First International Symposium on Cyber Worlds, 2002. Proceedings.

6-8 Nov. 2002

Filter Results

Displaying Results 1 - 25 of 74
  • Proceedings First International Symosium on Cyber Worlds

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • An image copyright protection scheme based on torus automorphism

    Publication Year: 2002, Page(s):217 - 224
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (629 KB) | HTML iconHTML

    We propose an approach to protect the copyright of image data. Many watermarking techniques have been proposed to guard the copyright of image data, most of which need to embed the watermark in the cover image. Unfortunately, embedding always results in a reduction of image quality. To achieve the goal of copyright protection without reducing image quality, we incorporate the concept of digital si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):561 - 562
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Function-based 3D web visualization

    Publication Year: 2002, Page(s):428 - 435
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (606 KB) | HTML iconHTML

    This paper describes how the web-based visualization can be greatly improved using the function-based shape modeling technique. The improvement is possible because the proposed function-defined VRML shape node allows the content creators to describe any complex models with relatively small functions compared to the large-size polygonal mesh based VRML nodes. These function-defined shapes can be us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process of software evolution

    Publication Year: 2002, Page(s):8 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    A number of interesting phenomena can be observed when lifelong processes of object-oriented software are analyzed from the viewpoint of software evolution. This paper proposes a framework of software evolution studies and reports the results of empirical case studies and evolution patterns discovered through the analysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel datacube model supporting interactive web-log mining

    Publication Year: 2002, Page(s):419 - 427
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (914 KB) | HTML iconHTML

    Web-log mining is a technique to find "useful" information from access-log data. Typically, association rule mining is used to find frequent patterns (or sequence patterns) of visited pages from access logs and to build users' behavior models from those patterns. In this direction, there exists a difficulty that a human decision-maker must do such data mining process many times under different con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber graphics

    Publication Year: 2002, Page(s):3 - 7
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1093 KB) | HTML iconHTML

    Cyber graphics as an emerging technology has been playing key roles as human interfaces of cyber worlds. With the ever increasing roles of cyber worlds in the real world, as seen in e-financial trading that deals the GDP equivalent in a day, understanding of cyber graphics is becoming essential. To this end, scientific research has been conducted to grasp the foundation as invariants. Cellular mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extensible requirements patterns of web application for efficient web application development

    Publication Year: 2002, Page(s):412 - 418
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Nowadays, web application has been going to be an e-business application. In the e-business environment, reducing time to market is a critical issue. Therefore, web application development process and time to market must be highly accelerated. On the other hand, a lot of redundant works actually occurred in the web application development. This paper presents the solutions for these problems, by p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid method for estimating the Euclidean distance between two vectors

    Publication Year: 2002, Page(s):183 - 190
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    We propose an alternative method for estimating the Euclidean distance between an image block and a codeword. Our method incorporates the reduced code look-up table (RCLUT) method with an RCLUT-like method to allow alternative selection in the encoding phase in vector quantization (VQ). This method can speed up computation for distance estimation. It provides better image quality than the RCLUT me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent based campus information providing system for cellular phone

    Publication Year: 2002, Page(s):339 - 345
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (930 KB) | HTML iconHTML

    In this paper a campus information providing system (CIPS) for cellular phones is proposed. By using this system, the search time to find the necessary information in the campus is reduced. A user can access the system using the cellular phone terminal and by clicking the links or by inserting a keyword in the form they can get easily the campus information. The system has four agents which deals ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Possible techniques for three dimensional hatching

    Publication Year: 2002, Page(s):515 - 520
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    This paper introduces a basic technique for drawing non-photorealistic images of volume models. The turtle graphics approach to imitating painting operations is implemented in 3D space. Objects are defined by sets of scattered range data. Analytically (that is, functionally represented) and procedurally defined geometric objects can also be used. The proposed technique is described in detail and p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple ant-colony optimization for network routing

    Publication Year: 2002, Page(s):277 - 281
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1663 KB) | HTML iconHTML

    An ANT is a mobile agent that is capable of solving various kinds of routing and congestion problems in computer networking by continuously modifying routing tables in response to congestion. In a distributed problem solving paradigm, a society of ANTs (each contributing some information) collaborate to solve a larger problem. In recent years, ant-based algorithms were used to solve classical rout... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OntoRama: Browsing RDF ontologies using a hyperbolic-style browser

    Publication Year: 2002, Page(s):405 - 411
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (755 KB) | HTML iconHTML

    This paper presents a Java-based hyperbolic-style browser designed to render RDF files as structured ontological maps. The program was motivated by the need to browse the content of a web-accessible ontology server: WEB KB-2. The ontology server contains descriptions of over 74,500 object types derived from the WordNet 1.7 lexical database and can be accessed using RDF syntax. Such a structure cre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A stitching algorithm of still pictures with camera translation

