Catálogo de publicaciones - libros

Compartir en
redes sociales


Computer and Information Seciences: ISCIS 2006: 21th International Symposium Istanbul, Turkey, Novenber 1-3, 2006, Proceedings

Albert Levi ; Erkay Savaş ; Hüsnü Yenigün ; Selim Balcısoy ; Yücel Saygın (eds.)

En conferencia: 21º International Symposium on Computer and Information Sciences (ISCIS) . Istanbul, Turkey . November 1, 2006 - November 3, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-47242-1

ISBN electrónico

978-3-540-47243-8

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Hardware-Oriented Visualisation of Trees

C. Rebollo; I. Remolar; M. Chover; J. Gumbau

Real-time rendering of vegetation is currently a problem in need of a solution. The large number of polygons that form this kind of objects means that current hardware cannot achieve interactive rendering of outdoor scenes. This paper deals with the problem and it presents a multiresolution scheme that allows us to represent the whole geometry of the trees using both uniform and variable levels of detail. The method presented here models the trees using two multiresolution models. This is due to the different characteristics of the geometry that forms them. The trunk is modelled by LodStrips , a model oriented towards representing continuous meshes, and the foliage is modelled by the multiresolution model Level of Detail Foliage , presented in a previous work. In this paper, it has been efficiently implemented and extended to allow us to change the level of detail in a variable way, by adapting the resolution of this part of the tree to certain criteria determined by the application. Both of them have been designed to be hardware-oriented. They take advantage of the graphics hardware by adapting the data structures and the rendering algorithms to make the visualisation time efficient. Finally, the multiresolution scheme presented in this paper is compared with the only work that has appeared up to now that uses the same technique.

Palabras clave: Binary Tree; Graphic Card; Graphic Hardware; Vegetal Species; Outdoor Scene.

- Computer Graphics | Pp. 374-383

A Multi-resolution Technique for Real-time Animation of Large Crowds

Ingu Kang; Young Ik Eom; JungHyun Han

This paper proposes a multi-resolution technique for real-time animation of large crowds, which is useful for massively multi-player online games. Skinning is used to animate non-player characters (NPCs) at close proximity as well as player characters, vertex keyframe animation is used for middle-distance NPCs, and impostors are used for rendering long-distance NPCs. Both of skinning and vertex keyframe animation are accelerated by GPU, and each character is animated independently of the others. The experiments show that hundreds of thousands of characters can be animated at real-time.

Palabras clave: character animation; skinning; vertex keyframe animation; impostor; large crowds rendering; GPU.

- Computer Graphics | Pp. 384-393

A Framework for Working with Digitized Cultural Heritage Artifacts

Can Ozmen; Selim Balcisoy

In this paper, we present our work in designing, implementing, and evaluating a set of 3D interactive spatial measurement tools in the context of Cultural Heritage Toolbox (CH Toolbox), a framework for computer-aided cultural heritage research. Our application utilizes a bi-manual, spaceball and mouse driven user interface to help the user manage visualized 3D models digitized from real artifacts. We have developed a virtual radius estimator, useful for analyzing incomplete pieces of radial artifacts, and a virtual tape measure, useful in measurement of geodesic distances between two points on the surface of an artifact. We tested the tools on the special case of pottery analysis.

Palabras clave: Cultural Heritage; Steiner Point; Radius Estimation; Cultural Heritage Domain; Real Artifact.

- Computer Graphics | Pp. 394-400

On the Stability of Application-Layer Multicast Tree

Ke Xu; Jiangchuan Liu; Lizheng Fu; Chunyu Liu

A tree structure has been widely used in constructing application-layer overlays. It is known that the instability of a tree will significantly reduce the performance of the overlay. In this paper, we propose a novel stochastic model that captures the (in)stability characteristics of an application-layer multicast tree. Our model has considered various important factors related to the tree stability, and we have derived closed-form solutions to a class of typical multicast trees. Our results offer a better understanding on the (in)stability of application-layer multicast trees, and also suggest three effective enhancements to improve their stability.

Palabras clave: Application-Layer Multicast; Stability; Stochastic model.

- Computer Networks | Pp. 401-412

Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks

JongMin Jeong; GooYeon Lee; SangJae Moon

This paper considers the global communication environment of B3G wireless networks when integrating security mechanism of two wireless networks, WLAN and 3G cellular networks. As a result, the existing integration paradigms are extended to a more realistic network model for B3G based on dividing the cellular network into the visited network and the home network. Also, we presents a security analysis based on a formal model of the cryptographic mechanisms.

