First International Symposium on Cyber Worlds, 2002. Proceedings.

6-8 Nov. 2002

Filter Results

Displaying Results 1 - 25 of 74
  • Proceedings First International Symosium on Cyber Worlds

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • Cyber graphics

    Publication Year: 2002, Page(s):3 - 7
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1093 KB) | HTML iconHTML

    Cyber graphics as an emerging technology has been playing key roles as human interfaces of cyber worlds. With the ever increasing roles of cyber worlds in the real world, as seen in e-financial trading that deals the GDP equivalent in a day, understanding of cyber graphics is becoming essential. To this end, scientific research has been conducted to grasp the foundation as invariants. Cellular mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process of software evolution

    Publication Year: 2002, Page(s):8 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    A number of interesting phenomena can be observed when lifelong processes of object-oriented software are analyzed from the viewpoint of software evolution. This paper proposes a framework of software evolution studies and reports the results of empirical case studies and evolution patterns discovered through the analysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual rooms for building complex interactive learning environments

    Publication Year: 2002, Page(s):16 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Through the specific example of an early 1990s office-based prototype prepared for students in the first analog electronics course in electrical engineering, the paper discusses how an interconnected collection of virtual rooms offers designers a flexible and efficient means of incorporating learning materials into student-centered interactive learning environments that, according to current learn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct segmentation for reverse engineering

    Publication Year: 2002, Page(s):24 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1952 KB) | HTML iconHTML

    In reverse engineering a physical object is digitally reconstructed from a set of boundary points. In the segmentation phase these points are grouped into subsets to facilitate consecutive steps as surface fitting. In this paper we present a step segmentation method with subsequent classification of simple algebraic surfaces. Our method is direct in the sense that it operates directly on the point... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatial knowledge and cyberworlds

    Publication Year: 2002, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    "Spatialization" refers to the creation of a graphic representation based on a spatial metaphor and the transformation that condenses large complex semantic domains into their essential components. Spatialization can be defined as the projection of elements of a high-dimensional information space into a low-dimensional, potentially experiential, interactive, representational space. Spatialization ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distance education technologies: current trends and software systems

    Publication Year: 2002, Page(s):38 - 43
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    This paper presents state-of-the-art technologies of distance education systems. A survey of current approaches in distance education is given, including a historical perspective of media technologies for learning. The paper also discusses current systems available and potential research directions to enhance these systems. Methodological and sociological issues of distance education are also disc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data redistribution using MPI user-defined types

    Publication Year: 2002, Page(s):47 - 53
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    In many parallel programs, run-time data redistribution is usually required to enhance data locality and reduce remote memory access on the distributed memory multicomputers. Recently researches in data redistribution algorithm have become very mature. The time required to generate data sets and processor sets is much lesser then before. That means packing/unpacking becomes a relatively heavy cost... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a leasing service for CORBA-based applications

    Publication Year: 2002, Page(s):54 - 61
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    The leasing concept enjoys increasing popularity, in the context of distributed systems - a prime example for this is Jini. In this paper, we present a service that realises the leasing concept for the CORBA environment. We discuss various resource management techniques with regard to CORBA and detail their advantages and disadvantages. The focus of this work, however, is the description of the de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient data compression methods for multi-dimensional sparse array operations

    Publication Year: 2002, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    For sparse array operations, in general, the sparse arrays are compressed by some data compression schemes in order to obtain better performance. The Compressed Row/Column Storage (CRS/CCS) schemes are the two common used data compression schemes for sparse arrays in the traditional matrix representation (TMR). When extended to higher dimensional sparse arrays, array operations using the CRS/CCS s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms and complexity for weighted hypergraph embedding in a cycle

    Publication Year: 2002, Page(s):70 - 75
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    The problem of weighted hypergraph embedding in a cycle (WHEC) is to embed the weighted hyperedges of a hypergraph as the paths in a cycle, such that the maximum congestion of any physical link in the cycle is minimized. A simpler version of this problem is the weighted graph embedding in a cycle (WGEC) that embeds the weighted edges of a normal graph as the paths in a cycle. The WHEC and WGEC pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable distributed search engine based on multiple meta servers

    Publication Year: 2002, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    We have developed distributed search engine, called cooperative search engine (CSE), in order to retrieve fresh information. In CSE, a local search engine located in each Web server makes an index of local pages. And, a meta search server integrates these local search engines in order to realize a global search engine. This meta server is single point of failure in CSE. We propose redundancy, of m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From dual-cube to metacube: efficient low-degree alternatives to hypercube

    Publication Year: 2002, Page(s):85 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    The hypercube has been widely used as the interconnection network in parallel computers. However, when dealing with the parallel computers of very large scale, the port limitation due to the technology greatly forbid the use of hypercube networks. The hypercube-based SGI Origin2000, a newly developed multiprocessor system, tried to solve this problem by introducing a Cray router. In this paper we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of SVD algorithm on the Trident processor

