Filters








3,563 Hits in 8.7 sec

Community Place

Rodger Lea, Yasuaki Honda, Kouichi Matsuda, Satoru Matsuda
1997 Proceedings of the second symposium on Virtual reality modeling language - VRML '97  
Community Place is a shared multi-user VRML system designed to work in the Internet. It consists of a VRML2.0 browser, a multi-user server architecture and an application support environment.  ...  Its goal is to provide input and data to the debate about multi-user VRML in the hope of aiding the next phase of VRML's evolution.  ...  ACKNOWLEDGEMENTS We are indebted to our colleagues in the Sony Computer Science Lab. and Sony's Architecture Labs. for their help in the definition of this project.  ... 
doi:10.1145/253437.253451 dblp:conf/vrml/LeaHMM97 fatcat:mtu5v5k2erf3rcptt3aeae5dl4

Language-level support for exploratory programming of distributed virtual environments

Blair MacIntyre, Steven Feiner
1996 Proceedings of the 9th annual ACM symposium on User interface software and technology - UIST '96  
Any data object in COTE-RIE can be declared to be a Shared Object that is replicated fully in any process that is interested in it.  ...  Unlike other VE toolkits, COTERIE is based on a set of general-purpose parallel and distributed language concepts designed with the needs of virtual environments in mind.  ...  Rory Stuart of NYNEX Science & Technology provided us with the crossbox and assistance in designing Figure 1  ... 
doi:10.1145/237091.237104 dblp:conf/uist/MacIntyreF96 fatcat:kflhi7yrdrbizneuj5s6tfa2ga

Real-time optical-flow range estimation on the iWarp

Terrence W. Fong, Raymond E. Suorsa, Kim L. Boyer, Louise Stark
1993 Applications of Artificial Intelligence 1993: Machine Vision and Robotics  
This paper describes the implementation of an optical ow range-estimation algorithm, intended to support autonomous helicopter navigation, on the iWarp distributed-memory multicomputer.  ...  The range-estimation algorithm has been previously implemented on both distributed and shared-memory workstations.  ...  The authors would like to express sincere appreciation to Judson Jones and the Oak Ridge National Laboratory for use of the ORNL iWarp machine.  ... 
doi:10.1117/12.141770 fatcat:ru5ituzp6vamvj3ds6bywfui54

Network topologies for scalable multi-user virtual environments

T.A. Funkhouser
1996 Proceedings of the IEEE 1996 Virtual Reality Annual International Symposium  
Hierarchical system designs utilizing servers that manage message distribution for entities in separate regions of a virtual environment are described t h a t scale to arbitrary numbers of simultaneous  ...  We present message distribution techniques appropriate for constructing scalable multi-user systems for a variety of network characteristics.  ...  The system runs on Silicon Graphics workstations and uses UDP datagrams for message passing.  ... 
doi:10.1109/vrais.1996.490531 dblp:conf/vr/Funkhouser96 fatcat:gv4kl6qcqjdf5i42cauhjhfxvq

Spatially-decaying aggregation over a network

Edith Cohen, Haim Kaplan
2004 Proceedings of the 2004 ACM SIGMOD international conference on Management of data - SIGMOD '04  
Nodes in a p2p network could use a summary of content and properties of nodes in their neighborhood in order to guide search.  ...  In graphical databases such a s W eb hyperlink structure, properties such as subject of pages that can reach o r b e r e a c hed from a page using link traversals provide information on the page.  ...  BFS can be performed in O(D 1+ ) t i m e and O(m 1+ ) messages, where D is the diameter of the network and a time unit is the time required for a message to pass through an edge.  ... 
doi:10.1145/1007568.1007647 dblp:conf/sigmod/CohenK04 fatcat:xbwjsjx4jbf2tjoj3unpb7jesy

Virtual playground

Paul Schwartz, Shihming Yen, Lauren Bricker, Bruce Campbell, Tom Furness, Kori Inkpen, Lydia Matheson, Nobutatsu Nakamura, Li-Sheng Shen, Susan Tanney
1998 Proceedings of the ACM symposium on Virtual reality software and technology 1998 - VRST '98  
distribution.  ...  The first goal is supported by examining economic issues related to the design of commercially viable 3D virtual environments including issues such as allowing use of currently developed Web based content  ...  In order to reduce the latency of message passing between hosts, we chose to use a distributed architecture with no central server and three different forms of message passing schemes: multicasting, reliable  ... 
doi:10.1145/293701.293707 dblp:conf/vrst/SchwartzBCFIMNSTY98 fatcat:iouhuculczaqvnlq56rb6ycfwy

Porting and performance evaluation of irregular codes using OpenMP

Dixie Hisley, Gagan Agrawal, Punyam Satya-narayana, Lori Pollock
2000 Concurrency Practice and Experience  
With the improvements in centralized shared memory technologies and the emergence of distributed shared memory DSM architectures, several medium-to-large physical and logical shared memory con gurations  ...  Thus, OpenMP stands to be a p r omising medium for developing scalable and portable parallel programs.  ...  Acknowledgments: We would like t o a c knowledge Haoqiang Jin and Jerry Yan, who generously shared the beta version of the updated cg NAS benchmark with us.  ... 
doi:10.1002/1096-9128(200010)12:12<1241::aid-cpe523>3.0.co;2-d fatcat:vgvokmbjenchbjhb36roh4ygke

