By Topic

IEEE Computer Graphics and Applications

Issue 2 • Date March-April 2006

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2470 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1839 KB)
    Freely Available from IEEE
  • Things Between and Behind

    Publication Year: 2006, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (5568 KB) | HTML iconHTML
    Freely Available from IEEE
  • Visual effects and video analysis lead to Olympics victories

    Publication Year: 2006, Page(s):6 - 11
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2648 KB) | HTML iconHTML

    In one study, researchers at several universities and the US Olympic Committee compared triple and quadruple toe loops by using high-speed video and 3D analyses at the 2002 Salt Lake City Winter Olympics. Researchers created 3D models of the skaters using motion capture from video taken with special camera systems during competitions. To capture a skill from anywhere on the rink, calibration of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Membership Information

    Publication Year: 2006, Page(s): 12
    Request permission for commercial reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • 2006 IEEE Computer Society Professional Membership/Subscription Application

    Publication Year: 2006, Page(s):13 - 14
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • On 3D input devices

    Publication Year: 2006, Page(s):15 - 19
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4256 KB) | HTML iconHTML

    We provide an overview of some of our input device developments, which we designed in response to the need for more advanced 3D interfaces. Some of our devices are more task-specific and others are more general, but all of them support six or more degrees of freedom (DOF) and work in three dimensions. In our work, we try to understand the essential requirements of individual tasks and task combina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NIH-NSF visualization research challenges report summary

    Publication Year: 2006, Page(s):20 - 24
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4256 KB) | HTML iconHTML

    The US National Science Foundation (NSF) convened a panel to report on the potential of visualization as a new technology. The NSF and US National Institutes of Health (NIH) convened the Visualization Research Challenges (VRC) Executive Committee to write a new report. Here, we summarize that new VRC report. We explore the state of the field, examine the potential impact of visualization on areas ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Distance Learning Campus

    Publication Year: 2006, Page(s): 25
    Request permission for commercial reuse | PDF file iconPDF (269 KB)
    Freely Available from IEEE
  • Guest Editor's Introduction: Visualization for Cybersecurity

    Publication Year: 2006, Page(s):26 - 27
    Request permission for commercial reuse | PDF file iconPDF (152 KB) | HTML iconHTML
    Freely Available from IEEE
  • IDGraphs: intrusion detection and analysis using stream compositing

    Publication Year: 2006, Page(s):28 - 39
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12528 KB) | HTML iconHTML

    IDGraphs is an interactive visualization system, supporting intrusion detection over massive network traffic streams. It features a novel time-versus-failed-connections mapping that aids in discovery of attack patterns. The number of failed connections (SYN-SYN/ACK) is a strong indicator of suspicious network flows. IDGraphs offers several flow aggregation methods that help reveal different attack... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical visualization of network intrusion detection data

    Publication Year: 2006, Page(s):40 - 47
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2349 KB) | HTML iconHTML

    A technique for visualizing intrusion-detection system log files using hierarchical data based on IP addresses represents the number of incidents for thousands of computers in one display space. Our technique applies a hierarchical data visualization technique that represents leaf nodes as black square icons and branch nodes as rectangular borders enclosing the icons. This representation style vis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual correlation of network alerts

    Publication Year: 2006, Page(s):48 - 59
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4776 KB) | HTML iconHTML

    The VisAlert visual correlation tool facilitates situational awareness in complex network environments by providing a holistic view of network security to help detect malicious activities. Information visualization techniques and methods in many applications have effectively increased operators' situational awareness, letting them more effectively detect, diagnose, and treat anomalous conditions. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Countering security information overload through alert and packet visualization

    Publication Year: 2006, Page(s):60 - 70
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8813 KB) | HTML iconHTML

    This article presents a framework for designing network security visualization systems as well as results from the end-to-end design and implementation of two highly interactive systems. In this article, we provide multiple contributions: we present the results of our survey of security professionals, the design framework, and lessons learned from the design of our systems as well as an evaluation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Digital Library Packages for Institutions

    Publication Year: 2006, Page(s): 71
    Request permission for commercial reuse | PDF file iconPDF (273 KB)
    Freely Available from IEEE
  • Focusing on context in network traffic analysis

    Publication Year: 2006, Page(s):72 - 80
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4680 KB) | HTML iconHTML

    The time-based network traffic visualizer combines low-level, textual detail with multiple visualizations of the larger context to help users construct a security event's big picture. TNV is a visualization tool grounded in an under standing of the work practices of security analysts. We designed it to support ID analysis by giving analysts a visual display that facilitates pattern and anomaly rec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2006, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • How to solve a quadratic equation. Part 2

    Publication Year: 2006, Page(s):82 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (867 KB) | HTML iconHTML

    We derived an algorithm to find the real roots of the homogeneous quadratic equation, Ax2+2Bxw+Cw2=0. Because the equation is homogeneous, a root consists of an [x, w] pair where any nonzero multiple represents the same root. We strove to find an algorithm that didn't blow up no matter what values of A, B, and C we were given, including various combinations of zeroes. At the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CAD/CAM for nanoscale self-assembly

    Publication Year: 2006, Page(s):88 - 91
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1040 KB) | HTML iconHTML

    IEEE Computer Graphics and Applications has a long tradition of addressing CAD/CAM problems, a tradition that extends even beyond the well-known special issue on solid modeling. Here, we discuss the conversion of a standard representation for a solid object (for example, a boundary representation) into a set of complex message-passing instructions for manufacturing the object by a distributed syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tools and Products

    Publication Year: 2006, Page(s):92 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4686 KB) | HTML iconHTML

    In this issue, Tools and Products provides information about Christie's Matrix Simulation Projector, Userful's DiscoverStation 4.0, TV One's LCDs, InPhase Technologies' Tapestry HDS4000, Syntax-Brillian's Olevia LCDs, Emulex' HBA firmware and drivers, Vizio's 42HDTV, PhatWare's PhatPad 3.0, Eovia's Carrara 5, Right Hemisphere's Adobe Design Collaboration software, Access and Koto's multimedia plat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertiser/Product Index

    Publication Year: 2006, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • [Back inside cover]

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE

Aims & Scope

IEEE CG&A bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a unique combination of peer-reviewed feature articles and informal departments, including product announcements.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
L. Miguel Encarnação
University of Iowa