By Topic

First International Symposium on Cyber Worlds, 2002. Proceedings.

6-8 Nov. 2002

Filter Results

Displaying Results 1 - 25 of 74
  • Proceedings First International Symosium on Cyber Worlds

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s):561 - 562
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Spatial knowledge and cyberworlds

    Publication Year: 2002, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    "Spatialization" refers to the creation of a graphic representation based on a spatial metaphor and the transformation that condenses large complex semantic domains into their essential components. Spatialization can be defined as the projection of elements of a high-dimensional information space into a low-dimensional, potentially experiential, interactive, representational space. Spatialization ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet voting: concerns and solutions

    Publication Year: 2002, Page(s):261 - 266
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Internet voting systems, catering to different requirements, have been widely implemented and used. Some have been successful, while others have experienced unexpected problems. This paper overviews the concerns of using Internet voting and tries to give solutions. Tradeoffs between the advantages and disadvantages of employing Internet voting are also addressed. A simple protocol is designed to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct segmentation for reverse engineering

    Publication Year: 2002, Page(s):24 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1952 KB) | HTML iconHTML

    In reverse engineering a physical object is digitally reconstructed from a set of boundary points. In the segmentation phase these points are grouped into subsets to facilitate consecutive steps as surface fitting. In this paper we present a step segmentation method with subsequent classification of simple algebraic surfaces. Our method is direct in the sense that it operates directly on the point... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel datacube model supporting interactive web-log mining

    Publication Year: 2002, Page(s):419 - 427
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (914 KB) | HTML iconHTML

    Web-log mining is a technique to find "useful" information from access-log data. Typically, association rule mining is used to find frequent patterns (or sequence patterns) of visited pages from access logs and to build users' behavior models from those patterns. In this direction, there exists a difficulty that a human decision-maker must do such data mining process many times under different con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vertically stacked Benes networks for crosstalk-free permutation

    Publication Year: 2002, Page(s):255 - 260
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    Crosstalk in optical switching elements (SEs) is one of the major shortcomings in optical switching networks, and avoiding crosstalk is an important issue for proper optical network operation. We propose a new class of optical multistage interconnection networks (MINs)-vertically stacked Benes networks VSB(N, K) that have N inputs (outputs) and consist of K vertically stacked Benes networks. The V... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synchronous parallel GA with nearly zero sequential computations

    Publication Year: 2002, Page(s):296 - 300
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1957 KB) | HTML iconHTML

    Generally speaking, genetic algorithms (GAs) can provide global optimal solutions with higher probability. However, compared with conventional approaches, GAs are usually more time consuming. To solve this problem, different parallel GAs (PGAs) have been proposed in the literature. A direct method is to employ many slave processors for individual evaluation, and a master processor to synchronize t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a leasing service for CORBA-based applications

    Publication Year: 2002, Page(s):54 - 61
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    The leasing concept enjoys increasing popularity, in the context of distributed systems - a prime example for this is Jini. In this paper, we present a service that realises the leasing concept for the CORBA environment. We discuss various resource management techniques with regard to CORBA and detail their advantages and disadvantages. The focus of this work, however, is the description of the de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual rooms for building complex interactive learning environments

    Publication Year: 2002, Page(s):16 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Through the specific example of an early 1990s office-based prototype prepared for students in the first analog electronics course in electrical engineering, the paper discusses how an interconnected collection of virtual rooms offers designers a flexible and efficient means of incorporating learning materials into student-centered interactive learning environments that, according to current learn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shape modeling using cellular structured spaces

    Publication Year: 2002, Page(s):447 - 454
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (749 KB) | HTML iconHTML

    Abstraction is one of the most important concepts in computer science. It has been realized in object oriented programming as the form of class hierarchy. In this paper, new abstraction levels are introduced. This abstraction level can be applied in many fields of computer science, including computer graphics, image processing, database systems and design automation. In this paper the new abstract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extensible requirements patterns of web application for efficient web application development

    Publication Year: 2002, Page(s):412 - 418
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Nowadays, web application has been going to be an e-business application. In the e-business environment, reducing time to market is a critical issue. Therefore, web application development process and time to market must be highly accelerated. On the other hand, a lot of redundant works actually occurred in the web application development. This paper presents the solutions for these problems, by p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cellular design system for soft and varied sized objects

    Publication Year: 2002, Page(s):386 - 393
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    After we sketch the design of a product on the Web, we can obtain each part of the product applying a cell decomposition to the sketched design based on the cellular model operations and then applying the homotopy theory to it. When we perform cell decomposition, we can specify the manufacturing procedures of a product as homotopy invariants based on the homotopy theory. Using the parts and the ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis of the WD public-key cryptosystem