A Reaction-Diffusion Model for Epidemic Routing in Sparsely Connected MANETs

Daniel J. Klein, Joao Hespanha, Upamanyu Madhow
2010 2010 Proceedings IEEE INFOCOM  
In contrast to prior work, our model provides insight into the spatial distribution of the "infection," and reveals that the performance is sensitive to the geometry of the deployment region, not just  ...  In this paper, we model message propagation using a reaction-diffusion partial differential equation that has a traveling wave solution, and show that the performance predictions made by the model closely  ...  Existing well-mixed scaling laws apply to the situation in (a), whereas the reaction-diffusionbased laws derived in this paper apply to (b). using techniques developed for spatial epidemics. • We derive  ... 
doi:10.1109/infcom.2010.5462133 dblp:conf/infocom/KleinHM10 fatcat:adcyxmurf5fhjoxtyggqe2uz7i

A DFT-DWT Domain Invisible Blind Watermarking Techniques for Copyright Protection of Digital Images [chapter]

Munesh Chandra
2012 Advances in Wavelet Theory and Their Applications in Engineering, Physics and Technology  
Energy of watermarking message can be distributed averagly in space domain after the signal is implemented DFT.  ...  We have divided the HL 2 and LH 2 bands in to 4x4 blocks and applied DFT in these blocks and used to two highly uncorrelated pseudo random sequences (treated as key: key1) to embed watermarking message  ... 
doi:10.5772/38304 fatcat:2rkcetg4szb6xexzqtbzeqb67u

A Framework For Immersive Spatial Audio Performance

Mike Wozniewski, Zack Settel, Jeremy R. Cooperstock
2006 Zenodo  
Loudspeakers and microphones are modeled within thescene along with the listener/performer, creating a navigable 3Dsonic space where sound sources and sinks process audio according to user-defined spatial  ...  Traditional uses of virtual audio environments tend to focus onperceptually accurate acoustic representations.  ...  In addition, the authors are most grateful for the resources provided to the project by La Société Des Arts Technologiques and to the Banff Centre for the Arts for offering a productive and stimulating  ... 
doi:10.5281/zenodo.1177021 fatcat:hkz6okklare3vbiqihuqsf2i2y

An Analytical Model for Molecular Propagation in Nanocommunication via Filaments Using Relay-Enabled Nodes

Kamaloddin Darchinimaragheh, Attahiru S. Alfa
2015 IEEE Transactions on Nanobioscience  
Based on this technique, molecular communication via filaments using nano-relays is proposed in this paper to improve the performance of the system in terms of delay and bit error probability.  ...  Molecular communication is a nanoscale communication method in which information is encoded in molecules.  ...  In addition to this example, a practical technique is using concentration gradient.  ... 
doi:10.1109/tnb.2015.2492360 pmid:26529773 fatcat:pn3qkdzqajbdlg322b7foevhem

Gelecek Nesil Kablosuz Haberleşme Sistemleri için Çoklu Anten Sistemlerin Kanal Kapasitesi Analizi

Marwan DHUHEIR, Muhammad ASSHAD, Kerem Küçük
2017 Düzce Üniversitesi Bilim ve Teknoloji Dergisi  
Bununla birlikte MIMO sistemler, yüksek kanal kapasitesi ve yüksek veri hızı ihtiyacını karşılamaya yönelik teknikler olduklarından, uzaysal çoğullama ve kanal durum bilgisi teknikleri ile sağlanabilecek  ...  Ayrıca yüksek veri hızı ve güvenilirlik isteyen sistemler için en iyi seçim olarak öne çıkmaktadır.  ...  Since MIMO systems use techniques such as spatial multiplexing, we want to give a brief introduction in order to give the reader an overview about them.  ... 
doaj:4027d21c73784408a063abfb8b37d4ea fatcat:vmzbnmzfrzbenjc7axucfcohre

An Overview of the COVEN Platform

Emmanuel Frécon, Gareth Smith, Anthony Steed, Mårten Stenius, Olov Ståhl
2001 Presence - Teleoperators and Virtual Environments  
These applications were used in a series of real-scale networked trials that allowed us to gather many interesting human and technological results.  ...  To ful ll the technological and experimental goals of the project, we have modi ed an existing CVE platform: the DIVE (distributed interactive virtual environment) toolkit.  ...  Our goal here is to be able to decrease bandwidth use within a region of the environment.  ... 
doi:10.1162/105474601750182351 fatcat:4bxwkplk7nejlnalbtznrb6ihq

Approach for software development of parallel real-time VE systems on heterogenous clusters [article]

C. Winkelholz, T. Alexander
2002 Eurographics Symposium on Parallel Graphics and Visualization  
Main concept of the approach discussed in this paper is to use the virtual reality modeling language (VRML) as an interface definition language (IDL) for the parallel and distributed virtual environment  ...  Furthermore, the implementation of a VE system for a geographic information system (GIS) based on this approach is shown.  ...  These approaches are designed to visualize a distributed virtual environment to multiple spatially separated users across a wide area network (WAN).  ... 
doi:10.2312/egpgv/egpgv02/023-032 fatcat:74gvzzyacncwpo3f3fwddpgfpi

Attacking Image Watermarking and Steganography - A Survey

Osama Hosam
2019 International Journal of Information Technology and Computer Science  
In this paper, we discuss the image data hiding attacks that directed to both secure message and carrier image. First, message attacks such as Oracle and Template attacks will be discussed.  ...  On the other hand, watermarking algorithms are used for keeping the watermark robust to attacks.  ...  Desynchronization attack is a technique used to disturb the watermark extraction process.  ... 
doi:10.5815/ijitcs.2019.03.03 fatcat:bjbiaqox6jeupiuui33ej2luay
« Previous Showing results 1 — 15 out of 3,563 results