ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synthetic Biometrics for Training Users of Biometric and Biomedical Systems

    Publication Year: 2011, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    Simulators of biometric data are emerging technologies for educational and training purposes (security access, forensic systems, public safety and health care). They emphasize decision-making skills in diverse situations. To model these situations or scenarios, synthetic biometric data can be used. This paper reviews an example of the application of synthetic biometrics for training users of a phy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Multi-modal Biometric Architecture for High-Dimensional Features

    Publication Year: 2011, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3490 KB) | HTML iconHTML

    Dealing with high-dimensional data has an important role in a number of areas, including biometric recognition in both real world and emerging virtual reality applications. Acquiring a group of different biometrics with various characteristics and specifications results in a number of issues that should be addressed, while developing such multi-modal recognition system. In this paper, we propose a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Sensor Based 3D Annotation Authoring Tool for Outdoor Field Applications

    Publication Year: 2011, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (865 KB) | HTML iconHTML

    Many professional tasks such as geographic or archaeological surveying require editing and processing spatial data. User generated models act as an underlying level for visualizing annotations. For accurate and fast placement of annotations in the field we introduce a mobile modelling workflow. Our contribution includes i) a novel annotation technique based on geometric regions and ii) a modelling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic

    Publication Year: 2011, Page(s):23 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (409 KB) | HTML iconHTML

    Honeynets are an increasingly popular choice deployed by organizations to lure attackers into a trap network, for collection and analysis of unauthorized network activity. A Honeynet captures substantial amount of data and logs for analysis in order to identify malicious activities perpetrated by the hacker community. The analysis of this large amount of data is a challenging task. Through this pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Example of a Charge Calculation System Using the Numerical Value and Exponential Calculation of the Cellular Data System

    Publication Year: 2011, Page(s):31 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    In the era of cloud computing, data is processed in a "Cloud", and data and its dependencies between systems or functions progress and change constantly within the cloud, as a user's requirements change. Such information worlds are called cyber worlds. We need a more powerful mathematical background which can model the cyber worlds in the "cloud"as they are. We consider the Incrementally Modular A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Information-Based Perception Model for Agent-Based Crowd and Egress Simulation

    Publication Year: 2011, Page(s):38 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB) | HTML iconHTML

    One of the major components of Agent Based Crowd Simulation is motion planning. There have been various motion planning algorithms developed and they've become increasingly better and more efficient at calculating the most optimal path. We believe that this optimality is coming at the price of realism. Certain factors like social norms, limitations to human computation capabilities, etc. prevent h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Open Modular Architecture for Effective Integration of Virtual Worlds in the Web

    Publication Year: 2011, Page(s):46 - 53
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2213 KB) | HTML iconHTML

    The Web and virtual worlds are currently crossing their ways, and although there are some efforts made to integrate them into each other, those typically rely on technologies that are rather esoteric to most Web-developers. In this paper, we present a new open architecture that combines several emerging and established technologies to provide convenient tools for developing virtual worlds in the W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a Collaborative Virtual Environment: A Programming Language Codesign Approach

    Publication Year: 2011, Page(s):54 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    Developing 3D virtual environments requires an advanced level of programming expertise. In many cases, working on such an application involves a wide range of programming activities such as 3D graphics, networking, user interfaces and audio programming. At the same time, such applications are usually real time and performance critical. The complexity of developing such an application comes from tw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of Force and Vibrotactile Feedback with Direct Stimulation for Texture Recognition

    Publication Year: 2011, Page(s):62 - 68
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (535 KB) | HTML iconHTML

    In this paper a study is conducted in order to evaluate three different strategies of haptic feedback for texture discrimination in virtual environments. Specifically, both force and vibrotactile feedback have been evaluated, as well as the direct use of the sense of touch, to detect different textures. To this end, a force feedback Phantom device, a custom built vibrotactile data glove and paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancement of Stage Performances by Projecting CG Animation and Control of Images with Sensors

    Publication Year: 2011, Page(s):69 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3963 KB) | HTML iconHTML

    We have been producing live stage performances using computer graphics (CG) and interactive techniques. We developed a system to support and enhance live performances. This system projects CG onstage alongside real actors and allows users to control the projected images in real time. Collaborative scenes between real actors and virtual actors created by CG are possible. The system has multi-functi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ESimp: Error-Controllable Simplification with Feature Preservation for Surface Reconstruction

    Publication Year: 2011, Page(s):77 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2282 KB) | HTML iconHTML

    We present a rapid and effective point simplification algorithm for surface reconstruction which can represent different levels-of-detail. The core of this algorithm is to generate an approximately minimal set of adaptive balls covering the whole surface by defining and minimizing local quadric error functions. First, the feature points are extracted by simple thresholding curvatures, Second, for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.