    Publication Year: 2002, Page(s):249 - 254
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    The theory of generalized inverses of matrices over finite fields has been used in cryptographic applications in recent years. Wu and Dawson (1998) proposed a public-key cryptosystem based on generalized inverses of matrices. In 2001, Sun proposed a scheme for cryptanalysing Wu and Dawson's public-key cryptosystem. However, his method is time intensive because message recovery requires the pre-com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new QoS routing approach for multimedia applications based on genetic algorithms

    Publication Year: 2002, Page(s):289 - 295
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    In order to support multimedia communication over high speed networks, it is necessary to develop routing algorithms which use for routing more than one QoS parameter. This is because new services such as video on demand and remote meeting systems require better QoS. However, the problem of QoS routing is difficult and to find a feasible route with two independent path constraints is NP-complete. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • University software education matched to social requests

    Publication Year: 2002, Page(s):331 - 336
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    We raised issues of how the software education matching to a social request should be carried out in universities in this cyber-world era. In the high-tech era, it is unavoidable that almost all the high-tech products are provided as black-box. For this reason, it, too, is unavoidable that the education in high-tech era will, in stead of extracting the befit of the high-tech stuff, force us to mem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive function-based artistic shape modeling

    Publication Year: 2002, Page(s):521 - 528
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (778 KB) | HTML iconHTML

    This paper addresses interactive function-based shape modeling where relatively small formulas are used rather than thousands of polygons. Interactive modification of the function model with concurrent visualization of the respective polygonal mesh provides both interactivity and any required level of detail leading to a photorealistic appearance of the resulting shapes. We have proposed a renderi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data redistribution using MPI user-defined types

    Publication Year: 2002, Page(s):47 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    In many parallel programs, run-time data redistribution is usually required to enhance data locality and reduce remote memory access on the distributed memory multicomputers. Recently researches in data redistribution algorithm have become very mature. The time required to generate data sets and processor sets is much lesser then before. That means packing/unpacking becomes a relatively heavy cost... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process of software evolution

    Publication Year: 2002, Page(s):8 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    A number of interesting phenomena can be observed when lifelong processes of object-oriented software are analyzed from the viewpoint of software evolution. This paper proposes a framework of software evolution studies and reports the results of empirical case studies and evolution patterns discovered through the analysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Presenting methods for unraveling the first two regular 4D polytopes (4D simplex and the hypercube)

    Publication Year: 2002, Page(s):439 - 446
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB) | HTML iconHTML

    This article presents methods for unraveling the hypercube and the 4D simplex and obtaining the unravelings that corresponds to the hyper-flattening of their boundaries. These regular polytopes can be raveled back using the methods in an inverse way. The transformations to apply include rotations around a plane (characteristic of the 4D space). All these processes can be viewed using a computer an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OntoRama: Browsing RDF ontologies using a hyperbolic-style browser

    Publication Year: 2002, Page(s):405 - 411
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (755 KB) | HTML iconHTML

    This paper presents a Java-based hyperbolic-style browser designed to render RDF files as structured ontological maps. The program was motivated by the need to browse the content of a web-accessible ontology server: WEB KB-2. The ontology server contains descriptions of over 74,500 object types derived from the WordNet 1.7 lexical database and can be accessed using RDF syntax. Such a structure cre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation approach to verification and validation of formal specifications

    Publication Year: 2002, Page(s):113 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1388 KB) | HTML iconHTML

    Specification simulation is an approach to verifying and validating specifications by well-selected sample data. In this paper we put forward a technique for simulation of formal specifications in order to detect potential faults and validate their desired functions. The important benefit of this technique is it allows us to simulate implicit specifications, which are usually defined with a pair o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of SVD algorithm on the Trident processor

    Publication Year: 2002, Page(s):95 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1720 KB) | HTML iconHTML

    Within the current decade, process technology is promising one billion transistors on a single die, operating at frequency of from 6 to 10 GHz. As a direct result of the fundamental trends of increasing transistors density and switching speeds, newer technological and microarchitectural design constrains are introduced. Among them, wire delays will become critical. To take the benefits of the VLSI... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of Web service flows with model-checking techniques

    Publication Year: 2002, Page(s):378 - 385
    Cited by:  Papers (43)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Web service is an emerging software technology to use remote services in the Internet. As it becomes pervasive, some "language" to describe Web service flows is needed to combine existing services flexibly. The flow essentially describes distributed collaborations and is not easy to write and verify, while the fault that the flow description may contain can only be detected at runtime. The faulty ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key exchange protocols for multiparty communication services

    Publication Year: 2002, Page(s):241 - 248
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Network technology is improving distributed applications. The parties in distributed applications need to exchange secret information to perform a specific task, and these parties form a specific group. Secret message exchanges in the group are likely to be in a secret conference over a network. To perform secret message exchange, one needs a common secret key to encrypt or decrypt messages. The b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.