    Publication Year: 2002, Page(s):95 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1720 KB) | HTML iconHTML

    Within the current decade, process technology is promising one billion transistors on a single die, operating at frequency of from 6 to 10 GHz. As a direct result of the fundamental trends of increasing transistors density and switching speeds, newer technological and microarchitectural design constrains are introduced. Among them, wire delays will become critical. To take the benefits of the VLSI... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified framework for software development

    Publication Year: 2002, Page(s):105 - 112
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    This paper introduces an alternative methodology, Lyee methodology, which provides a unified and deterministic framework to enhance the efficiency of software development and simplifies system maintenance and integration. This framework also simplifies the complexity of the software structure and provides a structure for users or customers to express their intentions or knowledge directly in the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation approach to verification and validation of formal specifications

    Publication Year: 2002, Page(s):113 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1388 KB) | HTML iconHTML

    Specification simulation is an approach to verifying and validating specifications by well-selected sample data. In this paper we put forward a technique for simulation of formal specifications in order to detect potential faults and validate their desired functions. The important benefit of this technique is it allows us to simulate implicit specifications, which are usually defined with a pair o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategies to suppress productivity degradation with unknown issues under iterative development process

    Publication Year: 2002, Page(s):121 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    Two different approaches in the iterative development process have been proposed for development projects using object technologies: the modeling intensive approach and the implementation intensive approach. The differences between the two approaches arise partly from differences in strategies to suppress productivity degradation by trial and error with unknown issues in development projects. Stra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database semantics representation for natural language access

    Publication Year: 2002, Page(s):127 - 133
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    In natural language database interfaces (NLDBI), manual construction of translation knowledge normally undermines domain portability because of its expensive human intervention. To overcome this, this paper proposes linguistically-motivated database semantics in order to systematically construct translation knowledge. Database semantics consists of two structures which are designed to function as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thai OCR error correction using genetic algorithm

    Publication Year: 2002, Page(s):137 - 141
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    This paper presents an efficient method for Thai OCR error correction based on genetic algorithm (GA). The correction process starts with word graph construction from spell checking with dictionary, then a graph is searched for a corrected sentence with the highest perplexity (using language model, bi-gram and tri-gram) and word probability from OCR. For a long sentence, a search space is huge and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HMM topology selection for on-line Thai handwriting recognition

    Publication Year: 2002, Page(s):142 - 145
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    Researchers have extensively applied hidden Markov models (HMM) to handwriting recognition in English, Chinese, and other languages. Most researchers have used left-right topology for handwriting and speech recognition. This research studied the effect of HMM topology on isolated online Thai handwriting recognition. The left-right, fully connected and proposed topologies (left-right-left) were com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the RNN to develop a Web-based pattern recognition system for pattern search of component database

    Publication Year: 2002, Page(s):146 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (811 KB) | HTML iconHTML

    This study attempts to apply pattern recognition (PR) technologies with associative memory to real-time pattern recognition of engineering components using a client-server network structure in a Web-based recognition system. A remote engineer is able to draw directly the shape of engineering components using the browser, and the recognition system will search for the component database of a compan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Result integration in a meta Web search engine

    Publication Year: 2002, Page(s):154 - 158
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    A meta Web search engine first sends a user's search requests to its referenced search engines. The results returned by these search engines are then integrated by one result-integrating algorithm and returned to the user. Query precision, completeness and response speed are directly affected by the choice of result integration algorithm. By analyzing common result-integrating algorithms, this pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content-based video retrieval using mosaic images

    Publication Year: 2002, Page(s):161 - 167
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    Content-based video retrieval is one of the most active multimedia research issues. We propose a system for retrieving video data by means of mosaic images. Mosaicing is a technique of joining/merging frames of a shot into one blended image. The resulting mosaic image can convey three primitive features in videos, that is, background, (moving) objects, and camera work such as pan, tilt and zoom. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of relative effectiveness of features in content-based image retrieval

    Publication Year: 2002, Page(s):168 - 175
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (823 KB) | HTML iconHTML

    Content-based retrieval in image databases requires appropriate features of images to be derived and used in the indexing and searching process. Fast and accurate retrieval is crucial from a user point of view. The kinds of features used, their organization in suitable data structures, and the similarity search scheme, directly affect the speed and quality of content-based retrieval. In this paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A stitching algorithm of still pictures with camera translation

    Publication Year: 2002, Page(s):176 - 182
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    We propose a method to stitch still images taken by a camera with translation and generate a panoramic image automatically. In such a situation, perspective parallax may arise at overlapping regions of two neighboring picture images, making stitching difficult if we use the existing algorithm in panoramic systems. To solve this problem, we introduce a technique of pattern detection and point-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.