First International Symposium on Cyber Worlds, 2002. Proceedings.

6-8 Nov. 2002

Filter Results

Displaying Results 1 - 25 of 74
  • Proceedings First International Symosium on Cyber Worlds

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • An image copyright protection scheme based on torus automorphism

    Publication Year: 2002, Page(s):217 - 224
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (629 KB) | HTML iconHTML

    We propose an approach to protect the copyright of image data. Many watermarking techniques have been proposed to guard the copyright of image data, most of which need to embed the watermark in the cover image. Unfortunately, embedding always results in a reduction of image quality. To achieve the goal of copyright protection without reducing image quality, we incorporate the concept of digital si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):561 - 562
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Web-based software engineering education environment supporting collaboration between the teacher side and the student groups

    Publication Year: 2002, Page(s):323 - 330
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Software development is knowledge-intensive work. In a software project, various types of problems need to be resolved. One approach to acquiring the knowledge necessary for software development in a university education environment is for the students to experience project-based software development. For this kind of education to succeed, collaboration is inevitable between both the teacher side ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From dual-cube to metacube: efficient low-degree alternatives to hypercube

    Publication Year: 2002, Page(s):85 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    The hypercube has been widely used as the interconnection network in parallel computers. However, when dealing with the parallel computers of very large scale, the port limitation due to the technology greatly forbid the use of hypercube networks. The hypercube-based SGI Origin2000, a newly developed multiprocessor system, tried to solve this problem by introducing a Cray router. In this paper we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of an effective learning method SQ3R based distance learning system

    Publication Year: 2002, Page(s):318 - 322
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    With the advantage of the scientific and the objective, many educational psychology-based learning methods, such as SQ3R learning method, meaningful reception learning method, SQ4R method, etc. are widely used in school education and individual study. At the same time, recently the WWW based education systems have flourished. But there are still few learning methods standing up for the WWW based l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatial knowledge and cyberworlds

    Publication Year: 2002, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    "Spatialization" refers to the creation of a graphic representation based on a spatial metaphor and the transformation that condenses large complex semantic domains into their essential components. Spatialization can be defined as the projection of elements of a high-dimensional information space into a low-dimensional, potentially experiential, interactive, representational space. Spatialization ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable distributed search engine based on multiple meta servers

    Publication Year: 2002, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    We have developed distributed search engine, called cooperative search engine (CSE), in order to retrieve fresh information. In CSE, a local search engine located in each Web server makes an index of local pages. And, a meta search server integrates these local search engines in order to realize a global search engine. This meta server is single point of failure in CSE. We propose redundancy, of m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An e-shopping system with different negotiation model

    Publication Year: 2002, Page(s):311 - 317
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    This paper proposes an agent based e-shopping system that uses different negotiation models to match different users and generates different negotiation model objects for adaptation of different user preferences. Five different levels from simple to sophisticated of negotiation models are described. How different models are matched to different users is explained and how adaptation of different us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS control in group communication

    Publication Year: 2002, Page(s):282 - 288
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    This paper discusses a communication model to exchange multimedia messages in a group of multiple processes. Quality of Service (QoS) required by an application has to be supported. In traditional communication protocols like TCP and RTP, a process can reliably deliver messages to one or more than one process, i.e. one-way transmission. In the group communication, a process sends multimedia messag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct segmentation for reverse engineering

    Publication Year: 2002, Page(s):24 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1952 KB) | HTML iconHTML

    In reverse engineering a physical object is digitally reconstructed from a set of boundary points. In the segmentation phase these points are grouped into subsets to facilitate consecutive steps as surface fitting. In this paper we present a step segmentation method with subsequent classification of simple algebraic surfaces. Our method is direct in the sense that it operates directly on the point... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database semantics representation for natural language access

    Publication Year: 2002, Page(s):127 - 133
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    In natural language database interfaces (NLDBI), manual construction of translation knowledge normally undermines domain portability because of its expensive human intervention. To overcome this, this paper proposes linguistically-motivated database semantics in order to systematically construct translation knowledge. Database semantics consists of two structures which are designed to function as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms and complexity for weighted hypergraph embedding in a cycle

    Publication Year: 2002, Page(s):70 - 75
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    The problem of weighted hypergraph embedding in a cycle (WHEC) is to embed the weighted hyperedges of a hypergraph as the paths in a cycle, such that the maximum congestion of any physical link in the cycle is minimized. A simpler version of this problem is the weighted graph embedding in a cycle (WGEC) that embeds the weighted edges of a normal graph as the paths in a cycle. The WHEC and WGEC pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real-time configurable shader based on lookup tables

    Publication Year: 2002, Page(s):507 - 514
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3563 KB) | HTML iconHTML