- Computer Networks | Pp. 413-423

A New Function for Optimization of Working Paths in Survivable MPLS Networks

Krzysztof Walkowiak

We consider the problem of working paths optimization in survivable MPLS network. Both restoration methods: global and local repair are addressed. We focus on an existing facility network, in which only network flows can be optimized to provide network survivability. The lost flow due to a single failure of a network link is applied as the performance metric. Since joint optimization of working and recovery paths is very complex, we suggest to partition the problem into two simpler subproblems and first optimize working routes. We introduce a new objective function for optimization of working routes and propose a heuristic algorithm to solve the considered problem. Next, simulation performance of various methods for working paths assignment is examined.

Palabras clave: Network Link; Network Survivability; Backup Path; Demand Pattern; Restoration Method.

- Computer Networks | Pp. 424-433

HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes

Attila Altay Yavuz; Fatih Alagoz; Emin Anarim

Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant communication, play important role in tactical military networks. However, providing security in tactical military MANETs, having very large and dynamic structure without infrastructure support in hostile environments, is a very difficult task. In order to address security problems in tactical military MANETs, we propose a new HIerarchical MUlti-Tier adaptive ad-hoc network security protocol based on SIgncryption type key exchange Schemes: HIMUTSIS. Our protocol makes contribution to the military MANETs in three major points: Architectural design, cryptographic methods used in military MANETs and key management techniques. Novel architectural design of HIMUTSIS facilitates certification and key management procedures, provides flexibility and reduces cryptographic workload of the military MANETs. In HIMUTSIS, as a novelty, we offer to use DKEUTS (Direct Key Exchange Using TimeStamp) protocol providing security and performance advantages when compared to some traditional cryptographic methods. Also, multi-security level approach provides adaptive solutions for each layer of the HIMUTSIS. As a key management technique, HIMUTSIS uses hybrid key management approach which reduces rekeying workload of the networks significantly while minimizing single point of failure risk of the military MANET.

Palabras clave: Security Level; Block Cipher; Stream Cipher; Trust Third Party; Cryptographic Hash Function.

- Computer Networks | Pp. 434-444

Dual-Level Traffic Smoothing Technique over Switched Ethernet for Hard Real-Time Communication

Hai Jin; Minghu Zhang; Pengliu Tan

This paper introduces a novel dual-level traffic smoothing technique for hard real-time communication over Fast/Gigabit switched Ethernet without any modification to existing Ethernet hardware. First, the necessary restricted conditions for hard real-time communication over switched Ethernet are analyzed using the network calculus theory. Then the dual-level traffic smoothing scheme, which combines the node-level traffic smoothing with the global-level traffic smoothing, is introduced. Finally, we make thorough measurements and the results show that the dual-level traffic smoothing mechanism can provide very good hard real-time communication performance with low system overheads and has more potential for most hard real-time and embedded control systems than other existing approaches.

Palabras clave: Packet Loss; Service Node; Arrival Curve; Network Calculus; Service Curve.

Pp. 445-454

A Model of a Packet Aggregation System

Jung Ha Hong; Oleg Gusak; Neal Oliver; Khosrow Sohraby

The decision and ability to aggregate packets can have significant impact on the performance of a communication system. The impact can be even more substantial when the system operates under a heavy load. In this paper, we present a queuing model which describes a packet encapsulation and aggregation process. Using this model, we provide analysis of the end-to-end delay of a packet transmitted by the system. The analytical model is verified by a simulation model of the system. We calculate the maximum number of packets in a single frame for which packet aggregation minimizes the average total delay of a packet. It is numerically shown that when the load is high, the higher the variability of the packet service time, the higher the maximum allowed number of packets in the frame should be to achieve the minimum average total packet delay. However, the impact of the variability of the packet service time is insignificant when the system load is moderate or low.

Palabras clave: Service Time; Markov Chain Model; Probability Generate Function; Laplace Stieltjes Transform; Markov Modulate Poisson Process.

- Computer Networks | Pp. 455-463

On the Use of Principle Component Analysis for the Hurst Parameter Estimation of Long-Range Dependent Network Traffic

Melike Erol; Tayfun Akgul; Sema Oktug; Suleyman Baykut

Long-range dependency and self-similarity are the major characteristics of the Internet traffic. The degree of self-similarity is measured by the Hurst parameter ( H ). Various methods have been proposed to estimate H . One of the recent methods is an eigen domain estimator which is based on Principle Component Analysis (PCA); a popular signal processing tool. The PCA-based Method (PCAbM) uses the progression of the eigenvalues which are extracted from the autocorrelation matrix. For a self-similar process, this progression obeys a power-law relationship from which H can be estimated. In this paper, we compare PCAbM with some of the well-known estimation methods, namely; periodogram-based, wavelet-based estimation methods and show that PCAbM is reliable only when the process is long-range dependent (LRD), i.e., H is greater than 0.5. We also apply PCAbM and the other estimators to real network traces.

Palabras clave: Principle Component Analysis; Fractional Brownian Motion; Hurst Parameter; Regression Plot; Autocorrelation Matrix.

- Computer Networks | Pp. 464-473