First International Symposium on Cyber Worlds, 2002. Proceedings.

6-8 Nov. 2002

Filter Results

Displaying Results 1 - 25 of 74
  • Proceedings First International Symosium on Cyber Worlds

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • An image copyright protection scheme based on torus automorphism

    Publication Year: 2002, Page(s):217 - 224
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (629 KB) | HTML iconHTML

    We propose an approach to protect the copyright of image data. Many watermarking techniques have been proposed to guard the copyright of image data, most of which need to embed the watermark in the cover image. Unfortunately, embedding always results in a reduction of image quality. To achieve the goal of copyright protection without reducing image quality, we incorporate the concept of digital si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):561 - 562
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Mesh median filter for smoothing 3-D polygonal surfaces

    Publication Year: 2002, Page(s):488 - 495
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1296 KB) | HTML iconHTML

    In this paper we introduce a new mesh filtering method: a mesh median filter. This is an application of the median filter to smoothen 3-D noisy shapes given by triangle meshes. An algorithm of the mesh median filter is realized by applying the median filter to face normals on triangle meshes and updating mesh vertex positions to make them fit to the filtered normals. As an advanced modification of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatial knowledge and cyberworlds

    Publication Year: 2002, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    "Spatialization" refers to the creation of a graphic representation based on a spatial metaphor and the transformation that condenses large complex semantic domains into their essential components. Spatialization can be defined as the projection of elements of a high-dimensional information space into a low-dimensional, potentially experiential, interactive, representational space. Spatialization ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical image retouching method

    Publication Year: 2002, Page(s):480 - 487
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    In this paper we present a novel fast algorithm for image retouching. A space-mapping technique is used to transform a missing (or damaged) part of a surface into a different shape in a continuous manner. Experimental results are included to demonstrate the feasibility of our approach. The proposed approach shows the obvious relationship between the surface retouching problem and image inpainting.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The general autocorrelation and its application

    Publication Year: 2002, Page(s):267 - 273
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The general autocorrelation proposed is the extension of the traditional autocorrelation. Besides having the same ability as autocorrelation to reveal the characteristics of the linear structures, the strict avalanche criterion (SAC) and the propagation criterion (PC) of degree k, the general autocorrelation is capable of finding the order of SAC and PC which is a capability that autocorrelation d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct segmentation for reverse engineering

    Publication Year: 2002, Page(s):24 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1952 KB) | HTML iconHTML

    In reverse engineering a physical object is digitally reconstructed from a set of boundary points. In the segmentation phase these points are grouped into subsets to facilitate consecutive steps as surface fitting. In this paper we present a step segmentation method with subsequent classification of simple algebraic surfaces. Our method is direct in the sense that it operates directly on the point... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified framework for software development

    Publication Year: 2002, Page(s):105 - 112
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    This paper introduces an alternative methodology, Lyee methodology, which provides a unified and deterministic framework to enhance the efficiency of software development and simplifies system maintenance and integration. This framework also simplifies the complexity of the software structure and provides a structure for users or customers to express their intentions or knowledge directly in the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous and robust navigation for simulated humanoid characters in virtual environments

    Publication Year: 2002, Page(s):531 - 536
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    An important task for virtual characters is autonomous navigation in a virtual environment. This involves finding a way through the environment leading to a certain goal, avoiding obstacles such as walls, or surfaces not suitable for walking on. This paper presents an algorithm that analyzes a given scene database in a preprocessing phase in a fully automatic manner. It identifies storeys, rooms a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Free-form deformation with automatically generated multiresolution lattices

    Publication Year: 2002, Page(s):472 - 479
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB) | HTML iconHTML

    Developing intuitive and efficient methods for shape editing is one of the most important areas in computer graphics, and free-form deformation (FFD), which is one of such methods, allows the user to deform a model easily by moving a set of control points, collectively called the lattice. Although the FFD method can be used for both global and local deformations, the user must define a suitable la... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable distributed search engine based on multiple meta servers

    Publication Year: 2002, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    We have developed distributed search engine, called cooperative search engine (CSE), in order to retrieve fresh information. In CSE, a local search engine located in each Web server makes an index of local pages. And, a meta search server integrates these local search engines in order to realize a global search engine. This meta server is single point of failure in CSE. We propose redundancy, of m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet voting: concerns and solutions

    Publication Year: 2002, Page(s):261 - 266
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Internet voting systems, catering to different requirements, have been widely implemented and used. Some have been successful, while others have experienced unexpected problems. This paper overviews the concerns of using Internet voting and tries to give solutions. Tradeoffs between the advantages and disadvantages of employing Internet voting are also addressed. A simple protocol is designed to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML vs. Object-Oriented XML: Motivations, applications, and performance evaluation

    Publication Year: 2002, Page(s):371 - 377
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1604 KB) | HTML iconHTML

