Search Results - "2004 International Conference on Cyberworlds"

Refine Results
  1. 1

    Barcode readers using the camera device in mobile phones by Ohbuchi, E., Hanaizumi, H., Hock, L.A.

    “…This paper shows new algorithms and the implementations of image reorganization for EAN/QR barcodes in mobile phones. The mobile phone system used here…”
    Get full text
    Conference Proceeding
  2. 2

    Transmedial worlds - rethinking cyberworld design by Klastrup, L., Tosca, S.

    “…In this paper we introduce the concept of transmedial worlds, relating it to genre and adaptation theory, and presenting a framework for how to look for…”
    Get full text
    Conference Proceeding
  3. 3

    An efficient and secure multi-server password authentication scheme using smart cards by Chin-Chen Chang, Jung-San Lee

    “…With the rapid growth of computer networks and communication technologies, more and more computers are linked together such that facilities can be shared…”
    Get full text
    Conference Proceeding
  4. 4

    Watermarking a 3D shape model defined as a point set by Ohbuchi, R., Mukaiyama, A., Takahashi, S.

    “…This paper discusses a method to watermark a 3D shape model defined as a set of unoriented points. Our approach is to perform frequency domain analysis of the…”
    Get full text
    Conference Proceeding
  5. 5

    Toward E-appearance of human face and hair by age, expression and rejuvenation by Bastanfard, A., Takahashi, H., Nakajima, M.

    “…Recently, Web based facial appearance systems have received more attention by various aspects and applications like online systems. Therefore there is a…”
    Get full text
    Conference Proceeding
  6. 6

    Modeling of bodies and clothes for virtual environments by Magnenat-Thalmann, N., Cordier, F., Seo, H., Papagianakis, G.

    “…Although graphical human modeling has been a long sought subject in computer graphics, when it comes to dealing with real-time applications, it raises a number…”
    Get full text
    Conference Proceeding
  7. 7

    The potentials of cyberworlds - an axiomatic approach by Kunii, T.L.

    “…Considering the increasingly large impacts and potentials of cyberworlds as seen in e-financing that trades GDP equivalent in a day, we human beings living in…”
    Get full text
    Conference Proceeding
  8. 8

    Intelligent agents in virtual worlds by Iglesias, A., Luengo, F.

    “…The realistic animation of the behavior of virtual agents emulating human beings and evolving within virtual 3D worlds (a field also known as artificial life)…”
    Get full text
    Conference Proceeding
  9. 9

    Modeling corporate knowledge within the agent oriented abstraction by Maret, P., Calmet, J.

    “…An enterprise can be considered in a distributed computational paradigm. Multiagent systems have been invented to tackle such problems within artificial…”
    Get full text
    Conference Proceeding
  10. 10

    Interactive function-based shape modeling for cyberworlds by Levinski, K., Sourin, A.

    “…Shared virtual worlds require exchanging shape models over the Internet. Since complex shapes such as VRML objects are often defined with polygonal meshes, the…”
    Get full text
    Conference Proceeding
  11. 11

    Immersive multi-projector display on hybrid screens with human-scale haptic and locomotion interfaces by Hashimoto, N., Jeong, S., Takeyama, Y., Sato, M.

    “…Many immersive displays developed in previous researches are strongly influenced by the design concept of the CAVE which is the origin of the immersive…”
    Get full text
    Conference Proceeding
  12. 12

    A compression-based data hiding scheme using vector quantization and principle component analysis by Chin-Chen Chang, Pei-Yu Lin

    “…Nowadays, data-hiding techniques for images generally work by embedding the secret data in either the spatial domain or the frequency domain. By contrast,…”
    Get full text
    Conference Proceeding
  13. 13

    Paradigm of information security as interdisciplinary comprehensive science by Tsujii, S.

    “…The concept of information security is "the dynamic process for establishing an integrated and complete system designed to form, without infringing freedom…”
    Get full text
    Conference Proceeding
  14. 14

    Bridge ontology and its role in semantic annotation by Baowen Xu, Peng Wang, Jianjiang Lu, Yanhui Li, Dazhou Kang

    “…Multiontologies environment is common such as the semantic annotation applications based on multiontologies. Based on analyzing and classifying the…”
    Get full text
    Conference Proceeding
  15. 15

    Generating autonomous time-varying virtual cities by Honda, M., Mizuno, K., Fukui, Y., Nishihara, S.

    “…We propose an approach to generating virtual cities that vary dynamically over time, focusing on the layout of artificial elements such as building, roads, and…”
    Get full text
    Conference Proceeding
  16. 16

    A platform to design and run dynamic virtual environments by Piza, H.I., Zuniga, F., Ramos, F.F.

    “…This paper is devoted to introducing, in a general fashion, a platform that allows users to generate virtual scenes. Such generation involves two phases: 1)…”
    Get full text
    Conference Proceeding
  17. 17

    Frame skeleton based auto-inbetweening in computer assisted cel animation by Melikhov, K., Feng Tian, Hock Soon Seah, Quan Chen, Jie Qiu

    “…Automatic inbetweening is one of the main focuses in computer assisted cel animation as inbetweening process is traditionally time-consuming and…”
    Get full text
    Conference Proceeding
  18. 18

    Query processing algorithms for time, place, purpose and personal profile sensitive mobile recommendation by Pinyapong, S., Kato, T.

    “…Nowadays more people have started using mobile phone to access information they need from anywhere at anytime. In advanced mobile technology, location service…”
    Get full text
    Conference Proceeding
  19. 19

    Analytically-defined collaborative shape modeling in VRML by Qi Liu, Sourin, A.

    “…In this paper we introduce a function-defined extension of Virtual Reality Modeling Language where analytical formulas are used for defining geometry and…”
    Get full text
    Conference Proceeding
  20. 20

    3D character model creation from cel animation by Ono, Y., Bing-Yu Chen, Nishita, T.

    “…When creating a cel animation, the animators often use 3D character models to add some effects on the character or to generate intermediate images between the…”
    Get full text
    Conference Proceeding