    This paper presents hardware architecture for a configurable shader with pre-filtered environment mapping and twist/bump pattern mapping. Our architecture enables per-pixel shading calculation, which can be programmed by means of lookup tables, random-access memories (RAMs) and read-only memories (ROMs), and provides real-time rendering with various shading and reflectance models, such as Blinn-Ph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML vs. Object-Oriented XML: Motivations, applications, and performance evaluation

    Publication Year: 2002, Page(s):371 - 377
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1604 KB) | HTML iconHTML

    Currently, XML by itself is a flat structure used to describe structured document for data transfer. In this paper, through a Web based video application which uses enhanced XML descriptions for data transfer, we present an approach to convert the enhanced XML into Object-Oriented XML by integrating them into an object-oriented database (OODB). To enhance the functionality of the XML objects, meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent based e-marketplace over e-business

    Publication Year: 2002, Page(s):303 - 310
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    E-business can help a company or enterprise to extend its market place to an unlimited region. Through Internet and WWW the limitation of distance and region are broken for business behaviors. The agent technique is one of the important technologies developed to support the Internet applications. Especially, the Internet and WWW technologies have broken the limitation of space of enterprise market... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous and robust navigation for simulated humanoid characters in virtual environments

    Publication Year: 2002, Page(s):531 - 536
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    An important task for virtual characters is autonomous navigation in a virtual environment. This involves finding a way through the environment leading to a certain goal, avoiding obstacles such as walls, or surfaces not suitable for walking on. This paper presents an algorithm that analyzes a given scene database in a preprocessing phase in a fully automatic manner. It identifies storeys, rooms a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A stitching algorithm of still pictures with camera translation

    Publication Year: 2002, Page(s):176 - 182
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    We propose a method to stitch still images taken by a camera with translation and generate a panoramic image automatically. In such a situation, perspective parallax may arise at overlapping regions of two neighboring picture images, making stitching difficult if we use the existing algorithm in panoramic systems. To solve this problem, we introduce a technique of pattern detection and point-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple ant-colony optimization for network routing

    Publication Year: 2002, Page(s):277 - 281
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1663 KB) | HTML iconHTML

    An ANT is a mobile agent that is capable of solving various kinds of routing and congestion problems in computer networking by continuously modifying routing tables in response to congestion. In a distributed problem solving paradigm, a society of ANTs (each contributing some information) collaborate to solve a larger problem. In recent years, ant-based algorithms were used to solve classical rout... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel datacube model supporting interactive web-log mining

    Publication Year: 2002, Page(s):419 - 427
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (914 KB) | HTML iconHTML

    Web-log mining is a technique to find "useful" information from access-log data. Typically, association rule mining is used to find frequent patterns (or sequence patterns) of visited pages from access logs and to build users' behavior models from those patterns. In this direction, there exists a difficulty that a human decision-maker must do such data mining process many times under different con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual rooms for building complex interactive learning environments

    Publication Year: 2002, Page(s):16 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Through the specific example of an early 1990s office-based prototype prepared for students in the first analog electronics course in electrical engineering, the paper discusses how an interconnected collection of virtual rooms offers designers a flexible and efficient means of incorporating learning materials into student-centered interactive learning environments that, according to current learn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategies to suppress productivity degradation with unknown issues under iterative development process

    Publication Year: 2002, Page(s):121 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    Two different approaches in the iterative development process have been proposed for development projects using object technologies: the modeling intensive approach and the implementation intensive approach. The differences between the two approaches arise partly from differences in strategies to suppress productivity degradation by trial and error with unknown issues in development projects. Stra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient data compression methods for multi-dimensional sparse array operations

    Publication Year: 2002, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    For sparse array operations, in general, the sparse arrays are compressed by some data compression schemes in order to obtain better performance. The Compressed Row/Column Storage (CRS/CCS) schemes are the two common used data compression schemes for sparse arrays in the traditional matrix representation (TMR). When extended to higher dimensional sparse arrays, array operations using the CRS/CCS s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Result integration in a meta Web search engine

    Publication Year: 2002, Page(s):154 - 158
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    A meta Web search engine first sends a user's search requests to its referenced search engines. The results returned by these search engines are then integrated by one result-integrating algorithm and returned to the user. Query precision, completeness and response speed are directly affected by the choice of result integration algorithm. By analyzing common result-integrating algorithms, this pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TRLE - an efficient data compression scheme for image composition of parallel volume rendering systems

    Publication Year: 2002, Page(s):499 - 506
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (538 KB) | HTML iconHTML

    In this paper we present an efficient data compression scheme, the template run-length encoding (TRLE) scheme, for image composition of parallel volume rendering systems. Given an image with 2n×2n pixels, in the TRLE scheme, the image is treated as n×n blocks and each block has 2×2 pixels. Since a pixel can be a blank or non-blank pixel, there are 16 templates in a block. To comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.