    Publication Year: 2002, Page(s):176 - 182
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    We propose a method to stitch still images taken by a camera with translation and generate a panoramic image automatically. In such a situation, perspective parallax may arise at overlapping regions of two neighboring picture images, making stitching difficult if we use the existing algorithm in panoramic systems. To solve this problem, we introduce a technique of pattern detection and point-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • University software education matched to social requests

    Publication Year: 2002, Page(s):331 - 336
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    We raised issues of how the software education matching to a social request should be carried out in universities in this cyber-world era. In the high-tech era, it is unavoidable that almost all the high-tech products are provided as black-box. For this reason, it, too, is unavoidable that the education in high-tech era will, in stead of extracting the befit of the high-tech stuff, force us to mem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real-time configurable shader based on lookup tables

    Publication Year: 2002, Page(s):507 - 514
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3563 KB) | HTML iconHTML

    This paper presents hardware architecture for a configurable shader with pre-filtered environment mapping and twist/bump pattern mapping. Our architecture enables per-pixel shading calculation, which can be programmed by means of lookup tables, random-access memories (RAMs) and read-only memories (ROMs), and provides real-time rendering with various shading and reflectance models, such as Blinn-Ph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An e-shopping system with different negotiation model

    Publication Year: 2002, Page(s):311 - 317
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    This paper proposes an agent based e-shopping system that uses different negotiation models to match different users and generates different negotiation model objects for adaptation of different user preferences. Five different levels from simple to sophisticated of negotiation models are described. How different models are matched to different users is explained and how adaptation of different us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The general autocorrelation and its application

    Publication Year: 2002, Page(s):267 - 273
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The general autocorrelation proposed is the extension of the traditional autocorrelation. Besides having the same ability as autocorrelation to reveal the characteristics of the linear structures, the strict avalanche criterion (SAC) and the propagation criterion (PC) of degree k, the general autocorrelation is capable of finding the order of SAC and PC which is a capability that autocorrelation d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HLPM - a high level protocol monitoring tool for education

    Publication Year: 2002, Page(s):397 - 404
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    A high level protocol monitoring tool (HLPM) for education is presented. This tool provides an easy interface for learners who have little technical background to understand the design and implementation of Internet application protocols. Using this tool, learners can monitor, test and write interaction scenarios of an application level protocol. The tool incorporates the FESI Script (an interpret... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond flat panning and zooming: dolly-enhanced SQTVR

    Publication Year: 2002, Page(s):545 - 552
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    This paper describes a novel solution to limitations associated with interactive display of immersive stereographic imagery via Apple's QuickTime Virtual Reality (QTVR) technology. A unique multinode implementation providing Stereographic QTVR (termed here SQTVR) enables display of pairs of images exhibiting binocular parallax, and the stereoscopic depth percept that results is enhanced by motion ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical image retouching method

    Publication Year: 2002, Page(s):480 - 487
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    In this paper we present a novel fast algorithm for image retouching. A space-mapping technique is used to transform a missing (or damaged) part of a surface into a different shape in a continuous manner. Experimental results are included to demonstrate the feasibility of our approach. The proposed approach shows the obvious relationship between the surface retouching problem and image inpainting.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of relative effectiveness of features in content-based image retrieval

    Publication Year: 2002, Page(s):168 - 175
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (823 KB) | HTML iconHTML

    Content-based retrieval in image databases requires appropriate features of images to be derived and used in the indexing and searching process. Fast and accurate retrieval is crucial from a user point of view. The kinds of features used, their organization in suitable data structures, and the similarity search scheme, directly affect the speed and quality of content-based retrieval. In this paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms and complexity for weighted hypergraph embedding in a cycle

    Publication Year: 2002, Page(s):70 - 75
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    The problem of weighted hypergraph embedding in a cycle (WHEC) is to embed the weighted hyperedges of a hypergraph as the paths in a cycle, such that the maximum congestion of any physical link in the cycle is minimized. A simpler version of this problem is the weighted graph embedding in a cycle (WGEC) that embeds the weighted edges of a normal graph as the paths in a cycle. The WHEC and WGEC pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shape modeling using cellular structured spaces

    Publication Year: 2002, Page(s):447 - 454
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (749 KB) | HTML iconHTML

    Abstraction is one of the most important concepts in computer science. It has been realized in object oriented programming as the form of class hierarchy. In this paper, new abstraction levels are introduced. This abstraction level can be applied in many fields of computer science, including computer graphics, image processing, database systems and design automation. In this paper the new abstract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new QoS routing approach for multimedia applications based on genetic algorithms

    Publication Year: 2002, Page(s):289 - 295
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    In order to support multimedia communication over high speed networks, it is necessary to develop routing algorithms which use for routing more than one QoS parameter. This is because new services such as video on demand and remote meeting systems require better QoS. However, the problem of QoS routing is difficult and to find a feasible route with two independent path constraints is NP-complete. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.