    Currently, XML by itself is a flat structure used to describe structured document for data transfer. In this paper, through a Web based video application which uses enhanced XML descriptions for data transfer, we present an approach to convert the enhanced XML into Object-Oriented XML by integrating them into an object-oriented database (OODB). To enhance the functionality of the XML objects, meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual rooms for building complex interactive learning environments

    Publication Year: 2002, Page(s):16 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Through the specific example of an early 1990s office-based prototype prepared for students in the first analog electronics course in electrical engineering, the paper discusses how an interconnected collection of virtual rooms offers designers a flexible and efficient means of incorporating learning materials into student-centered interactive learning environments that, according to current learn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real-time configurable shader based on lookup tables

    Publication Year: 2002, Page(s):507 - 514
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3563 KB) | HTML iconHTML

    This paper presents hardware architecture for a configurable shader with pre-filtered environment mapping and twist/bump pattern mapping. Our architecture enables per-pixel shading calculation, which can be programmed by means of lookup tables, random-access memories (RAMs) and read-only memories (ROMs), and provides real-time rendering with various shading and reflectance models, such as Blinn-Ph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data redistribution using MPI user-defined types

    Publication Year: 2002, Page(s):47 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    In many parallel programs, run-time data redistribution is usually required to enhance data locality and reduce remote memory access on the distributed memory multicomputers. Recently researches in data redistribution algorithm have become very mature. The time required to generate data sets and processor sets is much lesser then before. That means packing/unpacking becomes a relatively heavy cost... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS control in group communication

    Publication Year: 2002, Page(s):282 - 288
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    This paper discusses a communication model to exchange multimedia messages in a group of multiple processes. Quality of Service (QoS) required by an application has to be supported. In traditional communication protocols like TCP and RTP, a process can reliably deliver messages to one or more than one process, i.e. one-way transmission. In the group communication, a process sends multimedia messag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of SVD algorithm on the Trident processor

    Publication Year: 2002, Page(s):95 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1720 KB) | HTML iconHTML

    Within the current decade, process technology is promising one billion transistors on a single die, operating at frequency of from 6 to 10 GHz. As a direct result of the fundamental trends of increasing transistors density and switching speeds, newer technological and microarchitectural design constrains are introduced. Among them, wire delays will become critical. To take the benefits of the VLSI... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing a secret gray image in multiple images

    Publication Year: 2002, Page(s):230 - 237
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (545 KB) | HTML iconHTML

    In a traditional visual cryptography scheme, a shared secret image can be revealed with no cryptographic computations. Unfortunately, the revealed secret image of a conventional visual cryptography scheme is almost black and white. Colored visual cryptography schemes based on modified visual cryptography were recently proposed. By means of a few additional computations, users can hide a colored se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive function-based artistic shape modeling

    Publication Year: 2002, Page(s):521 - 528
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (778 KB) | HTML iconHTML

    This paper addresses interactive function-based shape modeling where relatively small formulas are used rather than thousands of polygons. Interactive modification of the function model with concurrent visualization of the respective polygonal mesh provides both interactivity and any required level of detail leading to a photorealistic appearance of the resulting shapes. We have proposed a renderi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent based campus information providing system for cellular phone

    Publication Year: 2002, Page(s):339 - 345
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (930 KB) | HTML iconHTML

    In this paper a campus information providing system (CIPS) for cellular phones is proposed. By using this system, the search time to find the necessary information in the campus is reduced. A user can access the system using the cellular phone terminal and by clicking the links or by inserting a keyword in the form they can get easily the campus information. The system has four agents which deals ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topological morphing using Reeb graphs

    Publication Year: 2002, Page(s):465 - 471
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    Metamorphosis between 3D objects is often the transformation between a pair of shapes that have the same topology. This paper presents a new model using Reeb graphs and their contours to create morphing between 3D objects having different topology. The proposed method specifies the correspondence between of the input objects by using the graph isomorphic theory. Then the super Reeb graph, which ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the RNN to develop a Web-based pattern recognition system for pattern search of component database

    Publication Year: 2002, Page(s):146 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (811 KB) | HTML iconHTML

    This study attempts to apply pattern recognition (PR) technologies with associative memory to real-time pattern recognition of engineering components using a client-server network structure in a Web-based recognition system. A remote engineer is able to draw directly the shape of engineering components using the browser, and the recognition system will search for the component database of a compan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-based software engineering education environment supporting collaboration between the teacher side and the student groups

    Publication Year: 2002, Page(s):323 - 330
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Software development is knowledge-intensive work. In a software project, various types of problems need to be resolved. One approach to acquiring the knowledge necessary for software development in a university education environment is for the students to experience project-based software development. For this kind of education to succeed, collaboration is inevitable between both the teacher side ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.