By Topic

IEEE Computer Graphics and Applications

Issue 5 • Date Sept.-Oct. 2007

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1016 KB)
    Freely Available from IEEE
  • Call for Papers--IEEE Computer Graphics and Applications

    Publication Year: 2007, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (277 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1754 KB)
    Freely Available from IEEE
  • Beauty in Chaos [About the Cover]

    Publication Year: 2007, Page(s):4 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (931 KB) | HTML iconHTML

    This issue's cover features art by Stefano Menicagli. In this article, Menicagli describes his work and his process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Machine Learning to Boost the Next Generation of Visualization Technology

    Publication Year: 2007, Page(s):6 - 9
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2210 KB) | HTML iconHTML

    Visualization has become an indispensable tool in many areas of science and engineering. In particular, the advances made in the field of visualization over the past 20 years have turned visualization from a presentation tool to a discovery tool. Machine learning has received great success in both data mining and computer graphics; surprisingly, the study of systematic ways to employ machine learn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Action- and Workflow-Driven Augmented Reality for Computer-Aided Medical Procedures

    Publication Year: 2007, Page(s):10 - 14
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1270 KB) | HTML iconHTML

    During the past three years, we've tried to develop integrated AR solutions in the context of minimally invasive surgery. We have therefore focused on four main issues: recovery and monitoring of surgical workflow, integrating preoperative and intraoperative anatomic and functional data, improving visual perception in a mixed environment, and developing new user interaction paradigms for taking fu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Discovering the Unexpected

    Publication Year: 2007, Page(s):15 - 19
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    The marriage of computation, visual representation, and interactive thinking supports intensive analysis. The goal is not only to permit users to detect expected events, such as might be predicted by models, but also to help users discover the unexpected—the surprising anomalies, changes, patterns, and relationships that are then examined and assessed to develop new insight. The Guest Edito... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual Discovery in Computer Network Defense

    Publication Year: 2007, Page(s):20 - 27
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1632 KB) | HTML iconHTML

    Computer network defense (CND) requires analysts to detect both known and novel forms of attacks in massive volumes of network data. It's through discovering the unexpected that CND analysts detect new versions of mal ware (such as viruses and Trojan horses) that have passed through their antivirus products, new methods of intrusion that have breached their firewalls and intrusion detection system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual Insights into High-Resolution Earthquake Simulations

    Publication Year: 2007, Page(s):28 - 34
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2891 KB) | HTML iconHTML Multimedia Media

    This study focuses on the visualization of a series of large earthquake simulations collectively called TeraShake. The simulation series aims to assess the impact of San Andreas Fault earthquake scenarios in Southern California. We discuss the role of visualization in gaining scientific insight and aiding unexpected discoveries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualizing Diversity and Depth over a Set of Objects

    Publication Year: 2007, Page(s):35 - 45
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1637 KB) | HTML iconHTML

    In many domains, the user is interested not only in including objects with particular desired values, but also in the distribution of values in the the set. Our approach for visualizing a set of objects uses glyphs overlaid on a composite representation of the entire set to convey objects' depth and the set's diversity. We test and apply this technique to three application domains: analyzing stude... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • nSpace and GeoTime: A VAST 2006 Case Study

    Publication Year: 2007, Page(s):46 - 56
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7532 KB) | HTML iconHTML

    The nSpace and GeoTime visual analytic tools enable investigation and understanding of complex, ambiguous situations. nSpace is a system of systems supporting the whole analytic workflow. GeoTime provides insight into events and behaviors in time and space. Junior analysts used the analytic capabilities that these tools support to investigate the 2006 Visual Analytics Science and Technology contes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2007, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Bridging the Semantic Gap: Visualizing Transition Graphs with User-Defined Diagrams

    Publication Year: 2007, Page(s):58 - 66
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2343 KB) | HTML iconHTML

    Analysts of computer-based systems often face large data sets, such as those represented in state transition graphs, in which the organizational structure is clear but interpreting the data is not. This new method lets users generate interactive visualizations that help them analyze systems more easily, accurately, and quickly. Computer scientists and engineers use state transition graphs to model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Silver Bullet Security Podcast Series [advertisement]

    Publication Year: 2007, Page(s): 67
    Request permission for commercial reuse | PDF file iconPDF (755 KB)
    Freely Available from IEEE
  • Occlusion-Resistant Camera Design for Acquiring Active Environments

    Publication Year: 2007, Page(s):68 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1179 KB) | HTML iconHTML

    In this article, we present a detailed theoretical analysis and a prototype implementation of a family of cameras designed with the explicit goal of detecting and removing interfering dynamic occluders in real time, during live capture, as opposed to fixing the resulting artifacts a posteriori. Such an early-acquisition approach improves efficiency: more valid samples are acquired faster without w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertisers' index

    Publication Year: 2007, Page(s): 79
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Retargeting Images and Video for Preserving Information Saliency

    Publication Year: 2007, Page(s):80 - 88
    Cited by:  Papers (38)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1169 KB) | HTML iconHTML

    A nonphotorealistic algorithm for retargeting images adapts large images so that important objects in the image are still recognizable when displayed at a lower target resolution. Unlike existing image manipulation techniques such as cropping and scaling, the retargeting algorithm can handle multiple important objects in an image. To identify the important objects in an image, we must first segmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Envisioning the Wind: Meteorology Graphics at Weather Underground

    Publication Year: 2007, Page(s):92 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6056 KB) | HTML iconHTML

    The structure built by Weather Underground and afforded by the Internet has led to a mass democratization of weather, where all can contribute and all can freely take. The danger of democracy, of course, is that none will contribute: ultimately, all weather data come from observations, without which neither predictions nor extralocal knowledge would be possible. Weather Underground site features s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Art: When Artistic and Cultural Muse Merges with Computer Technology

    Publication Year: 2007, Page(s):98 - 103
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1355 KB) | HTML iconHTML

    Digital artifacts or "artistic applications" as they are usually called, aim at displaying information content by materializing concepts in a digital format. In this article the author explains about the concepts and definitions behind digital art and the technological issues related to artistic and cultural heritage applications. Artistic creation begins with a concept or an abstract idea, which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tools and Products

    Publication Year: 2007, Page(s):104 - 91
    Request permission for commercial reuse | PDF file iconPDF (1383 KB) | HTML iconHTML
    Freely Available from IEEE
  • Call for Papers - Call for Papers

    Publication Year: 2007, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2007, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (355 KB)
    Freely Available from IEEE

Aims & Scope

IEEE CG&A bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a unique combination of peer-reviewed feature articles and informal departments, including product announcements.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
L. Miguel Encarnação
University of Iowa